|RT | Jun 15, 2017|
|© Pascal Lauener / Reuters|
Wikileaks notes that the common use of WiFi devices in homes, offices, and public spaces makes them ideal for these so-called ‘Man-In-The-Middle’ attacks as the Cherry Blossom program can easily monitor, control and manipulate the Internet traffic of connected users.
Malicious content can be injected into the data stream between the user and the internet service, which exploits vulnerabilities in the target’s computer or operating system, according to WikiLeaks.
No physical access is required to implant the customized Cherry Blossom firmware on a wireless device as some devices allow their firmware to be upgraded over a wireless link.
RELEASE: CIA 'CherryBlossom' & 'CherryBomb' have been infecting #DLink, #Belkin & #Linksys WiFi routers for years https://t.co/uCQLaaRwrOpic.twitter.com/gEfD84RKlX— WikiLeaks (@wikileaks) June 15, 2017