Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected

WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.

Wikileaks: CIA Hacks Dubbed Dark Matter Reveal How Apple Products Are Infected

Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.

According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.

From Wikileaks:

Dark Matter

23 March, 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Leaked Documents

Sonic Screwdriver
DerStarke v1.4
DerStarke v1.4 RC1 – IVVRR Checklist
Triton v1.3
DarkSeaSkies v1.0 – URD

Dark Matter Dog

 
via

Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access

Dozens of House Democrats have collectively paid $4 million since 2009 to Pakistani IT professionals now under criminal investigation who had access to House members’ email and computer files.

Five Pakistani Congressional Staffers In Criminal Probe

Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

House Speaker Paul Ryan said last week Capitol Police are receiving additional help for the investigation. “I won’t speak to the nature of their investigation, but they’re getting the kind of technical assistance they need to do that, this is under an active criminal investigation, their capabilities are pretty strong but they’re also able to go and get the kind of help they need from other sources,” Ryan said.

The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.

Imran’s wife, Hina Alvi, and Rao Abbas, both of whom worked as House IT employees, are also under investigation.

Debbie Wasserman Schultz

The group were banned from accessing the computers as a result of the investigation but, as of earlier this month, Imran Awan remains as an “technology adviser” to former Democratic National Committee chair, Debbie Wasserman Schultz, who was forced to resign in July following revelations that she worked to further Hillary Clinton’s chances of winning the Democratic primary at the expense of Vermont Senator Bernie Sanders.

News of the brothers’ investigation has sparked speculation that it may be tied to the hack of the DNC servers, the contents of which were first released by Guccifer 2.0 and later published on WikiLeaks.

Russian actors have been accused of being behind the hack, which Democrats claim contributed to Clinton’s loss to Donald Trump. There have also been reports that the DNC hack came from an insider.

An email between DNC staffers in April 2016, which was released by WikiLeaks, references a staff member named Imran and how this person has access to the passwords for Wasserman Schultz’s iPad.

Garret Bonosky, deputy director of office of the DNC chair, tells Amy Kroll: “I have to get [this iPad] thing figured out. Need to make sure I have her username and password before I delete and reload the app.”

“I do not have access to her ipad password, but Imran does,” Kroll replies, later writing: “Just spoke to Imran, call me whenever GB and I’ll update you, don’t delete anything yet.”

Another email from the DNC hack, dated December 2016, references Imran once again. Wasserman Schultz’s assistant Rosalyn Kumar tells scheduler Anna Stolitzka: “[Nancy] Pelosi is doing [a] closed door meeting. No staff or anyone allowed. Kaitlyn come to Rayburn room and get her iPad for Imran.”

6-Figure Salaries

The brothers were paid high salaries for their work with various House members, above the median salary for Congressional staffers.

Imran, who started working for Wasserman Schultz in 2005, received $164,600 in 2016, with close to $20,000 of that coming from Wasserman Schultz.

Jamal, who started working as a staffer in 2014, was paid $157,350.12 in 2016.

Abid, who started working in 2005, was paid $160,943 in 2016.

Hina Alvi, who was employed as a staffer from February 2007, was paid 168,300 in 2016.

Rao Abbas was paid $85,049 in 2016.

The Daily Caller reports that Imran received $1.2 million in salary since 2010, while Abid and Alvi received over $1 million each.

House Democrats supporting the employees have suggested that the Pakistani nationality of the suspects may have inspired the investigation.

 
via

FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”

In a 2012 Wired article, entitled, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” then CIA Director David Petraeus heralded emerging technologies in relation to spying.
FLASHBACK - CIA Director David Petraeus: "We’ll Spy on You Through Your Dishwasher"
CIA Director David Petraeus unwinds with some Wii Golf, 2008. Photo: Wikimedia

With Wikileaks latest, largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are. They have become virtually nonexistent thanks to Obama’s two terms in office.

As far back as a five years ago, then CIA Director General David Petraeus was touting how hi-tech advances offered countless ways Americans can be spied on.

With the rise of the “Smart Home,” you are sending tagged, Geo-located data that the CIA can intercept in real-time when you use the lighting app on your phone to adjust your living room’s ambiance.

