WikiLeaks' CIA Hacking Dump Sends Tech Firms Scrambling for Fixes

Advertisement
By Reuters | Updated: 5 April 2017 17:01 IST

Tech companies must rapidly step up information-sharing to protect users from prying eyes, a security software executive said on Wednesday after WikiLeaks released a trove of data purporting to show that the CIA can hack all manner of devices.

Dozens of firms rushed to contain the damage from possible security weak points following the anti-secrecy organisation's revelations, although some said they needed far more information on what the US intelligence agency was up to before they could thwart suspected but previously hidden attacks.

Advertisement

Sinan Eren, vice president of Czech anti-virus software maker Avast, called on mobile software makers Apple and Google to supply security firms with privileged access to their devices to offer immediate fixes to known bugs.

"We can prevent attacks in real time if we are given the hooks into the mobile operating system," Eren said in a phone interview from Silicon Valley, where he is located.

Advertisement

"If we can drive a paradigm shift where mobile platforms don't shut off access, we'll be better able to detect when hackers are hiding in a mobile (phone)", he said.

Avast, which counts more than 400 million users of its anti-virus software worldwide, was named in the WikiLeaks documents as one of the security vendors targeted by the CIA in a leaked page labelled "secret" but lacking further details.

Advertisement

The leaks - which WikiLeaks described as the biggest in the Central Intelligence Agency's history - had enough technical details for security experts and product vendors to recognise that widespread compromises exist. However, they provided few specifics needed to offer quick fixes.

Reuters could not immediately verify the validity of the published documents, but several contractors and private cyber security experts said the materials appeared to be legitimate.

Advertisement

The 8,761 leaked documents list a wealth of security attacks on Apple and Google Android smartphones carried by billions of consumers, as well as top computer operating systems - Windows, Linux and Apple Mac - and six of the world's main web browsers.

Apple, Google, WhatsApp, and Others React to WikiLeaks CIA Dump

Apple said in a statement that nearly 80 percent of iPhone users run its current iOS software with the latest security patches. "Many of the issues leaked today were already patched in the latest iOS; we will continue work to rapidly address any identified vulnerabilities," Apple said on Tuesday. The statement made no reference to attacks on its computer software.

Google declined to comment, while a Microsoft spokeswoman said: "We're aware of the report and are looking into it."

Widely-used routers from Silicon Valley-based Cisco were listed as targets, as were those supplied by Chinese vendors Huawei and ZTE and Taiwanese supplier Zyxel for their devices used in China and Pakistan.

Cisco security team members said in a blog post that because WikiLeaks has not released any of the actual hacking exploits, "the scope of action that can be taken by Cisco is limited".

Omar Santos, a principal engineer in Cisco's security response unit, said malware appears to be targeting whole families of Cisco devices but is designed to remain hidden so as to steal data unnoticed. He said Cisco assumes WikiLeaks will eventually disclose the hacks, allowing it to fix them.

Huawei declined to comment. ZTE and Zyxel were not immediately available to respond.

Stay of execution
Messaging apps protected by full software encryption also appear to be vulnerable to hacking of the smartphones themselves, communications app provider Telegram said in a blog post. But one positive outcome may be that device and software makers will be able to close up these holes, it said.

"This is not an app issue. It is relevant on the level of devices and operating systems like iOS and Android," Telegram stated, adding: "The good news is that for the moment all of this is irrelevant for the majority of Telegram users. If the CIA is not on your back, you shouldn't start worrying just yet."

The WikiLeaks collection contains a mix of copious data and empty files marked "secret" that promised more details to come on attacks against more than 15 security software firms.

US cyber-security expert Robert Graham said WikiLeaks provided enough detail to recognise some known vulnerabilities.

"One anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak," Graham said in a blog post.

Some security experts said the CIA's possible use of tools from other spy agencies raised the risk of false attribution for targeted cyber attacks by the U.S. intelligence agency.

He said CIA cyber spying efforts could be set back years.

The CIA and White House declined comment. "We do not comment on the authenticity or content of purported intelligence documents," CIA spokesman Jonathan Liu said in a statement.

WikiLeaks said it aims to provoke a political and legal debate about the CIA's cyber arsenal. However, it was holding back, for now, much of the technical documentation that would allow other hackers and cyber criminals to exploit the hacks - while putting vendors on notice to expect further revelations.

The organisation said in a statement it is "avoiding the distribution of 'armed' cyber weapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should be analysed, disarmed and published".

It described sophisticated tools for targeting the devices of individual users, in contrast to the revelations by former National Security Agency contractor Edward Snowden of mass data collection on millions of web and phone users worldwide.

© Thomson Reuters 2017

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Poco X8 Series Arrives in India With 50-Megapixel Camera: See Price
  2. Oppo K14 5G Debuts With 7,000mAh Battery at This Price in India
  3. Realme P4 Lite 5G Roundup: Price in India, Specifications Expected
  4. Apple Reportedly Increases Foldable iPhone Panel Orders to 20 Million
  5. iQOO Z11 Surfaces on Benchmarking Site Ahead of Its Launch in China
  6. Oppo Find N6 Launched With Snapdragon 8 Elite Gen 5 SoC, 6,000mAh Battery
  7. Vivo T5x 5G Goes Official in India With 7,200mAh Battery
  8. iQOO 15R Review
  9. OnePlus 15, OnePlus 13s Get Latest OxygenOS 16 Update: Here's What's New
  10. Tecno Spark Go 3 Review: Last of the Sub-Rs. 10,000 Budget Phones?
  1. Instagram Rolls Out New AI Voice Effects For Voice Notes With Eight Filters
  2. Apple Reportedly Boosts Foldable Panel Orders to 20 Million, Suggesting Strong Demand for Foldable iPhone
  3. Smriti Irani Backs Women Entrepreneurs With SPARK Collective Push and British Council Partnership
  4. Oppo Watch X3 With Snapdragon W5 Chipset, Over 100 Sports Modes Launched
  5. Oppo Find N6 Launched With Snapdragon 8 Elite Gen 5 SoC, 6,000mAh Battery: Price, Features
  6. Poco X8 Pro Series Launched in India With Up to 9,000mAh Battery, 50-Megapixel Camera: Price, Specifications
  7. OnePlus Pad 3 Tipped to Launch With 13.2-Inch Display, Snapdragon 8 Elite Gen 5 Chip
  8. Vivo X500 Series Chipsets Tipped Months Ahead of Launch; Vivo Pro Max Could Also Debut
  9. Argentina Bans Polymarket Over Unregulated Crypto Betting Concerns: Report
  10. Oura Ring 4 Launched in India With Smart Sensing Technology and HRV Tracking: Price, Specifications
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.