Skip to content

Hacking

Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used By CIA

By Swati Khandelwal for The Hacker News - WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices. Dubbed "Cherry Blossom," the framework was allegedly designed by the Central Intelligence Agency (CIA) with the help of Stanford Research Institute (SRI International), an American nonprofit research institute, as part of its ‘Cherry Bomb’ project. Cherry Blossom is basically a remotely controllable firmware-based implant for wireless networking devices, including routers and wireless access points (APs), which exploits router vulnerabilities to gain unauthorized access and then replace firmware with custom Cherry Blossom firmware. "An implanted device [called Flytrap] can then be used to monitor the internet activity of and deliver software exploits to targets of interest." a leaked CIA manual reads.

FBI Arrests NSA Contractor Who Leaked Top Secret “Russian Hacking” Document To The Intercept

By Tyler Durden for Zero Hedge - Earlier this afternoon, the Intercept reported that according to a "top secret NSA document", Russian Military Intelligence "executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials days before election." The NSA document, reportedly dated May 5, analyzes recently acquired intelligence about "a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure." The document notes that investigation only began in the last few months. The document claims the investigation was spurred by "information that became available in April 2017." According to the Intercept, the report is "the most detailed U.S. government account of Russian interference in the election that has yet come to light. It is said to reveal that that Russian hacking may have penetrated further into U.S. voting systems than was previously understood" and "states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document."

The Russian Hacking Fiasco

By Mike Whitney for Information Clearing House - There’s no proof that Russian officials or Russian agents colluded with members of the Trump campaign. There’s no proof that Russia provided material support of any kind for the Trump campaign or that Russian agents hacked Hillary Clinton’s emails or that Russian officials provided Wikileaks with emails that were intended to sabotage Hillary’s chances to win the election. So far, no one in any of the 17 US intelligence agencies has stepped forward and verified the claims of Russian meddling or produced a scintilla of hard evidence that Russia was in anyway involved in the 2016 elections. No proof means no proof. It means that the people and organizations that are making these uncorroborated claims have no basis for legal action, no presumption of wrongdoing, and no grounds for prosecution. They have nothing. Zilch. Their claims, charges and accusations are like the soap bubbles we give to our children and grandchildren. The brightly-colored bubbles wobble across the sky for a minute or two and then, Poof, they vanish into the ether. The claims of Russia hacking are like these bubbles. They are empty, unsubstantiated rumors completely devoid of substance. Poof.

NSA-Leaking Shadow Brokers Just Dumped Its Most Damaging Release Yet

By Dan Goodin for ARS Technica - None of the exploits reported below are, in fact, zerodays that work against supported Microsoft products. Readers should read this update for further details. What follows is the post as it was originally reported. The Shadow Brokers—the mysterious person or group that over the past eight months has leaked a gigabyte worth of the National Security Agency's weaponized software exploits—just published its most significant release yet. Friday's dump contains potent exploits and hacking tools that target most versions of Microsoft Windows and evidence of sophisticated hacks on the SWIFT banking system of several banks across the world. Friday's release—which came as much of the computing world was planning a long weekend to observe the Easter holiday—contains close to 300 megabytes of materials the leakers said were stolen from the NSA. The contents (a convenient overview is here) included compiled binaries for exploits that targeted vulnerabilities in a long line of Windows operating systems, including Windows 8 and Windows 2012. It also included a framework dubbed Fuzzbunch, a tool that resembles the Metasploit hacking framework that loads the binaries into targeted networks.

Did CIA Kill Reporter Investigating John Brennan?

By Ralph Lopez for Hub Pages - Emails leaked in 2012 by Wikileaks paint a portrait of CIA Director John Brennan as a fierce partisan for the Obama administration who was behind "witch hunts of investigative journalists" while he was a White House national security advisor during Obama's first term. The CIA is the primary agency now suggesting that Russia hacked the US election, without ever addressing evidence that the 2016 Democratic primary nomination was hacked by supporters of Hillary Clinton. Brennan was to be the subject of an article by Rolling Stone reporter...

Vault 7: CIA Hacking Tools Revealed

By Staff of Wikileaks - Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits...

Seymour Hersh Blasts Media For Uncritically Promoting Russian Hacking Story

By Jeremy Scahill for The Intercept - PULITZER PRIZE-WINNING journalist Seymour Hersh said in an interview that he does not believe the U.S. intelligence community proved its case that President Vladimir Putin directed a hacking campaign aimed at securing the election of Donald Trump. He blasted news organizations for lazily broadcasting the assertions of U.S. intelligence officials as established facts. Hersh denounced news organizations as “crazy town” for their uncritical promotion of the pronouncements of the director of national intelligence and the CIA, given their track records of lying and misleading the public. “The way they behaved on the Russia stuff was outrageous,” Hersh said when I sat down with him at his home in Washington, D.C., two days after Trump was inaugurated.

