Wikileaks Vault 7: Did you say anything about security?

Yesterday we mentioned about it Wikileaks Vault 7 the latest leaks that reveal the CIA's hacking capabilities. One of the many remarkable things the service can do is to overcome encryption using popular messaging applications such as WhatsApp and Signal.

So everyone who uses the applications WhatsApp, Signal, Telegram, Weibo, Confide ή Cloackman and believe their messages are encrypted will rather be disappointed as the leak indicates that the encryption layers they use can be circumvented by the techniques developed by the CIA.Wikileaks Vault 7

According to the files released by Wikileaks, the CIA has special teams that work only for it malware intent on taking control of not only iPhone and Android devices but many others as well.

These teams use zero-day vulnerabilities found in operating systems, and they are constantly developing malware that can be used to bypass any encryption layers, messaging applications, and more.

WikiLeaks reports that the CIA's hacking tools and malware were developed by the Engineering Development Group (EDG), a software development group in for Cyber (CCI), which is a division of the Directorate for Digital Innovation (DDI) and is located within the CIA.

EDG develops, tests and offers operational support for all backdoors, exploits, malware, trojans, viruses and any other malware created by the CIA and used in its secret business.

Another part of the CIA is Devices Branch, which developed several remote attack methods targeting popular smartphones.

So CIA can have user geolocation, audio and text communications. The secret service can also secretly activate the phone's camera and microphone and generally use the device as a spy tool.

The CIA is reported to have created special sections who are working to discover ways around it of Android and iOS. The iOS branch has created a malware that can infect, control and extract data from iPhones, iPads and more. Similarly, the Android division has managed to turn Androids into spying devices by exploiting zero-days, which are either developed in-house by the CIA or borrowed from the UK's GCHQ, the NSA, or bought from zero-day trading companies.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).