WikiLeaks Reveals CIA Malware That Can Sabotage User Software
WikiLeaks Reveals CIA Malware That Can Sabotage User Software

Recently, Wikileaks has shown the world more than 9,000 documents and files of CIA which contains a huge bunch of security flaws and hacking tools that can easily sabotage users’ Softwares.

WikiLeaks Reveals CIA Malware That Can Sabotage User Software

To not miss what has become a tradition, Wikileaks has chosen Friday to issue a new installment of Vault 7, the series of leaks about alleged CIA hacking techniques that began last March 2017.

The information we know today is related to the Athena project, which is a tool supposedly used by the US Central Intelligence Agency to gain control of computers running any version of Microsoft’s operating system, from XP to Windows 10.

According to the Wikileaks report, once installed, malware allows the attacker to remotely control configuration and tasks, or download malicious pieces to perform specific tasks, among many other options.

Athena was developed in collaboration with the cyber security company Siege Technologies in September 2015, shortly after the arrival of Windows 10. The user guide is from February 2016, which denotes that it has been used recently.

Chronology of #Vault7

Today, there are already ten leaks of #Vault7 that Wikileaks has made public. Here is the information that has come to light in each delivery:-

  1. March 7: Wikileaks publish nearly 9,000 documents using CIA techniques to spy on various electronic devices.
  2. 23rd of March: Dark Matter, CIA techniques for hacking Apple devices.
  3. March 31st: Marble Framework, Exposes information related to the Agency tool to hide hacks.
  4. April 7th: Grasshopper, Documents that describe an application to create malware for Windows.
  5. April 14th: Hive, Six files with malware guides to control different devices.
  6. April 21st: Weeping Angel, Tool allegedly used by the CIA to spy on Samsung televisions.
  7. 28th of April: Scribbles, Information about the Agency’s program to spy out Microsoft Office documents.
  8. May 5th: Archimedes, CIA techniques for hacking local area networks (LANs).
  9. May 12th: AfterMidnight and Assassin, User guides for two malware for Windows operating systems.

However, while the world was busy dealing with the WannaCry ransomware outbreak, here, Wikileaks was busy in publishing hacking tools and malware that were created by CIA.

So, what do you think about these leaks? Simply share your views and thoughts in the comment section below.

LEAVE A REPLY

Please enter your comment!
Please enter your name here