Leak Of CIA Hacking Secrets Serves As Alert To Close Security Gaps

The U.S. Government’s response to the publication by WikiLeaks of about 8,000 pages of secret methods used by the Central Intelligence Agency to penetrate everything from cell phones to televisions has been varied.

On one hand, Congress is in a panic. It’s setting up investigations and predicting the end of the world. Intelligence professionals, on the other hand, seem only mildly surprised and not particularly bothered.

The information in Vault 7 of the WikiLeaks dump consists primarily of a catalog of tools used by the CIA and other governmental entities to break into a series of devices.

CIA Wikileaks

In each case the name of the tool is listed, the target device is there and so is the source of the tool used for hacking. In fact, it’s all presented in a series of matrices so you can look up the target by manufacturer and operating system to see what the tool will do and its limitations.

Included in the material are copies of the source code, instructions for using each of the tools, troubleshooting information on things that might prevent the hacking tools from working and detailed descriptions of what each tool does when it’s put to use.

While most of the attention so far has been towards the cell phones that can be hacked, the fact is that there’s a lot more than that. For example, there are hacking tools for Windows, Linux, macOS, iOS and Android devices.

There’s even a section on how to infect Samsung smart televisions, which has a lot of people worrying that the CIA is able to spy on them while sitting in their living rooms.


Some of the information is enlightening, such as an update-by-update commentary on the effort to hack into those Samsung televisions while still making them appear to be turned off. You can see each step of how the “Fake Off” setting was implemented, how each LED was suppressed, how the camera and microphone were turned on, how the resulting data was stored before being exfiltrated and even how to overcome problems such as the automatic software updates by Samsung.

While that information should be enough for you to choose some other type of television for your conference room, the real interest is in the ability to infect computers, routers and mobile devices.

While you’re doing this, it’s also worth noting the response from the companies that made some of those devices. Apple, for example, has said that the current version of iOS has already fixed most of the vulnerabilities that appear in the WikiLeaks documentation.

Google, meanwhile, has released a huge security update for Android devices, much of which will presumably fix some of the vulnerabilities in the WikiLeaks dump. Microsoft is reportedly hard at work looking at the Windows vulnerabilities. All of this is mostly good news for your organization.

But there’s one area where you will need to look at the reported vulnerabilities and decide if you can afford to take the risk of using Android phones.

Originally published on eWeek

Page: 1 2

Wayne Rash

Wayne Rash is senior correspondent for eWEEK and a writer with 30 years of experience. His career includes IT work for the US Air Force.

Recent Posts

Microsoft Faces UK Probe Over Inflection Staff Hiring

Poaching staff? UK's CMA regulator confirms phase one investigation of Microsoft's “hiring” of former Inflection…

1 hour ago

Elon Musk To Relocate SpaceX, X HQ To Texas

Leaving California. Elon Musk protests new gender-identity law, says he will move headquarters of SpaceX…

3 hours ago

Hackers ‘Publish Walt Disney Internal Slack Data’

Hackers reportedly publish data from thousands of Disney internal Slack communications, including data on strategy…

1 day ago

Apple Shares Reach All-Time High On AI Optimism

Apple shares surge after Morgan Stanley rates company 'top pick' over AI plans and says…

1 day ago

Musk Confirms Robotaxi Delay For Design Change

Elon Musk confirms delay of Tesla robotaxi launch as company's shares surge after he publicly…

1 day ago

Silicon UK In Focus Podcast: The Value of Data

Discover the transformative power of data in our latest podcast. Learn how leveraging data can…

1 day ago