{"id":91976,"date":"2017-05-08T12:00:07","date_gmt":"2017-05-08T11:00:07","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=91976"},"modified":"2017-05-07T10:22:25","modified_gmt":"2017-05-07T09:22:25","slug":"vault-7-archimedes","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-archimedes\/","title":{"rendered":"Vault 7: Archimedes"},"content":{"rendered":"<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-90223\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Today, May 5th 2017, WikiLeaks publishes &#8220;Archimedes&#8221;, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target&#8217;s computers web browser to an exploitation server while appearing as a normal browsing session.<\/p>\n<p>The document illustrates a type of attack within a &#8220;protected environment&#8221; as the the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse.<a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-90672 size-medium\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png 399w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2 style=\"padding-left: 30px;\"><em>Leaked Documents:<\/em><\/h2>\n<p style=\"padding-left: 30px;\"><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Archimedes-1_0-User_Guide\/\" >Archimedes 1.0 User Guide <\/a><\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Archimedes-1_3-Addendum\/\" >Archimedes 1.3 Addendum <\/a><\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Archimedes-1_2-Addendum\/\" >Archimedes 1.2 Addendum <\/a><\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Archimedes-1_1-Addendum\/\" >Archimedes 1.1 Addendum <\/a><\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Fulcrum-User_Manual-v0_62\/\" >Fulcrum User Manual v0.62 <\/a><\/em><\/p>\n<p><em>_________________________________________<\/em><\/p>\n<p><em><strong>All Releases:<\/strong><\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-scribbles-project\/\" >Vault 7: Scribbles Project<\/a> \u2013 28 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-weeping-angel\/\" >Vault 7: Weeping Angel<\/a> \u2013 21 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-hive-project\/\" >Vault 7: Hive Project<\/a> \u2013 14 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/grasshopper\/\" >Vault 7: Grasshopper Framework<\/a> \u2013 7 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/marble-framework\/\" >Vault 7: Marble Framework<\/a> \u2013 31 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/dark-matter\/\" >Vault 7: Project Dark Matter<\/a> \u2013 23 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/03\/vault-7-cia-hacking-tools-revealed\/\" >Vault 7: CIA Hacking Tools Revealed<\/a> \u2013 7 Mar 2017<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Archimedes\" >Go to Original \u2013 wikileaks.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, May 5th 2017, WikiLeaks publishes &#8220;Archimedes&#8221;, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-91976","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/91976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=91976"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/91976\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=91976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=91976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=91976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}