Thursday, January 30, 2025
HomeUncategorizedVault 7 Leaks: CIA Tool "Protego" Used to Control Missile System...

Vault 7 Leaks: CIA Tool “Protego” Used to Control Missile System and to Launching Missiles- WikiLeaks

Published on

SIEM as a Service

Follow Us on Google News

WikiLeaks Revealed a New CIA Document called “Protego” is PIC micro controller based Missile Control System Project and along with this, it contains  37 related proprietary hardware/software manuals.

Raytheon has Developed the missile control system that severing under the Protego Project.

Few Day before WikiLeaks Revealed CIA Hacking Tool called “Angelfire” which comprised of 5 integrated components that are used to Compromise the Windows Computers Especially Windows 7 and Windows XP

This Tool Different From other CIA Leaked Tool that all are Leaked under Malware and other cyber Attack Related one.

Based on the Indication of the Document, this tool is installed onboard a Pratt & Whitney aircraft (PWA) equipped with missile launch systems.

Missile System has 3 Micro Controllers (‘Missle Smart Switch’, MSS), the tube (‘Tube Smart Switch’, TSS) and the collar (which holds the missile before and at launch time) which is Placed in the Missile itself.

Separate micro-controller units are Equipped with Protego which helps to Exchange the data signals over encrypted and authenticated channels.

Protego system Image Requirement

Protego consists of 7 Different Images that are the complete Requirement used to Develop the Protego Project. Following Images are using for Different Purpuses.

  1. P1.X.production.hex
  2. P2.X.production.hex
  3. P3.X.production.hex
  4. P4.X.production.hex
  5. P5.X.production.hex
  6. P1_S.X.production.hex
  7. P2_ Maintenance.production.hex

According to Leaked CIA Document First, 3 Images using for build images are unique for each Collar, Tube, and Missile set and the keys must match.

Next 4th and  5th  Images used for used on the deployment Box for configuration control of any Protego system.

Last 2 Images used for build images are used when reprogramming the MP processor.

 
Master Processor is used to receiving 3 Signals from a beacon that are   ‘In Border’ (PWA is within the defined area of an operation), ‘Valid GPS’ (GPS signal available) and ‘No End of Operational Period’ (current time is within the defined timeframe for an operation)
Missiles can only be launched if all signals received by MP are set to ‘true’. Similarly, safeguards are in place to auto-destruct encryption and authentication keys for various scenarios (like ‘leaving a target area of operation’ or ‘missing missile’).  CIA Document Says.
 

Previous CIA Leaked Tools – wikileaks

Vault 7 Leaks: CIA Hacking Tool “Angelfire” Secret Document Revealed to Compromise Windows OS – WikiLeaks

Vault 7 Leaks: CIA Conducts Secret Cyber Operation “ExpressLane” Against Their Intelligence Partners -WikiLeaks

Vault 7 Leaks: CIA Hacking Tool “CouchPotato” Remotely Capture Videos & Images -WikiLeaks

Vault 7 Leaks: CIA Cyber Weapon “Dumbo” Hack WebCams & Corrupt Video Recordings –

 Vault 7 Leaks: CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Raytheon – Vault 7 Leaks: CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked

 

HighRise – Vault 7 Leaks: CIA Android Ha Vault 7 Leaks: CIA Hacking Tools “Achilles, Aeris, SeaPea” Revealed to Hack Mac and Linux OS -WikiLeaks

Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks

Gyrfalcon –  Vault 7 Leaks: CIA Cyber Weapon “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

OutlawCountry – Vault 7 Leaks: CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

ELSA – Vault 7 Leaks: CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks CherryBlossom –  Wikileaks

Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Pandemic –  New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...