The CIA had a plan that smart meters, smart phones, smart TVs and other smart household devices installed in every hopelessly “Dumbed Down” American’s home would permit the Deep State complete invasive access to you in the un-private, unsafe sanctuary you call home.

From Wired March 2012:

MORE AND MORE personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”

Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.

The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.

That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.

“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”

It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.

Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck.

 

CIA Method Of Snooping WiFi Data Through Mobile App/Exploit

CIA Method Of Snooping WiFi Data Through Mobile App/Exploit

Vault 7: CIA Hacking Tools Revealed

The tool ‘Spottsroide’ uses a development feature of the Broadcom modem- called monitor mode– that is present in (in this document, the Galaxy S2) many smartphones and other mobile devices that can be used to snoop and conduct blanket data collection of all WiFi traffic around the device. This data can be analysed later through a variety of different techniques.

Monitor mode (if supported) is normally disabled in firmware, this document confirms that and states “The source was never released, so this is the “reverse engineered” source”- meaning Broadcom didn’t help directly.

This does highlight the issues with fully closed-source backdoors and vulnerabilities, where they can be reverse engineered and exploited regardless of any perceived security.

The interesting thing is that the “survey app” responsible for data collection is initially launched through another app called Apollo, a “music player app”
Apollo is a default music app in CyanogenMod and a special version is available through the Google Play store for install on other Android devices, the “Joe” version is developed by a man named Joseph Cohen who has, according to his website, worked for “government research labs” as well as other government-sponsored projects.
Mr. Joseph Cohen has also co-authored papers on cybersecurity and “PASA: Passive broadcast for smartphone ad-hoc networks

It is possible there is nothing odd about the Apollo app- or Joseph Cohen’s version specifically- and there is simply some form of exploit or perhaps the app has plugins, extensions, or something that’s being leveraged here to start the data collection. But there’s no doubt this is all very odd.

This is a very interesting, highly covert way to conduct network analysis after the fact.

 
Source…

Michael Flynn Did Not Violate The Logan Act

In December when Michael Flynn talked with Russian Ambassador Sergey Kislyak, Flynn said it was to discuss logistics of a call between President Donald Trump and Russian President Vladimir Putin. Apparently they also discussed the sanctions imposed by outgoing President Barack Obama on Russia for their assumed and alleged “hacking” of the U.S. election in November.

By way of retaliation, based on the allegations of meddling in the election, Obama imposed sanctions that included kicking out 35 Russian officials and closing down two Russian-owned compounds in the U.S. President Putin said the next day that he had no intention of retaliating against Obama’s sanctions, but said he’d wait and deal with the Trump Administration.

Flynn, when recounting his discussion with the Russian Ambassador, obviously talked about Obama’s sanctions, but averred that he hadn’t. And technically, this was Flynn’s error – he lost the confidence of the President and the Vice President by not telling them that sanctions were in fact discussed. Even in his press conference this week President Trump said Flynn wouldn’t have been doing his job if he hadn’t discussed Obama’s sanctions. The sin was not in discussing the sanctions, the sin was in not telling his bosses that he had.

And this is where the political assassination of Michael Flynn occurred. According to the Washington Post, an intelligence source contacted them revealing, illegally, that the December 29th call between Flynn and Kislyak did include discussion of the Obama sanctions. It’s a felony to disclose intelligence data and information. And in order for an intelligence insider to leak something so inconsequential, it was obviously intended to cause political damage to the administration. There really can be no other viable explanation as to why someone in our intelligence apparatus would go public with such a disclosure.

Michael Flynn Did Not Violate The Logan Act

Many have attempted to claim that Flynn violated the Logan Act, since he was not yet functioning in his new appointment as the National Security Advisor. This is a red herring. The Logan Act dates to 1799, when a state legislator with no ties to any administration tried to assert himself as a personal negotiator for final peace with France. The anti-Jefferson Federalists did not like this private initiative, so they passed the Logan Act to make private ventures intent on negotiating personal treaties over international feuds a crime. A representative of an incoming or an outgoing administration is functioning in their official, or official-to-be, capacity, and are not acting a private citizens. Apparently Flynn was addressing Obama’s sanctions against Russia, not negotiating for them. And as President Trump said this week, Flynn would not have been doing his job properly if he didn’t broach the subject of Obama’s sanctions.

 
Source…

Load More