A Demand For Russian ‘Hacking’ Proof

By Staff of Consortium News - As President-elect Donald Trump prepares to take the oath of office Friday, a pall hangs over his upcoming presidency amid an unprecedentedly concerted campaign to delegitimize it. Unconfirmed accusations continue to swirl alleging that Russian President Vladimir Putin authorized “Russian hacking” that helped put Mr. Trump in the White House. As President for a few more days, you have the power to demand concrete evidence of a link between the Russians and WikiLeaks, which published the bulk of the information in question. Lacking that evidence, the American people should be told that there is no fire under the smoke and mirrors of recent weeks.

Real Purpose Of U.S. Government’s Report On Alleged Hacking By Russia

By Chris Hedges for Truth Dig - The barely contained rage of Director of National Intelligence James Clapper at the recent Senate Armed Services Committee hearing on foreign cyber threats was visible when he spat out that RT was “promoting a particular point of view, disparaging our system, our alleged hypocrisy about human rights, et cetera.” His anger was a glimpse into how the establishment seethes with hatred for dissidents. Clapper has lied in the past. He perjured himself in March 2013 when, three months before the revelations of wholesale state surveillance leaked by Snowden, he assured Congress that the National Security Agency was not collecting “any type of data”

Detailed Review Of DHS/FBI ‘Evidence’ Shows Russia Hacking Is Fake News

By David Spring for Turning Point News - Many of the IP addresses yielded the same dead end or otherwise highly suspicious result - meaning that some very large agency is using hundreds of servers in various countries around the world as a front for hacking attacks. I recently researched a series of attacks on my personal websites from hundreds of IP addresses using hundreds of servers that were supposedly located in the Ukraine. I was able to confirm the exact location in the Ukraine that was supposedly being used to launch literally thousands of attacks on my websites. However, it is not credible that anyone in the Ukraine has the millions of dollars needed to be running hundreds of servers in a remote Ukrainian location.

Snowden Document Reveals What NSA Knew About Previous Russian Hacking

By Sam Biddle for The Intercept - TO DATE, THE only public evidence that the Russian government was responsible for hacks of the DNC and key Democratic figures has been circumstantial and far short of conclusive, courtesy of private research firms with a financial stake in such claims. Multiple federal agencies now claim certainty about the Kremlin connection, but they have yet to make public the basis for their beliefs. Now, a never-before-published top-secret document provided by whistleblower Edward Snowden suggests the NSA has a way of collecting evidence of Russian hacks, because the agency tracked a similar hack before in the case of a prominent Russian journalist, who was also a U.S. citizen.

The Public Evidence On Russia Is Insufficient

By Sam Biddle for the Intercept. There’s a lot of evidence from the attack on the table, mostly detailing how the hack was perpetrated, and possibly the language of the perpetrators. It certainly remains plausible that Russians hacked the DNC, and remains possible that Russia itself ordered it. But the refrain of Russian attribution has been repeated so regularly and so emphatically that it’s become easy to forget that no one has ever truly proven the claim. There is strong evidence indicating that Democratic email accounts were breached via phishing messages, and that specific malware was spread across DNC computers. There’s even evidence that the attackers are the same group that’s been spotted attacking other targets in the past. But again: No one has actually proven that group is the Russian government (or works for it). This remains the enormous inductive leap that’s not been reckoned with, and Americans deserve better. . . in times of extraordinary risk, with two enormous military powers placed in direct conflict over national sovereignty, we need an extraordinary disclosure. The stakes are simply too high to take anyone’s word for it.

US Intel Vets Dispute Russia Hacking Claims

By Steering Committee of Veteran Intelligence Professionals for Sanity - A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else. Monday’s Washington Postreports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia.

What Is Behind Obama’s Investigation Into Russian Hacking

By Marcy Wheeler for the Empty Wheel. Before I start with the substance of the story, consider this background. First, if Trump comes into office on the current trajectory, the US will let Russia help Bashar al-Assad stay in power, thwarting a 4-year effort on the part of the Saudis to remove him from power. It will also restructure the hierarchy of horrible human rights abusing allies the US has, with the Saudis losing out to other human rights abusers, potentially up to and including that other petrostate, Russia. It will also install a ton of people with ties to the US oil industry in the cabinet, meaning the US will effectively subsidize oil production in this country, which will have the perhaps inadvertent result of ensuring the US remains oil-independent even though the market can’t justify fracking right now. The CIA is institutionally quite close with the Saudis right now, and has been in charge of their covert war against Assad.

New Leak May Show If You Were Hacked By The NSA

By Dan Goodin for ARS Technica - Shadow Brokers—the name used by a person or group that created seismic waves in August when it published some of the National Security Agency's most elite hacking tools—is back with a new leak that the group says reveals hundreds of organizations targeted by the NSA over more than a decade. "TheShadowBrokers is having special trick or treat for Amerikanskis tonight," said the Monday morning post, which was signed by the same encryption key used in the August posts.

Urgent End Of Year Fundraising Campaign

Online donations are back! Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Urgent End Of Year Fundraising Campaign

Online donations are back! 

Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Sign Up To Our Daily Digest

Independent media outlets are being suppressed and dropped by corporations like Google, Facebook and Twitter. Sign up for our daily email digest before it’s too late so you don’t miss the latest movement news.