Thursday, April 25, 2024

Vault 7 Leaks: CIA Conducts Secret Cyber Operation “ExpressLane” Against Their Intelligence Partners -WikiLeaks

WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI.

These Secret operation Performing for collecting the BioMetric Information around the World by helping of CIA’s own biometric collection system Branch called OTS (Office of Technical Services).

Few days before CIA Hacking Tool Revealed, CouchPotato that Capture and collecting videos Streaming.

CIA Considering this voluntary sharing is not enough and ExpressLane that is collecting the covert information by CIA  secretly exfiltrate data collections from such systems provided to liaison services.

OTS agents installed and run ExpressLane with the cover of upgrading the biometric software by that the liaison sites.

OTS system’s code components are based on products from Cross Match, a biometric software for law enforcement and the Intelligence Community.

How Does ExpressLane Tool Works

OTS (Office of Technical Services)Provide the liaison services with biometric information collecting system.

According to CIA Document, ExpressLane Helps to verify the date that is being Shared with the Agency and also giving an ability the disable the biometric software if liaison doesn’t provide the Agency with continued access.

Since it’s a BioMetric information Stealing Operation, the Target System must have an Access for USB port for the thumb drive.

Two Ways to Deploy the ExpressLane into Target Network.

1.First one At Headquarters before delivery of the biometric system to a Liaison Service
2.Second as part of an upgrade to the biometric system.

OTS officers install the ExpressLane 3.1.1  when a biometric system has given to Liaison as part of an upgrade to the biometric system.

The new version of ExpressLane enables the Upgrade Installation screen with a progress bar which appears when upgrading the biometric software.

OTS Request to upgrade the Biometric Software to install this Program and This installation time for the upgrade can be pre-determined by an OTS officer.

Here, ExpressLane sends the collected data to a watermarked thumb drive. and the Files that used to update the Biometric will be saved into Specific Location.

when watermarked thumb inserted into Target system, Another part of this Program called MOBSLangSvc.exe Helps to collect the data files encrypted and compressed.

Collection occurs even if no one is logged in.Kill date is modified by inserting a watermarked USB drive.

CreatePartition v3.1.1 supporting tool will be install before installing ExpressLane v3.1.1 on a target machine.

View the configuration of partition and options on the thumb drive and Reset the thumb drive – remove the hidden partition.

WikiLeaks

Installation Tool

After Post-processing of Collected Data, ExitRamp 3.1.1 is used on a Base system Headquarters to collect the data from the covert partition of a thumb drive used by ExpressLane v3.1.1. 

WikiLeaks

Post Processing of collection data

Here you can Visit the Previously Disclosed  CIA Cyber Weapons.

Previous CIA Leaked Tools by WikiLeaks

Vault 7 Leaks: CIA Hacking Tool “CouchPotato” Remotely Capture Videos & Images -WikiLeaks

Vault 7 Leaks:CIA Cyber Weapon “Dumbo” Hack WebCams & Corrupt Video Recordings – WikiLeaks

 Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Raytheon – Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked – WikiLeaks

HighRise – Vault 7 Leaks : CIA Android Ha Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks

Gyrfalcon –  Vault 7 Leaks: CIA Cyber Weapon “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

OutlawCountry – Vault 7 Leaks: CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

ELSA – Vault 7 Leaks: CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

CherryBlossom –  Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Pandemic –  New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Website

Latest articles

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch...

Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit...

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which...

JudgeO Online Code Editor Flaw Let Attackers Execute Code as Root User

A critical flaw has been identified in the popular online code editor, JudgeO.If...

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised...

Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security...

Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles