• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechWikiLeaks

What WikiLeaks’ CIA Hacking Dump Reveals About Your Privacy

By
Reuters
Reuters
Down Arrow Button Icon
By
Reuters
Reuters
Down Arrow Button Icon
March 8, 2017, 6:49 PM ET

WikiLeaks, the website that specializes in exposing secrets, released thousands of documents that described internal U.S. Central Intelligence Agency discussions on hacking techniques it used between 2013 and 2016 to circumvent security on electronic devices for spying.

U.S. officials said on Wednesday that CIA contractors were the likely source of the leak. The following are some questions and answers users of consumer electronics may have:

How many of the vulnerabilities described in the Wikileaks document are still open to exploit by hackers or spies?

There is no definitive answer in the documents, which describe attack techniques but often do not give enough detail for even the device and software vendors to understand fully how their products were targeted and close the security holes. Software updates have solved many of the flaws but it is
unclear how many remain. In a chart of exploits for Apple’s (AAPL) iPhone, the most recent version listed as hackable was iOS 9.2, which was released in late 2015.

Get Data Sheet, Fortune’s technology newsletter.

What did we learn about the CIA’s hacking program?

WikiLeaks published documents that it says describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.

How can you hack a TV?

WikiLeaks said it identified a project known as Weeping Angel where U.S. and British intelligence agencies developed ways to take over Samsung (SSNLF) smart TVs equipped with microphones, forcing them to record conversations when the device appeared to be turned off. Experts have long said smart TVs and other Internet-connected devices can be exploited to monitor a target.

Are these revelations new?

While the specific details are new, it is well known in the cyber security community that intelligence agencies are constantly trying to leverage flaws in technology products to conduct espionage.

The documents suggest that the CIA can access information in encrypted messaging apps like WhatsApp and Signal. I thought they were safe from even government spying?

No system is perfect. The documents describe ways to get information in those apps on Android devices, but only after gaining full control of those phones. Reuters has not found evidence in the documents released by WikiLeaks that the CIA had figured a way to break the encryption in those apps.

Are iPhones also vulnerable?

The documents discuss ways to get into iPhones as well. One appeared to show a list of Apple iOS security flaws purchased by U.S. intelligence agencies so they could gain access to those devices.

How To Use Two-Factor Authentication to Keep Hackers Away

What should I do if I’m worried?

Most people do not need to worry about being targeted by intelligence agencies. But everybody should stay on top of software patches so all their computers, mobile phones and other connected devices are running software with the latest security updates. Consumers should balance security concerns with their need to use smart devices.

What did we learn about how the CIA may try to make American hacking look like the work of hackers from other countries like Russia?

The CIA has a library of attack code taken from multiple sources and sorted by function, including a program from a Russian criminal kit that permits spyware to survive rebooting and a data-destruction tool lifted from a suspected Iranian operation. One purpose of such a collection is to avoid having to write programs from scratch, while another is to confuse anyone who discovers the malware in action.

The documents released so far do not show that the CIA set out to deceive victims into believing they had been hacked by someone else, but it suggests that the agency was capable of doing so if it wanted.

Is this as big as the leaks from former National Security Agency contractor Edward Snowden?

The Snowden leaks revealed that the NSA was secretly collecting U.S. call metadata on ordinary Americans. The materials released by WikiLeaks on Tuesday did not appear to reveal the existence of unknown any unknown programs. Instead they supplied details on how U.S. intelligence agencies work to discover and exploit security flaws to conduct espionage.

How damaging is this revelation to U.S. intelligence?

U.S. intelligence officials say the damage is limited because much of what was published is old, a number of the vulnerabilities in smart TVs and other devices have been known for at least two years and many have been patched. The breach was discovered late last year according to U.S. officials and most or all of the tools Wikileaks published are no longer in use.

In addition, they said, unless additional codes that would enable users to exploit the leaked material are also published, it would be difficult for other countries, groups, or people to use the leaked material against the United States or its allies.

WikiLeaks Dumps Thousands of Files on Alleged CIA Hacking Tools

Are the documents authentic?

Reuters could not immediately verify the contents of the published documents. U.S. officials told Reuters that they believe the documents are authentic. While the CIA has declined to comment, independent cyber security experts and former intelligence agency employees who have looked through them say that they appear to be authentic, citing code words used to describe CIA hacking programs.

How did WikiLeaks get the information?
Unclear. Someone inside the agency may have leaked the information. Or, someone outside may have figured out a way to steal it. U.S. officials told Reuters on Wednesday that contractors were the likely source for the leak.

What has the U.S. government and other governments said in response?
The White House said U.S. President Donald Trump was “extremely concerned” about the CIA security breach that led to the WikiLeaks release.

Germany’s chief federal prosecutor’s office said it would review the Wikileaks documents which suggest the CIA ran a hacking hub from the U.S. consulate in Frankfurt, and would launch a formal investigation if warranted.

About the Author
By Reuters
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

What drones and drug discovery have in common
NewslettersTerm Sheet
What drones and drug discovery have in common
By Allie GarfinkleMay 13, 2026
8 minutes ago
Google's new Googlebook laptop. (Courtesy: Google)
NewslettersFortune Tech
Behold, the Googlebook
By Andrew NuscaMay 13, 2026
1 hour ago
A gold Nvidia server exhibit
LawNvidia
Encrypted texts reveal how Nvidia chips and U.S. tech are being smuggled to China and Russia
By Amanda GerutMay 13, 2026
2 hours ago
Sam Altman walks inside a courthouse
LawOpenAI
Sam Altman defends himself as a ‘honest and trustworthy businessperson’ in trial testimony detailing his past dealings with Elon Musk
By The Associated Press, Barbara Ortutay and Matt O'BrienMay 12, 2026
13 hours ago
An employee pulls out a server rack shelf at the rear of a Trainium3 UltraServer at an Amazon Web Services QA lab in Austin, Texas, on February 3, 2026.
AIAmazon
‘That doesn’t sound very healthy’: Amazon’s reported tokenmaxxing might gamify AI usage, analyst warns
By Eva RoytburgMay 12, 2026
13 hours ago
amazon
RetailAmazon
Amazon’s promise of 30-minute delivery collides with memories of Domino’s drivers crashing in the late 1980s
By Anne D'Innocenzio and The Associated PressMay 12, 2026
13 hours ago

Most Popular

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
14 hours ago
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
Travel & Leisure
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
By Catherina GioinoMay 12, 2026
17 hours ago
Forget U.S. debt, China's total borrowing is in 'a league of its own'—much worse and deteriorating faster, analyst says
Economy
Forget U.S. debt, China's total borrowing is in 'a league of its own'—much worse and deteriorating faster, analyst says
By Jason MaMay 11, 2026
2 days ago
U.S. hotels are calling the World Cup a 'non-event' and 80% warn bookings are falling short of expectations, report finds
North America
U.S. hotels are calling the World Cup a 'non-event' and 80% warn bookings are falling short of expectations, report finds
By Sasha RogelbergMay 12, 2026
1 day ago
Microsoft’s CFO admits she joined the tech giant without even knowing her salary—and then missed her first day of work
Success
Microsoft’s CFO admits she joined the tech giant without even knowing her salary—and then missed her first day of work
By Preston ForeMay 11, 2026
2 days ago
OpenAI CEO Sam Altman says Gen Z and millennials are using ChatGPT like a 'life advisor'—but college students might be one step ahead
Tech
OpenAI CEO Sam Altman says Gen Z and millennials are using ChatGPT like a 'life advisor'—but college students might be one step ahead
By Sydney LakeMay 10, 2026
3 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.