AnonymousVideo

Vault 7 - CIA Hacking Tools Revealed # Ideas are bulletproof

Vault 7 - CIA Hacking Tools Revealed

Tuesday 7 March 2017

WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency.

Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

Once a single cyber ’weapon’ is ’loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that:

"There is an extreme proliferation risk in the development of cyber ’weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ’weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of ’armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ’weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.
Analysis

CIA malware targets iPhone, Android, smart TVs.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ’Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ’Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones ( 85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Keywords

Wikileaks

Translation

PeerTube, a free and federated video platform

PeerTube, a free and federated video platform

A decentralized video hosting network, based on free/libre software. PeerTube is a practical answer to all video-tubes that centralize our data and attention. With it, videos (...)


Girls of the Sun

A story of resistance and sisterhood. A fight for hope. This film is a unique tribute to those women. Director: Eva Husson - Cast: Golshifteh Farahani, Emmanuelle Bercot. (...)


The Armenian Genocide

Today we lament the beginning of the infamous Armenian Genocide (24th April 1915) in which 1.5 million Armenians died at the hands of Turkey’s Ottoman regime. Force-marched to (...)


End Julian Assange’s isolation

We demand that Julian Assange’s isolation ends NOW! It is with great concern that we heard that Julian Assange has lost access to the internet and the right to receive (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 - Host: 6dvj6v5imhny3anf.onion - Port: 6697 - SSL
Webchat #OpNewBlood
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Tor Browser
Tor Browser
Tor protects your privacy
NordVPN
NordVPN
Protect your privacy

Secure your Internet Connection.

Read more Close