WikiLeaks Revealed a New CIA Document called “Protego” is PIC micro controller based Missile Control System Project and along with this, it contains 37 related proprietary hardware/software manuals.
Raytheon has Developed the missile control system that severing under the Protego Project.
Few Day before WikiLeaks Revealed CIA Hacking Tool called “Angelfire” which comprised of 5 integrated components that are used to Compromise the Windows Computers Especially Windows 7 and Windows XP
This Tool Different From other CIA Leaked Tool that all are Leaked under Malware and other cyber Attack Related one.
Based on the Indication of the Document, this tool is installed onboard a Pratt & Whitney aircraft (PWA) equipped with missile launch systems.
Missile System has 3 Micro Controllers (‘Missle Smart Switch’, MSS), the tube (‘Tube Smart Switch’, TSS) and the collar (which holds the missile before and at launch time) which is Placed in the Missile itself.
Separate micro-controller units are Equipped with Protego which helps to Exchange the data signals over encrypted and authenticated channels.
Protego consists of 7 Different Images that are the complete Requirement used to Develop the Protego Project. Following Images are using for Different Purpuses.
According to Leaked CIA Document First, 3 Images using for build images are unique for each Collar, Tube, and Missile set and the keys must match.
Next 4th and 5th Images used for used on the deployment Box for configuration control of any Protego system.
Last 2 Images used for build images are used when reprogramming the MP processor.
Master Processor is used to receiving 3 Signals from a beacon that are ‘In Border’ (PWA is within the defined area of an operation), ‘Valid GPS’ (GPS signal available) and ‘No End of Operational Period’ (current time is within the defined timeframe for an operation)
Vault 7 Leaks: CIA Hacking Tool “CouchPotato” Remotely Capture Videos & Images -WikiLeaks
Vault 7 Leaks: CIA Cyber Weapon “Dumbo” Hack WebCams & Corrupt Video Recordings –
Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks
OutlawCountry – Vault 7 Leaks: CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks
Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks CherryBlossom – Wikileaks
Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to…
Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings.…
Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt…
Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH),…
The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s…
A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers.…