{"id":32584,"date":"2017-07-18T12:43:37","date_gmt":"2017-07-18T16:43:37","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-exposes-cias-highrise-sms-spying-tool-in-latest-vault-7-dump-hot-hardware.php"},"modified":"2017-07-18T12:43:37","modified_gmt":"2017-07-18T16:43:37","slug":"wikileaks-exposes-cias-highrise-sms-spying-tool-in-latest-vault-7-dump-hot-hardware","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-exposes-cias-highrise-sms-spying-tool-in-latest-vault-7-dump-hot-hardware.php","title":{"rendered":"WikiLeaks Exposes CIA&#8217;s HighRise SMS Spying Tool In Latest Vault 7 Dump &#8211; Hot Hardware"},"content":{"rendered":"<p><p>WikiLeaks  has published another set of leaked documents from the United  States Central Intelligence Agency (CIA). This latest leak is  part of WikiLeaks'   Vault 7 batch and details a malicious app for Android devices called  HighRise. Also called TideCheck, this app allows a remote hacker  to redirect or intercept SMS text messages that are sent to a  target's cellular phone, and have those communications forwarded  to a remote web server.  <\/p>\n<p>    This appears to be an old tool that was used by the CIA, or at    least the version described in the leaked documents is an older    piece of malware. The accompanying manual is dated December 16,    2013, and describes a tool that was designed to work on mobile    handsets running Android 4.0 (Ice Cream Sandwich) to 4.3 (Jelly    Bean). There have been four other major Android releases since    then, including KitKat, Lollipop, Marshmallow, Nougat. Google    is also close to releasing yet another Android build,     Android O.  <\/p>\n<p>    One thing that is interesting about this particular malware is    that it cannot be installed remotely, unlike some of the other    tools the CIA is known to have used. HighRise must be installed    physically and then manually run once before it will    automatically run in the background or after a reboot. As a    consequence of this, HighRise also shows up in the list of    installed apps so it can be started by the HighRise operator,    according to the user guide.  <\/p>\n<p>    These features suggest that this particular version probably    was not used for spying on a target, at least not directly, and    instead was used as a secure line of communication with CIA    agents in the field, perhaps as a backup. Previous versions of    the app did not have these attributes.  <\/p>\n<p>    It is not known if the CIA continues to use this tool, albeit    and updated version that supports newer version of Android (and    perhaps iOS as well).<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/hothardware.com\/news\/wikileaks-exposes-cias-highrise-sms-spying-tool-in-latest-dump\" title=\"WikiLeaks Exposes CIA's HighRise SMS Spying Tool In Latest Vault 7 Dump - Hot Hardware\">WikiLeaks Exposes CIA's HighRise SMS Spying Tool In Latest Vault 7 Dump - Hot Hardware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks has published another set of leaked documents from the United States Central Intelligence Agency (CIA). This latest leak is part of WikiLeaks' Vault 7 batch and details a malicious app for Android devices called HighRise. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32584","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32584"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32584"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32584\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}