Home Hacking Data Breach This Is How CIA Controls Webcams and Microphones Using Its ‘Dumbo’ Tool:...

This Is How CIA Controls Webcams and Microphones Using Its ‘Dumbo’ Tool: Wikileaks

46
0
SHARE
This Is How CIA Controls Webcams and Microphones Using Its 'Dumbo' Tool: Wikileaks

Meet Dumbo, a hacking tool used by the Central Intelligence Agency (CIA).  The Dumbo might sound dumb to you by virtue of its name.  But, in reality it is just the opposite.  It is the sharpest equipment to disable security cameras and corrupt video recordings in a system.

Dumbo can identify, control, and manipulate the monitoring and detection system on a target computer.  It can only work in devices supporting the Microsoft Windows OS.  This includes the 32-bit Windows XP, Windows Vista and latest Windows OS editions.  However, it does not function on OS prior to Windows XP or even a 64-bit system.

Dumbo is capable of identifying wireless or wired installed devices of the host system.  Webcams, microphones connected via Bluetooth, WiFi or cable can be brought under control using this tool.

A field agent can directly run the Dumbo with a USB stick.  Administrator privileges are required to cover up the Dumbo tasks.  The operator can suspend the device processes.  Thus recording, monitoring, detection of audio/video/network can be halted.  This destroys the original evidence of the intrusion operation.  The manipulation and deletion processes can also render the creation of a fake documentation.

The Dumbo compromises on the Physical Access Group (PAG) deployment.  The PAG is a special branch within the Center for Cyber Intelligence (CCI).  In CIA field operations, it comes in handy and exploits physical access to target computers.

Wikileaks put up the 19th scoop to its Vault 7 series.  The Dumbo made its way into the scene.  Julian Assange owned non-profit organisation has published documents of the Dumbo Project in its platform.  It accentuates the user guide, field guide and a TDR briefing for Dumbo.

LEAVE A REPLY

Please enter your comment!
Please enter your name here