WikiLeaks has already said that they are going to publish the biggest confidential documents of CIA, and here it goes
On Tuesday evening, WikiLeaks has released a bunch of 8,000 documents, as a part of "Vault 7" a series of leaks on agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina.
A total of 8,761 documents have been published as part of "Year Zero", which stats all hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. It can be also called entire hacking capacity of CIA.
"Year Zero’ is the name of the leaks made by WikiLeaks. It revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide -reports says.
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide -reports says.
The attacks against Smart TV's is called "Weeping Angel" developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones.
An attack against Samsung TV’s was in cooperation with MI5, placing them into a “Fake-Off” mode, recording conversations even when the device appears to be off.
Separate Division for Mobile Phone Hacking
The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.
Not only iOS devices, CIA also target Android too. Mainly for this CIA had 24 "weaponized" Android "zero days" which was used to target Android users.
CIA targets Windows, Mac, Linux
Not only Mobile users, but also targets Windows, Mac, Linux and routers too. For this CIA have another special division called Automated Implant Branch (AIB) which developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described here.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA).
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA).
This release is made by Twitter account, after a planned press conference suffered a cyberattack, according to the whistleblowing organization. WikiLeaks has since rescheduled its press conference.