WikiLeaks Releases "Nightskies1.2": Proof That CIA Has Been Bugging "Factory Fresh" iPhones
New findings from Wikileaks’ Vault 7, titled “Dark Matter” claims the CIA has been bugging “factory fresh” iPhones since 2008 through suppliers.
These documents are to be released after a 10 a.m. press briefing. On Twitter, Julian Assange posted a live stream of the briefing:
Here’s WikiLeaks full press release:
“Today, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for many CIA projects that infect Apple Mac Computer firmware (meaning the infection continues even when the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain all techniques utilized by the CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Furthermore, these documents reveal the “Sonic Screwdriver” project which, explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored in modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Included in this release, is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. NightSkies had reached 1.2 by 2008, and is designed to be physically installed into factory fresh iPhones. The CIA has been infecting the iPhone supply chain since 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target, it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.”
If you enjoyed this article or learned something new, please don't forget to share it with others so they have a chance to enjoy this free information. We believe all information should be free and available to everyone. Have a good day and we hope to see you soon!
WikiLeaks Releases "Nightskies1.2": Proof That CIA Has Been Bugging "Factory Fresh" iPhones Reviewed by Jamm Real on 00:47:00 Rating: