Yesterday we mentioned about it Wikileaks Vault 7 the latest leaks that reveal the CIA's hacking capabilities. One of the many remarkable things the service can do is to overcome encryption using popular messaging applications such as WhatsApp and Signal.
So everyone who uses the applications WhatsApp, Signal, Telegram, Weibo, Confide ή Cloackman and believe their messages are encrypted will rather be disappointed as the leak indicates that the encryption layers they use can be circumvented by the techniques developed by the CIA.
According to files released by Wikileaks, the CIA has dedicated malware-only teams that intend to take control of not only iPhone and Android but also many others.
These groups use zero-day ευπάθειες που βρέθηκαν στα λειτουργικά συστήματα, και αναπτύσσουν συνεχώς malware που μπορούν να χρησιμοποιηθούν για να παρακάμψουν τυχόν στρώματα κρυπτογράφησης, σε εφαρμογές μηνυμάτων ή και άλλες.
WikiLeaks reports that CIA and malware hacking tools have been developed by the Engineering Development Group (EDG), a software development team at the Center for Cyber Intelligence (CCI), which is a division of the Directorate for Digital Innovation or Directorate for Digital Innovation (DDI) and is headquartered within the CIA.
Η EDG αναπτύσσει, δοκιμάζει και προσφέρει επιχειρησιακή υποστήριξη για όλα τα backdoors, exploits, malware, trojans, virus και κάθε άλλου είδους malware που δημιουργήθηκαν από τη CIA και χρησιμοποιήθηκαν σε μυστικές businesses her.
Another part of the CIA is Mobile Devices Branch, which has developed many remote attack methods targeting popular smartphones.
So CIA can have user geolocation, audio and text communications. The secret service can also secretly activate the phone's camera and microphone and generally use the device as a spy tool.
The CIA is reported to have created special sections working to find ways to bypass Android and iOS security. The iOS branch has created malicious software that can infect, control, and extract data from iPhones, iPads, and more. Similarly, the Android section has been able to turn Android into zero-day spy devices that have either been deployed within the CIA or borrowed from the British GCHQ, the NSA or bought by zero day marketing companies.