WikiLeaks reveals how CIA hacks iPhones, MacBooks

Latest documents focus on how CIA targets Apple's popular personal electronics to spy on users


Afp March 24, 2017
An iPhone is seen on display at a kiosk at an Apple reseller store in Mumbai, India, January 12, 2017. PHOTO: REUTERS

WASHINGTON: The Central Intelligence Agency is able to permanently infect an Apple Mac computer so that even reinstalling the operating system will not erase the bug, according to documents published Thursday by WikiLeaks.

In its second release allegedly from the CIA's arsenal of hacking tools, WikiLeaks also said that it appears the US spy agency has been able since 2008 to insert it bugs onto new and unused iPhones by intervening in Apple's supply and distribution network.



The release follows the initial publication on March 9 by the anti-secrecy group of thousands of pages of instructions and code from what it called the entire CIA arsenal of hacking tools.

Google claims many exploits from WikiLeaks’ CIA documents already fixed

The documents are generally believed to be genuine although the CIA has not acknowledged this.

The publication of the documents sparked a US counterintelligence investigation into how the documents leaked out from the CIA and made their way to WikiLeaks, with some people pointing fingers at the agency's use of private subcontractors as a likely source.

The newest documents focus on how the CIA targets Apple's popular personal electronics to spy on users.

Five easy ways to stop your gadgets from spying on you

They show the CIA developed a tool in 2012 called "Sonic Screwdriver" that can hijack an Apple computer's password-protected boot process from peripheral devices like adapters and USB drives.



By doing so, they can inject a undetectable bug deep into the computer's essential firmware that will not be erased even when the computer is reformatted.

The manual for the "NightSkies" bug shows that the CIA developed it in 2008 to be implanted physically in brand new iPhones.

"While CIA assets are sometimes used to physically infect systems in the custody of a target, it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments," WikiLeaks said.

WikiLeaks to share CIA hacking tools with tech companies

The documents provide a glimpse into the workings of the CIA. One showed the agency urgently trying to adapt NightSkies to a certain Apple laptop.

The agency "has the opportunity to gift a MacBook Air to a target that will be implanted with this tool," one 2009 document said.

"The tool will be a beacon/implant that runs in the background of a MacBook Air that provides us with command and control capabilities."

COMMENTS

Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