Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

// // //

WikiLeaks Strikes Again

WikiLeaks has release thousands of pages allegedly from CIA's Center for Cyber Intelligence. Just how bad is it?

WikiLeaks has done it again.

The cybersecurity world and much of the world that orbits around cybersecurity is working overtime to understand just how worried everyone should be about the news that the CIA developed advanced tools for hacking into mobile devices and messaging apps -- and now information on those tools, and the tools themselves, are in the wild.

So what has changed in the last 24 hours? The world is now aware of 7,818 web pages with 943 attachments from the CIA Center for Cyber Intelligence. And we're told that there is more, totaling "…several hundred million lines of code…", according to WikiLeaks, that may ultimately be revealed. The word "may" is important, because WikiLeaks has decided, for now, to redact many names of both CIA assets and targets, and to withhold the actual code until, "…a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published."

In a March 7 press release announcing the public disclosure, WikiLeaks wrote, "By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other 'weaponized' malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook."

It's not news to note that the US government has developed a substantial code base of applications to use for spying through and disabling computer systems. In August of 2016, The Shadow Brokers, a hacker or group of hackers, auctioned software that it claimed had originated in a state-sponsored hacking group affiliated with the NSA. At that time, WikiLeaks claimed that it also had clean copies of the software that it would release, though no release has yet occurred.

What's new?
The information that has gotten the most attention regards "zero day" exploits that allow access to services like WhatsApp and Telegram before the encryption stage. That means users who assume that encryption is protecting their communication would instead be allowing "in the clear" access to their conversations.

Next up is the extent to which the tools seem to concentrate on devices in addition to computers. iOS, in particular, is the target of many documents, though Android is not ignored. In addition, non-computing devices like Samsung smart TVs are targeted so that the in-set camera and microphone can be used, even when the set is turned off, to spy on those in the room with the set.

What's the problem?
At first glance, there seems to be little truly earth-shaking in the WikiLeaks data dump. Few people would be surprised that the CIA was involved in writing applications to spy on computers and smartphones, that the agency was collecting exploits and malware developed by other groups, or that all of the above applications were in use. No, the surprise is that the collection of software is now available outside the agency in what could be the greatest "one stop shop" ever made available to hackers.

In past centuries, when an army retreated or abandoned an area, any guns left behind would be "spiked" so that they could not be turned around and used on their original owners. The kind of tools described by the WikiLeaks documents can't be spiked: Once in the hands of a hacker, they can be used against any target. And while WikiLeaks may be, for the moment, showing discretion in holding back the code itself, many CISOs will not assume that everyone coming into contact with the code will demonstrate the same restraint.

The CIA has not commented on the contents of the WikiLeaks documents, so there is no official word on their authenticity. While this writer has gone through some of the material, we cannot independently vouch for their authenticity. What can be confidently stated, though, is that the release of documents such as these are strong reminders that basic security measures, from keeping systems properly updated and patched, to slapping a sticky note over the webcam's lens, should not be ignored in the ongoing and escalating war against private enterprise data.

— Curtis Franklin, Security Editor, Light Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-34491
PUBLISHED: 2022-06-25
In the RSS extension for MediaWiki through 1.38.1, when the $wgRSSAllowLinkTag config variable was set to true, and a new RSS feed was created with certain XSS payloads within its description tags and added to the $wgRSSUrlWhitelist config variable, stored XSS could occur via MediaWiki's template sy...
CVE-2022-29931
PUBLISHED: 2022-06-25
Raytion 7.2.0 allows reflected Cross-site Scripting (XSS).
CVE-2022-31017
PUBLISHED: 2022-06-25
Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the serve...
CVE-2022-31016
PUBLISHED: 2022-06-25
Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated A...
CVE-2022-24893
PUBLISHED: 2022-06-25
ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can resul...