Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history happened because a cyber espionage unit had an employee who took advantage of weak security and gave secret hacking tools to WikiLeaks, according to a secet internal report just released. 

The breach was revealed in March 2017 when WikiLeaks published what it characterised as the largest-ever trove of acquired CIA documents, known as ‘Vault 7’. The hacking tools stolen in the breach, which occurred in 2016, came from its clandestine Center for Cyber Intelligence (CCI). The amount of data stolen is unknown, the memo said, but could be as much as 34 terabytes of data which is the equivalent of 2.2 billion pages of text. 

A former CIA employee, Joshua Schulte, has been accused of being behind the leak, altough a federal grand jury this year failed to reach a verdict on allegations of illegal gathering and transmission of national security information. The leaked material attracted controversy, showing that the CIA had the capability to perform widespread electronic surveillance, including compromising individuals’ smartphones, cars, computers and smart TVs.

Whistle-blower Edward Snowden criticised the CIA for intentionally maintaining vulnerabilities in US products. The theft was revealed around a year later, in March 2017, when WikiLeaks published what it claimed was the largest trove of CIA documents, dubbed "Vault 7," detailing some of the agency's sophisticated cyber weapons, this was reported by the Washington Post.

That incident prompted a review by the CIA WikiLeaks Task Force, which submitted its findings to then-Director Mike Pompeo and his deputy, who is now the director, Gina Haspel.  

While the CIA declined to comment on any specific report, agency spokesperson Timothy Barrett told CNN, "CIA works to incorporate best-in-class technologies to keep ahead of and defend against ever-evolving threats... The report is heavily redacted but clearly states that the breach came as a result of a series of security shortcomings ."

The task force memo was released by Democrat Senataor Ron Wyden,  who sits on the Senate Intelligence Committee, who obtained an incomplete, redacted version from the Justice Department. In a letter to the new Director of National Intelligence, Wyden asked for more information about "widespread cybersecurity problems across the intelligence community." 

The material published by WikiLeaks in 2017 suggested that the CIA had become the globe's pre-eminent hacking operation, breaking into high-tech phones and televisions to spy on people worldwide. 

Leaked information published by WikiLeaks as part of the "Vault 7" series contained notes about how the agency allegedly targeted individuals through malware and physical hacking on devices including phones, computers and TVs. 

To hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian, according to the documents published by WikiLeaks. 

The CIA's lax cybersecurity practices were also highlighted during the trial of Joshua Schulte, the ex-CIA employee who is accused of handing over reams of classified data to WikiLeaks in 2016. The October 2017 CIA report was introduced as evidence during the trial and Schulte's attorneys argued that the system's security was so poor that the information could have been accessed by a large number of employees. 

Following the failed prosection, it is still not officially known whether or nor Schulte actually did give the data to WikiLeaks. 

Wikileaks:     CNN:       New York Times:      US Senate:      Engineering Technology:     Politico:    Brian Krebs

Image: CIA 

You Might Also Read: 

Julian Assange Faces New Criminal Charges:

Snowden Accuses CIA Of 'A PR Fix':

 

« Coronvirus Phishing Campaign Targets Six Nations
Online Shoppers Have Lost Over £16m To Lockdown Fraud »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Aryon Security

Aryon Security

Aryon Security is redefining cloud security with the ability to enforce cloud strategy with confidence, enabling organizations to prevent risks before they emerge.