Muslim World$type=three$h=250$c=3$author=hide$comment=hide$rm=hide$date=hide$snippet=hide$show=home





Saudi Arabia$type=two$count=2$h=250$space=1$icon=1$m=0$sn=0$rm=0$show=/search/label/Muslim%20World




Popular Posts All time_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts Last 7 days_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts Last 30 days_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

Popular Posts Last year_$type=three$meta=0$snip=0$rm=0$count=9$show=/search/label/Popular

#Vault7: CIA’s ‘ELSA’ exploit tracks Windows devices through wifi connections


WikiLeaks has released the latest Vault 7 batch of CIA hacking exploits. ‘ELSA’ is malware used to track WiFi-enabled devices running Microsoft Windows, allowing the CIA to gather location data on a target’s device and monitor their patterns and habits.

ELSA tracks the geolocation of wifi-enabled devices, providing the CIA with a target’s “pattern of life,” by recording details about wifi access points near the target machine.

The malware allows the CIA to track a target’s location even when they’re not connected to the internet. All that’s needed is for the device to be wifi-enabled and in an area where wifi access points are in range. Using wifi for geolocation means GPS isn’t required.

ELSA was initially created in 2012, according to a 2013 user manual obtained by WikiLeaks. The manual is marked as ‘secret, noforn’ - meaning it’s not to be shared with other countries.

When the target device is connected to the internet, ELSA attempts to use public geolocation databases from Google or Microsoft to track the device’s location, and stores the longitude, latitude and timestamp in encrypted form on the device for the CIA to extract at a later time.

ELSA was developed by the Engineer Development Group (EDG), the division that manufactures the CIA’s hacking tools. The EDG is part of the Center for Cyber Intelligence (CCI).

ELSA differs from previous CIA Vault7 leaks in that the malware doesn’t beacon information from the target device back to a CIA server. Instead, the data must be retrieved from the device using other tools in the CIA’s collection of exploits and hacks. The manual doesn’t specify which particular tools are used to do this.

According to WikiLeaks, ELSA can be customized to suit the target environment and the objectives of the CIA. For example, the sampling interval, logfile size and persistence method can all be customized to suit the aims of the infiltration.

According to the manual, “some Anti-Virus (AV) suites such as Kaspersky and Rising protect critical system processes” from the injection technique used in ELSA. “Deploying ELSA to these systems requires careful system survey, targeting, and/ or cover application for processes vulnerable to this type of injection,” the manual explains.

ELSA is designed to be injected into an existing process on a device’s system. “It’s delivered in the form of a DLL,” the manual reads. A Windows DLL (Dynamic Link Library) is a library of code and data that can be used by more than one program at the same time. It helps operating systems and programs run faster and use less space.

ELSA also uses a configuration tool (patcher) and post processor. It uses the command-line tool, Microsoft Windows RegSvr32, to perform the installation.



Ads,5,Afghanistan,79,Africa,28,Americas,5,Animals,37,Argentina,1,Asia,277,Australia,11,Austria,5,Bahrain,3,Bangladesh,18,Barcelona,1,Belgium,3,Brunei,1,Business,1322,Canada,5,Catalan,80,China,129,Cuba,3,Czech Republic,3,DR Congo,1,Egypt,22,Ethiopia,1,Europe,261,Fitness,14,France,28,Germany,41,Haiti,1,Headlines,11,Health,171,Hillary Clinton,199,Hong Kong,2,Hungary,1,Iceland,1,India,111,Indonesia,11,International,75,Iran,84,Iraq,78,Ireland,2,Islamophobia,19,Israel,12,Italy,4,Japan,41,Jordan,1,Kenya,7,Kosovo,1,Kuwait,3,Lebanon,2,Libya,2,Lifestyle,303,Lithuania,1,Malawi,1,Malaysia,16,Malta,1,Maxico,4,Middle East,138,Muslim World,626,Myanmar,35,Nawaz Sharif,5,Nepal,3,Netherlands,2,New Zealand,10,Niger,1,Nigeria,2,Nobel Prize,81,North Korea,58,Norway,1,Opinion,26,Pakistan,1061,Palestine,38,Philippine,17,Pics,66,Poland,3,Popular,1,Qatar,93,Rohingya,118,Russia,49,Rwanda,1,Saudi Arabia,85,Science,144,Serbia,2,Showbiz,351,Somalia,4,South Africa,2,South Korea,8,Spain,62,Sports,1328,Sudan,1,Sweden,1,Switzerland,2,Syria,113,Taiwan,3,Technology,455,Thailand,12,Today IN History,24,Top News,1033,Tunisia,1,Turkey,81,U.S.,344,UAE,22,UK,59,Ukrain,2,Venezuela,4,Videos,76,Vietnam,2,World,4893,Yemen,21,Zimbabwe,2,
Muslim Global: #Vault7: CIA’s ‘ELSA’ exploit tracks Windows devices through wifi connections
#Vault7: CIA’s ‘ELSA’ exploit tracks Windows devices through wifi connections
Muslim Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy