A former Uber security manager says an espionage team inside the ride-hailing service used former CIA agents to help the company spy on its rivals overseas.
The testimony in a San Francisco courtroom Tuesday comes amid revelations that federal prosecutors are investigating allegations that Uber deployed an espionage team to plunder trade secrets from its rivals. That has triggered a delay in a high-profile federal trial over whether the beleaguered ride-hailing service stole self-driving car technology from a Google spinoff. Uber’s manager of global intelligence said that Uber hired several contractors that employed former CIA agentsRead more
WikiLeaks has resumed its CIA leaks and it has now started publishing source code and other files associated with tools allegedly developed by the intelligence agency.
In March, WikiLeaks began publishing documentation files describing what appeared to be CIA hacking tools as part of a leak dubbed Vault 7. Roughly two dozen tools and projects were disclosed over the course of several months. Now, after a two-month break, WikiLeaks announced a new round of leaks dubbed Vault 8, which provides source code and analysis for CIA tools. The organization pointed out that, similar to Vault 7, Vault 8 will not expose any zero-day or other vulnerabilities that could be used for malicious purposes.Read more
A missile control system developed by US defense contractor Raytheon is detailed in the CIA’s project ‘Protego,’ shared by WikiLeaks as part of the ‘Vault7’ series. WikiLeaks said the project differed to the “usual” malware development project from the CIA, with no indication as to why it’s contained within a repository of hacking techniques.
The release details micro-controller units which exchange data and signals over encrypted and authenticated channels, used on-board Pratt & Whitney aircraft equipped with missile launch systems. ‘Master Processor’ and ‘Deployment Box’ systems are on board the flight, with micro-controllers for the missile.Read more
Wikileaks published another collection of files purportedly from the United States Central Intelligence Agency, the latest of which focuses on a framework used to infect machines using Windows operating systems.
The release unveiled a CIA program called Angelfire, which consists of a five-part framework that can maintain a persistent backdoor on an infected machine and execute custom implants that give the agency additional access to the device. Angelfire operates in five parts, each of which allowing the intelligence agency to lodge itself deeper into an infected machine to maintain access to files and information on the targeted device.Read more
A new hacking tool used by the CIA has been revealed by WikiLeaks. The tool disables security cameras and corrupts recordings made on computers using Windows XP and newer versions of the Microsoft operating system. Dubbed 'Dumbo', it requires an agent to directly access a computer that holds the recordings using a USB thumb drive.
WikiLeaks released information about project Dumbo on its website today. WikiLeaks said: 'Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system.Read more
As part of its ongoing Vault 7 leaks, the whistleblower organisation WikiLeaks today revealed about a CIA contractor responsible for analysing advanced malware and hacking techniques being used in the wild by cyber criminals.
According to the documents leaked by WikiLeaks, Raytheon Blackbird Technologies, the Central Intelligence Agency contractor, submitted nearly five such reports to CIA as part of UMBRAGE Component Library (UCL) project between November 2014 and September 2015. These reports contain brief analysis about proof-of-concept ideas and malware attack vectors.Read more
Wikileaks published another set of documents Thursday. The latest release of files purportedly from the U.S. Central Intelligence Agency (CIA) details a piece of malicious software for Android devices.
The malware, referred to as Highrise, can redirect or intercept text messages sent to a target’s phone, allowing a CIA agent to access it before it lands in the inbox of the person it was intended for. HighRise acts as a proxy server for text messages, bouncing the messages to internet “listening posts” that allow an agent to intercept them. While the malicious software provides the CIA with a powerful snooping tool, there is a major limitation to Highrise.Read more
WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems using different attack vectors.
Secure Shell or SSH is a cryptographic network protocol used for remote login to machines and servers securely over an unsecured network. Dubbed BothanSpy — implant for Microsoft Windows Xshell client, and Gyrfalcon — targets the OpenSSH client on various distributions of Linux OS.Read more
WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems.
Dubbed OutlawCountry, the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to CIA controlled computer systems for exfiltrate and infiltrate data. The OutlawCountry Linux hacking tool consists of a kernel module, which the CIA hackers load via shell access to the targeted system and create a hidden Netfilter table with an obscure name on a target Linux user.Read more
How many people specifically know where you are right now? Friends and family? Your coworkers? If you're using a Windows laptop or PC you could add another group to the list: the CIA.
New documents released as part of WikiLeaks' series of CIA hacking revelations detail a method the agency uses to geolocate computers. The agency infects target devices with malware that can then check which public Wi-Fi networks a given computer can connect to at a given moment, as well as the signal strengths of those networks. From there, the malware compares the list of available Wi-Fi options to databases of public Wi-Fi networks to figure out where the device is.Read more
110 Reykjavik, Iceland