WikiLeaks Vault 7 Releases CIA Documents Showing How Agency Obscures Hacking Origins

WikiLeaks Vault 7

 

John McAfee views on WikiLeaks Vault 7 Releases

 

WikiLeaks Vault 7 proves CIA equates to Crooks In Action 

Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware/software manuals from Microchip Technology Inc.). The project was maintained between 2014 and 2015.

Protego is not the “usual” malware development project like all previous publications by WikiLeaks in the Vault7 series. Indeed there is no explicit indication why it is part of the project repositories of the CIA/EDG at all.

The Protego project is a PIC-based missile control system that was developed by Raytheon. The documents indicate that the system is installed on-board a Pratt & Whitney aircraft (PWA) equipped with missile launch systems (air-to-air and/or air-to-ground).

Protego consists of separate micro-controller units that exchange data and signals over encrypted and authenticated channels:

» On-board TWA are the ‘Master Processor’ (MP) and the ‘Deployment Box’. Both systems are layed-out with master/slave redundancy.

» The missle system has micro-controllers for the missle itself (‘Missle Smart Switch’, MSS), the tube (‘Tube Smart Switch’, TSS) and the collar (which holds the missile before and at launch time).

Wikileaks

 

WASHINGTON — In what appears to be the largest leak of C.I.A documents in history, WikiLeaks released on Tuesday thousands of pages describing sophisticated software tools and techniques used by the agency to break into smartphones, computers and even Internet-connected televisions.

The documents amount to a detailed, highly technical catalog of tools. They include instructions for compromising a wide range of common computer tools for use in spying: the online calling service Skype; Wi-Fi networks; documents in PDF format; and even commercial antivirus programs of the kind used by millions of people to protect their computers.

A program called Wrecking Crew explains how to crash a targeted computer, and another tells how to steal passwords using the autocomplete function on Internet Explorer. Other programs were called CrunchyLimeSkies, ElderPiggy, AngerQuake and McNugget.

The document dump was the latest coup for the antisecrecy organization and a serious blow to the C.I.A., which uses its hacking abilities to carry out espionage against foreign targets. New York Times

 

Malware and hacking tools that mirror one detailed in purported Central Intelligence Agency (CIA) Vault 7 documents released by WikiLeaks have been used in numerous cyberattacks in recent years, according to cyber security firm Symantec.

The tools have been used primarily by a group Symantec identified as Longhorn. The collective has been active since at least 2011 and has been tied to attacks against 40 targets in 16 different countries.

Read: WikiLeaks Vault 7, Year Zero: CIA Can Hack iOS, Android Devices, Access Encrypted Messaging Apps Like WhatsApp, Alleged Documents Say

Symantec claims it has been tracking the group for three years, keeping a close eye on its behavior in order to protect against similar attacks. Since the release of CIA documents by WikiLeaks as a part of its Vault 7 series, the security firm has been able to match the technical documentation from supposed CIA hacks to those performed by Longhorn.

According to Symantec, the Longhorn group has used some of the same cryptographic protocols identified in the Vault 7 documents. The group also used tactics for avoiding detection that were similar to ones in the leaks. Ibtimes

When WikiLeaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency’s already shadowy reputation gained a new dimension. But if you’re an average American, rather than Edward Snowden or an ISIS jihadi, the real danger clarified by that leak wasn’t that someone in Langley is watching you through your hotel room’s TV. It’s the rest of the hacker world that the CIA has inadvertently empowered.

As security researchers and policy analysts dig through the latest WikiLeaks documents, the sheer number of hacking tools the CIA has apparently hoarded for exploiting zero-day vulnerabilities—secret inroads that tech firms haven’t patched—stands out most. If the US intelligence community knows about them, that leaves open the possibility that criminal and foreign state hackers do as well.

