Intelligence

WikiLeaks published the user guide for the CIA Weeping Angel, the Samsung Smart TV Hacking Tool

WikiLeaks published the user guide related to the hacking tool allegedly used by the CIA, code-named Weeping Angel, to hack Samsung Smart TV.

WikiLeaks has published a new document included in the Vault7 archive containing technical details about another hacking tool allegedly used by the U.S. Central Intelligence Agency (CIA). This time, the organization has published information on a tool designed to record audio via the built-in microphone of some Samsung smart TVs.

The tool is the Weeping Angel, it was mentioned the first time Wikileaks published information related to the Vault 7. The Weeping Angel tool is a tool used by the cyber-spies to spy on targets through Samsung smart TVs.

CIA Weeping AngelCIA Weeping Angel

The Weeping Angel was based on “Extending,” an implant allegedly developed by the MI5, among its features, there is the ability to record audio via the built-in microphone of the devices.

“Today, April 21st 2017, WikiLeaks publishes the User Guide for CIA’s “Weeping Angel” tool – an implant designed for Samsung F Series Smart Televisions. Based on the “Extending” tool from MI5/BTSS, the implant is designed to record audio from the built-in microphone and egress or store the data.” reads the documentation released by Wikileaks. 

WikiLeaks has now released the user guide of the hacking tool that is dated February 2014. The document details the implant developed to exploit Samsung F series smart TVs as a surveillance system that can record audio from surrounding environment and either store or exfiltrate the recordings.

The installation of the Weeping Angel implant requests a physical access to the SmartTV, an attacker can infect the device by connecting a USB device.

“The EXTENDING implant can be installed using a Close Access method. The EXTENDING installer is loaded onto a USB stick. This USB stick is then inserted into the target SAMSUNG F Series TV, and the installer is run. The installer deploys the implant and Settings file onto the TV. EXTENDING begins to run when the TV is next powered on” reads the guide.

The EXTENDING implant can be uninstalled by using either a USB stick containing a certain configuration file or at a pre-configured time.

Data can be exfiltrated later exfiltrated via a USB stick or a compromised Wi-Fi hotspot.

The EXTENDING implant is also able to exfiltrates audio over a Wi-Fi hotspot, to a Live Listening Tool, running on a laptop.

It is interesting to note that developers had been planning to implement more data stealing features to spy on browser data and acquire Wi-Fi credentials.

The US intelligence agency still hasn’t confirmed or denied the authenticity of the Vault 7 files.

Last week security researchers at Symantec and Kaspersky have discovered evidence that links the tools described in the Vault 7 archive and the exploit used by a cyber espionage group named Longhorn.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Weeping Angel, CIA)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks<gwmw style="display:none;"></gwmw>

Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…

43 minutes ago

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

11 hours ago

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…

18 hours ago

Nova Scotia Power confirms it was hit by ransomware attack but hasn’t paid the ransom

Nova Scotia Power confirms it was hit by a ransomware attack but hasn't paid the…

1 day ago

Crooks stole over $200 million from crypto exchange Cetus Protocol

Cetus Protocol reported a $223 million crypto theft and is offering to drop legal action…

1 day ago

Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals

SafePay ransomware hit Marlboro-Chesterfield Pathology, stealing personal data of 235,000 people in a major breach.…

2 days ago