Category Archives: DARK MATTER(Wikileaks)

WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

 

WikiLeaks released details on what it said is a Central Intelligence Agency document tracking program called Scribbles, part of the agency’s effort to keep tabs on documents leaked to whistleblowers and journalists. Scribbles allegedly embeds a web beacon-style tag into watermarks located on Microsoft Word documents that can report document analytics back to the CIA.

WikiLeaks released information Friday about Scribbles as part of its ongoing  Vault 7 Dark Matter release that began last month. Also released is what WikiLeaks said is Scribbles’ source code.

A user manual describing Scribbles said the tool can be used to generate batch copies of identical or unique files, each with distinctive watermarks that includes a web beacon-like tag. A web beacon (or web bug) is a transparent graphic image that can be used to report back if a document has been opened and the IP address of the computer that requested the image file.

According to WikiLeaks, Scribble works exclusively with Microsoft Office documents. The tool, according to the user guide has been “successfully tested” to work with Microsoft Office 2013 (on Windows 8.1 x64) and Office 97-2016 running on Windows 98 and above.

WikiLeaks’ copy of the CIA’s Scribbles user manual says the tool will not work on encrypted or password-protected documents. The CIA also warns that if a document with a Scribbles’ watermark is opened in an alternative document viewing program, such as OpenOffice or LibreOffice, it may result in revealing watermarks and URLs for the user…

Source: WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

Advertisements

Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! 

By Lisa Haven

Earlier this year it was revealed by Julian Assange, Wikileaks, via their Vault 7 release, that the CIA created a secondary NSA surveillance system—one with less oversight than that of the NSA. It was also discovered that the CIA could implant virtual forensic fingerprints on computers and frame someone for a crime they didn’t commit, through a project known as UMBRAGE. Furthermore, Wikileaks revealed how the CIA could remotely take over the controls on vehicles and cause undetectable assassinations.

A few weeks later Wikileaks placed another nail in the CIA coffin with their release of Dark Matter, a program which proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying.

Now, as of March 31st, Wikileaks dropped yet another section of the Vault 7 files with their latest release of Marble Framework. Here’s more on this report…

Source: Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! | Police State

Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs Your “Factory Fresh” iPhones » The Event Chronicle

The latest leaks from WikiLeaks’ Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.  The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

Here is a live stream of the press briefing with Julian Assange:

And here is the full press release from WikiLeaks:

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Source: Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs Your “Factory Fresh” iPhones » The Event Chronicle

WIKILEAKS’ ‘DARK MATTER’ DUMP SHOWS CIA’S IPHONE, MACBOOK HACKS

CIA documents published by WikiLeaks Thursday reveal hacks used by the agency against Apple cellphones and computers.

Dubbed “Dark Matter,” the documents, a new addition to WikiLeaks’ ongoing “Vault 7” dump, detail hacks developed for iPhones and MacBooks as far back as 2008.

“These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware,” a WikiLeaks press release says.

By targeting the firmware, CIA hackers can remain in control of an infected device even if the target wipes the data and re-installs the operating system.


One such tool, known as “Sonic Screwdriver,” is, according to the CIA, a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting…”

By providing a target with a compromised peripheral device such as an Apple Thunderbolt-to-Ethernet adapter, which stores “Sonic Screwdriver” in its firmware, the CIA can gain persistence “even when a firmware password is enabled” on the target computer.

A 2008 document discussing an attack on iPhones, called “NightSkies,” reveals a malicious implant that would be physically installed on a new device. One method of deploying the hack could potentially involve intercepting an iPhone before it reaches a target.

“The tool operates in the background providing upload, download and execution capability on the device,” the document states. “NS is installed via physical access to the device and will wait for user activity before beaconing.”…

via WikiLeaks’ ‘Dark Matter’ Dump Shows CIA Hacks Against iPhones, MacBooks — Infowars

Advertisements

a part of the movement to Truth!