Vault 7 - News and Current Events | futures io social day trading
futures io futures trading


Vault 7
Updated: Views / Replies:988 / 9
Created: by aquarian1 Attachments:0

Welcome to futures io.

(If you already have an account, login at the top of the page)

futures io is the largest futures trading community on the planet, with over 100,000 members. At futures io, our goal has always been and always will be to create a friendly, positive, forward-thinking community where members can openly share and discuss everything the world of trading has to offer. The community is one of the friendliest you will find on any subject, with members going out of their way to help others. Some of the primary differences between futures io and other trading sites revolve around the standards of our community. Those standards include a code of conduct for our members, as well as extremely high standards that govern which partners we do business with, and which products or services we recommend to our members.

At futures io, our focus is on quality education. No hype, gimmicks, or secret sauce. The truth is: trading is hard. To succeed, you need to surround yourself with the right support system, educational content, and trading mentors – all of which you can find on futures io, utilizing our social trading environment.

With futures io, you can find honest trading reviews on brokers, trading rooms, indicator packages, trading strategies, and much more. Our trading review process is highly moderated to ensure that only genuine users are allowed, so you don’t need to worry about fake reviews.

We are fundamentally different than most other trading sites:
  • We are here to help. Just let us know what you need.
  • We work extremely hard to keep things positive in our community.
  • We do not tolerate rude behavior, trolling, or vendors advertising in posts.
  • We firmly believe in and encourage sharing. The holy grail is within you, we can help you find it.
  • We expect our members to participate and become a part of the community. Help yourself by helping others.

You'll need to register in order to view the content of the threads and start contributing to our community.  It's free and simple.

-- Big Mike, Site Administrator

Reply
 
Thread Tools Search this Thread
 

Vault 7

  #1 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Vault 7

Recently Vault 7 was released

This showed the CIA
1. Turned Smart TV into listening devices
2. Backdoors built into Windows and Apple OS
3. Backdoors built into iPhones
4. Computer chips built with backdoors.

This information showed that these backdoors and the code to enter them. This code was not kept secret but widely disemminated.

Given that the code allow anyone with it to enter peoples computers and iphones it allows not just wiretapping of all communications but allows people to do identity theft, enter bank accounts, launch sniffers to record passwords to your accounts and so on.

Yet despite the enormous danger of these illegal backdoors to people's safety, identity and so on - MSM media is silent. The cover up of the CIA spying is incredible.

I searched for a thread here at FIO thinking that with so many tech savvy people they would be aghast at this CIA exposing them to such immense danger.

Couldn't find a thread.
so not in print media and not online

What is going on?
Is everyone asleep?

Keep your mind in the future, in the now.
Reply With Quote
 
  #2 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Snowden: What The Wikileaks Revelations Show Is "Reckless Beyond Words" | Zero Hedge

Wikileaks' "Vault 7" release this morning of thousands of documents demonstrating the extent to which the CIA uses backdoors to hack smartphones, computer operating systems, messenger applications and internet-connected televisions, will be profound.

he recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.
the CIA leaks could provide the blueprints.


the CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open.

"Why is this dangerous?" and explains "Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world."

here's the big deal: first public evidence USG secretly paying to keep US software unsafe. but kept them open -- to spy. https://t.co/mDyVred3H8

— Edward Snowden (@Snowden) March 7, 2017

==========
source:The Most Shocking Revelation From The CIA-Spying Scandal | Zero Hedge

Basically the CIA can turn your TV into a listening device, recording conversations in the room and transmitting the audio to a CIA server.

Even if you think the TV is off, it’s not.

CIA hackers have been able to spoof the on/off display and set the television to a “false off” mode.

Keep your mind in the future, in the now.
Reply With Quote
 
  #3 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received


https://blog.watchpointdata.com/vault-7-7-revelations


7. More Vulnerable Than Ever

The hacking division of the CIA has produced more than one thousand hacking weapons. The CIA lost control of their extensive arsenal, and the malware is now available for cybercriminals and friends and enemies of the state to use as they please

...
This leaves everyone, from the everyday citizen to the CIA itself, more vulnerable than ever to a cyberattack.

By hoarding these zero-days, the CIA is placing manufacturers, the general population, and critical infrastructure at massive risk to foreign intelligence or cyber criminals.

