• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechApple

Apple Responds to WikiLeaks Dump, Says Many iOS Flaws Already Patched

By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
March 8, 2017, 8:29 AM ET
Apple Fans Await iPhone 7
BERLIN, GERMANY - SEPTEMBER 16: A visitor tries out an Apple iPhone 7 on the first day of sales of the new phone at the Berlin Apple store on September 16, 2016 in Berlin, Germany. The new phone comes in two sizes, one with a 4.7 inch display, the other with a 5.5 inch display. (Photo by Sean Gallup/Getty Images)Sean Gallup — Getty Images

A new batch of documents released by WikiLeaks on Tuesday, which purport to expose a range of spying tactics by the Central Intelligence Agency, claim the agency exploits vulnerabilities in Apple’s iOS operating software. In other words, the CIA is able to spy on users’ iPhones.

In response, Apple (AAPL) issued a statement that appeared to validate the claims published by WikiLeaks, and also claimed the company believes it has fixed most of the flaws identified in the documents.

The news comes as the tech industry and U.S. Intelligence community is still assessing the implications of the release of the WikiLeaks documents, which appear to be genuine, and which describe a variety of ways the CIA is able to spy on smartphones and Internet-connected television sets.

In the case of Apple, a summary of the documents by WikiLeaks says the CIA has dedicated a “disproportionate” amount of attention to iOS, perhaps because iPhones are used by “elites” (emphasis mine):

Despite iPhone’s minority share (14.5%) of the global smartphone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

The WikiLeaks trove also includes a list of hacks the CIA has developed or purchased in order to spy on iPhones, including some details on how the exploit the vulnerabilities.

Get Data Sheet, Coins2Day’s technology newsletter.

In a statement to Coins2Day, Apple said it is aware of many of the vulnerabilities and has already patched them. It also urged customers to stay current with software updates.

“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates,” the statement read in part.

Apple did not address how long it would take the company to address all the vulnerabilities.

Despite the dramatic nature of the WikiLeaks dump, this is hardly the first report of the CIA targeting Apple and other device makers as a technique for spying. Such practices are common among intelligence agencies, which look for security holes in consumer products as a means to conduct espionage. One of the more high-profile examples came when the FBI reportedly purchased a software vulnerability in order to access the iPhone of a dead terrorist involved in last year’s massacre at San Bernardino.

About the Author
By Jeff John RobertsEditor, Finance and Crypto
LinkedIn iconTwitter icon

Jeff John Roberts is the Finance and Crypto editor at Coins2Day, overseeing coverage of the blockchain and how technology is changing finance.

See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.