WikiLeaks begins a new series of leaks on the U.S. Central Intelligence Agency. With the codename "Vault 7", it is the largest publication of confidential documents on the agency.
WikiLeaks got the portion of the data from archive that appears to have circulated among former U.S. government hackers and contractors in an unauthorized manner. It has several millions lines of code that contains CIA's hacking arsenals: malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation.
The first full part, called "Year Zero", comprises of 8,761 documents and files taken from an isolated and high-security network inside CIA's Center for Cyber Intelligence in Langley, Virgina. It also includes 7818 web pages with 943 attachments from the internal development groupware
While the "Vault 7" includes information obtained in the period between 2013 and 2016 with an introductory disclosure of the CIA targeting French political parties and candidates in the lead up to the 2012 presidential election, the "Year Zero" which is the first part, focuses more on recent events,
ENCRYPTED RELEASE
Use a 'torrent' downloader on: https://t.co/gpBxJAoYD5
And '7z' to decrypt.
Passphrase will be made public at Tue 9am ET. pic.twitter.com/MxZQtoaCMK— WikiLeaks (@wikileaks) March 7, 2017
Julian Assange, WikiLeaks editor stated that:
RELEASE: Vault 7 Part 1 "Year Zero": Inside the CIA's global hacking force https://t.co/h5wzfrReyy pic.twitter.com/N2lxyHH9jp
— WikiLeaks (@wikileaks) March 7, 2017
After reviewing the "Year Zero" disclosure, WikiLeaks concluded that it was used on attack attempts to tens of thousands of CIA targets throughout Latin America, Europe and the U.S..
According to its analysis, the CIA malware and hacking tools are built with EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). EDG has created and developed, as well as tested and operated on all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
Targets include Windows, OSx, Linux, routers, iPhone, Android, smart TVs
While WikiLeaks is aware of the imperfect results of any approach chosen to verify the sources, it remains committed to its publishing model and note that the quantity of published pages in "Year Zero" already eclipses the total number of pages published over the first three years of the NSA leaks by former contractor and whistleblower Edward Snowden.