Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones
Zero Hedge ^ | 03/23/17 | Tyler Durden

Posted on 03/23/2017 7:34:38 AM PDT by Enlightened1

A new WikiLeaks Vault 7 leak titled “Dark Matter” claims that the Central Intelligence Agency has been bugging “factory fresh” iPhones since at least 2008 through suppliers. The documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

And here is the full press release from WikiLeaks:

Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

"DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.

Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple...

(Excerpt) Read more at zerohedge.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; News/Current Events
KEYWORDS: apple; cia; darkmatter; iphones; iphonesbugged; nightskies12; vault7; wikileaks
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last
To: Rashputin

The FBI, et al, no longer needs Apple to break into their devices....................


41 posted on 03/23/2017 12:53:51 PM PDT by Red Badger (Ending a sentence with a preposition is nothing to be afraid of........)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Red Badger
They never did, actually, because they had access out of the gate before the first ROM went into the first device.

That fact will come out as will the fact that it wasn't some rogue individual who gave them that access, it was a corporate decision made in exchange for considerations unspecified.

42 posted on 03/23/2017 1:14:48 PM PDT by Rashputin (Jesus Christ doesn't evacuate His troops, He leads them to victory !!)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Enlightened1; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
Another article on the Wikileaks Apple iPhone hacking report. Again, the report talks only about technology that is from 2008, OLD NEWS that we already knew about from the leaks that Edward Snowden released almost three years ago. There is NOTHING more modern in the #Vault 7 release that indicates more modern iPhones or iPads are vulnerable to this type of hack. However almost any device can be made susceptible to being a bug type listening device if a spy agency gets its hands on it before it is delivered and they can implant their own hardware or software in it. That is what this leak claims the CIA was doing, intercepting iPhones before delivery and implanting them with spyware. However, the latest document is from NINE YEARS AGO. — PING!


APPLE, CIA, LEAKS, and iPhones
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

43 posted on 03/23/2017 2:07:20 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void
I would expect any electronics mass produced in China has PLA mandated backdoors in addition to anything the CIA adds.

Apple controls everything about the iPhone and there are no backdoors. Some Android phones have such backdoors in them, not all.

44 posted on 03/23/2017 2:08:53 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 11 | View Replies]

To: tophat9000
So a quick translation of this is there embedding this in the bootstrap firmware...

The code that starts the computer up sets all the parameters and loads the operating system in

The opportunity to add that code to the firmware was closed by Apple last year. Now, the Firmware can no longer be updated or changed by any peripheral plugged into an ethernet, USB, or Thunderbolt port, which is what the CIA's software was designed to do. Even a SuperUser cannot update the firmware without an additional beyond SuperUser passcode to prevent just this kind of scenario and that passcode must be input manually from the keyboard.

45 posted on 03/23/2017 2:12:38 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 12 | View Replies]

To: momincombatboots
2008.. socialism weds globalism. I still have my old iPhone 4.. still works perfect, just has a small screen so I like my Note 4 big screen.

I hate to tell you this, but that is probably the last iPhone this exploit would actually work on. . .

46 posted on 03/23/2017 2:14:29 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Red Badger
I’ll give Cook a very small break. This could have been done by a factory employee completely unknown to him...............

Wikileaks and the CIA documents are very explicit about how this is done and it is NOT at the Apple assembly plant. It's being done before the target receives the device, while in shipment.

Quoting from the Wikileaks website summary:

"Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise."

There is nothing in Wikileaks about any Apple employees being involved in the compromising of the devices. US postal, FedEx, UPS, and other delivery company employees may have been compromised, but it doesn't look as if Apple employees had a hand in it.

47 posted on 03/23/2017 2:34:29 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker

They would have to break the seals on the boxes and replace them with exact copies.................


48 posted on 03/23/2017 2:37:04 PM PDT by Red Badger (Ending a sentence with a preposition is nothing to be afraid of........)
[ Post Reply | Private Reply | To 47 | View Replies]

To: glorgau
Boy, it sure is a good thing that they only use these things against non-US citizens. Otherwise I’d be really upset.

"While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise."

Get ready to be upset. See that ". . . or otherwise." According to the Wikileaks summary, the CIA intercepted the shipments of the iPhones and then remailed them. The only problem with that is the only way that could happen is for US destinations. Apple ships iPhones out of China for all worldwide destinations. Apple does not originate any iPhone shipments from the US to foreign nations. So, all of these mail orders are to US destinations. The only time an iPhone would be mailed from Apple to a customer in the US is for warranty repair.

49 posted on 03/23/2017 2:41:13 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 28 | View Replies]

To: minnesota_bound
The CIA has been bugging Swordmaker iPhones since at least 2008 : )

Nope, they've had the capability to bug certain iPhones for specific targets since 2007. Edward Snowden released documents for that. I posted those on FR in 2013. These are essentially the same exploit using the same technique. It requires physical possession or access of the iPhone at some time. It was how they were able to bug Angela Merkel's iPhone.

This is NOT by any means all iPhones nor, do I think, modern iPhones. That would require a completely different attack modality. That is nowhere to be found in these documents. Every iPhone since the iPhone 5s would require a completely different approach.

