Julian Assange Introductory Remarks On Wikileaks Vault 7 Year Zero
In his introductory remarks on Vault 7 Year Zero, Julian Assange mentions that Wikileaks obtained the files from an anonymous source and criticises the CIA for gross incompetence for losing control of such dangerous material such dangerous material, which is almost certainly in the hands of foreign intelligence agencies and cyber mafias. He calls on software companies to help out in solving the problem and also suggests the need for a Geneva Convention to stop the proliferation of cyber weapons.
CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.
Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.