“The Cherry Blossom (CB) system gives a means of watching the internet activity of and making software exploits on points of interest,” reads the ten-year-old record. “In particular, CB is centered on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to reach these goals.”
The document continues on to say that routers with vulnerable passwords can be easily broken into and that the firmware is unusually active when it gets to DLink’s DIR-130 model and the Linksys-manufactured WRT300N model.
Once the hacking process is finished and CherryBlossom is fully established on the Internet router, the method begins to send letters called signals to a server that is managed and controlled by the CIA, codenamed “CherryTree.”
At this point, the CIA has the capability to analyze the router’s state and web traffic via a web-based user interface called “CherryWeb.” The infected router is named a “mission,” which normally has to do with targeting a particular laptop or phone inside of the house by utilizing information such as IP and email addresses, chat user names and MAC addresses.
The CIA reports that have been published by Wikileaks date back to the year 2007, which suggests that this work has been going on for ten years outdoors our knowledge and without our permission.
ConversionConversion EmoticonEmoticon