• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechWikiLeaks

WikiLeaks Dumps Thousands of Files on Alleged CIA Hacking Tools

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
March 7, 2017, 2:52 PM ET

WikiLeaks on Tuesday published thousands of computer files allegedly belonging to the United States’ Central Intelligence Agency that it said pertained to an extensive trove of sophisticated hacking tools used by the spy organization to conduct espionage.

The secret-leaking website said the CIA’s arsenal contained digital weapons that can compromise smartphones, including Apple (AAPL) iPhones and Google (GOOG) Android-powered devices, Microsoft (MSFT) Windows-based computers, and Samsung (SSNLF) “smart” television sets. The dump contained, by WikiLeaks’ count, a total of 8,761 documents and attachments supposedly originating from an “isolated, high-security network” at the CIA’s headquarters in Langley, Virginia.

WikiLeaks boasted that its hoard of material—dubbed “Year Zero,” the first release in a series it’s calling “Vault 7″—surpassed the number of documents brought to light by Edward Snowden, the National Security Agency contractor-turned-whistleblower, who went rogue in 2013. The website said the full collection, which “gives its possessor the entire hacking capacity of the CIA,” spans from 2013 through 2016.

Get Data Sheet, Fortune’s technology newsletter.

The CIA neither confirmed nor denied the legitimacy of the leak. “We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fortune in an email.

Although WikiLeaks typically chooses not to comment on its sources, the website suggested that the cache had been “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom provided WikiLeaks with portions of the archive.” In another unusual step, the site redacted some personally identifying information contained in the documents, although it warned that its attempts were likely not comprehensive.

WikiLeaks said its source wished to spark an open discussion about the CIA’s mission and oversight that “urgently need to be debated in public.” It added that the source wanted to raise concerns “about the security, creation, use, proliferation and democratic control of cyberweapons.”

In a statement, Julian Assange, the site’s editor echoed the sentiment: “There is an extreme proliferation risk in the development of cyber ‘weapons’,” he said. “Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade.”

Critics have blasted WikiLeaks in recent months for broadcasting what they deemed to be politically charged disinformation during the recent U.S. presidential election, and for publishing hacked documents allegedly stolen by Russian agents. Before leaving office earlier this year, former President Barrack Obama’s administration released a report that described the site as having close ties to the Kremlin.

For more on WikiLeaks, watch:

Consistent with the tradecraft of the spy world, many of the alleged hacking tools have characteristically colorful codenames, like “Weeping Angel” (for turning a smart TV into an audio bug), “Hammer Drill” (for breaching air-gapped computers with malware-infected CDs and DVDs), and “Fine Dining” (for hijacking computer systems while pretending to do something else like, say, playing a video). The cache of remote exploits is reminiscent of the network-compromising code put up for auction by a shadowy hacker group called the Shadow Brokers last summer.

The leaked information purports also to divulge organizational details about the CIA’s cyber division, called the Center for Cyber Intelligence, a unit with a mandate similar to the NSA and the military’s Cyber Command.

Thomas Rid, a professor who studies information warfare at King’s College London, remarked in a post on Twitter that it was “too early” to tell how harmful the latest alleged leak might be to the U.S. intelligence community’s interests, “but if details on exploits are genuine, then dump could be extremely damaging.”

“This stuff is cool, and I’m sure most would rather plug the holes, but don’t fool yourself, its a setback for counterterrorism,” commented John Hultquist, threat intelligence manager for the cybersecurity firm FireEye (FEYE).

Several security experts commented online that they were less shocked by the number and capabilities of the supposed hacking tools than they were that someone—perhaps some group, or government—had the audacity to steal and leak them in the first place, assuming they are legit.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Greg Abbott and Sundar Pichai sit next to each other at a red table.
AITech Bubble
Bank of America predicts an ‘air pocket,’ not an AI bubble, fueled by mountains of debt piling up from the data center rush
By Sasha RogelbergDecember 3, 2025
11 minutes ago
Alex Karp smiles on stage
Big TechPalantir Technologies
Alex Karp credits his dyslexia for Palantir’s $415 billion success: ‘There is no playbook a dyslexic can master… therefore we learn to think freely’
By Lily Mae LazarusDecember 3, 2025
37 minutes ago
Isaacman
PoliticsNASA
Billionaire spacewalker pleads his case to lead NASA, again, in Senate hearing
By Marcia Dunn and The Associated PressDecember 3, 2025
48 minutes ago
Kris Mayes
LawArizona
Arizona becomes latest state to sue Temu over claims that its stealing customer data
By Sejal Govindarao and The Associated PressDecember 3, 2025
1 hour ago
Startups & VentureLeadership Next
Only social media platforms with ‘real humanity’ will survive, investor and Reddit cofounder Alexis Ohanian says
By Fortune EditorsDecember 3, 2025
2 hours ago
NewslettersCIO Intelligence
Dave’s Hot Chicken is placing broad bets on AI to give the restaurant chain an edge in the chicken wars
By John KellDecember 3, 2025
2 hours ago

Most Popular

placeholder alt text
North America
Jeff Bezos and Lauren Sánchez Bezos commit $102.5 million to organizations combating homelessness across the U.S.: ‘This is just the beginning’
By Sydney LakeDecember 2, 2025
1 day ago
placeholder alt text
Economy
Ford workers told their CEO 'none of the young people want to work here.' So Jim Farley took a page out of the founder's playbook
By Sasha RogelbergNovember 28, 2025
5 days ago
placeholder alt text
North America
Anonymous $50 million donation helps cover the next 50 years of tuition for medical lab science students at University of Washington
By The Associated PressDecember 2, 2025
1 day ago
placeholder alt text
Economy
Elon Musk says he warned Trump against tariffs, which U.S. manufacturers blame for a turn to more offshoring and diminishing American factory jobs
By Sasha RogelbergDecember 2, 2025
1 day ago
placeholder alt text
Success
Warren Buffett used to give his family $10,000 each at Christmas—but when he saw how fast they were spending it, he started buying them shares instead
By Eleanor PringleDecember 2, 2025
1 day ago
placeholder alt text
C-Suite
MacKenzie Scott's $19 billion donations have turned philanthropy on its head—why her style of giving actually works
By Sydney LakeDecember 2, 2025
1 day ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.