WikiLeaks Details CIA Hacking Tools for Macs, iPhones

wikileaks-details-cia-hacking-tools-for-macs-iphones photo 1

WikiLeaks, continuing its data dump of leaked CIA hacking tools, released a set of documents on Thursday that appear to show how the agency was able to spy on Apple's Mac computers and iPhones.

Most of the leaked documents describe hacking methods that are several years old, which suggests they may have been updated or retired as new Apple products were released. With code names like "Dark Matter" and "Sonic Screwdriver," the hacking tools could have allowed the CIA to gain access to computers and mobile devices using techniques like installing malware in a device's firmware, according to WikiLeaks.

Among the documents is a user guide from 2012 for the Sonic Screwdriver tool, which describes the CIA's attempts to execute code on peripheral devices while a Mac desktop or laptop is booting up. The technique is familiar to anyone who has experience changing their PC's boot drive: the CIA's implant code was stored on an Apple Thunderbolt-to-Ethernet adapter, and it scanned all external and internal bootable drives to find one that would let it install a surveillance backdoor on bootup.

Once the backdoor was installed and the computer rebooted into macOS, the infected Ethernet adapter would function normally. The CIA tested the tool on many MacBook models introduced starting in 2011, according to the user guide.

Related

  • WikiLeaks Trove Appears to Show CIA Hacking ToolsWikiLeaks Trove Appears to Show CIA Hacking Tools

Another leaked document describes the "NightSkies" tool from 2008, which was designed to be physically installed onto factory fresh iPhones. That suggests the CIA had access to the iPhone supply chain, according to WikiLeaks.

The documents released on Thursday are part of the "Vault 7" trove of leaked CIA hacking tools, which WikiLeaks first announced on March 7. The organization claims the trove is the largest-ever publication of confidential CIA documents, and it said it would give the manufacturers of the targeted software and hardware time to address the vulnerabilities described in the documents before releasing them.

WikiLeaks has reportedly been slow to fulfill that promise, however, requiring demands from companies before it hands over the data, according to Vice News. It was not immediately clear whether Apple had time to review the documents leaked on Thursday.

Recommended stories

Relax WikiLeaks Details CIA Hacking Tools for Macs, iPhones stories

How to Stay Anonymous Online

We live in a world of mass surveillance. Here are some tips for staying anonymous while still staying online.

6 ways to delete yourself from the internet

Finally ready to get off the grid? It's not quite as simple as it should be, but here are a few easy-to-follow steps that will point you in the right direction at the very least.

How to Hack Wi-Fi Passwords

Your intensions when cracking a Wi-Fi password are no doubt noble—we trust you—so here's how to do it.

More stories

Misfit Vapor Runs Android Wear 2.0

That means the smartwatch will support hundreds of apps, plus loads of other features like customized watch faces, on-board music functionality, and Google Assistant.