WikiLeaks: How does the CIA turn on your device microphone?

WikiLeaks continues to publish its archives Vault 7 allegedly belonging to the CIA. She published a user guide for Weeping Angel, a tool that allows the US intelligence service to gain control over smart TVs.

The Weeping Angels is a tool mentioned by the first round of Wikileaks' published records in March. Today the site gives us more information on what it can do.WikiLeaks

First of all, Weeping Angel is a tool derived from another tool created by the British intelligence service MI5 / BTSS, called "Extending".

Extending is a tool used by secret service hackers to take control of Samsung F Smart TV. The user guide explains that this is an implant designed to record audio from the built-in microphone as well as store data.

The malicious one can be installed on the TV via , and data can be collected in the same way or via a WiFi which is installed near the TV. The instruction shows step-by-step how to install the malware and advises hackers-spies to clear the history of installed applications if the TV remote control has a History button.

Let's mention that the audio in real time is also possible with the help of a Live Listen Tool, which works on devices with Windows 7 or 8 installed.

Wikileaks notes that CIA and MI5 / BTSS worked together for the Weeping Angel during a Joint Development Workshop, which is similar to the boot camps we know.

We must emphasize that in order to perform the Hack on Samsung smart TVs, physical contact with the TV is required to install the malware. This is mainly because of s of the firmware made in 2014, which prevents the piracy of the TV via the Internet.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).