• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Cherry Blossom – Daily Security Byte

June 20, 2017 By Corey Nachreiner

Months ago, Wikileaks posted many Top Secret CIA documents in their Vault 7 leak. Late last week, they released even more documents, outlining the CIA’s Wi-Fi router hacking capabilities. Cherry Blossom is the set of tools and techniques the CIA uses to hijack consumer Wi-Fi and wireless routers. If they can gain access to a target’s router, they can replace its firmware with a backdoored version that essentially gives them access to the target’s entire network. Watch the video to learn more about this new CIA leak.

Episode Runtime: 4:08

Direct YouTube Link: https://www.youtube.com/watch?v=6Oqu6nuHxYU

EPISODE REFERENCES:

  • CIA hacked Wi-Fi routers for years – Forbes
  • CIA’s Leaked Cherry Blossom documents – WikiLeaks
  • CIA Wi-Fi pwnage “tools” leaked – The Register

Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Hacking

Comments

  1. David Jones says

    June 22, 2017 at 5:36 pm

    Hi Corey,

    These short SecurityBites are great Corey. I often send them on to clients and even friends and family, because the language you use is normally not too geeky and the information contained is good at raising security awareness amongst even non-techy tymes.

    One thing on this topic… You forgot to mention the fact that the majority of consumer Internet devices have an all too limited patch lifespan. i.e. The vendors will only release firmware updates for these devices for a few years (or even less, in some cases) and then not release any further updates, even if vulnerabilities are identified; as their philosophy is that the devices should simply be replaced, at this point. All too often I find consumer Internet devices, even being used by small businesses, that are years old (normally rebranded devices from telcos/ISPs), with known vulnerabilities and no firmware patch available from the vendor/provider. Now look at domestic setups and this situation only gets worse. We really need to be making people aware of two critical facts:
    1. Businesses should only use commercial grade Internet devices and maintain them properly.
    2. Homes, that are using these consumer devices, should really look at replacing them every couple of years.

    Cheers,

    David.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use