{"id":19197,"date":"2017-11-27T17:53:16","date_gmt":"2017-11-27T17:53:16","guid":{"rendered":"http:\/\/dev.yogaesoteric.net\/news-events-en\/articles-1602-en\/wikileaks-cia-has-been-hacking-wireless-routers-for-years\/"},"modified":"2017-11-27T17:53:16","modified_gmt":"2017-11-27T17:53:16","slug":"wikileaks-cia-has-been-hacking-wireless-routers-for-years","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/wikileaks-cia-has-been-hacking-wireless-routers-for-years\/","title":{"rendered":"WikiLeaks: CIA has been hacking wireless routers for years"},"content":{"rendered":"<p><\/p>\n<p>    <img loading=\"lazy\" decoding=\"async\" src=\"\/all_uploads\/uploads-oct17\/27.11.2017\/13833\/13833.jpg\" width=\"550\" height=\"367\" alt=\"\" \/><\/p>\n<p>  A batch of confidential &#8220;Vault 7&#8221; documents, leaked by the non-profit whistleblower organization WikiLeaks, has revealed that the United States Central Intelligence Agency has been hacking routers from major brands for years, turning them into surveillance devices.<\/p>\n<p><\/p>\n<p>  The reported &#8220;Cherry Blossom&#8221; tool can modify a router&#8217;s firmware without a victim&#8217;s knowledge, giving the attacker a wide range of capabilities like eavesdropping on network traffic, gathering passwords, scanning for email addresses and phone numbers and more.<\/p>\n<p><\/p>\n<p>  The attacker even has the power to redirect an unsuspecting user to a particular website, including government-created webpages used for phishing purposes.<\/p>\n<p><\/p>\n<p>  Once infected, the backdoor remains functional even after a router is updated to a newer firmware version, so long as it has not changed its underlying hardware or operating system.<\/p>\n<p><\/p>\n<p>  The hack cannot be deployed remotely. Instead, the CIA can install it on a target router using its Claymore tool or by side-loading a compromised firmware using supply chain tactics (intercepting the target device between the factory and the end user).<\/p>\n<p><\/p>\n<p>    ZDNet reports that the documents reveal that the &#8220;Cherry Blossom&#8221; hack supports more than two-dozen router models from major manufacturers.<\/p>\n<p><\/p>\n<p>  Among the compromised router brands are the devices from Asus, Belkin, Buffalo, Dell, Dlink, Linksys, Motorola, Netgear, Senao and US Robotics. However, Apple&#8217;s AirPort devices don&#8217;t seem to be among them, but the fact they&#8217;re not listed doesn&#8217;t mean that the CIA hasn&#8217;t hacked Time Capsule and AirPort devices.<\/p>\n<p><\/p>\n<p>    <strong><br \/>\n      <br \/>\n    <\/strong><\/p>\n<p>    <strong><br \/>\n      <br \/>\n    <\/strong><\/p>\n<p>    <strong>yogaesoteric<\/strong><\/p>\n<p>    <strong>November 27, 2017&#160;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A batch of confidential &#8220;Vault 7&#8221; documents, leaked by the non-profit whistleblower organization WikiLeaks, has revealed that the United States Central Intelligence Agency has been hacking routers from major brands for years, turning them into surveillance devices. The reported &#8220;Cherry Blossom&#8221; tool can modify a router&#8217;s firmware without a victim&#8217;s knowledge, giving the attacker a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[815],"tags":[],"class_list":["post-19197","post","type-post","status-publish","format-standard","hentry","category-articles-1602-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/19197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=19197"}],"version-history":[{"count":0,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/19197\/revisions"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=19197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=19197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=19197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}