WikiLeaks CherryBlossom the CIA tool for your router

New leaked secret documents reveal that the CIA targets and violates home and public wireless routers for years in its attempt to conduct illegal surveillance.

The leaked documents are part of an ongoing series of leaks circulating WikiLeaks website, revealing the work of the elite of the CIA hacking team, called the Engineering Development Group.Inc

Among the dozens of files are user guides and s, manuals and other "secret" maps and charts that reveal several suites of hacking tools that allow the organization to conduct targeted exploitation of networks and computers.

One of the tools is called CherryBlossom, and allows the service to monitor the online activity of a target, redirect the browser, crawl email addresses and phone numbers, and more.

Routers or routers remain a prime target for both information services and hackers, because they act as a central Internet connection point as well as on entire networks. What makes routers a very attractive goal is that safety flaws that make it easy to exploit are not often revealed, and of course there are not so many updates.

According to a document dating back to 2010, by mid-2012 the CIA had developed implants "for about 25 different devices from 10 different manufacturers", including its routers Asus, Belkin, D-Link, Linksys and Netgear.

It is unclear whether malicious implants are still functioning or withdrawn.

Please be reminded that Wikileaks released documents in the Vault 7 series from 7 March, exposing more and more Coca-Cola Hacker tools.

"Year Zero” the CIA exploits popular hardware and .
"Weeping Angel"The spying tool that the service uses to penetrate smart TVs, turning them into disguised microphones.
"Dark Matter"Exploits targeting iPhones and Mac.
"MarbleThe source code of a secret anti- framework. It is essentially an obfuscator used by the CIA to hide the real source of malware.
"GrasshopperA framework that allows the intelligence service to easily create custom malware to infringe on Windows and bypass any virus protection.

"Archimedes"- a MitM attack tool allegedly created by the CIA for targeting computers within a local area network (LAN).
Scribbles” a piece of software designed to add 'web beacons' to classified documents to allow intelligence to monitor leaks.
Athena:is designed to be able to gain complete control over infected Windows computers, allowing the CIA to perform many operations on the target machine, such as deleting or installing malware, stealing data and sending it to CIA servers.

CherryBlossom a tool that monitors a web activity on a goal, redirects the browser, crawls e-mail addresses and phone numbers, and more through the router

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).