Basically, if the CIA can discover these vulnerabilities, experienced hackers can as well. The point of disclosing vulnerabilities to the technology industry is so they can fix or patch the vulnerability to prevent attacks from happening.

Keep your mind in the future, in the now.
Reply With Quote
 
  #4 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

BTW the CIA built in avoidance techniques in their virus ware so anti-virus tools cannot detect it.

everyone still sleeping?

what the score of the game tonight?

Keep your mind in the future, in the now.
Reply With Quote
 
  #5 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

The alleged CIA practice of deliberately keeping software exploits unpatched for potential access is like not giving sick people penicillin, said John McAfee, the creator of McAfee antivirus, on the latest WikiLeaks data trove.

The anti-secrecy website on Tuesday published a trove of classified documents related to the US arsenal of cyberweapons. Among other things, WikiLeaks alleged that the CIA failed to follow the Obama administration commitment not to hoard “zero day” exploits, vulnerabilities in software that the general IT community, including software producers, are unaware of. The White House pledged to promptly report such vulnerabilities to producers so that they could patch them.

The failure is akin to deliberately deny ill people medicine that government has, told RT John McAfee, the creator of McAfee antivirus, a decision that he called “horrific”.

“The CIA has confirmed that they knew of ‘zero day’ exploits years in advance of the manufacturers of the software finding out,” he said. “Basically, by not fixing those faults it puts customers of Google, Apple, Microsoft and many other American manufacturers at risk, it puts their reputation at risks, and it costs us all billions of
dollars.”



https://www.rt.com/news/380083-mcafee-vault7-cia-exploits/

Keep your mind in the future, in the now.
Reply With Quote
 
  #6 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

where is the common sense?

Today I read:

"It is unclear what sorts of products Neuralink might create, but people who have had discussions with the company describe a strategy similar to SpaceX and Tesla, where Mr. Musk developed new rocket and electric-car technologies, proved they work, and is now using them to pursue more ambitious projects. The company's first products could be advanced implants to treat intractable brain disorders like epilepsy or major depression, a market worth billions of dollars. Such implants would build on simpler electrodes already used to treat brain disorders like Parkinson’s disease.

If Neuralink can prove the safety and efficacy of its technology and receive government approval, perhaps it then could move on to cosmetic brain surgeries to enhance cognitive function, these people say. Mr. Musk alluded to this possibility in his comments last June, describing how humans struggle to process and generate information as quickly as they absorb it."


sounds nice huh?

With a rising police state, hijacked internet of things, CIA building in hacking devices in the firmware of iphones for over a decade, spy camera in digital converters of TV signals..

An interface that allows direct connection into the brain can also be used to monitor your thoughts and and control your actions. The technology, if realized, has the ability to make the police state a complete reality and the horror of sci-fi films reality.

It is by these actions that technocrats destroy civilization.

GMO's to make cancerous food
"security cams" to help 1984
driverless cars so that the police can control your movements
cash less so they can curtail your freedom
  • Skynet of terminator
  • Cloning of that Arnold film where his dup was made
  • Machine control of the planet of Matrix
  • The film where Sylvester Stallone wakes up in the future and the cars are driven by Jonney-Cab - except there will be no dummy in the seat to rip out - if your location wasn't per-authorized - it won't go.

------
so these buffoons race us towards our destruction and yet can't fund planting trees to restore the lungs of the planet?

And the buffoons of the buffoons cheer them on with choruses of "breakthrough, breakthrough" and govt funding (our-money into building the collars/nooses around our necks)to it. Billions poured down the drain so politicians can groom their egos and say they are "with it". If it's high-tech IT MUST be good - right!

source:Elon Musk Launches Company To Hook Up People To Computers | Zero Hedge

Keep your mind in the future, in the now.

Last edited by aquarian1; March 27th, 2017 at 07:47 PM.
Reply With Quote
 
  #7 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Neuralink

Elon Musk's new co could allow uploading, downloading thoughts: Wall Street Journal
(Reuters) - Tesla Inc founder and Chief Executive Elon Musk has launched a company called Neuralink Corp through which computers could merge with human brains, the Wall Street Journal reported, citing people familiar with the matter.

Neuralink is pursuing what Musk calls the "neural lace" technology, implanting tiny brain electrodes that may one day upload and download thoughts, the Journal reported. (http://on.wsj.com/2naUATf)
>
Musk has not made an official announcement, but Neuralink was registered in California as a "medical research" company last July, and he plans on funding the company mostly by himself, a person briefed on the plans told the Journal.

