The files include comments by CIA hackers boasting in slang language of their prowess: "You know we got the dankest Trojans and collection tools," one reads. It took advantage of files Microsoft built into Windows since at least 10 years ago. That RickyBobby tool, the documents said, was intended to plant and harvest files on computers running "newer versions of Microsoft Windows and Windows Server." It operated "as a lightweight implant for target computers" without raising warnings from antivirus or intrusion-detection software. The tools described in the documents carried bizarre names, including Time Stomper, Fight Club, Jukebox, Bartender, Wild Turkey, Margarita and "RickyBobby," a racecar-driving character in the comedy film, "Talladega Nights." said it was looking into the report, while the maker of secure messaging app Signal said the purported CIA tools affected users' actual phones and not its software design or encryption protocols. Some technology firms on Tuesday said they were evaluating the information. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive," WikiLeaks said in a statement. "The archive appears to have been circulated among former U.S. WikiLeaks said the material came from "an isolated, high-security network" inside the CIA's Center for Cyber Intelligence but didn't say whether the files were removed by a rogue employee or whether the theft involved hacking a federal contractor working for the CIA or perhaps breaking into a staging server where such information might have been temporarily stored. It was not immediately clear how WikiLeaks obtained the information, and details in the documents could not immediately be verified. The revelations threatened to upend confidence in an Obama-era government program, the Vulnerability Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed. Tuesday's disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabilities in ways that might block the tools' effectiveness is the responsibility of leading technology companies. WikiLeaks said it planned to avoid distributing tools "until a consensus emerges" on the political nature of the CIA's program and how such software could be analyzed, disarmed and published. Missing from WikiLeaks' trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. Jonathan Liu, a spokesman for the CIA, said: "We do not comment on the authenticity or content of purported intelligence documents." White House spokesman Sean Spicer also declined comment. WikiLeaks has a long track record of releasing top secret government documents, and experts who sifted through the material said it appeared legitimate. One document discusses hacking vehicle systems, indicating the CIA's interest in hacking modern cars with sophisticated on-board computers. The documents also include discussions about compromising some internet-connected televisions to turn them into listening posts. Read more: Canada's spy agencies broke surveillance laws, watchdogs revealįor subscribers: The Globe sits down with Canada's spymaster Richard Fadden TVs, phones, computers: The details in the WikiLeaks release on CIA hacking
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |