Linksys, DLink And Belkin all are being tracked by CIA

The firmware, which has remained committed the codename “CherryBlossom,” goes on a total of 25 router designs with the potential to work on dozens more after adjustments are made.

“The Cherry Blossom (CB) system gives a means of watching the internet activity of and making software exploits on points of interest,” reads the ten-year-old record. “In particular, CB is centered on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to reach these goals.”

The document continues on to say that routers with vulnerable passwords can be easily broken into and that the firmware is unusually active when it gets to DLink’s DIR-130 model and the Linksys-manufactured WRT300N model.

Once the hacking process is finished and CherryBlossom is fully established on the Internet router, the method begins to send letters called signals to a server that is managed and controlled by the CIA, codenamed “CherryTree.”

At this point, the CIA has the capability to analyze the router’s state and web traffic via a web-based user interface called “CherryWeb.” The infected router is named a “mission,” which normally has to do with targeting a particular laptop or phone inside of the house by utilizing information such as IP and email addresses, chat user names and MAC addresses.

The CIA reports that have been published by Wikileaks date back to the year 2007, which suggests that this work has been going on for ten years outdoors our knowledge and without our permission.

When you consider about all of the ways in which the federal government and big companies like Amazon are spying on the American people, it’s both surprising and unnerving to understand that most of this interference occurs in the comfort of our own homes. As technology advances to advance, and as that technology grows more and more available to average American citizens, there is an ever-expanding list of ways in which our Fourth Amendment liberties are being infringed upon.

Take your time to comment on this article.

Related posts

Apple Addressed Two Zero-Day Flaws In Intel-based Macs

Really Simple Security Plugin Flaw Risks 4+ Million WordPress Websites

Glove Stealer Emerges A New Malware Threat For Browsers