Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history happened because a cyber espionage unit had an employee who took advantage of weak security and gave secret hacking tools to WikiLeaks, according to a secet internal report just released. 

The breach was revealed in March 2017 when WikiLeaks published what it characterised as the largest-ever trove of acquired CIA documents, known as ‘Vault 7’. The hacking tools stolen in the breach, which occurred in 2016, came from its clandestine Center for Cyber Intelligence (CCI). The amount of data stolen is unknown, the memo said, but could be as much as 34 terabytes of data which is the equivalent of 2.2 billion pages of text. 

A former CIA employee, Joshua Schulte, has been accused of being behind the leak, altough a federal grand jury this year failed to reach a verdict on allegations of illegal gathering and transmission of national security information. The leaked material attracted controversy, showing that the CIA had the capability to perform widespread electronic surveillance, including compromising individuals’ smartphones, cars, computers and smart TVs.

Whistle-blower Edward Snowden criticised the CIA for intentionally maintaining vulnerabilities in US products. The theft was revealed around a year later, in March 2017, when WikiLeaks published what it claimed was the largest trove of CIA documents, dubbed "Vault 7," detailing some of the agency's sophisticated cyber weapons, this was reported by the Washington Post.

That incident prompted a review by the CIA WikiLeaks Task Force, which submitted its findings to then-Director Mike Pompeo and his deputy, who is now the director, Gina Haspel.  

While the CIA declined to comment on any specific report, agency spokesperson Timothy Barrett told CNN, "CIA works to incorporate best-in-class technologies to keep ahead of and defend against ever-evolving threats... The report is heavily redacted but clearly states that the breach came as a result of a series of security shortcomings ."

The task force memo was released by Democrat Senataor Ron Wyden,  who sits on the Senate Intelligence Committee, who obtained an incomplete, redacted version from the Justice Department. In a letter to the new Director of National Intelligence, Wyden asked for more information about "widespread cybersecurity problems across the intelligence community." 

The material published by WikiLeaks in 2017 suggested that the CIA had become the globe's pre-eminent hacking operation, breaking into high-tech phones and televisions to spy on people worldwide. 

Leaked information published by WikiLeaks as part of the "Vault 7" series contained notes about how the agency allegedly targeted individuals through malware and physical hacking on devices including phones, computers and TVs. 

To hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian, according to the documents published by WikiLeaks. 

The CIA's lax cybersecurity practices were also highlighted during the trial of Joshua Schulte, the ex-CIA employee who is accused of handing over reams of classified data to WikiLeaks in 2016. The October 2017 CIA report was introduced as evidence during the trial and Schulte's attorneys argued that the system's security was so poor that the information could have been accessed by a large number of employees. 

Following the failed prosection, it is still not officially known whether or nor Schulte actually did give the data to WikiLeaks. 

Wikileaks:     CNN:       New York Times:      US Senate:      Engineering Technology:     Politico:    Brian Krebs

Image: CIA 

You Might Also Read: 

Julian Assange Faces New Criminal Charges:

Snowden Accuses CIA Of 'A PR Fix':

 

« Coronvirus Phishing Campaign Targets Six Nations
Online Shoppers Have Lost Over £16m To Lockdown Fraud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.