×
GreekEnglish

×
  • Politics
  • Diaspora
  • World
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Cooking
Monday
15
Dec 2025
weather symbol
Athens 10°C
  • Home
  • Politics
  • Economy
  • World
  • Diaspora
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Mediterranean Cooking
  • Weather
Contact follow Protothema:
Powered by Cloudevo
> technology

C.I.A. developed tools to spy on Mac computers, WikiLeaks disclosure shows

The C.I.A. declined to comment

Newsroom March 27 11:45

The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks.

Apple said in a statement Thursday evening that its preliminary assessment of the leaked information indicated that the Mac vulnerabilities described in the disclosure were previously fixed in all Macs launched after 2013.

However, the documents also indicated that the Central Intelligence Agency was developing a new version of one tool last year to work with current software.

The leaked documents were the second batch recently released by WikiLeaks, which said it obtained a hoard of information on the agency’s cyberweapons programs from a former government worker or contractor. The first group of documents, published March 7, suggested that the C.I.A. had found ways to hack Apple iPhones and Android smartphones, Microsoft Windows computers, Cisco routers and Samsung smart televisions.

Since the initial release of the C.I.A. documents, which the agency has not confirmed are authentic, major technology companies have been scrambling to assess whether the security holes exploited by the C.I.A. still exist and to patch them if they do.

All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques.

Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws governing the receipt of classified information.

At a news conference Thursday, Mr. Assange criticized the government policies that restricted such communications but said that Apple had nonetheless been willing to work with representatives of his anti-secrecy organization.

Google and Microsoft, he said, had simply pointed WikiLeaks to its existing channels for anyone to report a security flaw.

In its statement, Apple denied negotiating with WikiLeaks. “We have given them instructions to submit any information they wish through our normal process under our standard terms,” the company said. “Thus far, we have not received any information from them that isn’t in the public domain. We are tireless defenders of our users’ security and privacy, but we do not condone theft or coordinate with those that threaten to harm our users.”

The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet.

A similar tool called NightSkies was developed in 2009 to spy on iPhones, the documents said, with the agency figuring out how to install it undetected before a new phone was turned on for the first time. (Apple said that flaw affected only the iPhone 3G and was fixed in all later models.)

Although most of the tools targeted outdated versions of the Apple devices’ software, the C.I.A.’s general approach raises new security concerns for the industry, said Eric Ahlm, who studies cybersecurity at Gartner, a research firm. By rewriting the most basic software of a computer or a phone, tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates.

>Related articles

Turkish man arrested in Chios for espionage

Software issue in Airbus A320 caused by solar radiation creates turbulence disruptions on flights worldwide

The NVIDIA phenomenon: The $5 trillion company became Trump’s super weapon in the “war” with China – How it surpassed Amazon, Apple and Microsoft

Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies so they could be fixed. The C.I.A. documents suggest that some key vulnerabilities were kept secret for the government’s use.

The C.I.A. declined to comment Thursday, pointing reporters to its earlier statement about the leaks, in which it defended its use of “innovative, cutting-edge” techniques to protect the country from foreign threats and criticized WikiLeaks for sharing information that could help the country’s enemies.

Source

Ask me anything

Explore related questions

#apple#CIA#Mac computers#software#spying#wikileaks
> More technology

Follow en.protothema.gr on Google News and be the first to know all the news

See all the latest News from Greece and the World, the moment they happen, at en.protothema.gr

> Latest Stories

How “Albanian” was Georgios Kastriotis or Skanderbeg, what does the domed tomb at the Hilandar Monastery on Mount Athos hide?

December 14, 2025

See all the farmers’ demands to the government: They do not want OPEKEPE’s control to be transferred to AADE

December 14, 2025

Mitsotakis to farmers: Dialogue cannot take place with ultimatums – Roadblocks undermine your struggle – We are examining a new support package

December 14, 2025

Shooting in Sydney: Gunfire by two unknown individuals at a Jewish celebration on a beach, reports of casualties (videos)

December 14, 2025

Shops are open today, the market is open during festive hours

December 14, 2025

Sunday Sports Broadcasts: Where to watch the tests of the Super League’s Big Four

December 14, 2025

Moments of terror at Brown University after the shootings: Police evacuated students who had hidden

December 14, 2025

The redevelopment of Ellinikon prioritizes the extension of the Metro toward Glyfada – New extensions to follow

December 14, 2025
All News

> Politics

Mitsotakis to farmers: Dialogue cannot take place with ultimatums – Roadblocks undermine your struggle – We are examining a new support package

He says he is surprised by the farmers’ “no” – “Whoever rejects the principles of democracy assumes a great burden toward society” – Reiterates that the government’s door remains open for a meeting

December 14, 2025

What the leadership of the ESM means for Greece: The country’s major creditor and the messages for the Greek economy

December 13, 2025

Zoe’s extreme parliamentary reality show: The repeated calls to 100, the sexist attacks, and the “to the very end”

December 13, 2025

Mitsotakis meets the UN Secretary-General’s Personal Envoy for Cyprus

December 12, 2025

Liakouli on tensions with Konstantopoulou: Parliament staff leave the committee in tears

December 12, 2025
Homepage
PERSONAL DATA PROTECTION POLICY COOKIES POLICY TERM OF USE
Powered by Cloudevo
Copyright © 2025 Πρώτο Θέμα