The Watch Pinku katto: Futoku aishite fukaku aishite OnlineCIA has put quite a bit effort into figuring out ways to hack Apple devices.That's the takeaway from the latest batch of documents dumped by WikiLeaks.
The so-called "Dark Matter"documents, published Thursday, detail methods allegedly used by the CIA to infect MacBooks and some older iPhones with malware that allowed the agency to remotely spy on device owners.
SEE ALSO: Wikileaks' CIA dump contained WAY more bad memes than you would thinkAs usual, WikiLeaks released a fairly alarming-sounding statement accompanying the documents. But before you freak out about the security of your own Apple products, it's important to understand exactly what they say.
It's important to note that, much like the earlier Vault 7 dump that detailed exploits used to "bypass" encryption used by chat apps like WhatsApp and Signal, the new methods described in the latest documents also require physical access to the device.
The documents make completely clear the fact that CIA operatives would need physical access to a device before they can carry out any of the exploits described.
First, the good news. The only iPhone specifically named in the documents is one that is pretty much completely dead: the iPhone 3G (running iOS 2.1, no less). Apple also confirmed Thursday the only iPhone affected was the 3G and that the vulnerability was fixed as of the release of the iPhone 3GS.
Still, the exploit detailed in a document called NightSkies, dated to 2008, involved "a beacon/loader/implant tool" that "operates in the background providing upload, download and execution capability on the device."
The setup process was somewhat complex (again, it required physical access to the phone), but once there, it could have been used to access an astonishingly vast amount of data from a "target's" iPhone.
The document contains instructions for downloading call logs, text messages, contacts lists, mail and maps files, browser history, YouTube video cache (YouTube was one of the only third-party apps to come pre-installed on early iPhones), voicemails, calendar data, photos and even "user-specific" keyboard data. In other words: very nearly everything you could possibly hope to get off an iPhone using the app's that came pre-installed at the time.
It all started with a dongle. Seriously.
A project called Sonic Screwdriver (yes, we already know the CIA is full of Doctor Whofans) detailed how a thunderbolt-to-ethernet adapter could be modified with a bit of malicious code designed to infect a laptop's firmware.
By infecting the firmware, this allowed the code to "persist" in the device even if the hard drive was wiped or the operating system is completely re-installed. As Motherboard'sLorenzo Franceschi-Bicchierai points out, it was actually a fairly clever move by the CIA as a similar method was later uncovered by security researchers two years later in 2014.
According to the documents, the CIA tested this method with MacBook Pros and MacBook Airs from late 2011 to mid 2012. (In a statement, Apple said this particular exploit had been fixed in every MacBook made after 2013.)
But, again, before you go chucking your own ethernet adapter in the garbage, remember that this only worked with adapters that had been specially modified with the malicious code to begin with.
Topics Apple iPhone
Previous:Poison Ivies
'American Idol' is returning, but Kelly Clarkson and Simon Cowell are notMark Zuckerberg's Oculus trial transcript reveals his vision for Facebook VRIntroducing Mashable ReelsThe Russians trolled Trump and released photos of him on the internetApple might reveal a new iPad next monthEven the experts think some passwordSaturn's moon Titan looks like a pretty chill place in new photos9 movie and TV moments that feel eerily similar to Trump firing ComeyNewlywed couple ditches traditional first dance for an epic light saber battleEverything is totally fine at Fyre Festival HQA major clue has us thinking 'Game of Thrones' trailer will be arriving very, very soonIt's 2017, and Samsung is still launching flip phonesFirst Hydra took Captain America, now they're taking the White HouseJennifer Aniston says modernFirst Hydra took Captain America, now they're taking the White HouseSnapchat sold about $8 million worth of Spectacles (not that it helped much)The Prince of Norway is the internet's new favourite royal family memberNBA star fined after social media catches him threatening fanI went to a rage room and smashed up a bunch of stuff and it was amazing'American Gods' is blessed with a Season 2 renewal after two episodes People are loving this dude allegedly stealing venetian blinds The taco trucks are coming for Donald Trump Kind Canadians remind America it's already great Google Pixel's are nice, but they're no Samsung Galaxy Breastfeeding mothers could soon have their own emoji Someone is reading out the entire internet to Julian Assange A U.S. fighter jet gets painted hot pink Pumpkin sushi takes the spice out of a new fall trend Hannah Hart talks about her struggle with mental health in 'Buffering' Pearl Jam and Tupac among nominees for Rock and Roll Hall of Fame Police use facial recognition much more than you realize Naked statue of Hillary Clinton ignites fury in New York Khloe Kardashian DGAF about Donald Trump calling her a 'piglet' Electric Objects is a digital frame for artwork Adele's partner literally showered her with love notes for their anniversary Highly deadly snake shows up at bar in the middle of city You can listen to two of David Bowie's stellar final songs now Caramel M&Ms are coming to make your dreams come true 'Overwatch' player's lewd comment toward interviewer costs team prize money Curt Schilling to Twitter: Just stop with the bloody finger comparisons
2.4398s , 10131.4921875 kb
Copyright © 2025 Powered by 【Watch Pinku katto: Futoku aishite fukaku aishite Online】,New Knowledge Information Network