Source Code For CIA’s Spying Tool Hive Released By Wikileaks: Vault 8
|

Source Code For CIA’s Spying Tool Hive Released By Wikileaks: Vault 8

s a part of its Vault 7 series, in mid-April, Wikileaks dropped a leak that contained six new documents revealing a CIA malware control program called Hive. It was a back-end infrastructure designed by CIA to keep an eye on other malware implants. From November 9, Wikileaks has started a new series named Vault 8….

Highrise: How This CIA Malware Spies And Steals User Data Using SMS
|

Highrise: How This CIA Malware Spies And Steals User Data Using SMS

Short Bytes: The latest WikiLeaks Vault 7 leak deals with an Android malware that doesn’t need the internet to talk to the CIA servers and spy on the users. Named Highrise, this malware acts as an SMS proxy to send stolen data. Highrise works on Android version 4.0-4.3; it’s installed under the name TideCheck.  ast week, we wrote…

Brutal Kangaroo: How CIA Hacked Offline Computers Using Infected USB Drives
|

Brutal Kangaroo: How CIA Hacked Offline Computers Using Infected USB Drives

Short Bytes: Brutal Kangaroo malware is the latest addition to the ongoing WikiLeaks Vault 7 leaks. Published earlier this week, the leaked documents show how the CIA hacked offline and air-gapped computers using USB drives. Brutal Kangaroo is basically a combination of 4 tools which work together. The malware used Windows operating system vulnerabilities to targeted air-gapped computers….

Everything You Need To Know About WikiLeaks’ Release –Windows, iPhone, Linux, Android, Mac, WhatsApp and Telegram Messages, TVs, Routers, And Modern Cars Are Hackable By CIA
|

Everything You Need To Know About WikiLeaks’ Release –Windows, iPhone, Linux, Android, Mac, WhatsApp and Telegram Messages, TVs, Routers, And Modern Cars Are Hackable By CIA

Short Bytes: WikiLeaks has released the complete catalog of CIA’s hacking tools and malware. This revelation by WikiLeaks, named Year Zero, is the first part of a new series Vault 7. It suggests that CIA has plenty of hacking tools to control different computer operating systems, smartphones, routers, smart TVs. etc. n Tuesday, we told you…