Wikileaks Post Methods on Hacking iPhones and MacBooks

A leak on Wikileaks, part of the “Vault 7” segment has recently became famous for tricks used by the Central Intelligence Agency to hack Apple devices. Those were targeted at Apple MacOS and iOS mobile devices.

And not only this but the so-called “Dark Matter” leak uncovers plans of exploiting vulnerabilities in the macOS and those exploits are performed by a special branch, known as EDB – Embedded Development Branch, The Hacker News report.

The Malware Used

In the documents released in the leak, it has been uncovered that a very specific tailor-made malware for the firmware of the Apple devices was created so that the infection files remain active even if the devices are factory reset.

One of the tools reported to be used is the so-called NightSkies 1.2 which is an implant instrument also known as a loader. This tool runs on devices like MaBook air and it reportedly provides the ability to control the device partially or even fully. In addition to this, this tool is also create to leave almost no trace behind, according to the leak.
Furthermore, another hacking tool, tailor made for iPhones was reported to be active ever since the distant year 2007 and the infection by this tool has been conducted on brand new iPhones that are fresh out of the factories. The CIA were also reported in the documents to have had physical access to the phones during their shipping process to far away or to the U.S. from the supplier.

Another hacking tool released in the whistle blower document is known as the Sonic Screwdriver. This software was actually a mechanism to execute a script to infect a MacBook or a desktop Mac during the boot process.

This method has been reported in the documents to enable the access to the Firmware of the computers using an ethernet connection, physically plugged into the Mac’s Thunderbolt connector.

The tool also provides the ability to bring viruses from another device without detection. And the infection with those viruse scan happen from external devices uninterrupted, even if the Mac computer has an enabled password for it’s firmware.

And in addition to multiple IOS exploits, some of which were fixed, there is also information on hacking other devices, like Android smartphones, Samsung smart TV devices and others, which are used by the masses.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.