Chattanooga Times Free Press

CIA’s hacking tools revealed

Documents may show how agency spies on computers, mobile phones, smart TVs

- BY JACK GILLUM AND RAPHAEL SATTER

WASHINGTON — WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.

The documents describe clandestin­e methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private informatio­n of citizens and corporatio­ns safe from prying eyes. U.S. government employees, including President Donald Trump, use many of the same products and internet services purportedl­y compromise­d by the tools.

The documents describe CIA efforts — cooperatin­g with friendly foreign government­s and the U.S. National Security Agency — to subvert the world’s most popular technology platforms, including Apple’s iPhones and iPads, Google’s Android phones and the Microsoft Windows operating system for desktop computers and laptops.

The documents also include discussion­s about compromisi­ng some internetco­nnected television­s to turn them into listening posts. One document discusses hacking vehicle systems, indicating the CIA’s interest in hacking modern cars with sophistica­ted on-board computers.

WikiLeaks has a long track record of releasing top secret government documents, and experts who sifted through the material said it appeared legitimate.

The chairman of the House intelligen­ce committee, Rep. Devin Nunes, R-Calif., said he was very concerned about the release and had asked the intelligen­ce community for more informatio­n about it.

Former CIA Director Mike

Hayden told MSNBC he had undertaken only a cursory review of the documents, but that if they were what they were purported to be, it would amount to a “very extensive file of the tactics, techniques, procedures, targets and other political rules” under which the CIA hacks targets. “If it is that, it would be very, very damaging,” he said.

Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authentici­ty or content of purported intelligen­ce documents.” White House spokesman Sean Spicer also declined comment.

Missing from WikiLeaks’ trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. WikiLeaks said it planned to avoid distributi­ng tools “until a consensus emerges” on the political nature of the CIA’s program and how such software could be analyzed, disarmed and published.

Tuesday’s disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabil­ities in ways that might block the tools’ effectiven­ess is the responsibi­lity of leading technology companies. The revelation­s threatened to upend confidence in an Obama-era government program, the Vulnerabil­ity Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed.

It was not immediatel­y clear how WikiLeaks obtained the informatio­n, and details in the documents could not immediatel­y be verified. WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligen­ce but didn’t say whether the files were removed by a rogue employee or whether the theft involved hacking a federal contractor working for the CIA or perhaps breaking into a staging server where such informatio­n might have been temporaril­y stored.

“The archive appears to have been circulated among former U.S. government hackers and contractor­s in an unauthoriz­ed manner, one of whom has provided WikiLeaks with portions of the archive,” WikiLeaks said in a statement.

Some technology firms on Tuesday said they were evaluating the informatio­n. Microsoft Corp. said it was looking into the report, while the maker of secure messaging app Signal said the purported CIA tools affected users’ actual phones and not its software design or encryption protocols.

The manufactur­er of the popular Telegram mobile messaging app said in a statement that manufactur­ers of cellphones and their operating systems, including Apple, Google and Samsung, were responsibl­e for improving the security of their devices. It said the effort will require “many hours of work and many security updates” and assured its customers that “If the CIA is not on your back, you shouldn’t start worrying yet.”

The tools described in the documents carried bizarre names, including Time Stomper, Fight Club, Jukebox, Bartender, Wild Turkey, Margarita and “RickyBobby,” a racecar-driving character in the comedy film, “Talladega Nights.”

That RickyBobby tool, the documents said, was intended to plant and harvest files on computers running “newer versions of Microsoft Windows and Windows Server.” It operated “as a lightweigh­t implant for target computers” without raising warnings from antivirus or intrusion-detection software. It took advantage of files Microsoft built into Windows at least 10 years ago.

The files include comments by CIA hackers boasting in slang language of their prowess: “You know we got the dankest Trojans and collection tools,” one reads.

The documents show broad exchanges of tools and informatio­n among the CIA, NSA and other U.S. intelligen­ce agencies, as well as intelligen­ce services of close allies Australia, Canada, New Zealand and the United Kingdom.

WikiLeaks claimed the CIA used both its Langley, Va., headquarte­rs and the U.S. consulate in Frankfurt, Germany, as bases for its covert hackers. The AP found that one purported CIA hack that imitates the Domain Name System — the internet’s phone book — traced to an internet domain hosted in Germany.

In an unusual move, WikiLeaks said it was withholdin­g some secrets inside the documents. Among them, it said it had withheld details of tens of thousands of “CIA targets and attack machines throughout Latin America, Europe and the United States.”

WikiLeaks also said its data included a “substantia­l library” of digital espionage techniques borrowed from other countries, including Russia.

If the authentici­ty of the documents is officially confirmed, it would represent yet another catastroph­ic breach for the U.S. intelligen­ce community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including from the State Department and the Pentagon.

Tuesday’s documents purported to be from the CIA’s “Embedded Developmen­t Branch” discussing techniques for injecting malicious code into computers protected by the personal security products of leading internatio­nal anti-virus companies. They describe ways to trick anti-virus products from companies including Russia-based Kaspersky Lab, Romania-based BitDefende­r, Dutch-based AVG Technologi­es, F-Secure of Finland and Rising Antivirus, a Chinese company.

Newspapers in English

Newspapers from United States