WASHINGTON – WikiLeaks on Tuesday published thousands of documents purportedly taken from the Central Intelligence Agency’s Center for Cyber Intelligence, a dramatic release that appears to expose intimate details of America’s cyberespionage toolkit.
It was not immediately clear how WikiLeaks obtained the information, which included more than 8,700 documents and files. The CIA tools, if authentic, could undermine the confidence that consumers have in the safety and security of their computers, mobile devices and even smart TVs.
WikiLeaks said the material came from “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.” It didn’t say how the files were removed, such as possibly by a rogue employee, by hacking a federal contractor working for the CIA or breaking into a staging server where such hacking tools might be temporarily stored.
RELEASE: Vault 7 Part 1 “Year Zero”: Inside the CIA’s global hacking force https://t.co/h5wzfrReyy pic.twitter.com/N2lxyHH9jp
— WikiLeaks (@wikileaks) March 7, 2017
The more than 8,000 documents cover a host of technical topics, including what appears to be a discussion about how to compromise smart televisions and turn them into improvised surveillance devices. WikiLeaks said the data also include details on the agency’s efforts to subvert American software products and smartphones, including Apple’s iPhone, Google’s Android and Microsoft Windows.
The information dump could not immediately be authenticated by reporters, and the CIA declined comment, but WikiLeaks has a long track record of releasing top secret government documents. Experts who’ve started to sift through the material said that it appeared legitimate and that the release was almost certain to shake the CIA.
Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authenticity or content of purported intelligence documents.”
WikiLeaks said the archive “appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
If the authenticity of the documents is officially confirmed, it would represent yet another catastrophic breach for the U.S. intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including hundreds of thousands of documents from the State Department and the Pentagon.
WikiLeaks, which has been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had “recently” lost control of a massive arsenal of CIA hacking tools as well as associated documentation.
“There’s no question that there’s a fire drill going on right now,” said Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec. “It wouldn’t surprise me that there are people changing careers — and ending careers — as we speak.”
One of the purported CIA malware programs is described in the WikiLeaks documents as a “simple DLL hijacking attempt” that had been tested against Microsoft Windows XP, Vista and 7 operating systems. The technique, which the document called a “Windows FAX DLL injection,” introduces computer code that allows an attacker to gain access to a computer process’ memory and permissions while at the same time masking the attack.
Williams, who has experience dealing with government hackers, said the voluminous files’ extensive references to operation security meant they were almost certainly government-backed. “I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.”
“The only people who are having that conversation are people who are engaging in nation-state-level hacking,” he said.
WikiLeaks said its data also included a “substantial library” of digital espionage techniques borrowed from other countries, including Russia.
Bob Ayers, a retired U.S. intelligence official currently working as a security analyst, noted that WikiLeaks has promised to release more CIA documents.
“The damage right now is relatively high level,” he said. “The potential for really detailed damage will come in the following releases.”
RAPHAEL SATTER
JACK GILLUM