Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial

A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency’s classified hacking and tools and leaking it to WikiLeaks whistleblower website.

While t… Continue reading Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial

Researchers Claim CIA Was Behind 11-Year-Long Hacking Attacks Against China

Qihoo 360, one of the most prominent cybersecurity firms, today published a new report accusing the U.S. Central Intelligence Agency (CIA) to be behind an 11-year-long hacking campaign against several Chinese industries and government agencies.

The ta… Continue reading Researchers Claim CIA Was Behind 11-Year-Long Hacking Attacks Against China

Ex-CIA employee charged with leaking ‘Vault 7’ hacking tools to Wikileaks

A 29-year-old former CIA computer programmer who was charged with possession of child pornography last year has now been charged with masterminding the largest leak of classified information in the agency’s history.

Joshua Adam Schulte, who once creat… Continue reading Ex-CIA employee charged with leaking ‘Vault 7’ hacking tools to Wikileaks

Vault 8: WikiLeaks Releases Source Code For Hive – CIA’s Malware Control System

Almost two months after releasing details of 23 different secret CIA hacking tool projects under Vault 7 series, Wikileaks today announced a new Vault 8 series that will reveal source codes and information about the backend infrastructure developed by … Continue reading Vault 8: WikiLeaks Releases Source Code For Hive – CIA’s Malware Control System

Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

WikiLeaks has just published another Vault 7 leak, revealing how the CIA spies on their intelligence partners around the world, including FBI, DHS and the NSA, to covertly collect data from their systems.

The CIA offers a biometric collection system—with predefined hardware, operating system, and software—to its intelligence liaison partners around the world that helps them voluntary share

Continue reading Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time

After disclosing CIA’s strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA’s ability to spy on video streams remotely in real-time.

Dubbed ‘CouchPotato,’ document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.
<!– adsense –>

Continue reading CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time

This is How CIA Disables Security Cameras During Hollywood-Style Operations

In last 20 years, we have seen hundreds of caper/heist movies where spies or bank robbers hijack surveillance cameras of secure premises to either stop recording or set up an endless loop for covert operations without leaving any evidence.

Whenever I see such scenes in a movie, I wonder and ask myself: Does this happen in real-life?

Yes, it does, trust me—at least CIA agents are doing this.

Continue reading This is How CIA Disables Security Cameras During Hollywood-Style Operations

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and di… Continue reading 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)

WikiLeaks has today published the 16th batch of its ongoing Vault 7 leak, this time instead of revealing new malware or hacking tool, the whistleblower organisation has unveiled how CIA operatives stealthy collect and forward stolen data from compromis… Continue reading How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems … Continue reading Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs