WikiLeaks Exposes Massive CIA Leak Including Hacking Tools

The New Acunetix V12 Engine


WikiLeaks has dropped another massive bomb called “Vault7“, basically a massive CIA leak which covers documents, correspondence, hacking tools, exploits and much more.

It details sophisticated software tools and techniques used by the agency to break into smartphones, computers and even Smart TVs.

WikiLeaks Exposes Massive CIA Leak Including Hacking Tools

The first installment published already contains 7,818 web pages with 943 attachments and WikiLeaks has stated this is only part of the cache.

It also appears the CIA has managed to circumvent the security controls in Signal, WhatsApp and Telegram – most likely by compromising the phone and grabbing the plain-text rather than cracking the encryption itself.

WikiLeaks has dumped online what appears to be a trove of CIA documents outlining the American murder-snoops’ ability to spy on people.

The leaked files describe security exploits used to compromise vulnerable Android handhelds, Apple iPhones, Samsung TVs, Windows PCs, Macs, and other devices, to read messages, listen in via built-in microphones, and so on. The dossiers discuss malware that can infect CD and DVD disc file systems, and USB sticks, to jump air-gaps and compromise sensitive and protected machines – plus loads more spying techniques and tools.

Yes, government surveillance has a chilling effect on freedom of expression. But, no, none of this cyber-spying should be a surprise.

The tranche of CIA documents – a mammoth 8,761 files dubbed “Year Zero” – accounts for “the entire hacking capacity of the CIA,” WikiLeaker-in-chief Julian Assange boasted today. He said the documents show the intelligence agency had lost “control of its arsenal” of exploits and hacking tools, suggesting they were passed to the website by a rogue operative.


It’s pretty similar in many ways to the 2016 NSA Shadow Brokers hack we wrote about.

The CIA hasn’t publically confirmed the authenticity of the documents but 3rd parties have including former intelligence officers.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal, and dozens of ‘zero day’ weaponized exploits against a wide range of US and European company products, [including] Apple’s iPhone, Google’s Android, Microsoft’s Windows and even Samsung’s TVs, which are turned into covert microphones,” the WikiLeaks team said in a statement.

“The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” it added.

One silver lining is that this leak demonstrates it is so difficult to crack today’s end-to-end encryption apps, such as Signal and WhatsApp, that spies have to drill into the underlying devices and computers to snoop on people. That’s a lot of effort, cost, and risk, compared to eavesdropping on communications on the wire, which strong end-to-end cryptography comfortably thwarts. Agents are therefore forced to carry out targeted snooping on individuals’ devices, rather than carry out mass blanket surveillance.

Meanwhile, some folks are speculating that the source of the leak could be the Russians, and its true purpose is to derail the CIA for political gain.

Many of the tools, attachments and code archives have been redacted by WikiLeaks who stated it was notreleasing the computer code for actual, usable weapons “until a consensus emerges on the technical and political nature of the C.I.A.’s program and how such ‘weapons’ should be analyzed, disarmed and published.”

What’s contained aren’t exactly really zero-day exploits anymore though as this cache is claimed to be from 2013-2016 – but looks more like it’s predominantly from the 2013-2014 period.

That said, I won’t be getting a TV with a micrphone or a camera any time soon.

Source: The Register

Posted in: Hacking Tools, Legal Issues, Privacy


Latest Posts:


Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.


Comments are closed.