CIA has been hacking into Wi-Fi routers for years, leaked documents show

The hacking tools target hundreds of models developed by dozens of router manufacturers.
Written by Zack Whittaker, Contributor

Leaked secret documents have revealed that the CIA has been targeting and compromising home, office, and public wireless routers for years in an effort to carry out clandestine surveillance.

The documents, which could not be immediately verified, are part of an ongoing series of leaks released by the website WikiLeaks, revealing the work of the CIA's elite hacking unit, dubbed the Engineering Development Group.

Among the dozens of files are user and installation guides, manuals, and other "secret"-marked maps and charts that reveal several hacking tool suites, which allow the agency to conduct targeted exploitation of networks and computers.

One of the tools, dubbed CherryBlossom, allows the agency to monitor the internet activity of a target, redirect their browser, scan for email addresses and phone numbers, and other software exploits.

(Image: supplied)

Routers remain a prime target for intelligence agencies and hackers alike because of they act as a central port of call for an entire network. What makes routers such an attractive target is that they are more often than not riddled with security flaws that make exploitation easy.

According to one 2010-dated document, the CIA had by mid-2012 developed implants "for roughly 25 different devices from 10 different manufacturers," including Asus, Belkin, D-Link, Linksys, and Netgear.

"In general, once a make, model, and hardware version of a device is supported, it is straightforward to implant any later firmware versions, or international firmware versions, so long as the device has not changed its underlying hardware or operating system," said the document.

It's not clear if the implants are still working today or if they were retired.

Editorial standards