{"id":32187,"date":"2017-06-16T22:43:51","date_gmt":"2017-06-17T02:43:51","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-alleges-years-of-cia-d-link-and-linksys-router-hacking-via-cherry-blossom-program-threatpost.php"},"modified":"2017-06-16T22:43:51","modified_gmt":"2017-06-17T02:43:51","slug":"wikileaks-alleges-years-of-cia-d-link-and-linksys-router-hacking-via-cherry-blossom-program-threatpost","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-alleges-years-of-cia-d-link-and-linksys-router-hacking-via-cherry-blossom-program-threatpost.php","title":{"rendered":"Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via &#8216;Cherry Blossom&#8217; Program &#8211; Threatpost"},"content":{"rendered":"<p><p>    Wikileaks released details of what it claims is a CIA-developed    wireless router hacking program targeting home wireless routers    and business wireless networks. The program is called Cherry    Blossom and leverages custom router firmware called FlyTrap,    according to the organizationslatest leak    posted Thursday.  <\/p>\n<p>    Cherry Blossom provides a means of monitoring the Internet    activity of, and performing software exploits on, targets of    interest, according to the report.  <\/p>\n<p>    Thereleaseis part of itsongoing Vault 7    leaksthat began in March and have continued almost    weekly exposingCIA activities and capabilities.  <\/p>\n<p>    According to the documents, the CIA created modified router    firmware called FlyTrap that could be installed on routers    remotely. Once successfully installed, FlyTrap would then    monitor the targets internet traffic and scan for email    addresses, chat usernames, MAC addresses and VoIP numbers.    FlyTrap also allowed government agents to redirect traffic to    desirable sites.  <\/p>\n<\/p>\n<p>    Once the new firmware on the device is flashed, the router or    access point will become a so-called FlyTrap. A FlyTrap will    beacon over the Internet to a command and control server    referred to as the CherryTree. The beaconed information    contains device status and security information that the    CherryTree logs to a database, according to Wikileaks.  <\/p>\n<p>    Listed by the CIA are hundreds of individual consumer- and    business-class wireless router models targeted by the agency    from brands made by 3Com, D-Link, Linksys and Panet Tec. The    Cherry Blossom framework in the alleged CIA documents describes    a program and software used for contract year 2011-2012.  <\/p>\n<p>    If the router is configured to allow firmware to be updated    remotely (and tons are) you are at risk. I would put the    percentage of (home) routers out there vulnerable to this type    of attack at well over 80 percent, said Rick McElroy, security    strategist at Carbon Black.  <\/p>\n<p>    Exploiting misconfigured routers is nothing new, and something    adversaries have been doing for years.  <\/p>\n<p>    McElroy notes that in March, Wikileaks revealed a similar    alleged CIA plot     targeting more than 300 enterprise-class Cisco routers and    switches. Based on the Vault 7 public disclosure, Cisco    launched an investigation into the products that could    potentially be impacted by these and similar exploits and    vulnerabilities, wrote Cisco at the     time in security bulletin announcing fixes for the alleged    CIA hacks.  <\/p>\n<p>    According to Wikileaks documents, FlyTrap is capable of setting    up VPN tunnels to Cherry Blossom-controlled VPN servers in    order to give an operator access to clients on the FlyTraps    WLAN\/LAN for further exploitation.  <\/p>\n<p>    Clearly the most difficult aspect of a Cherry Blossom program    is implanting the FlyTrap firmware on the targeted wireless    router. To that end, the alleged CIA document suggests using a    CIA exploitation tool such as Tomato or Surfside for targeting    vulnerabilities in commercial routers.  <\/p>\n<p>    In instances where a wireless device doesnt permit an    over-the-air update, the CIA developed what are called    Wireless Upgrade Packages. Its unclear what or how these    packages might be deployed to targeted systems. Also    ambiguous, is another suggested means of installing FlyTrap on    routers using the Claymore tool. According to the leaked CIA    document, the Claymore tool is a survey, collection, and    implant tool for wireless (802.11\/WiFi) devices.  <\/p>\n<p>    The last method for installing FlyTrap on one of the hundreds    of routers listed is described: Use the Devices Firmware    Upgrade Web Page over a Wired (LAN) Link  this technique would    likely be used in a supply chain operation, the alleged CIA    describes.  <\/p>\n<p>    For security expert Udi Yavo, CTO and co-founder of enSilo, he    believes this last method mentioned indicates that the CIA    intercepted some router devices in the supply chain and created    back doors that could later be exploited.  <\/p>\n<p>    The CIA has the ability to compromise the device in the supply    chain. In these cases, no vulnerability or misconfiguration is    needed. However, a lot of IoT devices are easy to compromise.    For example, during DEFCON 2016 over 40 zero days were found in    IoT devices. And that was in 2016, before that it was even    easier, Yavo said.  <\/p>\n<p>    It should be noted, however, that the CBlossom architecture    does not limit itself to wireless devices  in general, wired    network devices could be implanted\/compromised in the same    fashion to achieve the same goals, read the alleged CIA    document.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/threatpost.com\/wikileaks-alleges-years-of-cia-d-link-and-linksys-router-hacking-via-cherry-blossom-program\/126339\/\" title=\"Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via 'Cherry Blossom' Program - Threatpost\">Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via 'Cherry Blossom' Program - Threatpost<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Wikileaks released details of what it claims is a CIA-developed wireless router hacking program targeting home wireless routers and business wireless networks. The program is called Cherry Blossom and leverages custom router firmware called FlyTrap, according to the organizationslatest leak posted Thursday<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32187","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32187"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32187"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32187\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}