Surveillance / Whistleblowers

Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs “Factory Fresh” iPhones

Source: Zero Hedge

A new WikiLeaks Vault 7 leak titled “Dark Matter” claims that the Central Intelligence Agency has been bugging “factory fresh” iPhones since at least 2008 through suppliers.  The documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

RELEASE: CIA #Vault7 “Dark Matter” https://t.co/pgnfeODXVBpic.twitter.com/vkI16f3vMD

— WikiLeaks (@wikileaks) March 23, 2017

Here is a live stream of the pending press briefing with Julian Assange:

LIVE: WikiLeaks press briefing in some minutes: CIA #Vault7 “darkmatter” ask questions with #AskWL https://t.co/ldG78exSsu

— WikiLeaks (@wikileaks) March 23, 2017

And here is the full press release from WikiLeaks:

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

WikiLeaks Continues ‘Vault 7’ With New Documents Detailing Mac-Related CIA Exploits

WikiLeaks today continued its “Vault 7” series by leaking details concerning CIA-related programs that were built with the intent to infest iMac and MacBook devices. Today’s “Dark Matter” installation of Vault 7 follows a few weeks after WikiLeaks debuted “Year Zero,” which focused on exploits that the CIA created for iOS devices. In a response the same day that Year Zero came out, Apple said that many of the vulnerabilities in the leak were already patched.

Now, WikiLeaks is shedding light on Mac-related vulnerabilities and infestation programs, which the leakers claim “persists even if the operating system is re-installed.” The project in question, created and spearheaded by the CIA’s Embedded Development Branch, is called the “Sonic Screwdriver” and represents a mechanism that can deploy code from a peripheral device — a USB stick, or the “screwdriver” — while a Mac is booting up.

According to WikiLeaks, this allows an attacker “to boot its attack software” even if the Mac has a password enabled on sign-up. In the report, it’s said that the CIA’s own Sonic Screwdriver has been stored safely on a modified firmware version of an Apple Thunderbolt-to-Ethernet adapter. Besides the Doctor Who-referencing exploit, Dark Matter points towards yet another bounty of CIA programs aimed at gathering information, infesting, or somehow crippling a Mac device.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Dark Matter isn’t exclusively Mac focused, however, and includes a few new iPhone exploits in the round-up as well. One is called “NightSkies 1.2” and is described as a “beacon/loader/implant tool” for the iPhone that is designed to be physically installed on an iPhone directly within its manufacturing facility. This conspiracy-leaning exploit is said to date back to 2008 — one year after the first iPhone debuted — and suggests, according to WikiLeaks, that “the CIA has been infecting the iPhone supply chain of its targets since at least 2008.”

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

The full list of the new Dark Matter documents can be found on WikiLeaks, and we’re likely to see more Apple-related WikiLeaks as the Vault 7 series continues. As it was with Year Zero, it’ll still take some time for security analysts and experts to determine the full impact of today’s leaks.

Advertisements

One thought on “Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs “Factory Fresh” iPhones

  1. Pingback: Deus Nexus – Wikileaks Releases NightSkies 1.2 | Blue Dragon Journal

POST A COMMENT (See policy on sidebar)

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s