Keep your mind in the future, in the now.
Reply With Quote
 
  #8 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Cyber risk from uniface internet portals

All of these scenarios are worrying enough, but a couple years ago the U.S. government suffered a cyberattack even worse than shutting a stock exchange or opening the floodgates on a dam.

Chinese hackers had gained access to the files of the U.S. Office of Personnel Management (OPM). Estimates of individuals affected range from 4 million up to 32 million. The Chinese hackers actually obtained credentials to gain access to the system, and once inside systematically downloaded the database.

If the stolen information were limited to names, addresses, Social Security numbers and the like, the damage would be immense and the affected individuals would be at constant risk of harassment and identity theft.

But the damage was far worse.

Many of the files consisted of responses to a questionnaire called Standard Form 86, or SF-86. This is the form used to apply for security clearances up to and including the top-secret level.

The form itself is 127 pages long, which is daunting enough.

But the attachments and documentation required to support the information on the form, including tax returns, personal net worth statements, explanations of answers to certain questions, etc., can run to hundreds of pages more."

Our modern financial system and investment and savings providers with their massive dependency on single interface websites, servers and the internet face serious risks that few analysts have yet to appreciate and evaluate.

Cyber Wars Could Crash Markets and Threat To Humanity ? Buffett and Rickards | Zero Hedge

Keep your mind in the future, in the now.
Reply With Quote
 
  #9 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Twitter unprivacy statement

-------------
Even if you don't have a twitter account any website you visit with a stupid twitter icon (which of is almost all as the programmers add then on as a "de riguer").
collects -without your consent

  • IP address,
  • location,
  • your mobile carrier,
  • device information
  • device ID
  • and application IDs

so pretty much everything except the size of your underwear.

If your computer was bought with a credit card or if you gave you name and address (e.g for the receipt) then the secret police can combine both db to know who you are, what you read, when and where you are. With Cortana or Toshiba face recognition at log on - which they build into every laptop and don't tell you its there, "they" also have your voice print and digital face on file.

They can turn on your computer camera and microphone without you knowing - completing the Big Brother loop.

That this kind of "lack of privacy" statement doing whatever they can to violate your privacy is a mark of the coming police state.


Do you know of any websites with a twitter icon? hah-hah

---------- from twitter "privacy" or was that piracy" statement ------
"Using Our Services: We receive information when you interact with our Services, even if you have not created an account (“Log Data”). For example, when you visit our websites, sign into our Services, interact with our email notifications, use your account to authenticate to a third-party website, application, or service, or visit a third-party website, application, or service that includes a Twitter button or widget, we may receive information about you. This Log Data may include your IP address, browser type, operating system, the referring web page, pages visited, location, your mobile carrier, device information (including device and application IDs), search terms, or cookie information.

Location Information: We may receive information about your location. For example, you may choose to publish your location in your Tweets and in your Twitter profile. You may also tell us your location when you set your trend location on Twitter.com. We may also determine location by using other data from your device, such as precise location information from GPS, information about wireless networks or cell towers near your mobile device, or your IP address. We may use and store information about your location to provide features of our Services, such as Tweeting with your location, and to improve and customize the Services, for example, with more relevant content like local trends, stories, ads, and suggestions for people to follow. "

--------

Keep your mind in the future, in the now.

Last edited by aquarian1; October 8th, 2017 at 05:47 PM.
Reply With Quote
The following user says Thank You to aquarian1 for this post:
 
  #10 (permalink)
Elite Member
Point Roberts, WA, USA
 
Trading Experience: Advanced
Platform: IB and free NT
Broker/Data: IB
Favorite Futures: ES
 
aquarian1's Avatar
 
Posts: 3,620 since Dec 2010
Thanks: 1,415 given, 2,245 received

Vault 7


From wiki
https://en.wikipedia.org/wiki/Vault_7

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[citation needed].

