Re: "Sovereign".....Exactly What Does That Mean?
COTTONMOUTH-I: A modified USB or Ethernet connector that installs Trojan software and acts as a wireless bridge for covert remote access, using a digital core (TRINITY) and RF transceiver (HOWLERMONKEY).
COTTONMOUTH-II: Similar to COTTONMOUTH-I but deployed in a USB socket (requiring target machine integration) to create a wireless bridge for data exfiltration.
COTTONMOUTH-III: A stacked Ethernet and USB plug that functions as a wireless bridge to enable remote network access and data transfer.
FIREWATCH: Disguised as a standard RJ45 socket, it monitors, injects, or transmits data via radio technology using HOWLERMONKEY, potentially creating a VPN tunnel to the target.
HOWLERMONKEY: An RF transceiver component used in various implants (like COTTONMOUTH) to extract data or enable remote control over air-gapped systems.
NIGHTSTAND: A portable Wi-Fi exploitation system that installs exploits wirelessly from up to eight miles away, bridging to air-gapped targets without physical contact.
RAGEMASTER: Hidden in a VGA cable's ferrite choke, it taps and modulates the video signal to RF (codename VAGRANT) for remote monitoring of a target's screen.
SURLYSPAWN: A keystroke monitoring implant that logs inputs on non-connected computers and transmits them covertly, often via RF methods.
TURNIPSCHOOL: Concealed in a USB cable, it provides short-range RF communication to software on the host, allowing data bridging from air-gapped machines.