New Documents From WikiLeaks Expose How The CIA Exploits Wireless Devices
by Alexa Erickson
In the latest ongoing WikiLeaks whistleblowing scandal, the website has published documents from the CIA’s CherryBlossom project, exposing agency’s exploitation of Wi-Fi device security vulnerabilities. Released on Thursday, the new batch of CIA classified documents comes from the Vault 7 project.
In a press release, WikiLeaks said: “Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).”
CherryBlossom monitors the Internet activity of, and performs software exploits on, targets of interest. According to the press release:
In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for “Man-In-The-Middle” attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users.
The devices work by compromising the data stream between the user and Internet services. The end result is control and manipulation of router user traffic.
According to WikiLeaks, CherryBlossom has been infecting Wi-Fi routers of D-Link, Belkin, and Linskys companies for years.
To implant the customized CherryBlossom firmware on a wireless device, no physical access is required, making the operation dangerously stealthy. This is because some devices allow their firmware to be upgraded over a wireless link.
The new firmware on the device can be used to ignite the router into a “FlyTrap,” which can scan for “email addresses, chat usernames, MAC addresses and VoIP numbers” in passing network traffic.
WikiLeaks has been releasing documents of the Vault 7 since March 7, its first full part revealing 8,761 documents. The most recent release prior to CherryBlossom occurred on June 1, and involved the “Pandemic” spyware.
About the writer: Inspired by balance, Alexa finds that her true inner peace comes from executing a well-rounded lifestyle. An avid yogi, hiker, beach bum, music and art enthusiast, salad aficionado, adventure seeker, animal lover, and professional writer, she is an active individual who loves to express herself through the power of words.
TLAV Editor’s Note: As it is no secret that independent media has come under establishment attack, both in regard to traffic and revenue, with this new release it becomes quite clear what TLAV and other outlets have been experiencing. With regular attacks on our severs, and verifiable traffic manipulation, its apparent that any site with a dissenting view will be, and likely already are being targeted. Drowning out dissenting views simply cannot be allowed in a free society. We must now rely on the direct support of our readers and subscribers to continue to challenge the mainstream narrative. We cannot do this without you. Help us on Patreon, or simply spread the word! Follow the change. Be the change.
Other articles about Wikileaks, Vault 7 and the Deep State from TLB, Click Here.
Follow TLB on Twitter @thetlbproject
The views expressed here belong to the author and do not necessarily reflect our views and opinions.
TLB has other above the fold articles, videos and stories available by clicking on “HOME” at the top of this post. Never miss a new post, sign up for E-Mail alerts at the bottom of the Home page and get a link dropped right to your in-box.
TheLibertyBeacon.com contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.