Previous All Posts Next

The Five W's of the WikiLeaks CIA Dump

Posted: March 15, 2017 to Cybersecurity.

Tags: Malware, Data Breach, AI

Who: WikiLeaks is a self-proclaimed "stateless news organization" that is led by Julian Assange.  The website became infamous in June 2013 when Edward Snowden, an NSA contractor, leaked secret NSA surveillance documents proving that the government agency does in fact illegally monitor its citizens. It is believed that the person who leaked the CIA files is also a government contractor. What: “Year Zero” is the first release in a series dubbed by WikiLeaks as “Vault 7,” and is comprised of 8,761 pages that detail the tools used in the CIA’s cyber espionage toolkits, which includes hundreds of millions of lines of code.  The code can be used for nefarious deeds that range from exploiting smartphone vulnerabilities to turning smart TVs into microphones and has actually been in the hands of unauthorized government personnel.    When: Year Zero was released March 7, 2017, but the timeframe for the rest of the series has not yet been announced. Where: The full report can be seen on the WikiLeaks website. Why: WikiLeaks states that its source came to them because he or she “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons” after the CIA “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation.”  
Craig Petronella
Craig Petronella
CEO & Founder, Petronella Technology Group | CMMC Registered Practitioner

Craig Petronella is a cybersecurity expert with over 24 years of experience protecting businesses from cyber threats. As founder of Petronella Technology Group, he has helped over 2,500 organizations strengthen their security posture, achieve compliance, and respond to incidents.

Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next