ALERT: WikiLeaks Just Dropped CIA Bomb- If You Own An iPHONE, You Need To Know This



The newest documents from Wikileaks Vault 7 have dropped today entitled “Dark Matter.”

The documents are previously unreleased and implicate the CIA in the bugging of iPhones since 2008 starting fresh from the factory.

take our poll - story continues below

Whom do you consider to be the most corrupt Democrat Politician?

  • Whom do you consider to be the most corrupt Democrat Politician?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to America's Freedom Fighters updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

Wikileaks has also made the claim that the CIA has the ability to permanently monitor or bug iPhones, even with their operating systems deleted or released.

According to Twitter, Wikileaks is slotted to give a “press briefing” via Periscope this afternoon for additional information regarding the drop.


The documents are expected to be released in the next 24-hours. The announced was made after a “press briefing” that WikiLeaks promoted on its Twitter.

According to the documents already released, ALL Apple products are affected.  This includes Apple Mac devices, Macs, and iPhones. The program known as “Dark Matter” is known to infect the device via the computer firmware. The infection will persist, even if the operating system is deleted and reinstalled. The program  was developed by

The Sonic Screwdriver project aptly titled after a Doctor Who gadget that opens just about anything, is nefarious in the way that it can easily infect other systems. The project can be launched from a USB stick, or even on an Apple Thunderbolt-to-Ethernet adapter with modified firmware.
Image result for iphone wikileaks
Potentially scarier in this release is the manual for the NightSkies tool made specifically for iPhone. NightSkies version 1.2 had been out since 2008 and according to WikiLeaks was specifically designed to be installed on “factory fresh iPhones.” This has led WikiLeaks to believe that “the CIA has been infecting the iPhone supply chain of its targets since at least 2008.”
A summary of the documents has been released on the WikiLeaks website. It reads:

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

God Bless.

Here’s How To Be Sure To Continue Seeing Our Content On Facebook



Please like and share on Facebook and Twitter!

Facebook Has Banned Us!

The leftists at Facebook decided they didn’t like our message, so they removed our page and are censoring us. Help us fight back and subscribe to our newsletter so that you can stay up-to-date with everything Facebook doesn’t want you to see!

Disqus Comments