Hacks and Glitches Portal
  • Home
  • Forums
  • Request Tool
  • Terms of Use
  • Privacy Policy
  • ABOUT US
  • Contact Us
No Result
View All Result
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security
SUBSCRIBE
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security
No Result
View All Result
Hacks and Glitches Portal
No Result
View All Result

WikiLeaks Exposes How CIA is Hacking iPhones and MacBooks

kalixto by kalixto
03/23
in Android, iOS, iPhone, Leaked, Mobile, News, Security
Reading Time: 4 mins read
A A
30
Home Android
0
SHARES
551
VIEWS
Share on FacebookShare on Twitter

WikiLeaks CIA Hacks Apple

Wikileaks Exposes CIA’s Cybernetic Prowess

Two weeks ago Wikileaks published a chunk of highly confidential documents involving the US Central Intelligence Agency’s (CIA) cybernetic hacking capabilities. Primary investigations and press reports claim that the leak displays the CIA’s entire cybernetic ability to hack smartphones and popular social media messaging apps.

Nicknamed Vault 7, this trove of top-secret documents began to be released publicly on March 07, 2017. The first set of documents, called ‘Zero Day’ which consists of 7,818 web pages with 943 attachments reportedly from the Centre of Cyber Intelligence. The “zero-day” refers to a hole in the software that is unknown to the vendor and is exploited by hackers before it comes to the attention of the vendor and he tries to fix it. This is termed as ‘zero-day’ attack or the ‘zero day’ vulnerability.

The Vault 7

The ‘zero day’ archive of Vault 7 delved with the attack vectors which were developed by the Embedded Development Branch (EDB) of the CIA that can infect an Apple firmware despite re-installing the operating system of MacOS or iOS and also that of the Android OS.

The follow-up to the March 7th, 2017 leak another was made on the 21st. This set calling itself ‘Dark Matter’.  The ‘Dark Matter’ revealed the methods that the CIA was using in order to gain access to all of the devices produced by Apple. The electronic tools mentioned in the report can compromise both Apple‘s iOS and Google’s Android operating systems.

The leak showcased that the CIA had Apple on its target since 2008. The “Dark Matter” archive included documents from 2009 and 2013. On the release of the ‘Zero Day’ documents Apple claimed, “many of the issues leaked today were already patched in the latest iOS,” and that they “will continue work to rapidly address any identified vulnerabilities.”

Following the release of ‘Dark Matter, another statement was released by Apple claiming the vulnerabilities of the iPhone that affected the iPhone 3G were patched in the iPhone 3GS and that Mac OS was fixed on all the computers produced by apple from and after 2013.

In the first part of ‘Vault 7’, in the iOS documents: the security details are codenamed such as the Elderpiggy, Juggernaut, and Winterspy. Under those details are provided things like the technique or method employed to exploit a vulnerability (e.g. API); the modification date; the version of the flawed operating systems; the description of the measure; and origin or where it was made (GCHQ, the NSA, etc.).

For Android, the details provide the name (the delivered name and the proof-of-concept name), affected devices, the contract or partner through which it was bought, the kind of access provides (remote access, access to private documents of the user).

The Dark Matter

The ‘Dark Matter’ set of documents made a revelation about a hacking strategy called the ‘Sonic Screwdriver’ which were dated November 2012. The documents explain the Sonic Screwdriver as a hacking tool which is a mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting that means that the attacker can cast the malware into a Mac device through flash drives or other such pluggable options.

WikiLeaks reveals how the Sonic Screwdriver is put into the firmware of the Thunderbolt-to-Ethernet adapter. Once the adapter is plugged into a Mac computer, the code that is embedded into the firmware will scan the memory storage for a file called ‘Filter’. Then when it finds its target, it will launch the ‘Sonic Screwdriver’ code and provide the CIA with the ability to remotely control the machine. This strategy will be used not only to access to whatever there is on the computer but also to keep track of the people and places the user is communicating with.

