Past cyberattacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security researcher Symantec Corp. said.
That means the attacks were likely conducted by the US Central Intelligence Agency (CIA). The files posted by WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and other electronic gear, along with programming code for some of them, and multiple people familiar with the matter have told Reuters that the documents came from the CIA or its contractors.
Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA.
The CIA has not confirmed the Wikileaks documents are genuine.
But agency spokeswoman Heather Fritz Horniak said that any WikiLeaks disclosures aimed at damaging the intelligence community “not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm.”
Horniak said: “It is important to note that CIA is legally prohibited from conducting electronic surveillance targeting individuals here at home, including our fellow Americans, and CIA does not do so.”
She declined to comment on the specifics of Symantec’s research.
The CIA tools described by Wikileaks do not involve mass surveillance, and all of the targets were government entities or had legitimate national security value for other reasons, Symantec researcher Eric Chien said ahead of Monday’s publication.
In part because some of the targets are US allies in Europe, “there are organizations in there that people would be surprised were targets,” Chien said.
Symantec said sectors targeted by operations employing the tools included financial, telecommunications, energy, aerospace, information technology, education, and natural resources.
Besides Europe, countries were hit in the Middle East, Asia, and Africa.
One computer was infected in the US in what was likely an accident — the infection was removed within hours. All the programs were used to open back doors, collect and remove copies of files, rather than to destroy anything.
The eavesdropping tools were created at least as far back as 2011 and possibly as long ago as 2007, Chien said. He said the WikiLeaks documents are so complete that they likely encompass the CIA’s entire hacking toolkit, including many taking advantage of previously unknown flaws.
The CIA is best-known for its human intelligence sources and analysis, not vast electronic operations. For that reason, being forced to build new tools is a setback but not a catastrophe.
It could lead to awkward conversations, however, as more allies realize the Americans were spying and confront them.
Separately, a group calling itself the Shadow Brokers on Saturday released another batch of pilfered National Security Agency hacking tools, along with a blog post criticizing President Donald Trump for attacking Syria and moving away from his conservative political base.
Source: Arab News
GMT 10:39 2018 Tuesday ,09 January
Pay Dh50 and make internet calls on EtisalatGMT 22:01 2017 Tuesday ,31 October
Internet giants find more Russia-linked election meddlingGMT 21:31 2017 Tuesday ,31 October
Google ditched autopilot driving feature after test user napped behind wheelGMT 21:17 2017 Tuesday ,31 October
Tech firms must do more on extremism: World Economic ForumGMT 21:07 2017 Tuesday ,31 October
Swiping your way toward peace of mind: The most helpful breast cancer appsGMT 21:30 2017 Sunday ,29 October
VPN law latest step in Kremlin online crackdown, experts sayGMT 16:03 2017 Sunday ,22 October
'Good morning' Facebook post leads to arrest of PalestinianGMT 15:03 2017 Thursday ,12 October
Facebook pushes ad overhaul before 2018 US electionMaintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2023 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2023 ©