Wikileaks has released a huge collection of documents that reportedly reveal CIA hacking secrets.
The documents revealed by Wikileaks in its dump total 7,818 web pages and include 943 attachments. Several private security experts claim that the leak appears legitimate. They point to terms used in current cyber programs as evidence of this.
The Wikileaks dumps claims that the CIA has the ability to hack mobile devices from both Apple Inc. (NASDAQ:AAPL) and Alphabet Inc’s (NASDAQ:GOOG,GOOGL) Google. This includes the ability to obtain messages and audio before they are sent through encryption apps.
Another major claim from the Wikileaks dump has to do with how the CIA covers its tracks. The data in the leaks says that the CIA has the ability to mask its hacking attempts as having come from other countries. This includes Russia, China and Iran. However, the information doesn’t detail exactly how the CIA accomplishes this, or its other hacks, reports Reuters.
The CIA is reportedly already planning to start its search for the source of the Wikileaks dump, but it is refusing to comment on the matter. It will reportedly have to search through a database of 5,000 Center for Cyber Intelligence users that may have had access to the information in the leak.
The CIA will likely look into who accessed the more secure information first in its search. From here, the organization will probably look for when the files were last changed. This will help it create a list of users that may have been behind the leak. After this, the agency will likely start behavioral profiling to track down the individual, Fox News notes.