The Landlady’s Loose LegsCIA has put quite a bit effort into figuring out ways to hack Apple devices.That's the takeaway from the latest batch of documents dumped by WikiLeaks.
The so-called "Dark Matter"documents, published Thursday, detail methods allegedly used by the CIA to infect MacBooks and some older iPhones with malware that allowed the agency to remotely spy on device owners.
SEE ALSO: Wikileaks' CIA dump contained WAY more bad memes than you would thinkAs usual, WikiLeaks released a fairly alarming-sounding statement accompanying the documents. But before you freak out about the security of your own Apple products, it's important to understand exactly what they say.
It's important to note that, much like the earlier Vault 7 dump that detailed exploits used to "bypass" encryption used by chat apps like WhatsApp and Signal, the new methods described in the latest documents also require physical access to the device.
The documents make completely clear the fact that CIA operatives would need physical access to a device before they can carry out any of the exploits described.
First, the good news. The only iPhone specifically named in the documents is one that is pretty much completely dead: the iPhone 3G (running iOS 2.1, no less). Apple also confirmed Thursday the only iPhone affected was the 3G and that the vulnerability was fixed as of the release of the iPhone 3GS.
Still, the exploit detailed in a document called NightSkies, dated to 2008, involved "a beacon/loader/implant tool" that "operates in the background providing upload, download and execution capability on the device."
The setup process was somewhat complex (again, it required physical access to the phone), but once there, it could have been used to access an astonishingly vast amount of data from a "target's" iPhone.
The document contains instructions for downloading call logs, text messages, contacts lists, mail and maps files, browser history, YouTube video cache (YouTube was one of the only third-party apps to come pre-installed on early iPhones), voicemails, calendar data, photos and even "user-specific" keyboard data. In other words: very nearly everything you could possibly hope to get off an iPhone using the app's that came pre-installed at the time.
It all started with a dongle. Seriously.
A project called Sonic Screwdriver (yes, we already know the CIA is full of Doctor Whofans) detailed how a thunderbolt-to-ethernet adapter could be modified with a bit of malicious code designed to infect a laptop's firmware.
By infecting the firmware, this allowed the code to "persist" in the device even if the hard drive was wiped or the operating system is completely re-installed. As Motherboard'sLorenzo Franceschi-Bicchierai points out, it was actually a fairly clever move by the CIA as a similar method was later uncovered by security researchers two years later in 2014.
According to the documents, the CIA tested this method with MacBook Pros and MacBook Airs from late 2011 to mid 2012. (In a statement, Apple said this particular exploit had been fixed in every MacBook made after 2013.)
But, again, before you go chucking your own ethernet adapter in the garbage, remember that this only worked with adapters that had been specially modified with the malicious code to begin with.
Topics Apple iPhone
Previous:No Left Turns
Next:Fighting Words
Trollope’s “Doctor Thorne” Adapted By “Downton” CreatorWatch: Nabokov Shows Off His Many Editions of “Lolita”Watch: Nabokov Shows Off His Many Editions of “Lolita”My Exes’ Exes: A Note of RegretGoya’s Funny, Disquieting Drawings of Witches and CronesNew Stories Found from Twain’s Days as a NewspapermanWhen Eudora Welty Went Sailing with FaulknerToo Many Books! We‘re in an Era of OverproductionGoya’s Funny, Disquieting Drawings of Witches and CronesRemembering St. Nicholas Magazine for ChildrenNineteenthCan You Spot the Fake Books at Shakespeare and Company?On Canceling Plans You’ve Forgot You MadePeter Saul’s “Pictures with Problems”On Canceling Plans You’ve Forgot You Made“Mating” Book Club, Part 5: The Joys of Intellectual LoveWorld Dream in Six WordsListen: An Archival Interview with Gail GodwinHemingway, Fitzgerald, and the Sexual Anxiety of the Lost GenerationHans Op de Beeck, Night Time Watching these kittens grow up on Twitter was the highlight of summer internet Mr. Bubz is about to become your new favorite pet on Instagram Twitter admits it's been overstating number of users since 2019 How to unlink Facebook and Instagram Bored Ape Yacht Club caused Ethereum fees to soar to astronomical levels Barack Obama, George W. Bush, and others pay tribute to John McCain André 3000 had the loveliest moment with a fan wearing a T Hilarious meme reveals the 'real' names of your favorite celebrities Elon Musk's Twitter could make liberal activists miserable. Here's why. Talking Nintendo, 'Elden Ring'(?!), and the future of video games with Reggie Fils 9 of the best Ikea hacks to help transform your home Lesbian couple paints house rainbow to troll homophobic neighbors Bored Apes Yacht Club's Instagram hacked, resulting in theft of millions of dollars of NFTs 13 photos of the Trump boys that prove they're just like daddy Twitter roasts a poster of an 'edgy' Ted Cruz GoFundMe aims to put Trump's anti Wordle today: Here's the answer, hints for #314 on April 29 PSA: Don't play 'Nintendo Switch Sports' without your Joy Apple is removing apps from the App Store if they haven't been updated in a while Wordle today: Here's the answer, hints for April 26
1.9872s , 10131.2890625 kb
Copyright © 2025 Powered by 【Landlady’s Loose Legs】,Co-creation Information Network