The latest WikiLeaks ‘Vault7’ release details an alleged CIA project allowing the spy agency to give file servers the capability to infect machines which access them remotely.
‘Pandemic’ reveals the role of a persistent implant for Microsoft Windows file servers, accessed by remote machines to run programs, according to a statement from WikiLeaks.
The project acts as a ‘Patient Zero’ – a term used to describe the first identified carrier of a communicable disease during an outbreak.
‘Pandemic’ disguises itself on the infected source machine where the targeted files remain unchanged.
It’s modified when in transit from the source file server to the remote machine. When executed on the new machine ‘Pandemic’ will install the program, an iteration of which will now contain modified code.
‘Pandemic’ can replace up to 20 programs, with a maximum size of 800MB.
According to WikiLeaks “a single computer on a local network with shared drives that’s infected with the ‘Pandemic’ implant will act like a ‘Patient Zero’ in the spread of a disease.”
The latest release, which consists of five files, does not make clear if the infected machines become new pandemic servers, although WikiLeaks claims this is technically feasible.
According to the ‘Pandemic’ documentation its installation takes between 10 to 15 seconds.
The release is the latest in WikiLeaks’ ‘Vault7’ series, detailing hacking techniques allegedly sourced from within the CIA.
Previous releases have revealed techniques used to weaponize mobile phones, conduct surveillance via Smart TVs and load and execute malware on a target machine.
Source: #Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection
I know the Seth Rich murder has been covered ad naseum. So I’m gonna make this brief and to the point.
I just wanted to point out a couple things that I saw reported back when it happened that I havent heard a word about since.
In August of 2016 I was browsing through a 4chan forum and I took this screenshot of a conversation (screenshot below) where Anonymous was claiming that they had hacked into Huma Abedin’s personal computer and had intercepted Huma in real time, sending the Saudis a compromising video that she had taken of Hillary. It is not stated what exactly was on the video but my guess is that it probably had something to do with the sexual abuse of a minor.
(Apparently Angela Merkel was also in one of the “compromising videos” with Hillary. God only knows what it shows them doing.)
Huma Abedin’s family is in Saudi Arabia and this is where her loyalty lies.
Anonymous confronted Huma and faced with the threat of being exposed, she agreed to give them info (the emails that were later printed by Wikileaks) if they agreed to keep quiet about what they found her doing.
According to Anonymous, Huma told them that she would give them the info they’d asked for via an insider…a liasion.
Guess who that liasion was? SETH RICH!!
Now does it make sense why they are trying to confuse this story?
HUMA WAS THE LEAK!!
Anonymous then gave the emails to Wikileaks to publish.
Here is that screenshot from 4chan. This was big news back then in forums like 4Chan and GLP…but it never seemed to reach any of the mainstream alternative sites and it seems to have been forgotten about since…
Source: Seth Rich Was Huma Abedin’s Liasion to Leak Clinton Emails After She Was Blackmailed by Anonymous. Huma was the leak! | Alternative
(ANTIMEDIA) A federal appeals court has unanimously reversed part of a lower court’s dismissal of a lawsuit filed by the American Civil Liberties Union for Wikimedia, which challenges the NSA’s mass surveillance and collection of internet communications.
The suit was originally filed in 2015 by the ACLU on behalf of the Wikimedia Foundation, Amnesty International, and Human Rights Watch, among others, and centered around the NSA’s “Upstream” surveillance program, which intercepts data from the internet backbone cables carrying the online messages, web searches, and emails of U.S. citizens. Upstream operates under Section 702 of the Foreign Intelligence Surveillance Act, a statute the government uses to conduct warrantless surveillance on Americans who communicate with targets located outside of the United States…
Source: Wikimedia Lawsuit Against NSA Surveillance Just Approved to Move Forward | Galactic Connection
A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”
Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.
Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.
So apparently we have 3 Microsoft/CIA Viruses to worry about:
This program – unlike any other News Program on the internet – is about solutions.
We state what the news is and then how to protect yourself form this madness…
So here is what you can do to protect yourself.
Continue reading Wikileaks: CIA Now Controls Your COmputer
The Washington Post published its dubious story on President Trump leaking classified information to the Russians less than an hour after the bombshell news broke that murdered DNC staffer Seth Rich was in contact with Wikileaks and that DC Police were ordered to cover it up.
The coincidental timing has led many Trump supporters to accuse the Post of publishing their story in an attempt to distract the rest of the media from focusing on the massive new revelations in the Seth Rich case.
Source: Did Wash Post Publish Dubious Russia Story to Distract From Seth Rich Bombshell? » Alex Jones’ Infowars: There’s a war on for your mind!
By Zero Hedge
In its seventh CIA leak since March 23rd, WikiLeaks has just revealed the user manual of a CIA hacking tool known as ‘Archimedes’ which is purportedly used to attack computers inside a Local Area Network (LAN). The CIA tool works by redirecting a target’s webpage search to a CIA server which serves up a webpage that looks exactly like the original page they were expecting to be served, but which contains malware. It’s only possible to detect the attack by examining the page source. Per WikiLeaks:
Today, May 5th 2017, WikiLeaks publishes “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target’s computers web browser to an exploitation server while appearing as a normal browsing session.
The document illustrates a type of attack within a “protected environment” as the the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse.
Source: WikiLeaks Reveals “Archimedes”: Malware Used To Hack Local Area Networks » The Event Chronicle
WikiLeaks released details on what it said is a Central Intelligence Agency document tracking program called Scribbles, part of the agency’s effort to keep tabs on documents leaked to whistleblowers and journalists. Scribbles allegedly embeds a web beacon-style tag into watermarks located on Microsoft Word documents that can report document analytics back to the CIA.
WikiLeaks released information Friday about Scribbles as part of its ongoing Vault 7 Dark Matter release that began last month. Also released is what WikiLeaks said is Scribbles’ source code.
A user manual describing Scribbles said the tool can be used to generate batch copies of identical or unique files, each with distinctive watermarks that includes a web beacon-like tag. A web beacon (or web bug) is a transparent graphic image that can be used to report back if a document has been opened and the IP address of the computer that requested the image file.
According to WikiLeaks, Scribble works exclusively with Microsoft Office documents. The tool, according to the user guide has been “successfully tested” to work with Microsoft Office 2013 (on Windows 8.1 x64) and Office 97-2016 running on Windows 98 and above.
WikiLeaks’ copy of the CIA’s Scribbles user manual says the tool will not work on encrypted or password-protected documents. The CIA also warns that if a document with a Scribbles’ watermark is opened in an alternative document viewing program, such as OpenOffice or LibreOffice, it may result in revealing watermarks and URLs for the user…
Source: WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news