The US CIA has hacked into Users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung, according to Wikileaks.
Wikileaks published thousands of documents that describe methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private information of citizens and corporations safe from prying eyes, Associated Press reported Wednesday.
The documents describe CIA efforts -- cooperating with friendly foreign governments and the US National Security Agency -- to subvert the world's most popular technology platforms, including Apple's iPhones and iPads, Google's Android phones and the Microsoft Windows operating system for desktop computers and laptops.
The documents also include discussions about compromising some internet-connected televisions to turn them into listening posts. One document discusses hacking vehicle systems, indicating the CIA's interest in hacking modern cars with sophisticated on-board computers.
Jonathan Liu, a spokesman for the CIA, said: "We do not comment on the authenticity or content of purported intelligence documents." White House spokesman Sean Spicer also declined comment.
Missing from WikiLeaks' trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. WikiLeaks said it planned to avoid distributing tools "until a consensus emerges" on the political nature of the CIA's program and how such software could be analyzed, disarmed and published.
Tuesday's disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabilities in ways that might block the tools' effectiveness is the responsibility of leading technology companies. The revelations threatened to upend confidence in an Obama-era government program, the Vulnerability Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed.
"The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive," WikiLeaks said in a statement.
Some technology firms on Tuesday said they were evaluating the information. Microsoft Corp. said it was looking into the report, while the maker of secure messaging app Signal said the purported CIA tools affected users' actual phones and not its software design or encryption protocols.
The tools described in the documents carried bizarre names, including Time Stomper, Fight Club, Jukebox, Bartender, Wild Turkey, Margarita and "RickyBobby," a racecar-driving character in the comedy film, "Talladega Nights."
That RickyBobby tool, the documents said, was intended to plant and harvest files on computers running "newer versions of Microsoft Windows and Windows Server." It operated "as a lightweight implant for target computers" without raising warnings from antivirus or intrusion-detection software. It took advantage of files Microsoft built into Windows since at least 10 years ago.
The files include comments by CIA hackers boasting in slang language of their prowess: "You know we got the dankest Trojans and collection tools," one reads.
The documents show broad exchanges of tools and information among the CIA, NSA and other U.S. intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.
WikiLeaks claimed the CIA used both its Langley, Virginia, headquarters and the US consulate in Frankfurt, Germany, as bases for its covert hackers. The AP found that one purported CIA hack that imitates the Domain Name System -- the internet's phone book -- traced to an internet domain hosted in Germany.
Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec who has experience dealing with government hackers, said the files' extensive references to operation security meant they were almost certainly government-backed. "I can't fathom anyone fabricated that amount of operational security concern," he said. "It rings true to me."
In an unusual move, WikiLeaks said it was withholding some secrets inside the documents. Among them, it said it had withheld details of tens of thousands of "CIA targets and attack machines throughout Latin America, Europe and the United States."
WikiLeaks also said its data included a "substantial library" of digital espionage techniques borrowed from other countries, including Russia.
If the authenticity of the documents is officially confirmed, it would represent yet another catastrophic breach for the US intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including from the State Department and the Pentagon.
Tuesday's documents purported to be from the CIA's "Embedded Development Branch" discuss techniques for injecting malicious code into computers protected by the personal security products of leading international anti-virus companies. They describe ways to trick anti-virus products from companies including Russia-based Kaspersky Lab, Romania-based BitDefender, Dutch-based AVG Technologies, F-Secure of Finland and Rising Antivirus, a Chinese company.
Some documents were classified "secret" or "top secret" and not for distribution to foreign nationals. One file said those classifications would protect deployed hacks from being "attributed" to the US government. The practice of attribution, or identifying who was behind an intrusion, has been difficult for investigators probing sophisticated hacks that likely came from powerful nation-states.
Julian assanges whistleblowing website WikiLeaks was hacked on Monday following the publication of the second batch of leaked Democratic National Committee (DNC) emails. "Our email publication servers are under a targeted DoS (denial-of-service) attack since releasing #DNCLeak2," WikiLeaks said in a Twitter post
US Secretary of State John Kerry has instructed Ecuador to restrain Julian Assange from releasing documents related to US Presidential Nominee Hillary Clinton, Wikileaks revealed Tuesday. "Multiple US official tell us John Kerry asked Ecuador to stop Assange from publishing Clinton docs during FARC peace negotiations," WikiLeaks said on Twitter
Israel had plans of spreading rumors about a leak that it would use a military base in Saudi Arabia to strike Iran as one of its effors to counter Iran's nuclear buildup, according to th latest Wikileaks tranche of emails released Saturday. A July 2012 correspondence between a former adviser and then-secretary of state Hillary Clinton cited Israeli officials as saying that while Israel was unprepared for a full-scale war with Iran, rumors of an IDF strike could “persuade the world they mean business
Wikileaks has released classified document involving European Union plan for military intervention against ‘refugee boats in Libya and the Mediterranean which could eventually lead to sending ground troops to Libya. The report, dated back to January 29, 2016, was written by Rear Admiral Enrico Credendino, the commander of the Operation SOPHIA, for the EU's Military Committee and the EU's Political and Security Committee
Microsoft has reached an agreement to provide 17 US intelligence agencies with its cloud-computing platform, The Washington Post reported. According to the media outlet, citing the company's executives, the new deal will allow it to move intelligence agencies computer systems onto Microsoft Office 365 apps and add some cloud-based apps that had previously been unavailable to them
Wikileaks has released four secret documents as part of vault 7 leaks containing details of CIA project code-named Protego developed along with Raytheon. The information reveals four secret documents and 37 related technical manuals, details of Protego missile control system installed on board military aircraft manufactured by UTC subsidiary Pratt and Whitney,
WikiLeaks has published documents from the Central Intelligence Agency that details about CherryBlossom tool that exploits popular brands of routers such as D-Link, Belkin and Linksys companies. The CherryBlossom tool is used to monitor the Internet activity of users and conducts software exploits
WikiLeaks whistleblowing platform that published the leaked email of ex-state Secretary Hilllary Clintons email states that the US authorities had knowledge of Qatar as well as Saudi Arabia backing terrorists operation in the Middle East. The e-mail published late on Monday was dated by August 2014 and was addressed to John Podesta, then-counselor to President Barack Obama
Russian Attack Drone's Weapons Trials in 2020
P&W Engines Passes Tests, Grounded Swiss Airbus 220s to Resume Operations
India Gifts 2 Mi-35 Gunships to Afghanistan
Lockheed Wins $40M for AH-64 Gunship’s Modernised Turrets
Russian S-300s, S-400s Fail to Detect Israeli F-35s Flying Over Syria: Reports...
New GJ-11 Stealth Combat Drone with Flying Wing Design takes part in...
China to Deploy Sharp Sword Stealth Drone on Type-001A Carrier by Year-end...
USAF Develops "Thor" Electromagnetic Weapon to Hammer Enemy Drones
Several joint production and direct procurement programs could be halted if the US and Europe carry through with their threat...
Sanctions-hit Iran has found ingenious ways to develop military hardware
Artificial Intelligence (AI) is rapidly permeating the defence industry to aid and improve human decision-making
Upgrade of Russias Sukhoi Su-30SM fighters to equip them with armaments, radar, sensors and engines from the more powerful Su-35...
US companies sanctioned by China for supplying weapons to Taiwan may be denied rare earth elements (REEs), which have critical...
While the US F-35 stealth aircraft has become one the fastest selling fighter jets in the world aircraft market, thanks...