“We have not negotiated with Wikileaks for any information,” Apple said in a statement. “We have given them instructions to submit any information they wish through our normal process under our standard terms. Thus far, we have not received any information from them that isn’t in the public domain.”
The tools target Apple’s firmware, which is software that permanently runs on electronics to run fundamental processes.
One tool revealed on Thursday, dubbed “Sonic Screwdriver” in the alleged CIA documents, could infect MacBook firmware through the Thunderbolt port. The approach takes advantage of a flaw similar to a problem described by security researcher Trammell Hudson in 2015. They developed a hacking tool they dubbed “Thunderstrike 2” that infected MacBook firmware through the Thunderbolt port based on the flaw, which Apple patched in 2015.
Another tool described in the cache sought to infect iPhones as early as 2008, WikiLeaks said in its press release. The tool had been developed to version “1.2,” the organization noted, suggesting that “the CIA has been infecting the iPhone supply chain of its targets since at least 2008.”
Regarding the tools revealed by WikiLeaks on Thursday, Hudson wrote on his blog that, “they are all fairly old and probably don’t reflect the state of the art for the CIA Operations Group.”
This article originally appeared on CNET.com.
Leave a Reply