Besides iPhones and Mac computers, CIA also targeted Samsungs F800 range of Smart TVs. The exploit used to hack into smart TVs, called the ‘Weeping Angel’ could turn the TV into a secret speaker for listening conversation when the TV is switched off but is actually in a ‘fake off’ mode. The documents also state a work in progress to further boost its capabilities to the extent of recording videos and accessing the Wifi.

Besides Electronic giants, several messaging services using end-to-end encryption, like – WhatsApp, Weibo, Telegram, Signal, etc., were also jeopardized.

While the tech giants Samsung and Apple have embarked on their struggle to enhance the security of their products the big question remains, How much of these documents are real?
While obviously the CIA has neither refused nor assented to the authenticity of the documents, which is quite a popular approach taken by several law and security agencies, infamous whistleblower, Edward Snowden, tweeted that office names like JQJ (IOC crypt series) are real and something that is only knowledgeable to the insider.

ShareTweetPin
Previous Post

List of Best Porn Apps for Android That are Not in PlayStore (NSFW)

Next Post

Hacker Group Threatens to Wipe Out Millions of iPhones if Apple Does not Pay Ransom

Related Posts

how to hack an android phone

Can Android Phone be Hacked? Check This List of Vulnerabilities!

12/15
Take Advantage of Snapchat's 'For Your Eyes Only'

Take Advantage of Snapchat’s ‘For Your Eyes Only’ Feature to Safeguard Your Photos

07/31
Instagram Location tracker 02

TUTORIAL: How I Tracked Someone’s Location using Instagram

03/19
Bitcoin downtrend

Cryptocurrency is trending downwards. Is this a good time to buy in?

06/26
Next Post
ransomeware threathens iphone

Hacker Group Threatens to Wipe Out Millions of iPhones if Apple Does not Pay Ransom

Comments 30

  1. PetPalaceOwner says:
    2 years ago

    The method has completely changed the way I do things, thank you.

    Reply
    • SunfireSoul says:
      2 years ago

      I’m so grateful for your method, it’s truly amazing.

      Reply
      • MoonDance007 says:
        2 years ago

        The method is seriously helping me out, thank you.

        Reply
        • ShadowDancer93 says:
          1 year ago

          I’m so thankful for this life-changing method, thank you for posting it.

          Reply
          • QuillAndParchment says:
            1 year ago

            The method has completely shifted my perspective, thank you.

          • NebulaNavigator says:
            1 year ago

            This method is seriously impressive, thank you for bringing it to our attention.

          • ShadowDancer93 says:
            1 year ago

            This method is seriously life-changing, thank you for bringing it to our attention.

          • StarryWizard says:
            1 year ago

            This method has completely transformed my approach to problem-solving. Thank you for sharing your expertise!

          • BoneCrusher88 says:
            1 year ago

            This method is incredibly well thought out and easy to understand. I appreciate the time and effort you put into making it accessible to everyone.

          • StarburstWarrior says:
            1 year ago

            I’ve tried many other methods before, but this one is by far the most effective.

          • ShadowDancer93 says:
            1 year ago

            Your ideas are always so innovative and original. This method is no exception. Bravo!

          • ShadowWalker96 says:
            1 year ago

            This method is seriously life-changing, thank you for sharing it.

        • LightningStrike23 says:
          1 year ago

          This method has completely changed the game for me, thank you.

          Reply
          • IronFistCrusher says:
            1 year ago

            The method is exactly what I needed, thank you for sharing it.

