WikiLeaks has leaked CIA’s complete collection of hacking tools and malware. These tools have been devised to target Windows, Linux, and macOS computer, iOS and Android smartphones, and many other electronic devices. This dump is available for download via a torrent file.
W
ikiLeaks has published a collection of United States Central Intelligence Agency’s (CIA) collection of hacking tools. This collection, code-named “Vault 7”, is WikiLeaks’ largest ever publication of confidential documents.These alleged tools are collections of malware for targeting computers and routers based on Windows, Android, iOS, Linux, and macOS. WikiLeaks has released 8,761 documents and files, and titled it Year Zero.
WikiLeaks’ #Vault7 reveals gaping holes in all popular operating systems + anti-viruses programs https://t.co/K7wFTdlC82 pic.twitter.com/QHs8JYF0FR
— WikiLeaks (@wikileaks) March 7, 2017
CIA has an entire unit dedicated to hacking data from Apple devices, according to WikiLeaks. It also claims that CIA has built a collection of 24 Android Zero Days.
WikiLeaks says that the documents and files were obtained from an “isolated and high-security network” at CIA’s Center for Cyber Intelligence in Langley.
What makes this look real?
Program & office names, such as the JQJ (IOC) crypt series, are real. Only a cleared insider could know them.— Edward Snowden (@Snowden) March 7, 2017
If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. pic.twitter.com/kYi0NC2mOp
— Edward Snowden (@Snowden) March 7, 2017
WikiLeaks’ press release says that it has the majority of CIA’s hacking arsenal, which includes “malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation.”
Interestingly, some of these remote hacking tools have the power to convert electronic devices, including Samsung TVs, into spying agents.
The complete WikiLeaks is available via a torrent file. It’s a password protect archive that can be unlocked using the password SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds.
You can know about this leak in detail, read this post by WikiLeaks.
WikiLeaks' #Vault7 reveals gaping holes in all popular operating systems + anti-viruses programs https://t.co/K7wFTdlC82 pic.twitter.com/QHs8JYF0FR
— WikiLeaks (@wikileaks) March 7, 2017
https://twitter.com/pepe_wise/status/839132746903617536