

#Bitmessage nsa code#
Here we have code names "loader", "SOLARTIME", and "JUSTVISITING" plus in the following screenshot more: URClient versions 4.7.x and later will display the persistence method used as the Remote File Name for the Killsuit Persistence Identifier (KSLA for loader, SOTI for SOLARTIME, or JUVI for JUSTVISITING). The Remote Modules control allows the operator to get the status of the UNITEDRAKE client on the target machine, load new modules, and unload existing ones. For additional information see Section 7.8 This command will have a status of FAILED in the Queue, with UR ConnectionAborted. Components loaded in memory will still be present until the target reboots. This command will remove all components of UNITEDRAKE. The Implant Self Destruct functionality is used to remove the UNITEDRAKE client (versions 4.5.x and later) from the target. Neither FlewAvenue or Soggybottom2 have any mentions online that I can find. In this screenshot you will notice "FlewAvenue version" and "Soggybottom2" plus an incomplete name starting with "Salv", plus the tool tipoff which is part of UNITEDRAKE it seems. Note the reference in this picture to Foxacid - previously covered online by for example Bruce Schneier here:įoxacid is a tool to deanonymize Tor users and is used for the Quantum insert technology ( wired piece)Īnother few tools are mentioned further down in the manual: UR comes with a nice target overview - the Target Pane: I don't know if this is useful: "The HTTP2 key contains an additional value: StegoPercent - The default value is 25".

#Bitmessage nsa install#
There is information about it such as install files: URServer_win32_4.06.xx.xxxx_setup.exe, ur.sys - which makes me immediately think of shodan, where it could be possible to search specifically for URservers?

UNITEDRAKE is a system that both contains implants and the infrastructure used to operate remote implants with minimal operator interaction.
#Bitmessage nsa software#
This seems to be a manualto software called UNITEDRAKE created by Contact Sw, Inc. In this link there is one file we can immediately access - the manual_to_august_dump.pdf. There is a new page on Mega where you can download the dumps, and should you happen to have the right key, or an exploit for PGP, then you can probably see what's inside: This month, the two monthly dumps (changed from one) are exploits it seems. Previous dumps now available, send correct amount to correct ZEC address.Delivery email address clearnet only, recommend tutanota or protonmail, no need exchange secret, no i2p, no bitmessage, no zeronet.Zcash only, no Monero, delivery email in encrypted memo field.The shadow brokers are back this month with a new dump you can get access to with Zcash only.
