A number of documents published by Wikileaks on Tuesday detailing America's cyberespionage toolkit contain numerous exploits used by the Central Intelligence Agency for Samsung smart TVs, iOS and Android devices it has emerged. the verge reported.
According to The Verge, one of the published exploits ─ codenamed 'Weeping Angel' ─ is used for Samsung smart TVs and "operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
It was also reported that the intelligence agency has had some success in its attempt to target Android devices, with about 24 weaponised exploits.
However, attempts to target iOS devices have been less successful with only 14 weaponised exploits.
In a statement released on Wednesday Apple claimed to have fixed significant security flaws in its iOS software that were pointed on in the leaked documents.
The vulnerabilities in the iOS software could be used to track users, monitor their communications, or even take control of their phones, according to The Verge.
In its statement Apple claimed that an "initial analysis showed that many of the issues leaked... were patched in the latest iOS."
The tech-giant promised to continue to "rapidly address any identified vulnerabilities" as it urged is customers to download the latest software on their devices to ensure they have "the most recent security updates.
"WikiLeaks on Tuesday published thousands of documents purportedly taken from the Central Intelligence Agency's Center for Cyber Intelligence, a dramatic release that appears to provide an eye-opening look at the intimate details of America's cyberespionage toolkit.
The dump of more than 8,000 documents could not immediately be authenticated by The Associated Press and the CIA declined comment, but WikiLeaks has a long track record of releasing top secret government documents.
Experts who've started to sift through the material said it appeared legitimate and that the release was almost certain to shake the CIA.
“There's no question that there's a fire drill going on right now,” said Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec.
“It wouldn't surprise me that there are people changing careers and ending careers as we speak.” Bob Ayers, a retired US intelligence official currently working as a security analyst, agreed, saying that the release was “real bad” for the agency.
If the authenticity of the dump were officially confirmed, it would represent yet another catastrophic breach for the US intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including hundreds of thousands of documents from the State Department and the Pentagon.
WikiLeaks, which had been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had “recently” lost control of a massive arsenal of CIA hacking tools as well as associated documentation.
The radical transparency organisation said that “the archive appears to have been circulated among former US government hackers and contractors in an unauthorised manner” and that one of them “provided WikiLeaks with portions of the archive.”
Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authenticity or content of purported intelligence documents.”
Williams, who has experience dealing with government hackers, said that the voluminous files' extensive references to operation security meant they were almost certainly government-backed.
“I can't fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.”
“The only people who are having that conversation are people who are engaging in nation-state-level hacking,” he said.
The documents cover a range of topics, including what appeared to be a discussion about how to compromise smart televisions and turn them into improvised surveillance devices.
WikiLeaks said the leaked data also included details on the agency's efforts to subvert American software products and smartphones, including Apple's iPhone, Google's Android and Microsoft's Windows.
A “substantial library” of digital espionage techniques borrowed from Russia and other countries is in the data as well, WikiLeaks said.
Ayers noted that WikiLeaks has promised to release more CIA documents, saying Tuesday's publication was just “the first full part of the series.”
“The damage right now is relatively high-level,” he said. “(But) the potential for really detailed damage will come in the following releases.”