June 28, 2017
1 min read

Vault 7: Elsa

WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system. Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device. If it is connected to the internet, the malware automatically tries to use public geo-location databases from Google or Microsoft to resolve the position of the device and stores the longitude and latitude data along with the timestamp. The collected access point/geo-location information is stored in encrypted form on the device for later exfiltration. The malware itself does not beacon this data to a CIA back-end; instead the operator must actively retrieve the log file from the device – again using separate CIA exploits and backdoors.

The ELSA project allows the customization of the implant to match the target environment and operational objectives like sampling interval, maximum size of the logfile and invocation/persistence method. Additional back-end software (again using public geo-location databases from Google and Microsoft) converts unprocessed access point information from exfiltrated logfiles to geo-location data to create a tracking profile of the target device.

Leaked Documents

 

Tim Stigal

Independent and free in every sense Chechen journalist, financial analyst and trader who believes in God and defends the rights and honor of oppressed people.

Previous Story

Vault 7: Brutal Kangaroo

Next Story

Vault 7: OutlawCountry

Previous Story

Vault 7: Brutal Kangaroo

Next Story

Vault 7: OutlawCountry

Latest from Blog

Secret Congressional Reports

6,780 reports comprising over 127,000 pages of material on some of the most contentious issues in the nation, from the US relationship with Israel to the financial collapse. Change you can download:

Amazon Atlas

WikiLeaks publishes a “Highly Confidential” internal document from the cloud computing provider Amazon. The document from late 2015 lists the addresses and some operational details of over one hundred data centers spread

Dealmaker: Al Yousef

Today WikiLeaks publishes a secret document from the International Chamber of Commerce (ICC) International Court of Arbitration, pertaining to a dispute over commission payment in relation to a $3.6 billion arms deal

Vault 8

Source code and analysis for CIA software projects including those described in the Vault7 series. This publication will enable investigative journalists, forensic experts and the general public to better identify and understand

Vault 7: Protego

WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware/software manuals from Microchip Technology Inc.). The project was maintained between 2014 and 2015.
Go toTop