• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2017
  • June
  • 29
  • WikiLeaks CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers

WikiLeaks CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers

June 29, 2017June 29, 2017 Comments Off on WikiLeaks CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers
cia hacking tools cia leaked hacking tools download elsa download nsa tools elsa hacking tool

WikiLeaks Revealed another Document of  CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of WiFi enabled nearby Target Windows Computers based on the ESS (Extended Service Set) Data and Transfer the latitude, longitude information into 3rd Party Database.

ELSA Malware Collecting the targeted WiFi Enabled  Computers Information as Metadata Format and then it transmitting the Metadata to 3rd Party databases for resolution into latitude, longitude and saves its data in  128 bit AES encrypted file.

Few Week’s Before WikiLeaks Revealed a CIA Cyber Weapon  “Brutal Kangaroo” to  targets closed networks by air gap jumping using thumbdrives.

To Collecting the data and location information of target machine ,This  “ELSA”  Malware doesn’t have Victim to be  online. ELSA only need the target to be running with an enabled WiFi device.

Once Infected Windows Machine Connected to the internet then ELSA Malware Automatically Collecting the targets information longitude and latitude data along with the timestamp by using public geo-location databases from Google or Microsoft.

According to the CIA Revealed Secret Document,” The ELSA project allows the customization of the implant to match the target environment and operational objectives like sampling interval, the maximum size of the log file and invocation/persistence method.”

How Does ELSA Collect Geo-Location Information

ELSA Malware Contain 2 Major Components to perform the Operation of Tracking the Victims.

  • Operator Terminal – First implant is an Operator(Attacker) Icon Attack Box.
  • Windows Target- – Second implant of ELSA variant deployed on a target Windows host

ELSA Successfully initiate the Attack, targeting  Windows Machine Must be WiFi enabled and deployed in an environment with WiFi access points in range.

Once ELSA persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS(Extended Service Set Identifier) identifier, MAC address and signal strength at regular intervals.

According to Document, The ELSA software system is delivered in two sets of zip files with embedded hash files containing the project name, version, and algorithm used to calculate the hash:

  • elsa-v1.0.0-docs.zip
  • sha1-windows.txt
  • elsa-v1.0.0-windows.zip
  • sha1-windows-images.txt

Based on the Schedule Done by the Attacker, implant begins collecting WiFi access point information.

ElSA Using PATCHER tool to configure ELSA  for deployment and Target Machine and it specify,

  •  The target machine’s architecture (x86 vs. x64)
  •  The desired mode (dllhost, svchost, rundll32 )
  • The desired geo provider (microsoft / google)
  • SECRET//NOFORN
  • The desired maximum log file size
  • Whether or not to resolve ap lists into geo’s from the target

After Successfully Deployed the Malware into the target machine , CIA operator Fetching the log information of the Targets GEO Location as Log file by using  tools that helps to Operator placed ELSA on his system.

Finally Operator Decrypt the logfile that contains the information about the Victims Geo locations and CIA using EES Geo-location databases to identify the better locations information.

Post navigation

Leviathan Framework – Wide Range Mass Audit Toolkit
Alexa – Go Hacker Mode

Related Articles

Galaxy Fold 4

Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

- News
March 17, 2023
Google releases Chrome version 111 to fix 40 security vulnerabilities

Google releases Chrome version 111 to fix 40 security vulnerabilities

- News
March 17, 2023
Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year

Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year

- News
December 9, 2022
hacker gadgets
hacker phone covers

Recent Posts

NVIDIA Addresses High Security Flaws in GPU Display Drivers and vGPU Software

NVIDIA Addresses High Security Flaws in GPU Display Drivers and vGPU Software

April 1, 2023
Noseyparker - A Command-Line Program That Finds Secrets And Sensitive Information In Textual Data And Git History

Noseyparker – A Command-Line Program That Finds Secrets And Sensitive Information In Textual Data And Git History

April 1, 2023
SOOS DAST: vulnerability scanner against your web apps or APIs

SOOS DAST: vulnerability scanner against your web apps or APIs

April 1, 2023
CVE-2023-29059: Unraveling the Trojanized 3CX Desktop App Supply Chain Attack

CVE-2023-29059: Unraveling the Trojanized 3CX Desktop App Supply Chain Attack

April 1, 2023
CVE-2023-25076: Critical Buffer Overflow Vulnerability in SNIProxy

CVE-2023-25076: Critical Buffer Overflow Vulnerability in SNIProxy

March 31, 2023
Fingerprintx - Standalone Utility For Service Discovery On Open Ports!

Fingerprintx – Standalone Utility For Service Discovery On Open Ports!

March 31, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW