The CIA Has Been Hacking into Wi-Fi Routers for Years

The CIA Has Been Hacking into Wi-Fi Routers for Years

The CIA Has Been Hacking into Wi-Fi Routers for Years

The views expressed in these articles are the author's own and do not necessarily reflect Mint Press News editorial policy. We need your help!

According to the leaked documents, it's possible to replace a wireless router or access point's firmware with the CherryBlossom firmware.

However, the Central Intelligence Agency has so far not commented on these leaked documents.

The project comes from the CIA's elite hacking unit, the Engineering Development Group. "The wireless device itself is compromized by implanting a customized Cherry Blossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection".

Ankle injury ends Wahab's Champions Trophy for Pakistan
Kohli's master-class from 68 balls helped India post 3-319 in their 48 overs, after their innings had desperately needed a spark. India captain Virat Kohli has said that his "opinion does not matter" when it comes to playing Pakistan in bilateral series.

Artemis Racing reaches America's Cup challenger finals
Artemis will now meet Emirates Team New Zealand in the Challenger Play-off Finals, also a best-of-nine series, starting today. Both teams have had to overcome problems in their quest to become the challenger to America's Cup holder Oracle Team USA.

Iran blames USA for regional instability, creation of IS
Ayatollah Ali Khamenei blamed USA for the creation of ISIS and also said that it's fight against Islamic State is a lie. Earlier, Iranian Parliamentary Speaker Ali Larijani accused Washington of being an ally of Islamic State in the region.

Wi-Fi devices used in homes, public spaces, small- and medium-sized companies as well as enterprise offices were all part of the project.

The "man-in-the-middle" style attack gives the CIA essentially unlimited access to the activity of a user connected to the hacked network-which could potentially include those who aren't the direct target of the agency.

The devices work by compromising the data stream between the user and Internet services. In fact, most of the routers don't get patched for security flaws for years, opposite to regular devices like computers and smartphones. For devices which don't allow wireless upgrades, "Wireless Upgrade Packages" are created. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target's browser (e.g., to Windex for browser exploitation) or the proxying of a Target's network connections.

WikiLeaks has stuck with its previous position of not releasing the source code for any of the tools mentioned in the documents, but it still serves as a slightly terrifying insight into the capabilities of the Central Intelligence Agency.

Related news