50 posted on 03/23/2017 2:45:33 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 32 | View Replies]

To: for-q-clinton
Pretty much sounds like a root kit, but worse since it’s embedded in firmware simply wiping and reloading won’t fix it.

Read for comprehension, for-q-clinton. Nowhere in these articles does it say that ALL Macs are infected. It merely says that the CIA can, with physical access to a targeted Mac, compromise it. That has ALWAYS been the case with ANY computer. Hell they found hidden spy chips in Sharyl Attkisson's Apple keyboard AND hidden Steganographic files containing classified government documents that some three letter government agency had planted in her Home iMac, as well as running a spurious fiber optic cable line into her house to spy on her, just because she was writing articles critical of Obama!

The same kind of chips were secreted inside her CBS owned Windows PC laptop, so it isn't Apple centric spying. . . That was at least two years ago.

51 posted on 03/23/2017 2:53:00 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 36 | View Replies]

To: for-q-clinton
Pretty much sounds like a root kit, but worse since it’s embedded in firmware simply wiping and reloading won’t fix it.

Re-Flashing the firmware takes less than ten minutes. Apple can push out a correct firmware for the computer and have the owner do it if necessary.

52 posted on 03/23/2017 2:54:39 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Red Badger
They would have to break the seals on the boxes and replace them with exact copies.................

Apple just packages iPhones in a very tight cellophane wrap. Easy to replicate. They may now get a bit fancier with a laser seal. . . which the CIA will replicate in a week or so.

53 posted on 03/23/2017 2:57:41 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 48 | View Replies]

To: Swordmaker

Then why didn’t they do that on a regular basis knowing it will protect their users?


54 posted on 03/23/2017 3:00:06 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 52 | View Replies]

To: for-q-clinton
Then why didn’t they do that on a regular basis knowing it will protect their users?

Why doesn't Windows or any other tech company do it. It's unnecessary to do it unless you are updating your firmware. This is NOT a huge problem for the vast majority of Mac users who the CIA and NSA couldn't care squat about. I doubt there are more than a few hundred compromised devices in the world, or they would have popped up on the radar of the anti malware labs by now.

Angela Merkel's compromised iPhone was found because it wouldn't update properly. . . As I've commented on other threads about the issues with this working on modern iPhones.

Also, Apple CLOSED this Mac Firmware vulnerability sometime last year before this ever came out and made it impossible to revise Firmware from any of these ports.

If you think your Mac's Firmware has been compromised, you can download an official version from Apple and reflash it yourself. Problem solved!

55 posted on 03/23/2017 3:36:23 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 54 | View Replies]

To: Swordmaker

The CIA was watching you type this.


56 posted on 03/23/2017 3:59:34 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 50 | View Replies]

To: Swordmaker

Huh? It’s a huge issue. Have you not been reading the news. Or better yet why not release a tool that will do a checksum? Also how do you know the CIA didn’t make it so that it reflashes the eeproms? Or that the chicoms didn’t plant something similar.

In a windows environment it’s a lot more difficult with all the hodgepodge of choices of components. I guess Dell and HP could do something like that though...were they on the list of CIA targeted machines?


57 posted on 03/23/2017 4:38:25 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 55 | View Replies]

To: for-q-clinton
Huh? It’s a huge issue. Have you not been reading the news. Or better yet why not release a tool that will do a checksum? Also how do you know the CIA didn’t make it so that it reflashes the eeproms? Or that the chicoms didn’t plant something similar.

No, for-q-Clinton, it isn't. You are paranoid if you think it is. . . or just exhibiting your Apple Derangement Syndrome. Keep in mind that the CIA was planting chips in routers and Windows PCs long before they started thinking about Apple devices. . . and it was much easier to get their spyware on Windows and Android devices than on Apple stuff, much easier.

Apple controls the software that goes into every Apple device and does frequent quality assurance checks on random samples. They also check when it arrives here, to assure that nothing they did not create is being added to their products. Contrary to what you WANT to believe, Apple is in control of its products, not the Chinese.

In a windows environment it’s a lot more difficult with all the hodgepodge of choices of components. I guess Dell and HP could do something like that though...were they on the list of CIA targeted machines?

No it's easier. There are reference designs and its a lot easier to make the PC boot what you want.

58 posted on 03/23/2017 6:10:55 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 57 | View Replies]

To: Swordmaker
>>>>the opportunity to add that code to the firmware was closed by Apple last year<<<<<

Not true. There are two chips in the phone AP (application processor) and BP (baseband processor). BP controls antenna and radio and runs RTOS (real time operation system). BP and AP share memory and BP can inject malicious code BEFORE AP loads OS.

BP can be controlled via fake cell tower installed close to the targetted phone.

Only secure custom phones costing $10K are not vulnerable to radio penetration.

59 posted on 03/23/2017 6:40:58 PM PDT by DTA (Drain the swamp)
[ Post Reply | Private Reply | To 45 | View Replies]

To: for-q-clinton

Have you ever wondered how come every Hollywood movie and tv show has only Macs in the scenes?it would cost too much to be only a product placement scheme.


60 posted on 03/23/2017 6:43:08 PM PDT by DTA (Drain the swamp)
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson