Goto

Collaborating Authors

WikiLeaks Vault 7 Marble: Latest Leaks Show CIA Ability To Hide Origins Of Attack

International Business Times

WikiLeaks continued its ongoing release of documents from the CIA Friday with a collection of files detailing the agency's ability to obscure its activities and make it difficult for investigators to attribute the origins of attacks and hacking. The latest release from what WikiLeaks calls Vault 7 is titled " Marble " and contains documentation of files that are purportedly part of the CIA Core Library of malware code. WikiLeaks describes Marble as part of the CIA's "anti-forensics approach." The name "Marble" refers to a specific algorithm that scrambles and unscrambles data. Marble is one of the more technical releases that WikiLeaks has published as part of Vault 7. According to the documentation, the CIA tool is "designed to allow for flexible and easy-to-use obfuscation" by using "string obfuscation algorithms" that are used to link malware to a specific developer.


WikiLeaks publish 1000s of what it says are CIA documents

Daily Mail - Science & tech

WikiLeaks has published thousands of documents claiming to reveal top CIA hacking secrets, including the agency's ability to infiltrate encrypted apps like Whatsapp, break into smart TVs and phones and program self-driving cars. WikiLeaks said the files released on Tuesday - mysteriously dubbed ' Vault 7' - are the most comprehensive release of U.S. spying files ever made public. The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It details intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems. WikiLeaks alleges that some of the remote hacking programs can turn these electronic devices into recording and transmitting stations to spy on their targets.


British spies linked up with CIA reveals WikiLeaks

Daily Mail - Science & tech

British spies helped the CIA find a way to convert'smart' TVs into secret microphones using a codename inspired by Doctor Who killer monsters called'Weeping Angels'. MI5 worked with their US counterparts to develop software that convinced people their sets were switched off when in fact they were on and recording every word they say. British spies has been central to developing the hack of TVs connected to the internet, according to WikiLeaks. The spooks also chose to name it after to Weeping Angels from Doctor Who - monsters who pretended to be stone statues before creeping up on unsuspecting victims. US intelligence has also devised a method of remotely controlling cars and crashing them, leaked data claims.


WikiLeaks Vault 7 Dark Matter: CIA Hacking Tools For Macs, iPhones Revealed

International Business Times

WikiLeaks released the latest cache of documents in its "Vault 7" series Thursday, publishing the details of a number of U.S. Central Intelligence Agency (CIA) hacking programs designed to target Macs and iPhones. The CIA hacks highlighted in the latest information dump, dubbed Dark Matter by WikiLeaks, include programs developed by the CIA's Embedded Development Branch (EDB) to infect the firmware--software that performs basic functions and is embedded into a piece of hardware--of Apple computers. The primary revelation of the Dark Matter is the Sonic Screwdriver project. Named after a device from the Dr. Who universe, the Sonic Screwdriver is described in CIA documents as a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting." The tool overrides one of Apple's firmware protections that prevents any changes to the boot path of the device.


WikiLeaks Vault 7: Julian Assange Says Site Will Give CIA Hacking Tools To Tech Firms

International Business Times

WikiLeaks founder Julian Assange announced Thursday that his organization will provide tech companies to access to more detailed information regarding the CIA hacking tools published by WikiLeaks so the companies can develop fixes for the exploits. The decision to provide the more detailed specifications came after tech firms began reaching out to WikiLeaks in hopes of learning more about the government's hacking techniques. Assange said his organization will grant access to companies--including Apple, Google and Samsung--so they can see vulnerabilities discovered in their operating systems. "We have decided to work with them, to give them some exclusive access to some of the technical details we have, so that fixes can be pushed out," Assange said. Assange explained WikiLeaks decided not to publish said details because it didn't want "journalists and people of the world, our sources, being hacked using these weapons."