Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones

Tyler Durden's picture

The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.  The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

Here is a live stream of the pending press briefing with Julian Assange:

And here is the full press release from WikiLeaks:

Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

 

Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

 

"DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.

 

Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

 

Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

 

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Jim in MN's picture

Stay in the light. 

Tell the anti-American deep state elements to fuck off and return to Constitutional order, right up to whenever they're stupid or desperate enough to use the Internet Kill Switch.

Then find them and tell them in person.

Hiding is not going to help.

MrBoompi's picture

They told us they needed to do this to fight terrorism, but what they're doing is for other reasons entirely.  When being smart and aware becomes a crime that will be about it.  

Muse minus Time's picture

Instead of a criminal probation ankle tracker forced by courts, our cell phones do the job on a voluntary basis....we love our surveillance, NOT!

logicalman's picture

A Raspberry Pi is fine for web surfing - good for Tor too.

Tor is somewhat compromised, but better than nothing.

 

GreatUncle's picture

Tor your data is still being recorded no matter, but it allows you to bypass trivial blocks.

maskone909's picture

Apple is the deep state. Apple is a spy agency.

Chupacabra-322's picture

@ maskone,

They're all Spy Agencies along with the Criminal Telecoms, TV & Cable Networks.

"They got you by the balls."
-Geroge Carlin

Muse minus Time's picture

Be sure to include NASA in the spy loop...search "Summary of The NASA Future Strategic Issues & Warfare Circa 2025...it's in our face right now.  Page 93 describes the CNN syndrome.

Herd Redirection Committee's picture

Remember that fella by the name of Howard Hughes, real famous in the 50s and 60s?

Well I am pretty sure Hughes Aircraft was a CIA front...

Jubal Early's picture

Actually virtually all of silicon valley is part of the spy state.  Jan Irving of Gnostic media has an entire series of fascinating podcasts with Steve Outtim an early internet pioneer and one of the first burners.  Steve makes all the ties between Burning Man, Silicon Valley and MKUltra.  Burning man is a complete mind control front and silicon valley includnig apple are heavily in on it.

http://www.gnosticmedia.com/?s=burning+outtrim

Cardinal Fang's picture

That's why they need so many H1Bs...non of that Eurocentric Judeo-Christian Constitutional ethics problems.

'Yes sahib, whatever you say sahib.'

Otherwise, you are selected to walk point on the next tiger hunt.

Jubal Early's picture

I don't think the H1B's have the time and the money to attend Burning Man.  Its more about programming the hipster silicon valley techies to accept sexual deviation, mind altering drugs and most of all trans-humanism and trans-sexualism and the concept of singularity.  The leaders, like Schmidt from Google, sell this cutting edge "change" to drug addled idiots frying their brains in the desert.  In one of Steve Ottrims recent posts he writes:

"I am offering $1000 via PayPal to anyone that can give me a copy of the 1996 Burning Man Helco Contract, called “Standard Short Form Contract for Purchase of Soul”."

GreatUncle's picture

TBTF corporation become deep state to survive.

Imagine if the protectionism of a P2P monopoly was removed Apple would be fucked.

Tom Terrific's picture

Couldn't happen to a more deserving group of customers.

AC_Doctor's picture

What don't they bug, Beanie Babies?

TheMeatTrapper's picture

They do. That's Project Dark Diapers. It just hasn't been made public yet. 

MsCreant's picture

I guess it DependsTM.

They are in the shit now, aren't they?

Arnold's picture

My Beary Garcia was under indirect surveillance.
I asked the guys around the corner in the blacked out Yukon about it.

"Yeah, Yeah, that's the ticket." they said.

Confirmation from anonymous sources, good enough for me.

SgtShaftoe's picture

They're definitely bugging those, desperate, lonely, middle-aged people are a prime target for CIA recruitment. That's their "kind" after all.

TheAnswerIs42's picture

The Doctor only used the Sonic Screwdriver on Jelly Babies.

 

GreatUncle's picture

Why didn't they bug Clinton? Or Obama?

That says more than anything else ... it really does.

Protecting the population from the criminality?

Oh but you see the system is run by the criminals.

DuneCreature's picture

The CIA is just so trustworthy I want them to have access to everything on my system. ................... NOT!

The thieving assholes will steal everything that isn't nailed down and every file they can grab up and run with.

They have been doing this for years and I have followed the bread crumbs right back to one of their favorite hideouts in Redmond WA.

Then to top it all off the CIA wants to spoon feed everyone lies and misinformation. ...... OOOOOOH, the Russians broke into your network and pilfered your data! Right? .... No, you lying jackasses at Langley and the Gates gang stole it.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

What? .. The CIA makes crap up? And then puts in on TV?....... I'm SHOCKED! .. Shocked, I tell you. ... Just shocked and appalled.

Well, get used to it because it's now getting very close to becoming illegal to even point that fact out. National Security and such.

