Josh, head of Enhanced Security Solutions at ASK joins Mike in this segment of the Bottom Line IT Show. He discusses the recent WikiLeaks release of the CIA’s cybercrime tools and what this may mean for all of us. Josh and Mike also get into how this occurred and discuss the current way that that the CIA operates with regard to breached information.
The CIA recently lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. These hacking tools are used to gather intelligence against individuals or governments in order to compromise systems. Unfortunately, these tools are being released through Wiki Leaks to the world. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
Although the documentation that was leaked does include specific protocol needed to compromise computers, TV’s, phones, etc. it does not include the code that is necessary to perform this actions. Some claim there is enough information in the leaked documents that smart hackers will be able to reverse engineer hacks. Time will tell if this will be done.
The FBI has not identified who is responsible for the leaks. They are interviewing many government security contractors in order to rule out an inside job. It may be a possibility that a contractor proactively gave out the information, as opposed to an outside source stealing the documentation. According to Josh, we more than likely will never know 100% of the story. We will cover more of this story on future Bottom Line IT shows as more of the details are released.
Listen to the segment here:
FOR MORE INFORMATION ABOUT ASK
To learn more about ASK cyber security and how we can help your business take the hassle out of technology, contact us today!