Contents

1 Background
2 Publications
2.1 Part 1
2.2 Part 2
2.3 Part 3
2.4 Part 4
2.5 Part 5
2.6 Part 6
2.7 Part 7
2.8 Part 8
2.9 Part 9
2.10 Part 10
2.11 Part 11
2.12 Part 12
2.13 Part 13
2.14 Part 14
2.15 Part 15
2.16 Part 16
2.17 Part 17
3 Authenticity
4 Organization of cyber warfare
4.1 Frankfurt base
5 UMBRAGE
5.1 False flag theories
6 Marble framework
7 Compromised technology and software
7.1 CDs/DVDs
7.2 Apple products
7.3 Cisco
7.4 Smartphones/tablets
7.4.1 Messaging services
7.5 Vehicle control systems
7.6 Windows
8 Commentary
9 See also
10 References
11 External links

Background

WikiLeaks started teasing the release of "Vault 7" in early February 2017 with a series of cryptic tweets.[5] On 16 February 2017, WikiLeaks released CIA documents describing how the CIA monitored the 2012 French presidential election.[6] The press release for this leak stated it was published "as context for its forthcoming CIA Vault 7 series."[7]

On 8 March 2017 US intelligence and law enforcement officials said to the international news agency Reuters that they have been aware of the CIA security breach, which led to the Vault 7 since late 2016. The two officials said they were focusing on "contractors" as the likeliest source of the leak.[8]
Publications
Part 1

The first batch of documents named "Year Zero" was published by WikiLeaks on 7 March 2017, consisting of 7,818 web pages with 943 attachments, purportedly from the Center for Cyber Intelligence,[9] which already contains more pages than former NSA contractor and leaker, Edward Snowden's NSA release.[10] WikiLeaks did not name the source, but said that the files had "circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."[1] According to WikiLeaks, the source "wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons" since these tools raise questions that "urgently need to be debated in public, including whether the C.I.A.'s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency."[1]

WikiLeaks redacted names and other identifying information from the documents before their release,[1] while attempting to allow for connections between people to be drawn via unique identifiers generated by WikiLeaks.[11][12] It also said that it would postpone releasing the source code for the cyber weapons, which is reportedly several hundred million lines long, "until a consensus emerges on the technical and political nature of the C.I.A.'s program and how such 'weapons' should be analyzed, disarmed and published."[1] WikiLeaks founder Julian Assange claimed this was only part of a larger series.[10]

The CIA released a statement saying, "The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the Intelligence Community's ability to protect America against terrorists or other adversaries. Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm."[13]

Assange held a press conference on 9 March to offer to share unpublished data from Vault 7 with technology companies to enable them to fix vulnerabilities detailed therein. He stated that only 1% of the total leak has been released and that much of the remainder of the leak included unpatched vulnerabilities but that he was working with Microsoft, Apple and Google to get these vulnerabilities patched as he would not release information which would put the public at risk, and as fixes were released by manufacturers he would release details of vulnerabilities. As such, none of the vulnerabilities currently released are zero-day exploits. In this press release Assange also read an official statement by Microsoft which stated Microsoft's desire for the "next Geneva Convention" which would protect people from government cyber weapons the same way the previous Geneva Conventions have protected noncombatants from warfare.[14]

In a statement issued on 19 March 2017, Assange said the technology companies who had been contacted had not agreed, disagreed or questioned what he termed as WikiLeaks' standard industry disclosure plan. The standard disclosure time for a vulnerability is 90 days after the company responsible for patching the software is given full details of the flaw.[15] According to WikiLeaks, only Mozilla had been provided with information on the vulnerabilities, while "Google and some other companies" only confirmed receiving the initial notification. WikiLeaks stated: "Most of these lagging companies have conflicts of interest due to their classified work with US government agencies. In practice such associations limit industry staff with US security clearances from fixing holes based on leaked information from the CIA. Should such companies choose to not secure their users against CIA or NSA attacks users may prefer organizations such as Mozilla or European companies that prioritize their users over government contracts".[16][17]
Part 2

On 23 March 2017 WikiLeaks published Vault 7 part 2 "Dark Matter". That publication includes documentation for several CIA efforts to hack the Apple's iPhones and Macs.[18][19][20]
Part 3

On 31 March 2017 WikiLeaks published Vault 7 part 3 "Marble". It contained 676 source code files for the CIA's Marble Framework. It is used to obfuscate, or scramble, malware code in an attempt to make it so that anti-virus firms or investigators can not understand the code or attribute its source. According to WikiLeaks, the code also included a de-obfuscator to reverse the obfuscation effects.[21][22][23]
Part 4

