A new document dump from Wikileaks on Thursday claims that the CIA was able to infect a Mac’s firmware using an attack called a “sonic screwdriver.”
The documents, which are dated November 2012, are unverified. There’s also a strong likelihood that Apple has already fixed the vulnerability the CIA was supposedly able to exploit.
The method described in the documents allowed access to a Mac’s firmware using an Ethernet adaptor that plugged into the computer’s Thunderbolt port. Since the method targeted the Mac’s firmware, it could not be removed even if the computer’s user wiped the operating system clean, the documents claim.
The process sounds familiar to the so-called Thunderstrike bug that was discovered in Macs in 2015. Apple has since released a software patch that fixed the bug. In fact, Apple hired the two hackers who took credit for creating Thunderstrike. It’s unclear if the exploit detailed in the documents published by Wikileaks is the same as Thunderstrike.
Another document in Thursday’s document dump from Wikileaks describes how the CIA was supposedly able to infect “factory fresh” iPhones. However, the document is dated January 2009, and such an exploit could have been fixed by now.
The documents are the latest to come out of the “Vault 7” documents from Wikileaks. The first batch of the documents claimed that the CIA could break into Samsung smart TVs and the iPhone. While the documents appear to reveal some explosive information, many of the vulnerabilities exploited in various devices appear to have been fixed.
Apple representatives were not immediately available for comment.
NOW WATCH: A $US2.5 trillion asset manager just put a statue of a defiant girl in front of the Wall Street bull
NOW WATCH: Briefing videos
Business Insider Emails & Alerts
Site highlights each day to your inbox.