• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 26th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News
WikiLeaks

Vault 7: CIA’ Dumbo Project Hijacking Webcams and Microphones

August 3rd, 2017 Waqas Security, Leaks, WikiLeaks 0 comments
Vault 7: CIA’ Dumbo Project Hijacking Webcams and Microphones
Share on FacebookShare on Twitter

The Vault7 saga is far from over, and every passing week we are being introduced to a new set of tricks and tools that were allegedly used by the CIA for invading the privacy of security systems. CIA’s Dumbo Project is a system designed to manipulate Microphones, webcams and similar other devices installed on Microsoft Windows OS.

As per the documents released by WikiLeaks, the project was capable of corrupting video recordings that could compromise the Physical Access Group/PAG’s deployment. The PAG is a special branch of the Center for Cyber Intelligence/CCI. It was tasked to get physical access and exploit target computers on CIA field operations.

The Dumbo project’s hacking tools could kill processes through webcams. According to WikiLeaks’ press release, the tool allows for the identification, control, and manipulation of the monitoring and detection systems, like webcams and microphones, on a target computer running the Microsoft Windows operating system. It requires direct access to the computer as it is run from a USB stick.

The press release further revealed that “all processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings, the operator is aided in creating fake or destroying actual evidence of the intrusion operation.”

RELEASE: CIA project 'Dumbo' to switch off security webcams and corrupt recordings to hide physical intrusions https://t.co/XucsNTcJO6 pic.twitter.com/5xFl28eEKZ

— WikiLeaks (@wikileaks) August 3, 2017

Previously, WikiLeaks released Dumbo Project documents in June 2012. The Tool Delivery Review document highlighted that the system’s capabilities were utilized by the CIA’s special branch to prevent home security systems from identifying officers and also to prevent operations. 

For that, a USB thumb drive was required to execute the program, which was to be connected with the machine dedicated for Dumbo’s operations. That is, if the CIA wanted to maintain the record, it was necessary that the thumb drive from where Dumbo was executed remained plugged into the system until the operation was completed.

The tool can identify devices like local or wireless connected networks and would prevent webcams and microphones from monitoring.

Vault 7 documents previously leaked by WikiLeaks:

BothanSpy and Gyrfalcon: Steals SSH credentials from Linux & Windows devices
OutlawCountry and Elsa: Malware targeting Linux devices and tracking user geolocation
Brutal Kangaroo: CIA hacking tools for hacking air-gapped PCs
Cherry Blossom: CherryBlossom & CherryBomb: Infecting WiFi routers for years
Pandemic: A malware hacking Windows devices
AfterMidnight and Assassin: CIA remote control & subversion malware hacking Windows
Dark Matter: CIA hacking tool infiltrating iPhones and MacBooks
Athena: A malware targeting Windows operating system
Archimedes: A program helping CIA to hack computers inside a Local Area Network
HIVE: CIA implants to transfer exfiltrated information from target machines
Grasshopper: A malware payloads for Microsoft Windows operating systems
Marble: A framework used to hamper antivirus companies from attributing malware
Dark Matter: A CIA project that infects Apple Mac firmware
Highrise: An Android malware spies on SMS Messages
Aeris, Achilles, SeaPea: 3 malware developed by CIA targeting Linux and macOS

  • Tags
  • CIA
  • hacking
  • internet
  • Malware
  • security
  • Technology
  • USB
  • Vault 7
  • wikileaks
  • Windows
Facebook Twitter LinkedIn Pinterest
Previous article Pakistani Govt Portal Hacked to Play Indian National Anthem
Next article Someone DDoSed Chinese Telecom Firm For 11 Days
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
TikTok vulnerability allowed hackers to access users' phone numbers

TikTok vulnerability allowed hackers to access users' phone numbers

Watch out as new Android malware spreads through WhatsApp

Watch out as new Android malware spreads through WhatsApp

SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
TikTok vulnerability allowed hackers to access users' phone numbers
Security

TikTok vulnerability allowed hackers to access users' phone numbers

37
Why you should never use free a VPN
Drones

Why you should never use free a VPN

20
Watch out as new Android malware spreads through WhatsApp
Security

Watch out as new Android malware spreads through WhatsApp

199

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us