Latest WikiLeak Dump Shows CIA Hacking iPhones Since 2008

Physical hacking techniques, such as intercepting phone shipments, was something that had been previously hinted at in documents released by National Security Agency whistleblower Edward Snowden. (Photo: Toshiyuki IMAI/cc/flickr)

Latest WikiLeak Dump Shows CIA Hacking iPhones Since 2008

Outlet says it is likely that CIA "infected" Apple's supply chain, including by "interdicting mail orders"

On the tails of its damning CIA hacking bombshell, WikiLeaks on Thursday published another trove of documents outlining how the spy agency has been uploading secret software to Apple devices dating back to 2008.

Named 'Dark Matter,' the latest release shows that that CIA has been infecting iPhones since shortly after the product's launch in June 2007, and in some cases "interdicted mail orders and other shipments" to open, infect, and resend devices leaving the United States.

In its press statement, WikiLeaks said it was "noteworthy" that the NightSkies program, said to be a "beacon/loader/implant tool" for the Apple iPhone, "had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. I.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008."

TechCrunchobserves: "It was quite powerful as NightSkies could access your address book, SMS conversations and call logs in order to upload it to the CIA's servers. The agency could also execute commands on the iPhone remotely to install new tools and more."

"While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise," WikiLeaks noted.

This technique was something that had been previously hinted at in documents released by National Security Agency whistleblower Edward Snowden.

Among other capabilities, according to the outlet, the second batch of Vault 7 documents reveal the so-called "Sonic Screwdriver" project which, "as explained by the CIA, is a 'mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting' allowing an attacker to boot its attack software for example from a USB stick 'even when a firmware password is enabled.'"

Pedro Vilaca, a security researcher who specializes in Apple computers, told Vice Motherboard that it appears that the CIA agents were "very early adopters" of this kind of hacking technology.

The document dump showcases many of the CIA's older hacking techniques but, TechCrunch points out that it remains "unclear if some of them still work today."

Join Us: News for people demanding a better world


Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place.

We're hundreds of thousands strong, but every single supporter makes the difference.

Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. Join with us today!

Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.