• Home
  • Latest
  • Coins2Day 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechWikiLeaks

The WikiLeaks CIA Reveal Has Some Tech Firms Scrambling for Fixes

By
Reuters
Reuters
Down Arrow Button Icon
By
Reuters
Reuters
Down Arrow Button Icon
March 8, 2017, 11:55 AM ET

Tech companies must rapidly step up information sharing to protect users from prying eyes, a security software executive said on Wednesday after WikiLeaks released a trove of documents detailing the CIA’s capacity to hack all manner of devices.

Dozens of firms rushed to contain the damage from possible security weak points following the anti-secrecy organization’s revelations, although some said they needed more detailed information on what the U.S. Intelligence agency was up to before they can thwart suspected, but previously hidden attacks.

Sinan Eren, vice president of Czech anti-virus software maker Avast, called on mobile software makers Apple and Google to supply security firms with privileged access to their devices to offer immediate fixes to known bugs.

“We can prevent attacks in real time if we were given the hooks into the mobile operating system,” Eren said in a phone interview from Silicon Valley, where he is located.

“If we can drive a paradigm shift where mobile platforms don’t shut off access, we’ll be better able to detect when hackers are hiding in a mobile (phone),” he said.

Avast, which counts more than 400 million users of its anti-virus software worldwide, was named in the Wikileaks documents as one of the security vendors targeted by the CIA in a leaked page labelled “secret” but with no further details.

The leaks—which Wikileaks described as the biggest in the Central Intelligence Agency’s history—had enough technical details for security experts and product vendors to recognize widespread compromises exist. However, they provided few specifics needed to offer quick fixes.

Related: WikiLeaks Dumps Thousands of Files on Alleged CIA Hacking Tools

Reuters could not immediately verify the validity of the published documents, but several contractors and private cyber security experts said the materials appear to be legitimate.

The 8,761 leaked documents list a wealth of security attacks on Apple (AAPL) and Google Android (GOOGL) smartphones carried by billions of consumers, as well as top computer operating systems—Windows, Linux, and Apple Mac—and six of the world’s main web browsers.

Apple said in a statement that nearly 80% of iPhone users run its current iOS software with the latest security patches. “Many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities,” Apple said on Tuesday. The statement made no reference to attacks on its computer software.

Google did not immediately respond to a request for comment, while a Microsoft (MSFT) spokeswoman said: “We’re aware of the report and are looking into it.”

Widely-used routers from Silicon Valley-based Cisco were listed as targets, as were those supplied by Chinese vendors Huawei and ZTE and Taiwanese supplier Zyxel for their devices used in China and Pakistan.

Related: What Do I Need to Know About the CIA’s Hacking Program?

Cisco security team members said in a blog post that because WikiLeaks has not released any of the actual hacking exploits “the scope of action that can be taken by Cisco is limited.”

Omar Santos, a principal engineer in Cisco’s security response unit, said malware appears to be targeting whole families of Cisco (CSCO) devices but is designed to remain hidden so as to steal data unnoticed. He said Cisco assumes WikiLeaks will eventually disclose the hacks, allowing it to fix them.

Huawei declined to comment. ZTE and Zyxel were not immediately available to respond.

STAY OF EXECUTION

Messaging apps protected by full software encryption also appear to be vulnerable to hacking of the smartphones themselves, communications app provider Telegram said in a blog post. But one positive outcome may be that device and software makers will be able to close up these holes, it said.

“This is not an app issue. It is relevant on the level of devices and operating systems like iOS and Android,” Telegram stated, adding that: “The good news is that for the moment all of this is irrelevant for the majority of Telegram users. If the CIA is not on your back, you shouldn’t start worrying just yet.”

The WikiLeaks collection contains a mix of copious data and empty files marked “secret” that promised more details to come on attacks against more than 15 security software firms.

U.S. Cyber security expert Robert Graham said Wikileaks provided enough detail to recognize some known vulnerabilities.

“One anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak,” Graham said in a blog post.

Get Data Sheet, Coins2Day’s technology newsletter.

Some security experts said the CIA’s possible use of tools from other spy agencies raised the risk of false attribution for targeted cyber attacks by the U.S. Intelligence agency.

He said CIA cyber spying efforts could be set back years.

The CIA and White House declined comment. “We do not comment on the authenticity or content of purported intelligence documents,” CIA spokesman Jonathan Liu said in a statement.

WikiLeaks said it aims to provoke a political and legal debate over the CIA’s cyber arsenal. However, it was holding back, for now, much of the technical documentation that would allow other hackers and cyber criminals to exploit the hacks—while putting vendors on notice to expect further revelations.

The organization said in a statement it is “avoiding the distribution of ‘armed’ cyber weapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed, and published.”

It describes sophisticated tools for targeting the devices of individual users, in contrast to the revelations by former National Security Agency contractor Edward Snowden’s of mass data collection on millions of web and phone users worldwide.

About the Author
By Reuters
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

The CEO of Informatica, Amit Walia
SuccessCareers
Like DoorDash and Google’s CEOs, $7.6 billion Informatica boss is a McKinsey alum—he says being ‘pushed around’ by smart consultants helped him grow
By Emma BurleighJanuary 17, 2026
13 hours ago
photo of western union store
CryptoCryptocurrency
Stablecoins will shake up the $900 billion remittance market—setting up a fight between crypto firms and legacy brands like Western Union
By Carlos GarciaJanuary 17, 2026
14 hours ago
InnovationThe Boring Company
Exclusive: Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno
By Jessica MathewsJanuary 16, 2026
1 day ago
AIOpenAI
ChatGPT tests ads as a new era of AI begins
By Sharon GoldmanJanuary 16, 2026
1 day ago
AITech
Trump says he’ll make tech firms pay for power. They’d love to
By Michelle Ma, Alicia Tang and BloombergJanuary 16, 2026
1 day ago
Close cropped images of Sam Altman alongside an actor playing him.
AIFilm Industry
A filmmaker deepfaked Sam Altman for his movie about AI. Then things got personal
By Beatrice NolanJanuary 16, 2026
1 day ago

Most Popular

placeholder alt text
Politics
The Nobel Prize committee doesn't want Trump getting one, even as a gift—but they treated Obama very differently
By Nick LichtenbergJanuary 16, 2026
1 day ago
placeholder alt text
Economy
America’s $38 trillion national debt is so big the nearly $1 trillion interest payment will be larger than Medicare soon
By Shawn TullyJanuary 15, 2026
3 days ago
placeholder alt text
Europe
Americans have been quietly plundering Greenland for over 100 years, since a Navy officer chipped fragments off the Cape York iron meteorite
By Paul Bierman and The ConversationJanuary 14, 2026
3 days ago
placeholder alt text
Success
Jensen Huang tells Stanford students their high expectations may make it hard for them to succeed: 'I wish upon you ample doses of pain and suffering'
By Orianna Rosa RoyleJanuary 16, 2026
1 day ago
placeholder alt text
Politics
Anthony Scaramucci thinks Trump's 'hard-left' move to cap credit-card fees is because he's 'texting back and forth with Mayor Mamdani'
By Nick Lichtenberg and Eva RoytburgJanuary 16, 2026
1 day ago
placeholder alt text
Banking
'Absolutely, positively no chance, no way, no how, for any reason': Dimon says he'd never run the Fed but 'would take the call' to lead Treasury
By Jacqueline MunisJanuary 16, 2026
1 day ago

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.