Its broad zero-day stash, then, strongly suggests that the CIA—along with other intelligence agencies—has long allowed Americans to remain vulnerable to those same attacks. Now that those hacking secrets are public, potentially along with enough details to replicate them, the danger of the feds leaving major security flaws unfixed only escalates. https://www.wired.com/2017/03/cias-hacking-hoard-makes-everyone-less-secure/

Other Articles of Interest

Define Indoctrination: The Craft of Deep-Seated Brainwashing and Conditioning

Define Indoctrination: The Art of Subtle Brainwashing and Conditioning

Indoctrination: The Process of Brainwashing and Conditioning July 18. 2024 You think the way you do because of your parents, ...
The Statin Scam: Profiting at the Cost of Lives

The Statin Scam: Deadly Profits from a Pharmaceutical Deception

The Statin Scam: Profiting at the Cost of Lives July 16, 2024 Introduction: Few topics in modern medicine have generated ...

Copper Stocks: Buy, Flee, or Wait?

Cool Copper Stocks: Jump In or Out? Updated July 11, 2024 In the ever-evolving landscape of global investments, copper has ...

Dow 30 Stocks: Spot the Trend and Win Big

Dow 30 Stocks: Uncover the Trend and Dominate the Market July 19, 2024 The Dow Jones Industrial Average (DJIA), colloquially ...
Coffee Lowers Diabetes Risk: Sip the Sizzling Brew

Coffee Lowers Diabetes Risk: Sip the Sizzling Brew

Coffee Lowers Diabetes Risk: Java Up, Everyone! July 8, 2024 Introduction In the ever-evolving landscape of health and nutrition, few ...
3D Printing Ideas: Create the Unthinkable

3D Printing Ideas: Revolutionize Your Imagination

Editor: Vladimir Bajic | Tactical Investor 3D Printing Ideas: Unlocking the Future of Creativity and Innovation July 7, 2024 Introduction ...
Beetroot Benefits for Male Health: Unlocking Nature's Vitality

Beetroot Benefits for Male Health: Unlocking Nature’s Vitality

Beetroot Benefits for Male Health: Power Up Your Health with Nature's Booster July 5, 2024 Introduction "The preservation of health ...
Norse Pagan Religion, Viking-Style Warriors

Norse Pagan Religion, from Prayers to Viking-Style Warriors

The Origins of Norse Pagan Religion: The Creed of the Fierce Vikings July 3, 2024 Echoes of Ancient Realms In ...
Example of Out-of-the-Box Thinking: How to Beat the Crowd

Example of Out of the Box Thinking: How to Beat the Crowd

Examples of Out-of-the-Box Thinking: Outsmart the Crowd July 3, 2024 In investing and financial markets, thinking independently and diverging from ...
6 brilliant ways to build wealth after 40: Start Now

6 brilliant ways to build wealth after 40: Start Now

Great things are done when men and mountains meet. This is not done by jostling in the street. William Blake ...
Describe Some of the Arguments That Supporters and Opponents of Wealth

Describe Some of the Arguments That Supporters and Opponents of Wealth Tax Make

Describe Some of the Arguments That Supporters and Opponents of Wealth Tax Make: Key Perspectives Unveiled July 2, 2024  The ...
What is a Limit Order in Stocks and more

What is a Limit Order in Stocks: An In-Depth Exploration

What is a Limit Order in Stock: An In-Depth Exploration Updated July 1,  2024 Limit orders are like setting a ...
Lone Wolf Mentality: The Ultimate Investor's Edge

Lone Wolf Mentality: The Ultimate Investor’s Edge

Lone Wolf Mentality: Your Ultimate Investor's Edge July 1, 2024 In the ever-evolving landscape of investment, the "Lone Wolf Mentality" ...
Wolf vs Sheep Mentality: Both States Have Their Perks

Wolf vs Sheep Mentality: Embrace the Hunt or Be the Prey

Wolf vs Sheep Mentality: Dominate the Game or Get Devoured July 1, 2024 In the complex world of finance and ...
Best ETF Strategy: Avoid 4X Leveraged ETFs like the Plague

Best ETF Strategy: Avoid 4X Leveraged ETFs like the Plague

Best ETF Strategy: Avoid Super Leveraged ETFs Updated July 1, 2024 Introduction: The allure of leveraged ETFs, such as the ...