On 7 April 2017 WikiLeaks published Vault 7 part 4 dubbed "Grasshopper". The publication contains 27 documents from the CIA's Grasshopper framework. Which is used by the CIA to build customized and persistent malware payloads for the Microsoft Windows operating systems. Grasshopper focused on Personal Security Product (PSP) avoidance. PSPs are antivirus software such as MS Security Essentials, Symantec Endpoint or Kaspersky IS.[24][23]
Part 5

On 14 April 2017 WikiLeaks published Vault 7 part 5. Titled "HIVE". Based on the CIA top-secret virus program created by its "Embedded Development Branch" (EDB). The six documents published by WikiLeaks are related to the HIVE multi-platform CIA malware suite. A CIA back-end infrastructure with a public-facing HTTPS interface used by CIA to transfer information from target desktop computers and smartphones to the CIA, and open those devices to receive further commands from CIA operators to execute specific tasks. Also called Listening Post (LP), and Command and Control (C2). All of the above while hiding its presence behind unsuspicious-looking public domains. This masking interface is known as "Switchblade".[25]
Part 6

On 21 April 2017 WikiLeaks published Vault 7 part 6, code-named "Weeping Angel". Which is a hacking tool co-developed by the CIA and MI5. Used to exploit a series of smart TVs for the purpose of covert intelligence gathering. Once installed in suitable televisions with a USB stick, that hacking tool enables those televisions built-in microphones and possibly video cameras to record their surroundings, while the televisions falsely appear to be turned off. The recorded data is then either stored locally into the televisions memory or sent over the internet to the CIA. Allegedly both the CIA and MI5 agencies collaborated to develop that malware and coordinated their work in Joint Development Workshops.[26][27][28] As of this part 6 publication, "Weeping Angel" is the second major CIA hacking tool which notably references the British television show, Dr. Who, alongside "Sonic Screwdriver" in "Dark Matter".[29][30]
Part 7

On 28 April 2017 WikiLeaks published Vault 7 part 7 "Scribbles". The leak includes documentation and source code of a tool intended to track documents leaked to whistleblowers and journalists by embedding web beacon tags into classified documents to trace who leaked them.[31][32] The tool affects Microsoft Office documents, specifically "Microsoft Office 2013 (on Windows 8.1 x64), documents from Office versions 97-2016 (Office 95 documents will not work!) [and d]ocuments that are not [locked], encrypted, or password-protected".[33] When a CIA watermarked document is opened, an invisible image within the document that is hosted on the agency's server is loaded, generating a HTTP request. The request is then logged on the server, giving the intelligence agency information about who is opening it and where it is being opened. However, if a watermarked document is opened in an alternative word processor the image may be visible to the viewer. The documentation also states that if the document is viewed offline or in protected view, the watermarked image will not be able to contact its home server. This is only overridden when a user enables editing.[34]
Part 8

On 5 May 2017 WikiLeaks published Vault 7 part 8 "Archimedes". According to U.S. SANS Institute instructor Jake Williams, who analyzed the published documents, Archimedes is a virus previously codenamed "Fulcrum". According to cyber security expert and ENISA member Pierluigi Paganini, the CIA operators use Archimedes to redirect local area network (LAN) web browser sessions from a targeted computer through a computer controlled by the CIA before the sessions are routed to the users. This type of attack is known as man-in-the-middle (MitM). With their publication WikiLeaks included a number of hashes that they claim can be used to potentially identify the Archimedes virus and guard against it in the future. Paganini stated that potential targeted computers can search for those hashes on their systems to check if their systems had been attacked by the CIA.[35]
Part 9

On 12 May 2017 WikiLeaks published Vault 7 part 9 "AfterMidnight" and "Assassin". AfterMidnight is a malware installed on a target personal computer and disguises as a DLL file. Which is executed while the user's computer reboots. Then triggers a connection to the CIA's Command and Control (C2) computer, from which it downloads various modules to run. As for Assassin, it is very similar to its AfterMidnight counterpart, but deceptively runs inside a Windows service process. CIA operators reportedly use Assassin as a C2 to execute a series of tasks, collect, and then periodically send user data to the CIA Listening Post(s) (LP). Similar to a backdoor Trojan behavior. Both AfterMidnight and Assassin run on Windows operating system, are persistent, and periodically beacon to their configured LP to either request tasks or send private information to the CIA, as well as automatically uninstall themselves on a set date and time.[36][37]
Part 10

