Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Weeping Angel, Brutal Kangaroo and other secret CIA code names from the WikiLeaks surveillance leak

Other code names include Fine Dining, Cutthroat and HarpyEagle.

Julian Assange, founder of WikiLeaks
Julian Assange, founder of WikiLeaks
Julian Assange, founder of WikiLeaks
Carl Court / Getty

WikiLeaks shared nearly 9,000 pages of leaked documents from the Central Intelligence Agency today. The new cache details covert mass surveillance programs that appear to undermine encryption in iPhones, Android smartphones, Samsung smart TVs and other internet-connected devices.

The documents also describe a number of malware attacks used by the CIA to survey users on Windows, Mac OS and Linux operating systems.

Similar to the disclosures from Edward Snowden on the National Security Agency’s global cyberspying in 2013, this new document dump is loaded with bizarre, classified code names purportedly used by the CIA that sound like they were borrowed straight from the pages of a pulpy spy thriller.

WikiLeaks says that the trove shared today is only a fraction of what is to come in an ongoing series of leaks, which the organization is calling Vault 7.

Here are just a few of the secret cyberspying programs revealed by WikiLeaks today:

  • Weeping Angel, as described in the released documents, is an exploit that targets Samsung smart TVs by placing the internet-connected appliance in a “Fake Off” mode that makes the television appear to be turned off while it covertly sends audio recordings from the room to the CIA.
  • Brutal Kangaroo is malware created by the CIA to infiltrate computers that run Windows by infecting parts of the disk drive, according to WikiLeaks. Similar programs described include efforts to hide malware in .jpg and .png image files.
  • Fine Dining appears to be a list of 24 “decoy applications” that CIA agents can use to manually infect a computer or collect data. While the system appears to be running a video application or looking at a slideshow presentation, the operator can simultaneously run a program to infiltrate it, WikiLeaks reports.
  • Cutthroat and Swindle are part of the CIA’s multiplatform Hive “malware suite” that targets Windows, Linux and Solaris operating systems and MikroTik internet routers and helps establish communication with the infected systems, according to the released documents.
  • HammerDrill is described as a program that compromises Windows operating systems by infiltrating software from CDs and DVDs and logs when discs are inserted into the machine.
  • HarpyEagle appears to be a CIA program focused on finding ways of accessing the file systems of Apple AirPort Extreme and AirPort Time Capsule routers, according to one of the leaked documents.

This article originally appeared on Recode.net.

See More:

More in Technology

Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol
Podcasts
The importance of space toilets, explainedThe importance of space toilets, explained
Podcast
Podcasts

Houston, we have a plumbing problem.

By Peter Balonon-Rosen and Sean Rameswaram
Technology
What happened when they installed ChatGPT on a nuclear supercomputerWhat happened when they installed ChatGPT on a nuclear supercomputer
Technology

How they’re using AI at the lab that created the atom bomb.

By Joshua Keating
Future Perfect
Humanity’s return to the moon is a deeply religious missionHumanity’s return to the moon is a deeply religious mission
Future Perfect

Space barons like Jeff Bezos and Elon Musk don’t seem religious. But their quest to colonize outer space is.

By Sigal Samuel