Weeping Angel: A program developed in collaboration with
British intelligence that allegedly captures audio—but not video—from peoples’
homes by hacking Samsung smart TVs.
According to Wikileaks, the CIA can turn these TVs into bugging devices even
when they are turned off, so conversations can be recorded and sent to a covert
CIA server.
Hammer Drill: A malware that targets Windows operating
systems by infecting software on CDs and DVDs. Wikileaks says the malware has
air gap-jumping abilities that allow it to target computers isolated from the
internet.
Fine Dining: A suite of 24 decoy applications that,
according to Wikileaks, CIA agents can use to infect a computer or collect data
while they appear only to be running innocuous programs such as a slide show or
computer game.
HarpyEagle: Appears to be a CIA program that has been
investigating how to use wireless routers associated with Apple AirPort Extreme
and AirPort Time Capsule to access the file systems of targeted computers.
HIVE: A suite of malware developed by the CIA that
targets Windows, Solaris, Linux and MikroTik internet routers and helps
establish communication with infected computer systems, according to WikiLeaks.
Umbrage: A library of malicious software components taken
from commercial and foreign sources found to have been used in internet hacking
attacks. The library appears to give the CIA the ability to deploy hacking
tools and techniques that have been known to work in operations by other
countries.
______________
FBI Investigating WikiLeaks' CIA Release to Find Mole
By Cortney O'Brien On Tuesday, WikiLeaks released what is believed to be sensitive details into the CIA's hacking processes. The 10,000 pages of documents expose the tools the agency uses to hack into electronic devices.
The FBI has just launched an investigation to try and
find the mole.
“They’re
going to try to do some forensic work because those documents probably have
been changed [over time], so that enables them to narrow down the period to
when they were taken,” said Alex Yampolskiy, the CEO of SecurityScorecard.
“Once you say ‘this seems like it was a snapshot from this particular time,’
then they can look at audit logs of who had access to the document during that
time frame.”
The CIA leak, according to some experts, is on par with
being just as serious or even worse than Edward Snowden's NSA expose in 2013.