        • [email protected] says:
          4 months ago

          I was able to catch my cheating husband red handed with a lady he has been having a love affair with and this was made possible by Fred hacker that I met through a comment posted by Kimberly Jane on Reddit about his good and professional services. I started getting suspicious of my husband since he became too possessive of his phone which wasn’t the way he did prior before now. He used to be very carefree when it comes to his phone. but now he’s become obsessed and overtly possessive. I knew something was wrong somewhere which was why i did my search for a professional hacker online and contacted the hacker for help so he could penetrate his phone remotely and grant me access to his phones operating system, he got the job done perfectly without my husband knowing about it although it came quite expensive more than i thought of.i was marveled at the atrocities my husband has been committing. Apparently he is a chronic cheat and never really ended things with his ex.. contact him here. [email protected] and you can text,call and WhatSapp him on +15177981808 or +19782951763

          Reply
      • EarthQuakeKing says:
        1 year ago

        I’m so grateful to have found this method, thank you for posting it.

        Reply
    • DigitalWizard says:
      2 years ago

      The method has exceeded all of my expectations, thank you.

      Reply
    • CyberGod17 says:
      1 year ago

      The method has completely changed the way I approach things, thank you.

      Reply
  2. ShadowDancer93 says:
    2 years ago

    This method has completely changed the game for me, thank you.

    Reply
  3. SpectralRider says:
    1 year ago

    This method has completely changed the game for me, thank you.

    Reply
  4. ScribeKing777 says:
    1 year ago

    This method really works! Thanks for making it so easy to understand and apply.

    Reply
  5. SolarKnight33 says:
    12 months ago

    Absolutely fantastic! I’ve already seen great results from implementing your method.

    Reply
  6. QuillAndParchment says:
    11 months ago

    Your attention to detail is evident in the effectiveness of this method. Well done!

    Reply
  7. MaulSorcerer says:
    10 months ago

    Your method has helped me overcome challenges that I previously thought were insurmountable. Thank you for your incredible work!

    Reply
  8. LightningStrike23 says:
    10 months ago

    The method is simply awesome, thank you for posting it.

    Reply
  9. CyberGod17 says:
    10 months ago

    The method has made things so much easier for me, thank you.

    Reply
  10. SorceryMaster99 says:
    10 months ago

    This method really works! Thanks for making it so easy to understand and apply.

    Reply
  11. HackAttack24 says:
    9 months ago

    This method is seriously life-changing, thank you for bringing it to our attention.

    Reply
  12. [email protected] says:
    4 months ago

    when it comes to hacking. He will picture the best for you who actually needs his help, be careful of whom you contact to help you, he is a special hacker which has his own ways of hacking that nobody has ever imagined in thishacking world with his spare idea he can hack anything. He is totally secured and your security comes first.Hacking a website is a job for pros like MR FRED1-Change school grade. Bank jobs, flipping cash, hacking and controlling any robot.2-Database hack. Remove criminal records. Facebook hack. 3-gmail hack 4-whatsapp hack 5-website hack 6-tracking calls 7-online hacking lectures 9-Cloning of phones10-online records changes11-Twitter hack12 calls log And lots more. Contact [email protected] and you can text,call and whatsapp him on +15177981808 or +19782951763

    Reply
  13. [email protected] says:
    1 month ago

    My husband has been frequently deleting all messages for the last couple of days from his phone and he didn’t know i was peeping at him, then i asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who can get me deleted information and contents from my husband’s phone and luckily for me i came across this reputable ethical hacker Mr Fred, this hacker got the job done for me and provided me with results and i saw that my husband has been lying to me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret lover so i wont get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I must say am really impressed with the services i got from The hacker Detective and am here to say a very big thank you: contact him on [email protected] and you can text,call him on +15177981808 or +19782951763

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Home
  • Forums
  • Request Tool
  • Terms of Use
  • Privacy Policy
  • ABOUT US
  • Contact Us
Email Us at [email protected]

© 2021 Hackolo.com - Hacks and Glitches Portal HACKOLO.

No Result
View All Result
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security

© 2021 Hackolo.com - Hacks and Glitches Portal HACKOLO.

en_USEnglish
fr_FRFrançais es_ESEspañol de_DEDeutsch nl_NLNederlands ro_RORomână en_USEnglish