Categories: Data Breach

Vault 7 Leaks: CIA Conducts Secret Cyber Operation “ExpressLane” Against Their Intelligence Partners -WikiLeaks

WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI.

These Secret operation Performing for collecting the BioMetric Information around the World by helping of CIA’s own biometric collection system Branch called OTS (Office of Technical Services).

Few days before CIA Hacking Tool Revealed, CouchPotato that Capture and collecting videos Streaming.

CIA Considering this voluntary sharing is not enough and ExpressLane that is collecting the covert information by CIA  secretly exfiltrate data collections from such systems provided to liaison services.

OTS agents installed and run ExpressLane with the cover of upgrading the biometric software by that the liaison sites.

OTS system’s code components are based on products from Cross Match, a biometric software for law enforcement and the Intelligence Community.

How Does ExpressLane Tool Works

OTS (Office of Technical Services)Provide the liaison services with biometric information collecting system.

According to CIA Document, ExpressLane Helps to verify the date that is being Shared with the Agency and also giving an ability the disable the biometric software if liaison doesn’t provide the Agency with continued access.

Since it’s a BioMetric information Stealing Operation, the Target System must have an Access for USB port for the thumb drive.

Two Ways to Deploy the ExpressLane into Target Network.

1.First one At Headquarters before delivery of the biometric system to a Liaison Service
2.Second as part of an upgrade to the biometric system.

OTS officers install the ExpressLane 3.1.1  when a biometric system has given to Liaison as part of an upgrade to the biometric system.

The new version of ExpressLane enables the Upgrade Installation screen with a progress bar which appears when upgrading the biometric software.

OTS Request to upgrade the Biometric Software to install this Program and This installation time for the upgrade can be pre-determined by an OTS officer.

Here, ExpressLane sends the collected data to a watermarked thumb drive. and the Files that used to update the Biometric will be saved into Specific Location.

when watermarked thumb inserted into Target system, Another part of this Program called MOBSLangSvc.exe Helps to collect the data files encrypted and compressed.

Collection occurs even if no one is logged in.Kill date is modified by inserting a watermarked USB drive.

CreatePartition v3.1.1 supporting tool will be install before installing ExpressLane v3.1.1 on a target machine.

View the configuration of partition and options on the thumb drive and Reset the thumb drive – remove the hidden partition.

Installation Tool

After Post-processing of Collected Data, ExitRamp 3.1.1 is used on a Base system Headquarters to collect the data from the covert partition of a thumb drive used by ExpressLane v3.1.1. 

Post Processing of collection data

Here you can Visit the Previously Disclosed  CIA Cyber Weapons.

Previous CIA Leaked Tools by WikiLeaks

Vault 7 Leaks: CIA Hacking Tool “CouchPotato” Remotely Capture Videos & Images -WikiLeaks

Vault 7 Leaks:CIA Cyber Weapon “Dumbo” Hack WebCams & Corrupt Video Recordings – WikiLeaks

 Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Raytheon – Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked – WikiLeaks

HighRise – Vault 7 Leaks : CIA Android Ha Vault 7 Leaks : CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks

Gyrfalcon –  Vault 7 Leaks: CIA Cyber Weapon “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

OutlawCountry – Vault 7 Leaks: CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

ELSA – Vault 7 Leaks: CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

CherryBlossom –  Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Pandemic –  New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

View Comments

Recent Posts

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent a…

3 hours ago

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory Integrator…

3 hours ago

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through 9.7.0.…

4 hours ago

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper handling…

4 hours ago

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in Intel…

4 hours ago

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web…

8 hours ago