{"id":32201,"date":"2017-06-19T04:43:17","date_gmt":"2017-06-19T08:43:17","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-dump-details-how-the-cia-can-easily-hijack-routers-siliconangle-blog.php"},"modified":"2017-06-19T04:43:17","modified_gmt":"2017-06-19T08:43:17","slug":"wikileaks-dump-details-how-the-cia-can-easily-hijack-routers-siliconangle-blog","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-dump-details-how-the-cia-can-easily-hijack-routers-siliconangle-blog.php","title":{"rendered":"Wikileaks dump details how the CIA can easily hijack routers &#8211; SiliconANGLE (blog)"},"content":{"rendered":"<p><p>    The Central Intelligence Agency likes to hack Wi-Fi routers.  <\/p>\n<p>    Thats the major takeaway from a new    dump from Wikileaks that includes the details of software    used by the agency to spy on all and sundry.  <\/p>\n<p>    Called Cherry Blossom, the CIA-designed hacking    softwareuses a modified version of a routers firmware to    turn it into a surveillance tool. The firmware allows the    agency to monitor thetargets internet traffic remotely,    scan for useful information such aspasswords and redirect    the target to a desired website.  <\/p>\n<p>    The idea of the CIA spying on people isnt particularly    groundbreaking, but what is more interesting is that Cherry    Blossom can be installed remotely with zero physical access to    the router itself. It uses a process called FlyTrap by which    an implanted device can then be used to monitor the Internet    activity of and deliver software exploits to targets of    interest, the CIA manual noted.  <\/p>\n<p>    The method of attack is to hijack the over-the-air firmware    upgrade functionality. Many wireless devices allow a firmware    upgrade over the wireless link, meaning a wireless device can    often be implanted without physical access, the manual noted.    Supported devices  can be implanted by upgrading the firmware    using a variety of tools\/techniques.  <\/p>\n<p>    The document would appear to be somewhat old, given that it    includes references to as of August 2012. Still, no router    would be safe from Cherry Blossom. The manual described    different versions of the hacking tool tailored to a    multiplebrands and models of routers, including devices    from Asus, Belkin, Buffalo, Dell, DLink, Linksys, Motorola,    Netgear, Senao and US Robotics.  <\/p>\n<p>    Once the new firmware on the device is flashed, the router or    access point will become a so-called FlyTrap, Wikileaks noted    in its press release. A FlyTrap will beacon over the    Internet to a Command & Control server referred to as the    CherryTree. That beaconed information contains device status    and security information that the CherryTree then logs into a    database.  <\/p>\n<p>    In response to this information, the CherryTree sends a    Mission with operator-defined tasking, Wikileaks continued.    An operator can use CherryWeb, a browser-based user interface    to view Flytrap status and security info, plan Mission tasking,    view Mission-related data, and perform system administration    tasks.  <\/p>\n<p>    Althoughthe CIA is legally restricted from operating    within the borders of the United States, if youre reading this    from another country and are doing something untoward, it may    be advisable for you to turn off your router very quickly.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/siliconangle.com\/blog\/2017\/06\/15\/wikileaks-dump-details-cia-able-easily-hijack-routers\/\" title=\"Wikileaks dump details how the CIA can easily hijack routers - SiliconANGLE (blog)\">Wikileaks dump details how the CIA can easily hijack routers - SiliconANGLE (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Central Intelligence Agency likes to hack Wi-Fi routers. Thats the major takeaway from a new dump from Wikileaks that includes the details of software used by the agency to spy on all and sundry. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32201","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32201"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32201"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32201\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}