{"id":32542,"date":"2017-07-15T03:42:56","date_gmt":"2017-07-15T07:42:56","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-reveals-cia-tool-acting-as-sms-proxy-on-android-infosecurity-magazine.php"},"modified":"2017-07-15T03:42:56","modified_gmt":"2017-07-15T07:42:56","slug":"wikileaks-reveals-cia-tool-acting-as-sms-proxy-on-android-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-reveals-cia-tool-acting-as-sms-proxy-on-android-infosecurity-magazine.php","title":{"rendered":"WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android &#8211; Infosecurity Magazine"},"content":{"rendered":"<p><p>    WikiLeaks has revealed details about HighRise, a tool allegedly    developed by the US Central Intelligence Agency (CIA), which    intercepts and redirects SMS messages to a remote web server    through an Android application.  <\/p>\n<p>    In other words, the malware can enable a CIA agent to access    the message before it reaches its intended recipient.  <\/p>\n<p>    The leaked manual comes from Vault 7, the codename given by    WikiLeaks to documents it claims reveala repertoire of    hacking tools and capabilities that the CIA has used in the    recent past.  <\/p>\n<p>    According to WikiLeaks, HighRise acts as a proxy server for    text messages. However, it is limited to devices which have the    malware installed on it manually  meaning that the CIA would    need physical access to the Android device to infect the    handset.  <\/p>\n<p>    The manual suggested that it only works on Android versions    from 4.0 (Ice Cream Sandwich) to 4.3 (JellyBean)  although it    could have been updated to work on more recent versions of the    Android OS.  <\/p>\n<p>    The HighRise tool is packaged inside an app called TideCheck.    Once the CIA installs the app on the targets device, they have    to run it at least once, in order for it to work at all times     including when the phone is rebooted. The app starts when the    phone is powered on, meaning that it can continue to run in the    background and intercept text messages for longer than most    other CIA malware, which disappeared after a restart.  <\/p>\n<p>    According to the manual, CIA operatives have to enter the    special code inshallah which is the Arabic word for God    willing to access the apps settings.  <\/p>\n<p>    Once activated, the app gives the user three choices  they can    return directly to the configuration to make changes, they can    start the tool or they can send an SMS from the phone to a    remote CIA server.  <\/p>\n<p>    This is the first Vault 7 data dump to involve the Android OS;    most of the other tools have been focused on Windows or Linux.    This included Grasshopper, a builder for Windows malware, and    Scribble, a beaconing system for Office documents. There has    also been a tool geared to hack Samsung smart TVs, and a tool    for hacking iPhones and Macs.  <\/p>\n<p>    WikiLeaks claim that the CIA are, or have been using many of    these tools- but critics suggest that the documents are several    years out-of-date and have suggested that WikiLeaks has    overhyped their importance.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/wikileaks-highrise-cia-android\/\" title=\"WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android - Infosecurity Magazine\">WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android - Infosecurity Magazine<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks has revealed details about HighRise, a tool allegedly developed by the US Central Intelligence Agency (CIA), which intercepts and redirects SMS messages to a remote web server through an Android application. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32542","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32542"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32542"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32542\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}