Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
  HOME     MENU     SEARCH     NEWSLETTER    
BUSINESS NEWS FOR TECHNOLOGY DECISION-MAKERS. UPDATED 2 MINUTES AGO.
You are here: Home / Business Briefing / WikiLeaks Publishes CIA Trove
WikiLeaks Publishes CIA Trove Alleging Widescale Hacking
WikiLeaks Publishes CIA Trove Alleging Widescale Hacking
By Raphael Satter and Jack Gillum Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
07
2017

WikiLeaks on Tuesday published thousands of documents purportedly taken from the Central Intelligence Agency's Center for Cyber Intelligence, a dramatic release that appears to expose intimate details of America's cyberespionage toolkit.

It was not immediately clear how WikiLeaks obtained the information, which included more than 8,700 documents and files. The CIA tools, if authentic, could undermine the confidence that consumers have in the safety and security of their computers, mobile devices and even smart TVs.

WikiLeaks said the material came from "an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia." It didn't say how the files were removed, such as possibly by a rogue employee, by hacking a federal contractor working for the CIA or breaking into a staging server where such hacking tools might be temporarily stored.

The more than 8,000 documents cover a host of technical topics, including what appears to be a discussion about how to compromise smart televisions and turn them into improvised surveillance devices. WikiLeaks said the Relevant Products/Services also include details on the agency's efforts to subvert American software products and smartphones, including Apple's iPhone, Google's Android and Microsoft Windows.

The information dump could not immediately be authenticated by The Associated Press, and the CIA declined comment, but WikiLeaks has a long track record of releasing top secret government documents. Experts who've started to sift through the material said that it appeared legitimate and that the release was almost certain to shake the CIA.

Jonathan Liu, a spokesman for the CIA, said: "We do not comment on the authenticity or content of purported intelligence documents."

WikiLeaks said the archive "appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."

If the authenticity of the documents is officially confirmed, it would represent yet another catastrophic breach for the U.S. intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including hundreds of thousands of documents from the State Department and the Pentagon.

WikiLeaks, which has been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had "recently" lost control of a massive arsenal of CIA hacking tools as well as associated documentation.

"There's no question that there's a fire drill going on right now," said Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec. "It wouldn't surprise me that there are people changing careers -- and ending careers -- as we speak."

One of the purported CIA malware programs is described in the WikiLeaks documents as a "simple DLL hijacking attempt" that had been tested against Microsoft Windows XP, Vista and 7 operating systems. The technique, which the document called a "Windows FAX DLL injection," introduces computer code that allows an attacker to gain access to a computer process' memory and permissions while at the same time masking the attack.

Williams, who has experience dealing with government hackers, said the voluminous files' extensive references to operation security meant they were almost certainly government-backed. "I can't fathom anyone fabricated that amount of operational security concern," he said. "It rings true to me."

"The only people who are having that conversation are people who are engaging in nation-state-level hacking," he said.

WikiLeaks said its data also included a "substantial library" of digital espionage techniques borrowed from other countries, including Russia.

Bob Ayers, a retired U.S. intelligence official currently working as a security analyst, noted that WikiLeaks has promised to release more CIA documents.

"The damage right now is relatively high level," he said. "The potential for really detailed damage will come in the following releases."

© 2017 Associated Press under contract with NewsEdge/Acquire Media. All rights reserved.
Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
MORE IN BUSINESS BRIEFING
NEWSFACTOR BUSINESS REPORT
NEWSFACTOR NETWORK SITES
NEWSFACTOR SERVICES
© Copyright 2017 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.