Jump to content
  • Sign Up
Sign in to follow this  
Ukshep

WikiLeaks Releases Documents on Two CIA Projects Targeting Network Protocols

Recommended Posts

According to WikiLeaks, the BothanSpy is an implant targeting the SSH client program for Microsoft Windows platform, stealing user credentials form active SSH sessions.

MOSCOW (Sputnik) – The WikiLeaks whistleblowing platform released on Thursday a new package of CIA documents from the so-called Vault 7 project, in particular the documents on two separate CIA projects aimed at stealing users’ login details for remote access to a server of a website.

"Today, July 6th 2017, WikiLeaks publishes documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors," WikiLeaks said in a statement.

https://sputniknews.com/world/201707061055294450-wikileaks-documents-cia/

More releases from Wikileaks. Each one taking us further into a cyber war that escalates with each coming day.... We can all guess where it may end up!

Share this post


Link to post
Share on other sites

Governments around the world use think tanks to plan for EVERY conceivable  plan there is for EVERYTHING!! and then they choose which ones to act upon including the manipulation of the people by all know means!!

Share this post


Link to post
Share on other sites

Your content will need to be approved by a moderator

Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.