Vault7 – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 15 Mar 2017 05:23:24 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Vault7 – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Don’t Panic & P your S | TechSNAP 310 https://original.jupiterbroadcasting.net/107531/dont-panic-p-your-s-techsnap-310/ Tue, 14 Mar 2017 21:23:24 +0000 https://original.jupiterbroadcasting.net/?p=107531 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Malware found preinstalled on 38 Android phones used by 2 companies Malicious apps were surreptitiously added somewhere along the supply chain. Check Point didn’t disclose […]

The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Malware found preinstalled on 38 Android phones used by 2 companies

  • Malicious apps were surreptitiously added somewhere along the supply chain.

  • Check Point didn’t disclose the names of the companies that owned the infected phones. One of the affected parties was a “large telecommunications company” and the other was a “multinational technology company.”

  • It’s interesting how this came on out March 10 and the WikiLeaks notice about compromised cellphones came out a few days earlier. Coincidence?

“Vault 7” by WikiLeaks

  • A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

  • Among the more notable disclosures which, if confirmed, “would rock the technology world”, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

  • NOTE: From what I’ve read, this compromise involves first compromising the phone in question and as such is not an attack on the apps themselves.

  • Kreb’s coverage

  • Krebs says: “The documents for the most part don’t appear to include the computer code needed to exploit previously unknown flaws in these products, although WikiLeaks says those exploits may show up in a future dump. This collection is probably best thought of as an internal corporate wiki used by multiple CIA researchers who methodically found and documented weaknesses in a variety of popular commercial and consumer electronics.”

  • Krebs also says: “Some of the exploits discussed in these leaked CIA documents appear to reference full-on, remote access vulnerabilities. However, a great many of the documents I’ve looked at seem to refer to attack concepts or half-finished exploits that may be limited by very specific requirements — such as physical access to the targeted device.”

  • See also Espionage vs. Surveillance

  • Best advice: patch your shit, secure physical access, it is not as bad as WikiLeaks is making it out to be.


Feedback


Round Up:

+Silent Data Corruption Is Real


The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
CIA’s Dank Trojans | LINUX Unplugged 187 https://original.jupiterbroadcasting.net/107336/cias-dank-trojans-lup-187/ Tue, 07 Mar 2017 20:10:58 +0000 https://original.jupiterbroadcasting.net/?p=107336 RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed Become a supporter on Patreon: Show Notes: Follow Up / Catch Up GNU founder Richard Stallman's famous quote resonates with today's @WikiLeaks publication on the CIA's #Vault7 https://t.co/h5wzfrReyy pic.twitter.com/aPk2CK2DbN — WikiLeaks (@wikileaks) March 7, 2017 […]

The post CIA's Dank Trojans | LINUX Unplugged 187 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Follow Up / Catch Up

Vault7 – HIVE Targets Linux

The CIA has developed automated multi-platform malware attack and control
systems covering Windows, Mac OS X, Solaris, Linux and more, such
as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are
_described in the examples section below
._

HIVE

HIVE is a multi-platform CIA malware suite and its associated control
software. The project provides customizable implants for Windows, Solaris,
MikroTik (used in internet routers) and Linux platforms and a Listening
Post (LP)/Command and Control (C2) infrastructure to communicate with
these implants.

The implants are configured to communicate via HTTPS with the webserver of a
cover domain; each operation utilizing these implants has a separate cover
domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial
VPS (Virtual Private Server) provider. The public-facing server forwards all
incoming traffic via a VPN to a ‘Blot’ server that handles actual connection
requests from clients. It is setup for optional SSL client authentication: if
a client sends a valid client certificate (only implants can do that), the
connection is forwarded to the ‘Honeycomb’ toolserver that communicates with
the implant; if a valid certificate is missing (which is the case if someone
tries to open the cover domain website by accident), the traffic is forwarded
to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an
operator can also task the implant to execute jobs on the target computer, so
the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby
project.

See the classified user and
developer guides for HIVE.

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Setting Up a Linux Build Environment for EFI

This page will walk you through building a build environment for a Linux machine. Specifically, this tutorial is focused on Ubuntu/Linux Mint.


Linux Academy

“Linux Sucks… For the Last Time” – 2017

“Linux Sucks”. 2017 edition. The very last “Linux Sucks”. Ever. Recorded live at the Southern California Linux Expo (SCaLE) on March 2nd, 2017.

The Story of Firefox OS

Well, I’m Ben and I’m a Mozillian. I’m a Software Engineer who worked on the “Boot to Gecko” project full time for five years and I have a story to tell.

The Endless Mission One is a gorgeous Linux-powered desktop with a tempting price tag

But the Endless Mission One, which is the subject of this review, is significantly more expensive, costing $250. It also packs more capable hardware, and a gorgeous wood finish that wouldn’t look out of place in a home office. P

OggCamp 17 – Aug 19th & 20th 2017 | Canterbury, UK

OggCamp is a Free Culture Unconference.

TING

Gnome and Endless at SCaLE 15x

View post on imgur.com

The Endless Mission One comes in two variants — one with 320GB of storage, and one with 500GB. I reviewed the latter.

For many users, GNOME 3, also known as Gnome Shell, is the definitive desktop interface. It’s clean and simple, without too many twinkles or distractions. That said, this article describes some tricks to change the GNOME notifications experience.

DigitalOcean

Litebook is a $249 Linux laptop – Liliputing

You can order the 2.9 laptop from the Litebook website. A model with a 512GB hard drive is priced at $249. Or you can pay $20 more for a version with a 32GB mSATA solid state disk and a 512GB hard drive.

k. Litebooks are the perfect combination of beautiful hardware and software. Fast and intuitive the Litebook offers a computing experience like no other. Unlike Windows laptops, Litebooks are highly optimized, come without performance hogging bloatware, are designed to ensure your privacy, and are entirely free of malware and viruses, while unlike macs Litebooks are affordable, customizable, and are backwards compatible with windows software.

The post CIA's Dank Trojans | LINUX Unplugged 187 first appeared on Jupiter Broadcasting.

]]>