Menu
Get Support
Free Discovery Session

D.C., Maryland, and Virginia Home Owners Could be at Risk of the CIA Hacking Their Routers

Peerless Tech Solutions
June 2, 2017

That Wi-Fi router you have stuck in the corner at home is not only collecting dust, but is a target for hackers. Hackers including the CIA.

The CIA has had the ability to turn routers and network access points into surveillance device for years, according to secret documents released by WikiLeaks.

WikiLeaks has disclosed an alleged CIA program known as the CherryBlossom. The purpose of the initiative is to replace a router's firmware with a CIA-modified version known as FlyTrap. In some instances, physical access to the device may not even be necessary.

The potential applications of the toolkit are narrowing. With control over their router, a remote observer could monitor the target's local network and internet traffic and inject malicious malware for a variety of purposes. The techniques range from hacking network passwords to rewriting device firmware to remotely monitoring traffic that flows across a target's network.

CherryBlossom would allow the CIA to detect when a person is using their home network and divert the user's traffic through predetermined servers. Once FlyTrap is deployed successfully, agents are able to monitor the target using a web-based platform called CherryWeb. The command-and-control server that receives the data collected by FlyTrap is codenamed CherryTree. Other documents released say the CIA is targeting a wide range of U.S. and foreign products, including iPhones, Android devices, and Samsung TVs.

Give us a call today to learn more about protecting your network from hackers! We have successfully protected businesses in the La Plata, Waldorf, White Plains, Charles County, Prince Frederick, Solomon's, and Washington D.C., from hackers in their Wi-Fi network.

 

The Cloud Can Accelerate Your CMMC Efforts

We Can Help You Make The Shift

Speak With a CMMC Specialist

Don't Miss an Article!

You May Also Like

These Stories on Vulnerability

Subscribe by Email

Get The Latest From Peerless Right in Your Inbox