Thursday, March 28, 2024

Vault 7 Leaks: CIA Conducts Secret Cyber Operation “ExpressLane” Against Their Intelligence Partners -WikiLeaks

WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI.

These Secret operation Performing for collecting the BioMetric Information around the World by helping of CIA’s own biometric collection system Branch called OTS (Office of Technical Services).

Few days before CIA Hacking Tool Revealed, CouchPotato that Capture and collecting videos Streaming.

CIA Considering this voluntary sharing is not enough and ExpressLane that is collecting the covert information by CIA  secretly exfiltrate data collections from such systems provided to liaison services.

OTS agents installed and run ExpressLane with the cover of upgrading the biometric software by that the liaison sites.

OTS system’s code components are based on products from Cross Match, a biometric software for law enforcement and the Intelligence Community.

How Does ExpressLane Tool Works

OTS (Office of Technical Services)Provide the liaison services with biometric information collecting system.

According to CIA Document, ExpressLane Helps to verify the date that is being Shared with the Agency and also giving an ability the disable the biometric software if liaison doesn’t provide the Agency with continued access.

Since it’s a BioMetric information Stealing Operation, the Target System must have an Access for USB port for the thumb drive.

Two Ways to Deploy the ExpressLane into Target Network.

1.First one At Headquarters before delivery of the biometric system to a Liaison Service
2.Second as part of an upgrade to the biometric system.

OTS officers install the ExpressLane 3.1.1  when a biometric system has given to Liaison as part of an upgrade to the biometric system.

The new version of ExpressLane enables the Upgrade Installation screen with a progress bar which appears when upgrading the biometric software.

OTS Request to upgrade the Biometric Software to install this Program and This installation time for the upgrade can be pre-determined by an OTS officer.

Here, ExpressLane sends the collected data to a watermarked thumb drive. and the Files that used to update the Biometric will be saved into Specific Location.

when watermarked thumb inserted into Target system, Another part of this Program called MOBSLangSvc.exe Helps to collect the data files encrypted and compressed.

Collection occurs even if no one is logged in.Kill date is modified by inserting a watermarked USB drive.

CreatePartition v3.1.1 supporting tool will be install before installing ExpressLane v3.1.1 on a target machine.

View the configuration of partition and options on the thumb drive and Reset the thumb drive – remove the hidden partition.

WikiLeaks

Installation Tool

After Post-processing of Collected Data, ExitRamp 3.1.1 is used on a Base system Headquarters to collect the data from the covert partition of a thumb drive used by ExpressLane v3.1.1. 

WikiLeaks

Post Processing of collection data

Here you can Visit the Previously Disclosed  CIA Cyber Weapons.

Previous CIA Leaked Tools by WikiLeaks

Vault 7 Leaks: CIA Hacking Tool “CouchPotato” Remotely Capture Videos & Images -WikiLeaks

Vault 7 Leaks:CIA Cyber Weapon “Dumbo” Hack WebCams & Corrupt Video Recordings – WikiLeaks

 Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Raytheon – Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked – WikiLeaks

HighRise – Vault 7 Leaks : CIA Android Ha Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks

Gyrfalcon –  Vault 7 Leaks: CIA Cyber Weapon “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

OutlawCountry – Vault 7 Leaks: CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

ELSA – Vault 7 Leaks: CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

CherryBlossom –  Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Pandemic –  New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles