【Nude movies】
The Nude moviesCIA has put quite a bit effort into figuring out ways to hack Apple devices.That's the takeaway from the latest batch of documents dumped by WikiLeaks.
The so-called "Dark Matter"documents, published Thursday, detail methods allegedly used by the CIA to infect MacBooks and some older iPhones with malware that allowed the agency to remotely spy on device owners.
SEE ALSO: Wikileaks' CIA dump contained WAY more bad memes than you would thinkAs usual, WikiLeaks released a fairly alarming-sounding statement accompanying the documents. But before you freak out about the security of your own Apple products, it's important to understand exactly what they say.
Physical access is everything
It's important to note that, much like the earlier Vault 7 dump that detailed exploits used to "bypass" encryption used by chat apps like WhatsApp and Signal, the new methods described in the latest documents also require physical access to the device.
The documents make completely clear the fact that CIA operatives would need physical access to a device before they can carry out any of the exploits described.
So what was that about an iPhone?
First, the good news. The only iPhone specifically named in the documents is one that is pretty much completely dead: the iPhone 3G (running iOS 2.1, no less). Apple also confirmed Thursday the only iPhone affected was the 3G and that the vulnerability was fixed as of the release of the iPhone 3GS.
Still, the exploit detailed in a document called NightSkies, dated to 2008, involved "a beacon/loader/implant tool" that "operates in the background providing upload, download and execution capability on the device."

The setup process was somewhat complex (again, it required physical access to the phone), but once there, it could have been used to access an astonishingly vast amount of data from a "target's" iPhone.
The document contains instructions for downloading call logs, text messages, contacts lists, mail and maps files, browser history, YouTube video cache (YouTube was one of the only third-party apps to come pre-installed on early iPhones), voicemails, calendar data, photos and even "user-specific" keyboard data. In other words: very nearly everything you could possibly hope to get off an iPhone using the app's that came pre-installed at the time.
What about the MacBooks?
It all started with a dongle. Seriously.
A project called Sonic Screwdriver (yes, we already know the CIA is full of Doctor Whofans) detailed how a thunderbolt-to-ethernet adapter could be modified with a bit of malicious code designed to infect a laptop's firmware.

By infecting the firmware, this allowed the code to "persist" in the device even if the hard drive was wiped or the operating system is completely re-installed. As Motherboard'sLorenzo Franceschi-Bicchierai points out, it was actually a fairly clever move by the CIA as a similar method was later uncovered by security researchers two years later in 2014.
According to the documents, the CIA tested this method with MacBook Pros and MacBook Airs from late 2011 to mid 2012. (In a statement, Apple said this particular exploit had been fixed in every MacBook made after 2013.)
But, again, before you go chucking your own ethernet adapter in the garbage, remember that this only worked with adapters that had been specially modified with the malicious code to begin with.
Featured Video For You
Edward Snowden says Russians probably hacked the NSA
Topics Apple iPhone
Search
Categories
Latest Posts
Best headphone deal: Take 22% off the Sonos Ace at Amazon
2025-06-26 11:47Elon Musk, Twitter is enough. Please don't resurrect Vine.
2025-06-26 11:27Amazon Music Prime is adding 98 million songs, but only on shuffle
2025-06-26 10:43Pornhub reveals the most popular 'Avengers' searches
2025-06-26 10:33Popular Posts
Nintendo Switch 2 preorder just days away, per leak
2025-06-26 11:45Norton Identity Advisor Plus: Everything you need to know
2025-06-26 11:32People really love this video of a dude unclogging a drain
2025-06-26 11:22Wordle today: Here's the answer, hints for October 30
2025-06-26 11:10The Mismeasure of Media
2025-06-26 11:03Featured Posts
Japan orders Google to stop alleged antitrust violations
2025-06-26 11:44The dorky Easter eggs hidden in 2020 campaign websites
2025-06-26 11:28Robert Downey Jr. hosted a star
2025-06-26 10:51The difference between Airbnb vs. Vrbo, explained
2025-06-26 10:03'Mario Kart World' Nintendo Direct: 3 takeaways
2025-06-26 09:57Popular Articles
'The Witcher' will need to address the Geralt recasting in Season 4
2025-06-26 11:12Wordle today: Here's the answer, hints for November 2
2025-06-26 09:09Best soundbar deal: Save $300 on the Sonos Arc
2025-06-26 09:06Newsletter
Subscribe to our newsletter for the latest updates.
Comments (2684)
Belief Information Network
Best vacuum mop combo deal: Save $140 on the Tineco Floor One S5
2025-06-26 11:11Neon Information Network
Twitter might let users put videos behind a paywall
2025-06-26 11:10Steady Information Network
Twitter may charge users $20 per month to be verified
2025-06-26 11:01Dream Information Network
The new Call of Duty sees players assassinate a totally
2025-06-26 10:41Belief Information Network
Amazon Prime Grubhub deal: Save $10 off orders of $20 or more
2025-06-26 09:39