Only one of the tools targets the phone, a so-called “beacon” tool designed to be installed on an intercepted phone before purchase. The agency seems to have had a harder time with the early versions of the iPhone. Other implants install themselves in the computer’s firmware interface, making them undetectable through conventional forensic techniques. One tool, called “Sonic Screwdriver,” was used to infect MacBooks through a USB or Thunderbolt port, presumably deployed when the CIA has physical access to a device. Most of the documents are more than seven years old, putting them significantly out of sync with the company’s current products, but they show a persistent effort to find and exploit weaknesses in Apple products. Today’s documents focus specifically on Apple products, detailing the CIA’s methods for breaking into MacBooks and iPhones. Today, the group published a new set of documents dubbed “Dark Matter,” part of the ongoing Vault 7 publication on CIA hacking tools. For years, the CIA has been developing tools for hacking into Apple products - and thanks to WikiLeaks, those tools are now public.
0 Comments
Leave a Reply. |