Spying tools and operational protocols detailed in the recent Vault 7 leak have been used in cyberattacks against at least 40 targets in 16 different countries by a group Symantec calls Longhorn.
Symantec has been protecting its customers from Longhorn’s tools for the past three years and has continued to track the group in order to learn more about its tools, tactics, and procedures. The tools used by Longhorn closely follow development timelines and technical specifications laid out in documents disclosed by WikiLeaks. The Longhorn group shares some of the same cryptographic protocols specified in the Vault 7 documents.Read more
Since March, Wikileaks has published more than 8,761 confidential documents it claims originated from inside the US Central Intelligence Agency. Contained within the whistleblowing organisation's Vault 7 files are details of recent security exploits used by the agency to spy on people.
In particular, the documents claim the CIA developed malware to hack Samsung smart TVs, shared zero-day exploits with UK security agencies, developed anti-forensic tools to avoid detection, and built tools so its code could be disguised as being created in a third-party country.Read more
WikiLeaks has released the fourth part of ‘Vault 7’, named ‘Grasshopper’, the latest in a series of leaks detailing alleged CIA hacking techniques. It details malicious software WikiLeaks claims was taken from “suspected Russian organized crime.”
The latest release consists of 27 documents WikiLeaks claims come from the CIA’s ‘Grasshopper framework’, a platform for building malware for use on Microsoft Windows operating systems. In a statement from WikiLeaks, ‘Grasshopper’ was described as providing the CIA with the ability to build a customized implant which will behave differently, depending on the security capabilities of a computer.Read more
WikiLeaks’ latest batch of documents, named ‘Marble’, details CIA hacking tactics and how they can hamper forensic investigators from attributing viruses, trojans and hacking attacks to the spy agency. The tool was in use as recently as 2016.
The third release, which contains 676 source code files for the agency’s secret anti-forensics framework, is part of the CIA’s Core Library of malware, according to a statement from WikiLeaks. WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified, meaning the agency allows another party to be blamed for the hack.Read more
Tesla and SpaceX founder Elon Musk is launching a new company called Neuralink with the intention of connecting computers directly to human brains.
The billionaire entrepreneur, whose other interests include sending humans to Mars, is exploring “neural lace” technology – the implanting of tiny electrodes into the brain that could be used to give direct computing capabilities. Musk has not officially announced the new company but after the Journal’s report he tweeted confirming more news of Neuralink would come out next week.Read more
A new Wikileaks release called DarkMatter was released today, affirming that the Central Intelligence Agency has long targeted Apple Macs, creating malware designed to evade the tech giant's security mechanisms.
The leak also revealed the CIA had been targeting the iPhone since 2008, a year after the landmark device was released. That slice of info was included in a small dump of information Wednesday, that included manuals for a handful of implants and rootkits, the kernel and the firmware of the device. One of CIA's implants was called NightSkies then appearing to list the year 2008, though Wikileaks claimed the tool was operational in 2007, the year of launch.Read more
A partnership between the secret-spilling group and Google, Microsoft, and Apple has already hit its first road block. Last week, WikiLeaks promised it would share the technical details and code of the hacking tools that the CIA has allegedly developed against Google, Apple, Microsoft and other tech companies.
This week, after days of waiting, the secret-spilling site finally made initial contact with the companies. But WikiLeaks founder Julian Assange's attempt to help these major tech companies find out exactly what bugs and vulnerabilities the CIA is or was allegedly taking advantage of, and then plug the holes, is not going very smoothly for now.Read more
Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal.Read more
Fei-Fei Li, chief scientist of artificial intelligence and machine learning at Google Cloud, came on stage at Google’s Next Cloud conference today to talk about the current and next-generation applications of AI that Google’s working on.
These technologies will make a difference in self-driving cars and healthcare, sure, but also Snapchat’s filters and Google Photos’ search capabilities. But the big highlight came when she announced a new way to allow software to parse video. This new “Video Intelligence API” was demoed onstage, and it offered the kind of “whoa” moment you expect from a Google keynote.Read more
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, apps and other electronic devices.
The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices. The leak will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age.Read more
110 Reykjavik, Iceland