1) The CIA has the ability to break into Android and iPhone handsets, and all kinds of computers.
The U.S. intelligence agency has been involved in a concerted effort to
write various kinds of malware to spy on just about every piece of
electronic equipment that people use. That includes iPhones, Androids
and computers running Windows, macOS and Linux.
2) Doing so would make apps like Signal, Telegram and WhatsApp entirely insecure.
Encrypted messaging apps are only as secure as the devices they are
used on – if an operating system is compromised, then the messages can
be read before they are encrypted and sent to the other user(s).
3) The CIA could use smart TVs to listen in on conversations that happened around them.
One of the most eye-catching programs detailed in the documents is
“Weeping Angel.” That allows intelligence agencies to install special
software that allows TVs to be turned into listening devices – so that
even when they appear to be switched off, they’re actually on.
4) The agency explored hacking into cars and crashing them, allowing “nearly undetectable assassinations.”
Many of the documents reference tools that appear to have dangerous and
unknown uses. One file, for instance, shows that the CIA was looking
into ways of remotely controlling cars and vans by hacking into them.
5) The CIA hid vulnerabilities that could be used by hackers from other countries or governments.
Such bugs were found in the biggest consumer electronics in the world,
including phones and computers made Apple, Google and Microsoft. But
those companies didn’t get the chance to fix those exploits because the
agency kept them secret in order to keep using them, the documents
6) More information is coming. The documents have still not
been looked through entirely. There are 8,378 pages of files, some of
which have already been analyzed but many of which haven’t. And that’s
not to mention the other sets of documents that are coming. The “Year
Zero” leaks are just the first in a series of “Vault 7” dumps, Julian
Posted on 2017-03-07 08:31:40 GMT
Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report