- Jul 22, 2014
- 2,525
WikiLeaks published today the manual of another CIA hacking tool part of the Vault 7 leak series. This tool is referenced internally at the CIA under the name of HighRise and is an Android application for intercepting and redirecting SMS messages to a remote web server.
According to the leaked manual, HighRise only works on Android versions from 4.0 through 4.3 (Android Ice Cream Sandwich and Jelly Bean), but the document is dated to December 2013, and the tool was most likely updated in the meantime to support newer versions of the Android OS released during the past four years.
HighRise tool is also known as TideCheck
The actual HighRise tool is packaged inside an app named TideCheck (tidecheck-2.0.apk, MD5: 05ed39b0f1e578986b1169537f0a66fe).
The tool wasn't designed for social engineering attacks. CIA operatives have to install the app on the target's device themselves, and then manually run it at least one time for the tool to get boot persistence.
When starting the tool for the first time, CIA operatives must enter a special code to access its settings.
.........
According to the leaked manual, HighRise only works on Android versions from 4.0 through 4.3 (Android Ice Cream Sandwich and Jelly Bean), but the document is dated to December 2013, and the tool was most likely updated in the meantime to support newer versions of the Android OS released during the past four years.
HighRise tool is also known as TideCheck
The actual HighRise tool is packaged inside an app named TideCheck (tidecheck-2.0.apk, MD5: 05ed39b0f1e578986b1169537f0a66fe).
The tool wasn't designed for social engineering attacks. CIA operatives have to install the app on the target's device themselves, and then manually run it at least one time for the tool to get boot persistence.
When starting the tool for the first time, CIA operatives must enter a special code to access its settings.
.........