CIA has Dedicated Hacking Units Developing Zero-Day Exploits and Malware for iOS, Other Platforms

Read Time:2 Minute, 54 Second
CIA has Dedicated Hacking Units Developing Zero-Day Exploits and Malware for iOS, Other Platforms

According to a myriad of documents obtained by WikiLeaks, the Central Intelligence Agency (CIA) has a dedicated unit working on a variety of different routes to accessing some of the most popular devices on the planet.

The group has published over 8,000 documents regarding the dedicated unit within the CIA’s Center for Cyber Intelligence, which is reportedly focused on not only developing, but also obtaining, malware, including zero-day exploits, for a variety of devices and platforms. According to the information, those involved are primarily set on iOS devices, due to their popularity “among social, political, diplomatic and business elites.”

“…a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.”

The information is being brought to the surface because, as revealed in the leak, the CIA has “lost control” of the majority of the malware it has implemented in these endeavors, and, as a result, hs been passed around between former U.S. government hackers and contractors, all unauthorized.

“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

Read Also:  Tim Cook calls upon the White House to support unbreakable encryption

The teams within the CIA are not only focused on iOS devices. There are other teams within the Center for Cyber Intelligence that are working on other malware intrusions and zero-day exploits for Samsung smart TVs, the Android platform, and Windows. The goal in some of these instances is also to turn these devices into “covert microphones.”

The documents go even further, suggesting that the size and scope of this dedicated branch within the CIA is essentially a “second NSA,” with even less oversight:

“By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

Lastly, for what it’s worth, Will Strafach (@chronic, “iOS hacker, infosec”) has tweeted that there is “no evidence of working iOS malware yet,” but says that he is digging through the papers published by WikiLeaks to discern more.

@9to5mac @llsethj no evidence of working iOS malware yet fyi (I am digging through it now).

— Will Strafach (@chronic) March 7, 2017

[Source: iPhoneHacks]
0 0
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Leave a Reply

Your email address will not be published. Required fields are marked *