The latest documents posted by WikiLeaks reveal that the CIA has been hacking wireless routers for years. One particular hack, known as CherryBlossom, allowed the agency to monitor all Internet activity of a target, and even redirect their browser to government-created phishing sites …

ZDNet spotted the reference. Although the document says that the hack was operational for 25 different models of routers from major manufacturers, it is likely that the real number was much higher.

In general, once a make, model, and hardware version of a device is supported, it is straightforward to implant any later firmware versions, or international firmware versions, so long as the device has not changed its underlying hardware or operating system.

The documents list ten brands whose routers had been compromised: Asus, Belkin, Buffalo, Dell, Dlink, Linksys, Motorola, Netgear, Senao and US Robotics. Notably, Apple is not listed, suggesting that its Airport and Time Capsule products may not have fallen victim to the hack – though it’s of course conceivable that these devices were hacked at a later date.

We learned in March that the CIA has a hacking unit specifically devoted to iOS malware – and that the agency had lost control of most of it. That revelation underlined the importance of Apple’s refusal to develop a weakened version of iOS for use by law enforcement agencies. As we’ve argued many times, once a tool exists, it is only a matter of time before it leaks into the wild.


Check out 9to5Mac on YouTube!

FTC: We use income earning auto affiliate links. More.


Check out 9to5Mac on YouTube for more Apple news:

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

About the Author

Ben Lovejoy's favorite gear