{"id":6909,"date":"2017-03-09T04:30:28","date_gmt":"2017-03-09T12:30:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/09\/news-700\/"},"modified":"2017-03-09T04:30:28","modified_gmt":"2017-03-09T12:30:28","slug":"news-700","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/09\/news-700\/","title":{"rendered":"WikiLeaks looks at helping tech vendors disarm CIA hacking tools"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2017\/03\/cia-100712378-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 03:57:00 -0800<\/strong><\/p>\n<p> WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products. <\/p>\n<p> That\u2019s because WikiLeaks has <a href=\"http:\/\/www.computerworld.com\/article\/3177797\/security\/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html\">published<\/a> secret hacking tools allegedly taken from the CIA, which appear to target smartphones, smart TVs and PCs. <\/p>\n<p> Companies including Apple and Cisco have been looking through the stolen documents to address any vulnerabilities the CIA may have exploited.\u00a0However, WikiLeaks might be able to speed up and expand the whole process. <\/p>\n<p> So far, the site hasn\u2019t released the source code to any of the hacking tools. But on Wednesday, WikiLeaks raised the prospect that it might share the sensitive information with tech vendors as a way to quickly patch the vulnerabilities. <\/p>\n<p> \u201cTech companies are saying they need more details of CIA attack techniques to fix them faster. Should WikiLeaks work directly with them?\u201d the site <a href=\"https:\/\/twitter.com\/wikileaks\/status\/839534650880114690\">tweeted<\/a> out in a poll. <\/p>\n<p> The day before, WikiLeaks said it was holding back from publicly sharing the source code until a consensus emerges over how the hacking tools should be \u201canalyzed, disarmed and published.\u201d <\/p>\n<p> The site wants to prevent CIA-made \u201ccyberweapons\u201d from proliferating, so working with tech vendors could be a way for WikiLeaks to essentially defuse them. \u00a0 <\/p>\n<p> It\u2019s also an offer that tech vendors probably can\u2019t ignore. <\/p>\n<p> \u201cThey might have to absolutely work with WikiLeaks,\u201d said Jason Healey, a researcher at Columbia University who studies U.S. policy on vulnerability disclosure. <\/p>\n<p> \u201cHow do you tell a shareholder or a user that there\u2019s information on a hole out there, but you didn\u2019t bother to speak with WikiLeaks about it?\u201d he said. <\/p>\n<p> The other danger is that malicious parties might know about the secret CIA hacking tools too. <\/p>\n<p> WikiLeaks hasn\u2019t identified the source behind the stolen documents. But it\u2019s mentioned that former U.S. government hackers and contractors were circulating the confidential data, and that someone among them supplied a copied portion to WikiLeaks. <\/p>\n<p> However, Healey pointed to WikiLeak\u2019s <a href=\"http:\/\/www.pcworld.com\/article\/3129733\/wikileaks-dumps-another-trove-of-email-allegedly-from-clinton-aide.html\">suspected ties<\/a> to Russian cyberspies as a major area of concern. <\/p>\n<p> Assuming the stolen CIA hacking tools are real, Healey suggests that the U.S. government intervene and help vendors patch the vulnerabilities involved in this particular leak. <\/p>\n<p> \u201cDon\u2019t let [the tech vendors] go to WikiLeaks for the information,\u201d he said. \u201cLet them hear it from the U.S. and not maybe from the Russians.\u201d <\/p>\n<p> Other security experts said that while it&#8217;s possible WikiLeaks could be holding on to other secret hacking tools, the document dumps so far haven&#8217;t shown anything alarming. <\/p>\n<p> Will Strafach, CEO of Sudo Security Group, said that WikiLeaks has been exaggerating the capabilities of the leaked CIA hacking tools. <\/p>\n<p> For instance, the CIA-developed iOS exploits in the documents show that the hacking tools appear to be largely out-of-date and no longer work on iOS 10 or higher, he said. <\/p>\n<p> \u201cThe products are already patched,\u201d he said. \u201c[WikiLeaks is] definitely trying to mislead people here.\u201d <\/p>\n<p> On Wednesday, Google also said it reviewed the stolen documents and is confident that its Android OS can \u201calready shield users from many of these alleged vulnerabilities.\u201d <\/p>\n<p> However, tech vendors didn\u2019t immediately comment on whether they are reaching out to WikiLeaks. <\/p>\n<p> The controversial disclosures apparently won\u2019t win the site any fans from the CIA. <\/p>\n<p> \u201cSuch disclosures not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm,\u201d the agency said in a statement. <\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3178687\/security\/wikileaks-looks-at-helping-tech-vendors-disarm-cia-hacking-tools.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2017\/03\/cia-100712378-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 03:57:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p> WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products.<\/p>\n<p> That\u2019s because WikiLeaks has <a href=\"http:\/\/www.computerworld.com\/article\/3177797\/security\/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html\">published<\/a> secret hacking tools allegedly taken from the CIA, which appear to target smartphones, smart TVs and PCs.<\/p>\n<p> Companies including Apple and Cisco have been looking through the stolen documents to address any vulnerabilities the CIA may have exploited.\u00a0However, WikiLeaks might be able to speed up and expand the whole process.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3178687\/security\/wikileaks-looks-at-helping-tech-vendors-disarm-cia-hacking-tools.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11067,714],"class_list":["post-6909","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-government-it","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6909"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6909\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6909"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}