CIA’s ‘Dumbo’ Hacks PC Cameras, Microphones, Files: WikiLeaks

BIG BROTHER / SPYING / SURVEILLANCE / WHISTLEBLOWING, 7 August 2017

teleSUR – TRANSCEND Media Service

The whistleblower organization published everything in the Field Guide to the User’s Manual of the CIA’s hacking system.

Dumbo enables agents to either create fake evidence of their intrusion or destroy all real traces of the security break. | Photo: Reuters

3 Aug 2017 – In a press release published today, WikiLeaks revealed the CIA’s hacking tool, ‘Dumbo,’ which allows agents to manipulate Microsoft Window’s webcams, microphones, and other devices from thousands of miles away.

RELATED: Blackstone Group Poised to Buy Stake in Israeli Spyware Firm

The Wikileaks report, part of its Vault 7 disclosures, stated that Dumbo was created to enable access to a target computer during CIA field operations quickly and almost inconspicuously.

“Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired network,” WikiLeaks stated in a press release Thursday.

Controlled by a USB stick, field agents are able to gain access to a Windows system from an administration position, assuming the rights to mute microphones, disable all network adapters, and suspend camera recording while notifying the agent of active files to facilitate deleting or corrupting materials.

Additionally, Dumbo enables agents to either create fake evidence of their intrusion or destroy all real traces of the security break.

The whistleblower organization published everything in the Field Guide to the User’s Manual of the program’s hacking system, with reports dating back to 2015.

According to the files, the USB stick must be plugged in at all times during the operation in order for it to work and will only operate on 32bit Windows XP, Windows Vista and Window’s newer operating systems. It is not supported by 64bit Windows XP or any products released before XP.

However, according to the Wikileaks, Windows users are not the only potential victims of CIA probes. Other agency projects such as Imperial will breach almost any technology’s high security with trojans and untraceable stealth tactics, releasing sensitive information to unknown parties.

A report from HackRead detailed all seven of the Vault 7 documents released by Wikileaks.

Go to Original – telesurtv.net

 

Share or download this article:


DISCLAIMER: In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.


There are no comments so far.

Join the discussion!

We welcome debate and dissent, but personal — ad hominem — attacks (on authors, other users or any individual), abuse and defamatory language will not be tolerated. Nor will we tolerate attempts to deliberately disrupt discussions. We aim to maintain an inviting space to focus on intelligent interactions and debates.

 (please enter the four letters and numbers you see above, no spaces)

Read more

Click here to go to the current weekly digest or pick another article:

BIG BROTHER / SPYING / SURVEILLANCE / WHISTLEBLOWING: