Dark Knight
March 9th, 2017, 01:10 AM
Don't know if anyone has been keeping up on it here, recent WikiLeaks release of Vault7, tools which the CIA, FBI, NSA and Homeland Security use to actively spy on "terrorists" ..... *ahem* .. *cough, cough*
One would be interested to know the following security products they are able to bypass without ones knowledge ....
•Comodo
•Avast
•F-Secure
•Zemana Antilogger
•Zone Alarm
•Trend Micro
•Symantec
•Rising
•Panda Security
•Norton
•Malwarebytes Anti-Malware
•EMET (Enhanced Mitigation Experience Toolkit)
•Microsoft Security Essentials
•McAfee
•Kaspersky
•GDATA
•ESET
•ClamAV
•Bitdefender
•Avira
•AVG
The following a a list of portable apps they can install on ones system without any knowledge .......
The gist being "CIA field agents receive one or more of these decoy applications, which they store on an USB. While on a mission, they insert the USB in a target's computer and run one of the applications.
Just like in the movies, while the agent is using the app, let's say to show a slideshow presentation in Prezi, the decoy app also runs malicious code that scans the victim's storage space and steals a list of selected file types. Exfiltration can be via the Internet, or by storing the stolen data on the USB itself."
VLC Player Portable
Irfan View
Chrome Portable
Opera Portable
Firefox Portable
ClamWin Portable
Kaspersky TDSS Killer Portable
McAfee Stinger Portable
Sophos Virus Removal
Thunderbird Portable
Opera Mail
Foxit Reader
Libre Office Portable
Prezi
Babel Pad
Notepad++
Skype
Iperius Backup
Sandisk Secure Access
U3 Software
2048
LBreakout2
7-Zip Portable
Portable Linux CMD Prompt
Word is also that they can hack into Smart TV's to make them look like they are off so to use them as listening devices.
I cannot find the source at the moment but I also believe that they have Tor figured out also.
You can read more about this if interested over at Bleeping Computer (https://www.bleepingcomputer.com/)
One would be interested to know the following security products they are able to bypass without ones knowledge ....
•Comodo
•Avast
•F-Secure
•Zemana Antilogger
•Zone Alarm
•Trend Micro
•Symantec
•Rising
•Panda Security
•Norton
•Malwarebytes Anti-Malware
•EMET (Enhanced Mitigation Experience Toolkit)
•Microsoft Security Essentials
•McAfee
•Kaspersky
•GDATA
•ESET
•ClamAV
•Bitdefender
•Avira
•AVG
The following a a list of portable apps they can install on ones system without any knowledge .......
The gist being "CIA field agents receive one or more of these decoy applications, which they store on an USB. While on a mission, they insert the USB in a target's computer and run one of the applications.
Just like in the movies, while the agent is using the app, let's say to show a slideshow presentation in Prezi, the decoy app also runs malicious code that scans the victim's storage space and steals a list of selected file types. Exfiltration can be via the Internet, or by storing the stolen data on the USB itself."
VLC Player Portable
Irfan View
Chrome Portable
Opera Portable
Firefox Portable
ClamWin Portable
Kaspersky TDSS Killer Portable
McAfee Stinger Portable
Sophos Virus Removal
Thunderbird Portable
Opera Mail
Foxit Reader
Libre Office Portable
Prezi
Babel Pad
Notepad++
Skype
Iperius Backup
Sandisk Secure Access
U3 Software
2048
LBreakout2
7-Zip Portable
Portable Linux CMD Prompt
Word is also that they can hack into Smart TV's to make them look like they are off so to use them as listening devices.
I cannot find the source at the moment but I also believe that they have Tor figured out also.
You can read more about this if interested over at Bleeping Computer (https://www.bleepingcomputer.com/)