HACKED: Popular Open Source VLC Player (“VideoLan”) issues statement about CIA #Vault7

The beloved free open source program VLC Player by “VideoLAN Organization” Issued an official statement after reading the contents of the Wikileaks CIA Expose revealing that CIA malware had infected older versions of their software. So if you use this program make sure you have updated your software to the latest release of 2.2.4 if you are still operating in windows XP!

This is just the next program discovered to have a backdoor or an exploit to allow the CIA to illegally spy on us citizens domestically as enemy combatants. If you are a truth warrior and/or a keyboard warrior fighting for justice you better believe rogue criminal factions of the government are constantly monitoring you. Limit their surveillance capabilities by making sure you read the #Vault7 release and have taken the proper security protocols to protect yourself.

WIKILEAKS VAULT 7 RELEASE http://www.wethepeoplereport.com/cia/breaking-wikileaks-vault-7-shows-cia-spies-tv-phone-pc-mac/

Here is the VideoLAN Official Statement:

Internets, March 9th, 2017 On Tuesday, the 7th of March 2017, the Wikileaks organization released a new series of documents code-named “Vault 7” that are allegedly acquired through a leak from the U.S. Central Intelligence Agency. These documents reveal the existence of a malware arsenal, including “zero days” exploits, against a wide range of products (some of them being mainstream devices and software). One revelation1 concerns a tool that exploits a modified old version of VLC media player. The described tool gathers documents from a computer or network and, in order to hide its activity, runs inside VLC Portable 2.1.5 on Microsoft Windows platforms. Such modified software provides a legitimate appearance (plays media files) while scanning the computer or the network for its intelligence purpose.

VideoLAN is taking these revelations very seriously but it is important to note that the leaked document does not describe a vulnerability that is remotely exploitable, nor is present in a normal VLC installation.

The technique used is a modification of the software’s manifest in order to force the loading of a fake dynamic library “psapi.dll”, instead of using the official Windows version. This DLL contains the malware’s executable code. The attack described in the leaked document requires:

  • physical access to the targeted computer,
  • Microsoft Windows XP or later host system,
  • and execution of the tool allegedly developed by the CIA (provided on “thumbdrive”, but not exclusively).

We would like to bring to your attention that this exploit is nothing different than installing a trojaned software from an untrusted source. The only safe source for getting VLC media player is the official VideoLAN website2 .

Security of our users data is of prime importance. As a consequence, we have taken countermeasures to prevent malware from hiding their activity behind VLC media player. The used attack vector modification will not be possible starting from the next minor release, 2.2.5. We are also working on hardening the VLC security for the next major releases (3.x.x).

VLC media player is a free and open-source multimedia player that is being used by millions of people worldwide. It is made by the VideoLAN non-profit organization which is run by volunteers. All its members strongly believe in open source and standards.

The VideoLAN team