We live in a info zoo of Alice In Wonderland propulsions.

To the moon, Alice, to the MOON!

Corbett Report Extra - CIA Plants =
https://www.youtube.com/watch?v=xT4MZ5N8ABQ

The sad part is we pay the CIA perfectly good tax dollars to do this cartoon shit to us and then send our kids off to war to shoot it out with 'terrorists' trained, supplied and funded with those same tax dollars. All very covert and covered up. .. Almost.

Some of those kids never come home.

Then when some good American working for the FBI actually goes to Congress and blows the whistle on nefarious crap gone wild what do we get?

The Sibel Edmonds Story =
https://www.youtube.com/watch?v=IClVKyb63m4

Live Hard, The Big Picture Is Never As Pretty As The Stories We Are Told On The CNN/CIA News Hour, Die Free

~ DC v5.0

DuneCreature's picture

Finally, someone listens at yeast.

In the old days when they (the CIA and M$) were beta testing the back doors and schemes to steal computer cycles without you realizing it, they would run the stolen packets right back to their servers at Redmond WA.

They thought no one would notice, I guess. ........ That was back in the days when computer cycles were precious. Your machine would slow down to a crawl and you just knew something fucked up was happening in the background.

The morons weren't even smart enough, or too lazy, to try and proxy the hacking away from their home base in Redmond. ...... They would put a catcher server down the street and register the IP address to 'John Smith'. .... Fucking geniuses at M$. .... I'm sure it was more convenient to keep the hacking beta testing machines close by for maintenance purposes.

Being on an unlimited budget at M$ and all, that makes perfect sense, right?

Live Hard, I Would Tell People That Their Computer Was Slow Because Bill Gates Was Using It With Them Most Of The Time And They Would Think I Was Joking, Die Free

~ DC v5.0

Dg4884's picture

Crazy stuff man.  I have been an Android user since '06.  Who knows what they/them have done to it, but I have that sucker locked down as tight as I can get it and only use proton mail. 

Withdrawn Sanction's picture

It's from Google....do you need it spelled out? 

Google = CIA (InQTel) and later NSA. 

They really should change their slogan, however, from "Dont be Evil" to "Dont be Caught...doing Evil"

GreatUncle's picture

Flipped to Android / Linux and if in doubt put the fucking phone in a metal box.

WillyGroper's picture

lined with aluminum screen wire & bubble pack.

thru audio, they can gauge which keys are being hit via the distance between pecks without a keylogger.

Jubal Early's picture

Thats why I switched from Samsung to Huawei a year ago because I figured that since the US government had banned Hauwei routers, servers and other equipment because they couldn't be certain that there were no chinese CIA type hacks, that they are likely free of actual CIA hacks.  Recent events have proven my hunch to be correct.  I am really far more concerned about the CIA spying on me than Chinese intelligence.  Samsung is of course captive to the (((international elite))).

Dr. Engali's picture

If people believe that Apple wasn't aware of this and in on it they're nucking futs. Apple, Facebook, Twatter, all have NSA backing.

aliens is here's picture

I don't have an IPhone but I am sure my android device is bugged too so I just make random sounds into the microphone just in case some pevert in CIA is listening.

shovelhead's picture

I lay my phone against my computer speaker at night and play ABBA songs on a loop while I sleep.

Fight back.

GreatUncle's picture

The turn it on and turn it off game interspersed with random mutterings ...

"I got to go" ... off ... turn it on ... "nitroglycerine" ... off ... turn it on ... "the target is"  ... silence.

How to generate parannoia in a spook.

facingfacts 2016's picture

I start all my conversations with the words "shoulder fired missles", that way I know I have their full attention.

JailBanksters's picture

So everybodys going to dump their existing eye-phone and get the newer commie red eye-phone thinking they will be secure from prying eyes.

Now I know why they called them eye-phones and eye-macs, it's the all seeing eye, quite litterally.

 

MsCreant's picture

You can't hiiiiide your pryin' eyes

And your liiiiiiies are a thin dis-guise

Thought by nooow you'd realiiiiize

There ain't no way to hide your pryin' eyes

JailBanksters's picture
Those who would destroy our lives with lies will themselves be destroyed by truth
Boubou's picture

But don't hold your breath

JailBanksters's picture

Patience, young grasshopper

NotBuyingIt's picture

Yes! I pray every day that I live to see the day these cunts are destroyed.

Wang Dang SP's picture

Tyler, time for a ZHphone, tin foil case as an option.

J Jason Djfmam's picture

Two tin cans and a piece of string. Tap that.

TwelveOhOne's picture

Reminds me of "two turntables and a microphone" -- both being, two round objects, and a cylinder.

I wonder what that could be a reference to?

GeezerGeek's picture

The string has to vibrate to transmit sound. Vibrations can be monitored. Perhaps if your string was in a vacuum..

Infinite QE's picture

Hang Chindit!