Saturday, December 2, 2023

Ex-CIA Official Allegedly Leaked CIA’s Secret Hacking Tools To WikiLeaks

Recently, on Monday in New York, a federal judge has announced the verdict in the case of a former CIA software engineer who was blamed for stealing a massive trove of the agency’s detailed secret hacking tools and leaking 8000 classified CIA documents to the well-known whistleblower WikiLeaks, under the name “Vault 7”.

When the jury was inadequate to give a judgment on eight counts of the crime and transmission of CIA’s private documents, it did get ex-CIA Joshua Schulte guilty on two counts of contempt of court and presenting false reports to the FBI investigators.

Thus, on March 9, 2020, a federal judge condemned Joshua Schulte of two charges of abusing the court and presenting false statements against FBI agents, as we said before.

But, after four weeks of trial, there was not a clear proof that Schulte gave information after eight weeks of trials, including ‘theft of private information from the CIA,’ which should have been the main issue.

Yes! the jury did find Schulte chargeable on two counts of presenting false statements to investigators and contempt of court, reads NYTimes report.

However, the failure to give a unanimous approval on the most severe charges of revealing classified information was a vital blow to the government’s case.

Hence, a spokesperson for the U.S. attorney in the Southern District of New York refused to comment on this matter.

After that, during a trial that lasted more than a month, prosecutors characterized Schulte as a disgruntled employee who turned on revenge after his bosses abandoned to take his side in a conflict with a CIA co-worker.

The juror indicated last week that they were having difficulty apprehending a unanimous agreement on all of the charges.

Thus, the judge dropped one juror who showed she might have been studying about the case outside of discussions, which the judge had forbidden.

However, the Juror later stated that the government had displeased to prove beyond a reasonable doubt that Joshua Schulte presented the hacking tools to WikiLeaks.

Vault 7 Leak

As Vault 7 was the most significant leak of detailed information in the intelligence agency’s history.

That revealed the CIA’s undercover cyber-weapons and spying methods that the United States government applied to monitor or crack into computers, mobile phones, televisions, webcams, video streams, and more networks worldwide.

Therefore, the court will operate the next hearing later this month to review the further steps to be taken in the case.

Meantime, Joshua Schulte will also go over a separate trial for the child-pornography case, where the charges have not been fully settled, but provide a 20-year maximum sentence.

Joshua Schulte

However, last week in a separate report printed, a Chinese cybersecurity company blamed the CIA for being after an 11-year-long hacking operation that targeted various Chinese industries and government companies.

The Researchers also accused the CIA based upon the connections between the tools and exploits flowed in the Vault 7 archive and the tools utilized on the cyberattacks.

So, what do you think about this? Simply share all your views and thoughts in the comment section below. And if you liked this post then simply do not forget to share this post with your friends and on your social profiles.

Read More:

WikiLeaks Founder Julian Assange Arrested at Ecuadorian Embassy in London

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WikiLeaks

Vault 8 Leaks: Wikileaks Revealed CIA’s Secret Malware Control System called “Hive” Source Code


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles