WikiLeaks Vault#7 thread by Odio - Page 3 - TribalWar Forums
Click Here to find great hosting deals from Branzone.com


Go Back   TribalWar Forums > TribalWar Community > General Discussion
Reload this Page WikiLeaks Vault#7 thread
Page 3 of 9
Thread Tools
StapleMammal1
Veteran++
Contributor
Old
41 - 03-07-2017, 10:25
Reply With Quote
Wikileaks - Vault 7: CIA Hacking Tools Revealed

Quote:
Analysis: CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.



CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".

Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.
 
StapleMammal1 is offline
 
Sponsored Links
StapleMammal1
Veteran++
Contributor
Old
42 - 03-07-2017, 10:26
Reply With Quote
Android, Linux, and Mac are all compromised & ****ed beyond belief.
 
StapleMammal1 is offline
 
StapleMammal1
Veteran++
Contributor
Old
43 - 03-07-2017, 10:26
Reply With Quote
Well said.

 
StapleMammal1 is offline
 
StapleMammal1
Veteran++
Contributor
Old
44 - 03-07-2017, 10:28
Reply With Quote
If you ever need to skip the windows 8 activation process here you go. This tutorial is courtesy of the CIA found in their little playtime area.

The default MDSN Windows 8 installation requires Product Key Activation in order to setup. The following steps are useful in editing the MSDN iso to enable the Skip button during the install.

1.Extract the boot.bin from the msdn iso image. Download geteltorito.pl to help extract the boot image.
./geteltorito.pl win8_image.iso > boot.bin

2. mount the win8_image iso to a folder. It is read only e.g. a DVD so after mounting copy the contents to a writable folder.

mkdir win8_ro

mount -t auto -o loop win8_image.iso win8_ro

mkdir win8

cp -r win8_ro win8

3. Copy any modification into the win8 folder. In this case a file ei.cfg was added to win8/sources.
[EditionID]
Professional
[Channel]
Retail
[VL]
0

4. Copy the boot.bin into the win8 boot directory. mkisofs requires the boot.bin be located in the image as a relative path is used.
mkisofs -udf -b boot/boot.bin -no-emul-boot -hide boot.bin -relaxed-filenames -joliet-long -D -o ./new_win8.iso ./win8

5. chmod and chgrp the new_win8.iso so the linux gui can burn the dvd. Just right click.

6. The following iso is modified to enable skipping the Product Key prompt. [\\fs-01\share\OS DVD ISOs\Windows 8\skip activation modified]
 
StapleMammal1 is offline
 
Goshin
GriftKingXX
Old
45 - 03-07-2017, 10:32
Reply With Quote
cia hacked the planet
 
Goshin is offline
 
StapleMammal1
Veteran++
Contributor
Old
46 - 03-07-2017, 10:32
Reply With Quote
VIM lessons straight from CIA

Vim
 
StapleMammal1 is offline
 
Milk-Man
VeteranXX
Old
47 - 03-07-2017, 10:33
Reply With Quote
so like, what's in the new leaks? CIA being dicks?
 
Milk-Man is offline
 
StapleMammal1
Veteran++
Contributor
Old
48 - 03-07-2017, 10:43
Reply With Quote
Basically proof the CIA has "hacked the planet" like Goshin stated.

TVs, Comps, Cell phones, and the like. All working as spy devices for the CIA.

Spoiler
 
StapleMammal1 is offline
 
Last edited by StapleMammal1; 03-07-2017 at 10:47..
SuicideSnowman
VeteranXV
Old
49 - 03-07-2017, 10:47
Reply With Quote
It's pretty obvious that the possibility of this **** going on was high with everything being connected to the internet and having microphones.
 
SuicideSnowman is offline
 
SuicideSnowman
VeteranXV
Old
50 - 03-07-2017, 10:51
Reply With Quote
Also:

Quote:
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
So basically, they can blame everything on Russia if they wanted to. Let's blame hacking on Russia so that we can wiretap people communicating with them.
 
SuicideSnowman is offline
 
StapleMammal1
Veteran++
Contributor
Old
51 - 03-07-2017, 10:51
Reply With Quote
Quote:
Originally Posted by SuicideSnowman View Post
It's pretty obvious that the possibility of this **** going on was high with everything being connected to the internet and having microphones.
Agreed but years ago when I would tell folks their TV and phone was spying on them I would get called crazy and laughed at. Who's laughing now?
 
