Symantec Attributes 40 Cyber-Attacks to CIA-Linked Hacking Tools

Advertisement
By Reuters | Updated: 11 April 2017 09:50 IST

Past cyber-attacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher WikiLeaks, the security researcher Symantec Corp said on Monday.

That means the attacks were likely conducted by the US Central Intelligence Agency. The files posted by WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and other electronic gear, along with programming code for some of them, and multiple people familiar with the matter have told Reuters that the documents came from the CIA or its contractors.

WikiLeaks Says It'll Work With Tech Firms to Defeat CIA Hacking

Advertisement

Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA.

Advertisement

The CIA has not confirmed the Wikileaks documents are genuine. But agency spokeswoman Heather Fritz Horniak said that any WikiLeaks disclosures aimed at damaging the intelligence community "not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm.

"It is important to note that CIA is legally prohibited from conducting electronic surveillance targeting individuals here at home, including our fellow Americans, and CIA does not do so," Horniak said.

Advertisement

She declined to comment on the specifics of Symantec's research.

The CIA tools described by Wikileaks do not involve mass surveillance, and all of the targets were government entities or had legitimate national security value for other reasons, Symantec researcher Eric Chien said ahead of Monday's publication.

Advertisement

In part because some of the targets are US allies in Europe, "there are organizations in there that people would be surprised were targets," Chien said.

Symantec said sectors targeted by operations employing the tools included financial, telecommunications, energy, aerospace, information technology, education, and natural resources.

Besides Europe, countries were hit in the Middle East, Asia, and Africa. One computer was infected in the United States in what was likely an accident - the infection was removed within hours. All the programs were used to open back doors, collect and remove copies of files, rather than to destroy anything.

The eavesdropping tools were created at least as far back as 2011 and possibly as long ago as 2007, Chien said. He said the WikiLeaks documents are so complete that they likely encompass the CIA's entire hacking toolkit, including many taking advantage of previously unknown flaws.

The CIA is best-known for its human intelligence sources and analysis, not vast electronic operations. For that reason, being forced to build new tools is a setback but not a catastrophe.

WikiLeaks 'Vault 7' Dump: What You Should Know About the CIA's Hacking Programme

It could lead to awkward conversations, however, as more allies realize the Americans were spying and confront them.

Separately, a group calling itself the Shadow Brokers on Saturday released another batch of pilfered National Security Agency hacking tools, along with a blog post criticizing President Donald Trump for attacking Syria and moving away from his conservative political base.

It is unclear who is behind the Shadow Brokers or how the group obtained the files.

© Thomson Reuters 2017

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15R Storage Options Leaked: Here's How Much It Might Cost in India
  2. Lenovo Idea Tab Plus Launched in India With 10,200mah Battery: Details
  3. RAM Crisis 2026: 16GB Phones Out, 4GB Models Making a Comeback
  4. Redmi Note 15 5G Chipset Revealed Ahead of January 6 India Launch
  5. Oppo Reno 15c With Snapdragon 7 Gen 4 SoC Launched at This Price
  6. Realme Narzo 90, Realme Narzo 90x Launching Today: All You Need to Know
  7. Logitech MX Master 4 Launches in India With These Features
  8. Vivo S50, S50 Pro Mini With Snapdragon Chips Launched at These Prices
  9. Pixel 10 Series Gets Price Cuts During Google's End of Year Sale: See Offers
  10. MacBook Air (2025) With M4 Chip Available at This Discounted Price
  1. Realme Narzo 90, Realme Narzo 90x 5G Launching Today: Know Price in India, Features, Specifications and More
  2. Webb Telescope Discovers Hidden Atmosphere on Molten Super-Earth TOI-561 b Despite Extreme Heat
  3. Astronomers Watch a Dormant Neutron Star Reignite After a Decade of Silence
  4. Predictive Forecasting Tools Can Boost the Success of Clean Energy Investments Worldwide
  5. Chinese Spacecraft Nearly Slammed Into Starlink Satellite, SpaceX Reveals
  6. Clocks on Mars Run Faster Than on Earth, New Study Finds
  7. The Hunting Wives Out on OTT: Know Everything About This American Thriller Mystery Series
  8. All Her Fault Now Streaming on JioHotstar: Know Everything About This Thriller Series
  9. Wednesday Season 3 Set for July 2027 on Netflix: Jenna Ortega Returns as the Iconic Addams Heir
  10. Lakshmi Manchu’s Daksha: The Deadly Conspiracy Available for Streaming on Amazon Prime Video
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.