Every calendar week since March Wikileaks has been leaking secrets from the U.S. Central Intelligence Agency (CIA), which mainly focus on surveillance techniques in addition to hacking tools employed past times its agents.
However this time, the whistleblower arrangement has Vault seven leaks, because it's non nearly hacking in addition to spying; instead, it's a—Missile Control System.
Dubbed Project Protego, the PIC-based missile command scheme is installed on-board a Pratt in addition to Whitney Aircraft (PWA) equipped amongst missile launch system, which gives it might to hitting air-to-air in addition to air-to-ground targets.
The latest leak contains 4 hugger-mugger documents inwards total from the projection Protego, along amongst "37 related documents (proprietary hardware/software manuals from Microchip Technology Inc)," WikiLeaks says.
Leaked documents reveal scheme design, a direct on how to configure in addition to fix Protego images, in addition to also advise that all micro-controller units telephone commutation information in addition to signals over encrypted in addition to authenticated channels.
WikiLeaks is non certain why the hugger-mugger documents of projection Protego were the utilisation of repositories that belongs to the CIA's Engineering Development Group, who are evidently known for developing malware in addition to hacking tools for the agency.
However, notably, the CIA has developed Protego missile command scheme inwards partnership amongst 1 of a major U.S. defense contractor, Raytheon, who was also mentioned inwards a previous CIA leak.
Raytheon is the same fellowship that the way hired for analysing advanced malware in addition to hacking techniques existence used inwards the wild past times hackers in addition to cyber criminals.
It seems the name, Protego, has been inspired from the magical Shield Charm used inwards Harry Potter movies, which helped from physical attacks equally wells equally magical.
If so, in addition to thus the primary objective of this missile command scheme could locomote to defend something (secret facility or base), from external physical attacks.
Last week, WikiLeaks published some other CIA project, dubbed AngelFire, which is an implant developed past times the way to implant a persistent backdoor on the target Windows computers past times modifying their segmentation kicking sector.
Since March, WikiLeaks has published 23 batches of "Vault 7" series, which includes the latest in addition to final calendar week leaks, along amongst the next batches:
However this time, the whistleblower arrangement has Vault seven leaks, because it's non nearly hacking in addition to spying; instead, it's a—Missile Control System.
Dubbed Project Protego, the PIC-based missile command scheme is installed on-board a Pratt in addition to Whitney Aircraft (PWA) equipped amongst missile launch system, which gives it might to hitting air-to-air in addition to air-to-ground targets.
The latest leak contains 4 hugger-mugger documents inwards total from the projection Protego, along amongst "37 related documents (proprietary hardware/software manuals from Microchip Technology Inc)," WikiLeaks says.
Leaked documents reveal scheme design, a direct on how to configure in addition to fix Protego images, in addition to also advise that all micro-controller units telephone commutation information in addition to signals over encrypted in addition to authenticated channels.
"The missile scheme has micro-controllers for the missile itself ('Missile Smart Switch', MSS), the subway ('Tube Smart Switch', TSS) in addition to the neckband (which holds the missile earlier in addition to at launch time)."The missile launches alone when the Master Processor (MP) unit of measurement receives iii valid signals from a beacon, including 'In Border,' 'Valid GPS,' in addition to 'No End of Operational Period.'
WikiLeaks is non certain why the hugger-mugger documents of projection Protego were the utilisation of repositories that belongs to the CIA's Engineering Development Group, who are evidently known for developing malware in addition to hacking tools for the agency.
However, notably, the CIA has developed Protego missile command scheme inwards partnership amongst 1 of a major U.S. defense contractor, Raytheon, who was also mentioned inwards a previous CIA leak.
Raytheon is the same fellowship that the way hired for analysing advanced malware in addition to hacking techniques existence used inwards the wild past times hackers in addition to cyber criminals.
It seems the name, Protego, has been inspired from the magical Shield Charm used inwards Harry Potter movies, which helped from physical attacks equally wells equally magical.
If so, in addition to thus the primary objective of this missile command scheme could locomote to defend something (secret facility or base), from external physical attacks.
Previous Vault seven Leaks
Last week, WikiLeaks published some other CIA project, dubbed AngelFire, which is an implant developed past times the way to implant a persistent backdoor on the target Windows computers past times modifying their segmentation kicking sector.
Since March, WikiLeaks has published 23 batches of "Vault 7" series, which includes the latest in addition to final calendar week leaks, along amongst the next batches:
- ExpressLane — detailed nearly the spying software that the way used to spy on their intelligence partners some the world, including the FBI, DHS in addition to NSA.
- CouchPotato — H5N1 CIA projection that revealed its might to spy on video streams remotely inwards real-time.
- Dumbo — H5N1 CIA projection that revealed the CIA's might to hijack in addition to manipulate microphones in addition to webcams to corrupt or delete recordings.
- Imperial — H5N1 CIA projection that disclosed details of at to the lowest degree 3 CIA-developed hacking tools in addition to implants designed to target computers which run Apple Mac OS X in addition to unlike flavours of Linux OS.
- UCL/Raytheon — H5N1 CIA contractor, which analysed in-the-wild advanced malware in addition to hacking tools for assistance the way prepare its ain malware.
- Highrise — An alleged CIA projection that allow the spying way stealthy collect in addition to post stolen information from compromised smartphones to its server through SMSs.
- BothanSpy in addition to Gyrfalcon — Two implants that allowed the CIA agents to intercept in addition to exfiltrate SSH credentials from targeted Windows in addition to Linux systems using unlike assault vectors.
- OutlawCountry — An alleged CIA projection that allow the spying way hack in addition to remotely spy on PCs running Linux OS.
- ELSA — Alleged CIA malware that allows the way to rails geolocation of targeted laptops in addition to PCs running the Microsoft Windows OS.
- Brutal Kangaroo — An alleged tool suite for Microsoft Windows operating scheme used past times the CIA agents to target air-gap computers within an arrangement or company without needing whatever straight access.
- Cherry Blossom — H5N1 framework employed past times the CIA to monitor the Internet activity of the targeted systems past times exploiting vulnerabilities inwards Wi-Fi devices.
- Pandemic — H5N1 CIA projection that allowed the U.S. of A. intelligence way to plow Windows file servers into covert assault machines that tin silently infect other systems within the same network.
- Athena — H5N1 framework that the way designed to remotely spy in addition to accept total command of the infected Windows systems in addition to works on every version of Windows OS—from Windows XP to Windows 10.
- AfterMidnight in addition to Assassin — Two alleged CIA malware frameworks for Microsoft Windows that's designed to monitor in addition to study dorsum actions on the infected remote host PC in addition to execute malicious tasks.
- Archimedes — Man-in-the-middle assault tool allegedly developed past times the spying way to target PCs within a Local Area Network (LAN).
- Scribbles — Software allegedly designed to embed 'web beacons' into confidential documents, making the CIA agents able to rails insiders in addition to whistleblowers.
- Grasshopper — H5N1 framework which allow the spying way easily practise custom malware for breaking into Windows operating scheme in addition to bypassing antivirus protection.
- Marble — Source code of a hugger-mugger anti-forensic tool used past times the spying way to cover the actual source of its malware.
- Dark Matter — Several hacking exploits the spying way designed to target iPhones in addition to Macs.
- Weeping Angel — H5N1 spying tool used past times the intel way to infiltrate smart TV's in addition to transform them into covert microphones.
- Year Zero — CIA hacking exploits for pop hardware equally good equally software.
Share This :
comment 0 Comments
more_vert