StapleMammal1 is offline
 
Goshin
GriftKingXX
Old
52 - 03-07-2017, 10:53
Reply With Quote
internet of no protection on any things
 
Goshin is offline
 
StapleMammal1
Veteran++
Contributor
Old
53 - 03-07-2017, 11:06
Reply With Quote
Back when I was being a degenerate I used to put my phone at a perfect angel to catch all the disgusting things I would be doing because I knew I was being spied on.
 
StapleMammal1 is offline
 
NightTrain
VeteranXX
Old
54 - 03-07-2017, 11:16
Reply With Quote
Quote:
Originally Posted by SuicideSnowman View Post
Also:



So basically, they can blame everything on Russia if they wanted to. Let's blame hacking on Russia so that we can wiretap people communicating with them.

Such a cynic

Quote:
A U.S. intelligence official told CBS News that the signature of the breach is Russian and the U.S. government has identified methods and techniques used by Russia in past hacks that mirror those used in the DNC incursion.
 
NightTrain is offline
 
houston
Unregistered
Old
55 - 03-07-2017, 11:17
Reply With Quote
So basically the CIA under it's Umbrage program would obfuscate their own actions by masquerading as other actors, akin to leaving false fingerprints.
 
 
StapleMammal1
Veteran++
Contributor
Old
56 - 03-07-2017, 11:24
Reply With Quote
Correct houston.


Quote:
QUICK RUNDOWN SO FAR

>Wikileaks just NUKED the CIA
>CIA negligence sees it losing control of all cyber weapons arsenal sparking serious proliferation concerns
>Obama CIA built most powerful cyber attack arsenal, costing US taxpayers $100+billion. Lost it ALL to the enemy, for free.
>CIA illicitly hoarded 'zero day' attacks, putting at risk industry, government and even Trump's Twitter account
>The Obama administration used their advanced cyber attack arsenal against private citizens
>CIA hackers celebrated what they saw as the financial largesse of Obama towards them with "Make It Rain" gif
>CIA went from searching for zer0-days via code analysis to inserting CIA coders in major US tech companies to implement backdoors directly.
>CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.
>CIA can spy on you through your smart TV
>Jointly developed CIA+MI5 malware infests Samsung smart TVs to turn them into covert microphones
>CIA turned all internet enabled consumer electronics in the world into listening devices.
>final blow to deep state
>CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update.
>Skype voice conversations are converted into text in real-time, scanned for contents of interest and stored in CIA spy cloud.
>CIA = Microsoft
>CIA = Apple
>CIA = Cisco
>CIA = Google
>CIA has tools to remote control chips in cars, trucks, planes, medical devices and hospital tech with assassination potential.
>CIA hacker malware a threat to journalists: infests iPhone, Android bypassing Signal, Confide encryption
>U.S. Consulate in Frankfurt is a covert CIA hacker base
>CIA's secret hacking division produced a huge amount of weaponized malware to infest iPhone. Android phones--and lost control of it
 
StapleMammal1 is offline
 
NightTrain
VeteranXX
Old
57 - 03-07-2017, 11:26
Reply With Quote
Dont forget the CIA, Bezos, WaPo and $600 million.
 
NightTrain is offline
 
SuperTrap
VeteranXX
Contributor
Old
58 - 03-07-2017, 11:38
Reply With Quote
I was wrong. This is way more cool
 
SuperTrap is offline
 
boston
VeteranXV
Old
59 - 03-07-2017, 11:44
Reply With Quote
man good thing i cut and pasted that msg on facebook to keep me out of all this.
 
boston is offline
 
Goshin
GriftKingXX
Old
60 - 03-07-2017, 12:01
Reply With Quote
why do they gotta let the enemy have their tools wtf
 
Goshin is offline
 
Page 3 of 9
Reply


Go Back   TribalWar Forums > TribalWar Community > General Discussion
Reload this Page WikiLeaks Vault#7 thread

Social Website Bullshit

Tags
alex dare levert , alex knapik-levert


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off


AGENT: claudebot / Y
All times are GMT -4. The time now is 10:19.