Breaking News

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage ASUS Republic of Gamers Announces ROG NUC 16 Silicon Power Launches CreatePro Series Newtro Cooling Series and Next-Gen LCD Coolers at Computex 2026 Sony Announces the Launch of Xperia 1 VIII

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

CIA Used Sophisticated Hack Techniques To Apple Devices: WikiLeaks

CIA Used Sophisticated Hack Techniques To Apple Devices: WikiLeaks

Enterprise & IT Mar 23,2017 0

New documents from WikiLeaks point to a CIA program to hack Apple's iPhones and Mac computers using techniques that users couldn't disable, even by resetting their devices.

The latest disclosures describe techniques for rewriting devices' firmware in ways that would maintain a hacker's access even if a user resets a phone or computer to factory settings. Doing so wipes out all apps and the operating system and installs a clean version; it is an extreme measure sometimes used to deal with technical problems, but is also the sort of step that someone suspicious of surveillance might take when getting a brand new phone.

A December 2008 document describes "NightSkies," a tool apparently designed to target the iPhone 3G; the document claims it can retrieve files such as contact lists and call logs and execute other commands. WikiLeaks suggested that the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

However, the document describes only how to install the malware on a "factory fresh" version of the 3G - specifically, the iPhone 3G running the 2.1 version of Apple's operating system.

Other documents released describe similar exploits for Mac computers. One hides in the firmware of Apple's Thunderbolt-to-Ethernet adapter and requires someone to plug in that adapter to install the malware. Another targets a specific Mac model, the MacBook Air with the Leopard version of the Mac OS system - current at the time, but now seven generations old.

Obviously, the exploits pose little threat to typical users, as they involve old Apple devices models and the require physical access to devices.

Apple didn't respond to a request for comment.

Two weeks ago, WikiLeaks published thousands of alleged CIA documents describing hacking tools it said the government employed to break into computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.

Tags: Hacking
Previous Post
New Alcatel A30 and Moto G5 Plus Available On Amazon
Next Post
Samsung Adds 4G LTE Capability to Gear S3 Classic

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage
Enterprise & IT

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage

ASUS Republic of Gamers Announces ROG NUC 16
Enterprise & IT

ASUS Republic of Gamers Announces ROG NUC 16

Silicon Power Launches CreatePro Series
Enterprise & IT

Silicon Power Launches CreatePro Series

Newtro Cooling Series and  Next-Gen LCD Coolers at Computex 2026
Cooling Systems

Newtro Cooling Series and Next-Gen LCD Coolers at Computex 2026

Sony Announces the Launch of Xperia 1 VIII
Smartphones

Sony Announces the Launch of Xperia 1 VIII

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Endorfy Thock V2 Wireless Keyboard

Endorfy Thock V2 Wireless Keyboard

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed