WikiLeaks releases reports to CIA on malware

Wikileaks

The WikiLeaks has released new documents within the Vault Seven release, which contain experts’ reports its sent to the CIA regarding the functioning of several malware programs.

Wikileaks in a statement, said: “they (the documents) mostly contain Proof-of-Concept ideas and assessments for malware attack vectors, partly based on public documents from security researchers and private enterprises in the computer security field.”

It said the documents submitted to the CIA between November 2014 and September 2015, were prepared by the CIA contractor Raytheon Blackbird Technologies for the “UMBRAGE Component Library” (UCL) project.

The Raytheon Blackbird Technologies acted as some sort of a “technology scout” for the Remote Development Branch of the CIA, in particular by “analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects,” WikiLeaks explained.

The collective released the first batch from the Vault seven project in March, containing a total of 8,761 documents.

The latest release, dedicated to a CIA project targeting SMS messages sent and receive on Android devices, occurred on July 13.

See the official release from WikiLeaks below:

Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the “UMBRAGE Component Library” (UCL) project. The documents were submitted to the CIA between November 21st 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September, 11th 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors – partly based on public documents from security researchers and private enterprises in the computer security field.

Raytheon Blackbird Technologies acted as a kind of “technology scout” for the Remote Development Branch (RDB) of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects.

Leave a Reply

Your email address will not be published. Required fields are marked *