This technique is used by the CIA to redirect the target's computers web browser to an exploitation server while appearing as a normal browsing session, the recent leak discovered.
"Today, May 5th 2017, WikiLeaks publishes 'Archimedes', a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target's computers web browser to an exploitation server while appearing as a normal browsing session," the press release read.
The previous batch of the documents called The Scribbles was released on April 28.
On March 7, WikiLeaks began publishing what it said was a large archive of classified CIA-related files. The first part of the release shed light on hacking techniques developed and employed by the agency, including programs targeting all major computer operating systems.
The "Year Zero" batch was followed by the "Dark Matter" released on Match 23. The third batch called "Marble" was released on March 31. The "Grasshopper" batch revealing a platform for building malware was released on April 4. The HIVE batch revealing top secret CIA virus control system was released on April 14.
The first batch of Wikileaks' CIA revelations shed light on a technology allowing to turn on a Samsung smart TV set's audio recording capabilities remotely which had been designed by the CIA and the UK Security Service MI5.
In March 2016, WikiLeaks published over 8,700 classified CIA documents that revealed the agency's hoarding hacking technologies and listed major operating system vulnerabilities.
On April 21, WikiLeaks presented a user guide for CIA's "Weeping Angel" tool, a surveillance program using Samsung smart TV sets.