Central Intelligence Agency lost control of most of their hacking tools, which were being used by them to spy on their targets, while utilizing the smart devices, in the greater interest of USA.
A recent press release of Wikileaks on Tuesday educates us that CIA has been spying on us by infiltrating smartphones (iPhone, Android and Windows phones), tablets and even smart TVs by using malware tools as part of a covert hacking program. CIA used these tools to extract data and turn the devices into covert microphones.
Supposedly, 8,761 documents and files are taken from a high-security network at the CIA’s Center for Cyber Intelligence (CCI), detailing a catalog of Malware, Viruses, Trojans and more, created to spy on targets.
In the later half of 2016, CIA initiated its Hacking Division comprising more than 50,000 “registered users” to produce various tools and malware in order to infiltrate target devices to support its covert operations world-wide.”
Not only the CIA, United Kingdom’s MI5 also putted efforts and created some hacks. Its operation was to put Samsung smart TVs into a “Fake-Off” mode, giving the owner a gesture of TV as in standby mode, where as its microphone was recording voices and sending them to CIA over the internet.
To also utilize the iOS devices in their interests, CIA bypassed the encryption used by apps like WhatsApp and Telegram to collect audio and text message data. In addition, the devices were infected via tools capable of making the devices a discreet microphone. Infected devices can send information like location data, camera recordings and audio back to the CIA without detection. Similar tools were used for Android and Windows phone devices.
Loosing of any of such tool to wrong hands may jeopardize the overall security situation of the world. And recently CIA lost control over its hacking tools.
As per Yesterdays press release:
“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation,”.
Now, we cannot ascertain that who is using these tools and what all objectives the users of these tools can have. May it be an agency of some foreign country, some banned outfit, or a teenage hacker. What so ever the case is, till the time these vulnerabilities are not addressed, we cannot trust our iOS or android devices.
Stay tuned to techecstasy.com for more.