The latest dump of "leaked" documents from WikiLeaks reportedly from the CIA details the "Cherry Blossom" firmware modification program, which allowed intelligence agencies to change firmware in a networking company's factories — but Apple AirPort hardware appears to be unaffected by the effort.
The latest dump from the "Vault 7" data details the program where the U.S. CIA was able to redirect a surveillance target's web traffic, scan for passwords, and monitor site visits from a penetrated router. The two methods of installing the package are either another undetailed tool called Claymore, or through a "supply-chain operation" in the factories or distribution chains themselves.
The document dump of files generated by the CIA from as late as 2012 claims that devices from Asus, Belkin, Buffalo, Dell, DLink, Linksys, Motorola, Netgear, Senao, and US Robotics were susceptible to the attack vector. According to WikiLeaks, the Stanford Research Institute was a key partner in developing the CIA's tool.
A "Vault 7" dump surrounding Apple wireless networking equipment circulated in March. The "Harpy Eagle" project sought to penetrate the AirPort family of hardware, but failed with all efforts stymied by a combination of Apple's encryption efforts, and the company's custom hardware solutions.
There were no no fully functional or reliable exploits published that allowed the CIA to insert itself in a target's network through AirPort router hardware. Since the data dump's conclusion at the end of 2015, Apple has released four firmware updates for the hardware, further setting back the intelligence community's efforts.
Apple revealed after the initial data dump that it had patched most of the CIA's exploits in iOS 10.
The future of Apple's AirPort hardware is unclear. Internal departmental changes, reinforced by a report about Apple engineers now at eero, suggest that Apple has no plans to update its existing lineup of routers, including the AirPort Extreme, Time Capsule, and AirPort Express, but do not discount the possibility of the functionality being added to a different product. Apple's AirPort Express network extender and AirPlay audio target have not even been updated to the 802.11ac Wi-Fi specification, many years after release.
Without specifically confirming the dissolution of the AirPort hardware division, AppleInsider has been told by sources within Apple not authorized to speak on behalf of the company that the AirPort ecosystem back to the 802.11n version of the AirPort Extreme basestation would be made "as safe as possible for as long as possible."
63 Comments
Since I've got the keys tonight, we're leaving this thread open, as long as you all behave with each other and treat each other as reasonable human beings.
As a reminder, the news-item forum traffic is less than 5% of AI's traffic, and comments you leave are Google-searchable. Some of us work here -- so don't ruin it for us.
Glad to know Airport hasn't been exploited. Would be nice though to learn what Apple plans to do with the hardware. I have the flat AirPort Extreme. Not too long ago the Comcast modem/router was not playing nice with the AirPort Extreme and the Comcast techs were saying just use their router. I replied 'thanks but no thanks!' I'm happy with every Apple product I own. If only I had stock in the company now that would truly make my day. Lol.
If Apple knows this then why on Earth are they wanting to kill off Airport Extreme Routers? I would probably be one of those who rushes out and buys them all up but that would be useless if Apple stop sending out firmware updates once it kills it off. This doesn't make sense to me. You'd think they would expand on Airport not kill it off.
Makes you wonder who the bigger terrorists are.
Yes it's so true about the AirPort Extreme Router. I have never had an issue with it and it works the best. I had ATT routers that were given to me free but they were useless. I don't understand why Apple wants to eliminate such excellent hardware.