Header Ads

How Hacks CIA Computers That Are Not Connected To The Internet


WikiLeaks has published another group of secret documents throwing light on the CIA's hacking operation. The latest document has 150 pages and they have mentioned CIA's malware toolkit, which is called cruel kangaroo.

First, we have seen the anti-privacy organization, WikiLeaks has published more than thousands of documents, which they called "sophisticated software tools" used by the Central Intelligence Agency.

Documents show that the CIA can turn your TV into a mic, hack into a computer, bypass the encryption system in some popular chat apps and can do a lot more. Now, WikiLeaks has published a secret document which throws light on the CIA's hacking operation.

The latest document has 150 pages and they have mentioned CIA's malware toolkit, which is called cruel kangaroo. Cruel Kangaroo is able to take control of air-cooling computers using special USB drives.

According to WikiLeaks reports, cruel kangaroo components have created a custom network within the closed target of the network, making the job easier.

The cruel Kangaroo project has four components - the running time frame, which is a thumb drive transit tool, Shattered Assurance, which is a server tool that operates the automatic transition of thumb drives, Broken promises, which are a postprocessor that collect information and shadow Evaluates which is the primary firmness mechanism

Cruel Kangaroo uses a Windows operating system vulnerability, which can be used to manually handwrite link files to infect the USB thumb drive. Once the infected drive is inserted into the victim's computer, in which the dripping deadline designates the named component malware.

After the transition, the component scans and transmits other connected computers to the shadow network. Finally, a broken promise scans the data from devices with air-gap and exposes it.

Therefore, if we unite all components of cruel kangaroo, then it becomes a very useful tool to hack air-gapped devices. You can get more information about cruel kangaroo from here. 

So, what do you think about this? Share your thoughts in the comment box below.

5 comments:

  1. Few weeks back, I noticed my wife usually got this anxiety of hanging out with her other friends on weekends. My wife of 5 years went out of town with a couple of her friends on a certain weekend. I decided to know what was going on after noticing her strange attitude. I came in contact with Webhubghost (@) gmailcom after stumbling at a post of a woman who spoke so well of how he helped her in her situation. I reached out to Ben for help and he was able to remotely access her WhatsApp, text messages, location tracker and phone calls. He got this done in a twinkle of an eye and I was able to see all of her info. I discovered she's been seeing a guy, I went to her Facebook profile to see if she posted any new pics or whatever and noticed that this same guy liked almost every status she posted. He never commented.
    I was just curious who he was because she never mentioned him. His profile was mostly private, but he had a couple pictures and status that I could view.
    When she got back I talked to her about it. Of course, she at first came up with a bullsh*t story which she denied. I got to show her all of the evidences I got she couldn't say a word, I'm done with a traitor and a liar. The info I got helped me through our divorce, many thanks to Webhubghost (@) gmailcom for all you do. Get the peace of mind you deserve.
    Email: WEBHUBGHOST (@) gmailcom

    ReplyDelete
    Replies
    1. Finding out that your husband or wife has been unfaithful isn’t just a time of profound heartbreak and shock, it’s also a time of intense confusion . At certain points desperate measures are our only resort and we take them, finding a trustworthy infiltrator can be a lifeline and I sure used one to save my relationship, business and sanity. I was having real life problems when my friend recommended Zion to me. I contacted him because my business partner was shaking me, stealing money from the business. Also my spouse was always up at odd hours clearly this is a sign that my spouse is cheating, so the hacker cloned/hacked into their devices and granted me total access to their devices without their knowledge. I was overwhelmed that I could see my business partner hidden finances that were off records and read their old and new text messages, see new and deleted pictures, emails, call logs, Facebook, messenger, WhatsApp, Snapchat, GPS location in real time among other things off my spouse phone. If you require the services of a private investigator (EC council certified personnel), you can speak to Zion at Remotespytech(@) Gmail, com . You will be glad you did. For the purpose getting him comfortable working with you, it is advisable you make reference to this post as it would save you a lot of back and forth while ensuring you are not some kid playing around. I do hope this helps.

      Email: REMOTESPYTECH (@) GMAILCOM

      WhatsApp: +1 (689) 247-7465


      They can help you recover lost or stolen bitcoins and funds in one swipe. He assisted my friend recover his stolen $155,000 savings from a faux forex broker.

      He can help you acquire a loan (Personal, Student or Secured loan) despite your bad credit. Reach to this great team they are legitimate and genuine.
      Send your complaint to this great team now!!!

      Timely Service

      Delete
  2. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete
  3. Can you hack someone else's phone? There are many software offered by different hackers, all with price tags ranging from $300 to about $5000. Some of the apps offer text messages and call monitoring, photo/video interception, geo-location tracing and even control software to remotely shut phones down or read texts.

    Hacking has been going on for a very long time, and no matter how big technology gets, the hacking continues to happen. It's not just a side effect of living in a technological world - it can also be useful for manipulating data and security systems. With this new hacking software recently discovered from professional hackers, more people can experience the thrill of tampering with someone else's phone from the comfort of their own home.

    Hacking any mobile phone or other device through hacking softwares or accessing lot of information about your personal details is either long term commitment or it entirely depend on the hacker. Hacking mobile phone allow you to spy, send SMS to random contacts without permission, take away social media account and much more.

    Hackers who work with law enforcement can sell you hacking software. Alternatively, other hackers advertise their services online. All of this differentiates between computer theft and hacking. The latter involves having consent to access the data for a specific purpose.

    If you want to hack a phone and you don't know how, you need to get the right software for this. The best way is to get it from someone who knows hacking.HACKINGGLOBAL@PROTONMAIL.COM

    ReplyDelete
  4. Finding out that your husband or wife has been unfaithful isn’t just a time of profound heartbreak and shock, it’s also a time of intense confusion . At certain points desperate measures are our only resort and we take them, finding a trustworthy infiltrator can be a lifeline and I sure used one to save my relationship, business and sanity. I was having real life problems when my friend recommended Zion to me. I contacted him because my business partner was shaking me, stealing money from the business. Also my spouse was always up at odd hours clearly this is a sign that my spouse is cheating, so the hacker cloned/hacked into their devices and granted me total access to their devices without their knowledge. I was overwhelmed that I could see my business partner hidden finances that were off records and read their old and new text messages, see new and deleted pictures, emails, call logs, Facebook, messenger, WhatsApp, Snapchat, GPS location in real time among other things off my spouse phone. If you require the services of a private investigator (EC council certified personnel), you can speak to Zion at Remotespytech(@) Gmail, com . You will be glad you did. For the purpose getting him comfortable working with you, it is advisable you make reference to this post as it would save you a lot of back and forth while ensuring you are not some kid playing around. I do hope this helps.

    Email: REMOTESPYTECH (@) GMAILCOM

    WhatsApp: +1 (689) 247-7465


    They can help you recover lost or stolen bitcoins and funds in one swipe. He assisted my friend recover his stolen $155,000 savings from a faux forex broker.

    He can help you acquire a loan (Personal, Student or Secured loan) despite your bad credit. Reach to this great team they are legitimate and genuine.
    Send your complaint to this great team now!!!

    ReplyDelete

Powered by Blogger.