Information on CIA hacking tool "Archimedes" is released by WikiLeaks


ByChristopher Schirner

Man-in-the-middle attackCIA hacking tool to do "Archimedes"about,WikiLeaksHas been released. Archimedes was released by WikiLeaks in March 2017Vault 7It is one of the things related to attacking computers on the local network to exploit information.

WikiLeaks - Vault 7: Projects
https://wikileaks.org/vault7/#Archimedes

WikiLeaks Reveals CIA 'Archimedes' Tool Reportedly Used to Infect Local Networks - Breitbart
http://www.breitbart.com/tech/2017/05/05/wikileaks-reveals-cia-archimedes-tool-reportedly-used-to-infect-local-networks/


More Vault 7 leaks from WikiLeaks: Archimedes is the CIA's man-in-the-middle hacking tool
https://betanews.com/2017/05/06/wikileaks-vault-7-archimedes/


On 7th March 2017, a confidential document on a number of top secret operations that CIA collected personal information using smartphones and smart televisions, hacked cars, collected materials on French presidential election " Vault 7 "WikiLeaks released the information. For vulnerabilities such as Android and iOS considered to have been used for hacking,Vulnerability addressed"A comment is announced. However, as the security update can not be applied to the terminal, there is a possibility that the terminal may be subjected to a cyber attack, and uneasiness spread among users.

WikiLeaks releases a confidential document "Vault 7" that reveals the actual state of CIA's secret intelligence operations such as "hacking cars and assassinating them" and "recording conversations in rooms with TV" - GIGAZINE


After that, WikiLeaks has released CIA's hacking tool one after another, and on May 5, 2017, we released a new CIA hacking tool "Archimedes".

According to WikiLeaks, Archimedes is a tool to attack computers in LAN environment such as office. Archimedes is infected with malware and redirects the target computer to the server for information exploitation before the user is aware through the computer under the control of CIA. While the user is browsing on the target computer, the page you are watching is as usual, so the user does not notice that the CIA is being monitored. The document states that it was depicted how to place a computer in a "protected environment" under control and exploit information.

ByTor Håkon Haugen

Note that Archimedes was released in 2011FulcrumIt is a concrete method of, and it is unknown whether article creation is still being used.

in Software,   Security, Posted by darkhorse_log