WikiLeaks, continuing its data dump of leaked CIA hacking tools, released a set of documents on Thursday that appear to show how the agency was able to spy on Apple's Mac computers and iPhones.
Most of the leaked documents describe hacking methods that are several years old, which suggests they may have been updated or retired as new Apple products were released. With code names like "Dark Matter" and "Sonic Screwdriver," the hacking tools could have allowed the CIA to gain access to computers and mobile devices using techniques like installing malware in a device's firmware, according to WikiLeaks.
Among the documents is a user guide from 2012 for the Sonic Screwdriver tool, which describes the CIA's attempts to execute code on peripheral devices while a Mac desktop or laptop is booting up. The technique is familiar to anyone who has experience changing their PC's boot drive: the CIA's implant code was stored on an Apple Thunderbolt-to-Ethernet adapter, and it scanned all external and internal bootable drives to find one that would let it install a surveillance backdoor on bootup.
Once the backdoor was installed and the computer rebooted into macOS, the infected Ethernet adapter would function normally. The CIA tested the tool on many MacBook models introduced starting in 2011, according to the user guide.
Related
- WikiLeaks Trove Appears to Show CIA Hacking ToolsWikiLeaks Trove Appears to Show CIA Hacking Tools
Another leaked document describes the "NightSkies" tool from 2008, which was designed to be physically installed onto factory fresh iPhones. That suggests the CIA had access to the iPhone supply chain, according to WikiLeaks.
The documents released on Thursday are part of the "Vault 7" trove of leaked CIA hacking tools, which WikiLeaks first announced on March 7. The organization claims the trove is the largest-ever publication of confidential CIA documents, and it said it would give the manufacturers of the targeted software and hardware time to address the vulnerabilities described in the documents before releasing them.
WikiLeaks has reportedly been slow to fulfill that promise, however, requiring demands from companies before it hands over the data, according to Vice News. It was not immediately clear whether Apple had time to review the documents leaked on Thursday.
One uses a modified Ethernet adapter to install surveillance software.
Uber is working on a diversity report in the wake of an ex-engineer's sexual harassment claims.
Relax WikiLeaks Details CIA Hacking Tools for Macs, iPhones stories
Could the future of the MacBook be as an accessory device requiring an iPhone or iPad to function?
Clips is similar to iMovie, but with the added filters that people have come to expect from social media apps, and little of the complexity of other video editing apps.
Marketed as the most affordable iPad ever, it replaces the iPad Air 2 and uses the same 64-bit A9 chip found in the iPhone 6s.
Biometric security such as fingerprint scanning or facial recognition can't be changed, lip motion passwords are biometric authentication that can.
Forget running Doom on Apple Watch, an iOS developer is unlocking the huge library of Game Boy games for your wrist.
The messaging services are renowned for their end-to-end encryption, which, in this case, also made them vulnerable to attacks.
Apple hasn't made a major iPad refresh since the launch of the 9.7-inch iPad Pro last year, so the tablet lineup is ripe for updates.
Amazon is refusing to give authorities investigating a murder access to data from Alexa.
Samsung Display secures huge order worth billions from its rival.
Chips appear on iPhone 7 and 7 Plus, Apple says cosmetic damage isn't covered under warranty.
Vizio secretly collected viewing data from 11 million TVs, according to an FTC complaint.
It's not always a straightforward process, but it's always a good thing to do on occasion.
We live in a world of mass surveillance. Here are some tips for staying anonymous while still staying online.
Wozniak put Apple before his ego, which led to his having a hand in developing some of the world's most legendary products.
Design patent cases very rarely reach the Supreme Court. It had not heard such a case in more than 120 years.
Is public Wi-Fi safe? Hell, no. But there are steps you can take.
Wi-Fi, access point, router, 802.11ac. Networking can be a pain! But it doesn't have to be if you know what you're doing. Then it's actually fun! This is where you start.
Finally ready to get off the grid? It's not quite as simple as it should be, but here are a few easy-to-follow steps that will point you in the right direction at the very least.
Your intensions when cracking a Wi-Fi password are no doubt noble—we trust you—so here's how to do it.
Worried about the security of your Wi-Fi connection? Follow these steps and you'll be in a wireless Fort Knox.
Rex Tillerson told the DHS border screening is"mandatory" for anyone who visited ISIS-controlled regions.
That means the smartwatch will support hundreds of apps, plus loads of other features like customized watch faces, on-board music functionality, and Google Assistant.
Scientist creates graphene skin that's more sensitive than our own.
Poppy Crum, Dolby's chief scientist and an adjunct professor at Stanford University, talks about the evolving hearable market, augmented reality, and multisensory virtual reality.
The beloved airline name is being shuttered in 2019.
The clever design should help users avoid any mess.
Could the future of the MacBook be as an accessory device requiring an iPhone or iPad to function?
The AI system ordered its host satellite to monitor an exploding volcano before anybody asked.
The right clothes for my body are out there, but I won't find them in stores.
AT&T and Verizon are no longer advertising on Google's video platform after discovering their ads may have appeared next to horrible, offensive content.