On 19 May 2017 WikiLeaks published Vault 7 part 10 "Athena". The published user guide, demo, and related documents were created between September 2015 and February 2016. They are all about a malware allegedly developed for the CIA in August 2015. Roughly a mere one month after Microsoft released Windows 10 with their firm statements about how difficult it was to compromise Windows 10. Both the primary "Athena" malware and its secondary malware named "Hera" are resembling in theory to Grasshopper and AfterMidnight malware except some significant differences. One of those differences is that Athena and Hera were developed by the CIA with a New Hampshire private corporation called Siege Technologies. During a Bloomberg 2014 interview the founder of Siege Technologies stated and justified their development of such malware. Athena malware completely hijacks Windows' Remote Access services, while Hera hijacks Windows Dnscache service. Also both Athena and Hera affect all current versions of Windows including, but not limited to, Windows Server 2012 and Windows 10. Another difference are the types of encryption used between the infected computers and the CIA Listening Posts (LP). As for the similarities, they exploit persistent DLL files to create a backdoor to communicate with CIA's LP, steal private data, then send it to CIA servers, or delete private data on the target computer. As well as Command and Control (C2) for CIA operatives to send additional malicious software to further run specific tasks on the attacked computer. All of the above designed to deceive computer security software. Beside the published detailed documents, WikiLeaks has not provided any evidence suggesting the CIA used or not Athena.[38][39][40]
Part 11

On 1 June 2017 WikiLeaks published Vault 7 part 11 "Pandemic". This tool serves as a persistent implant affecting Windows machines with shared folders. It functions as a file system filter driver on an infected computer, and listens for Server Message Block traffic while detecting download attempts from other computers on a local network. "Pandemic" will answer a download request on behalf of the infected computer. However, it will replace the legitimate file with malware. In order to obfuscate its activities, "Pandemic" only modifies or replaces the legitimate file in transit, leaving the original on the server unchanged. The implant allows 20 files to be modified at a time, with a maximum individual file size of 800MB. While not stated in the leaked documentation, it is possible that newly infected computers could themselves become "Pandemic" file servers, allowing the implant to reach new targets on a local network.[41]
Part 12

On 15 June 2017 WikiLeaks published Vault 7 part 12 "Cherry Blossom".
Part 13

On 22 June 2017 WikiLeaks published Vault 7 part 13 "Brutal Kangaroo".
Part 14

On 28 June 2017 WikiLeaks published Vault 7 part 14 "Elsa".
Part 15

On 29 June 2017 WikiLeaks published Vault 7 part 15 "OutlawCountry".
Part 16

On 6 July 2017 WikiLeaks published Vault 7 part 16 "BothanSpy".
Part 17

On 13 July 2017 WikiLeaks published Vault 7 part 17 "Highrise".

Keep your mind in the future, in the now.
Reply With Quote
The following user says Thank You to aquarian1 for this post:

Reply



futures io > > > > Vault 7




Upcoming Webinars and Events (4:30PM ET unless noted)
 

futures io is celebrating 10-years w/ over $18,000 in prizes!

Right now
 

Pro Trader vs Pro Athlete w/Brannigan Barrett @ Habitus Capital

Elite only
     

Similar Threads
Thread Thread Starter Forum Replies Last Post
Want a Vault for Your Gold? It May Cost More Than Before Quick Summary News and Current Events 1 August 10th, 2011 05:27 AM
Invites to The Vault Laserdan Traders Hideout 1 July 7th, 2009 12:02 AM


Tags
ai, automatically, bloomberg, c2, cds, code, combine, data, delete, dow, downloading, el, elon musk, ema, email, est, firefox, funding, information, limit, list, news, operating system, people, platform, recognition, research, reverse, search, signals, size, source code, spacex, spy, strategy, support, systems, technology, top, trend, trends, type, united states, white, windows 10, zerohedge

All times are GMT -4. The time now is 07:59 PM. (this page content is cached, log in for real-time version)

Copyright © 2019 by futures io, s.a., Av Ricardo J. Alfaro, Century Tower, Panama, +507 833-9432 WhatsApp Business, info@futures.io
All information is for educational use only and is not investment advice.
There is a substantial risk of loss in trading commodity futures, stocks, options and foreign exchange products. Past performance is not indicative of future results.
no new posts
Page generated 2019-05-18 in 0.35 seconds with 14 queries on phoenix