• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Former CIA Engineer Convicted of Leaking ‘Vault 7’ Hacking Secrets to Wikileaks

You are here: Home / General Cyber Security News / Former CIA Engineer Convicted of Leaking ‘Vault 7’ Hacking Secrets to Wikileaks
July 14, 2022

Hacking Secrets to Wikileaks

Joshua Schulte, a previous programmer with the U.S. Central Intelligence Agency (CIA), has been discovered responsible of leaking a trove of labeled hacking resources and exploits dubbed Vault 7 to WikiLeaks.

The 33-12 months-aged engineer experienced been billed in June 2018 with unauthorized disclosure of labeled details and theft of classified substance. Schulte also faces a independent trial on expenses related to possession of youngster pornographic images and videos, for which he was arrested on August 24, 2017.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


U.S. Lawyer Damian Williams explained in a assertion that Schulte was convicted for “a single of the most brazen and detrimental acts of espionage in American historical past,” introducing his steps experienced a “devastating result on our intelligence neighborhood by giving critical intelligence to all those who want to do us harm.”

WikiLeaks would go on to release the documents on March 7, 2017, contacting it the “most significant at any time publication of confidential paperwork on the agency.” This provided an arsenal of “malware, viruses, trojans, weaponized ‘zero-day’ exploits, malware distant handle methods, and related documentation.”

The files, courting from 2013 to 2016, also in-depth the agency’s ability to compromise vehicles, clever TVs, web browsers, and extensively-utilized desktop and mobile operating units this sort of as Windows, macOS, Linux, Android, and iOS as element of its abroad spying functions to obtain intel.

At the very least 91 tools, formulated by the Operations Assist Department (OSB) of the elite hacking unit, are said to have been compromised subsequent the leak to the whistleblowing platform.

The Associated Push reported that prosecutors argued Schulte orchestrated the leak as retribution for disrespecting and disregarding his complaints about the get the job done setting. In his closing argument, he claimed that “hundreds of men and women experienced accessibility” to the leaked information and that “hundreds of folks could have stolen it.”

CyberSecurity

In a intriguing profile about Schulte past month, The New Yorker painted the photo of a disgruntled employee, describing him as “abrasive,” “opinionated,” and “obstreperous” during his time at the agency right until November 2016, when he joined Bloomberg.

Schulte, who has been residing at the Metropolitan Detention Centre ahead of the demo, has compared his confinement conditions to a “torture cage” and as some thing “down below that of impoverished individuals living in third world countries.” He is also explained to have transformed to Islam, observing a month of daytime fasting throughout Ramadan.

“Joshua Adam Schulte was a CIA programmer with entry to some of the country’s most beneficial intelligence-collecting cyber tools used to fight terrorist organizations and other malign influences around the globe,” Williams explained.

“When Schulte began to harbor resentment toward the CIA, he covertly collected those people tools and delivered them to WikiLeaks, building some of our most critical intelligence instruments identified to the community – and therefore, our adversaries.”

Found this article intriguing? Comply with THN on Fb, Twitter  and LinkedIn to read much more exceptional written content we post.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Fewer Fall Victim to Data Breaches as Attackers Switch to Business in 2022
Next Post: Journalists Emerge as Favored Attack Target for APTs journalists emerge as favored attack target for apts»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.