WikiLeaks tweeted out the possibility in a poll on Wednesday Credit: Arctic Warrior WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products.That’s because WikiLeaks has published secret hacking tools allegedly taken from the CIA, which appear to target smartphones, smart TVs and PCs.Companies including Apple and Cisco have been looking through the stolen documents to address any vulnerabilities the CIA may have exploited. However, WikiLeaks might be able to speed up and expand the whole process.So far, the site hasn’t released the source code to any of the hacking tools. But on Wednesday, WikiLeaks raised the prospect that it might share the sensitive information with tech vendors as a way to quickly patch the vulnerabilities. “Tech companies are saying they need more details of CIA attack techniques to fix them faster. Should WikiLeaks work directly with them?” the site tweeted out in a poll.The day before, WikiLeaks said it was holding back from publicly sharing the source code, until a consensus emerges over how the hacking tools should be “analyzed, disarmed and published.” The site wants to prevent CIA-made “cyberweapons” from proliferating, so working with tech vendors could be a way for WikiLeaks to essentially defuse them. It’s also an offer that tech vendors probably can’t ignore.“They might have to absolutely work with WikiLeaks,” said Jason Healey, a researcher at Columbia University who studies U.S. policy on vulnerability disclosure.“How do you tell a shareholder or a user that there’s information on a hole out there, but you didn’t bother to speak with WikiLeaks about it?” he said.The other danger is that malicious parties might know about the secret CIA hacking tools too.WikiLeaks hasn’t identified the source behind the stolen documents. But it’s mentioned that former U.S. government hackers and contractors were circulating the confidential data, and that someone among them supplied a copied portion to WikiLeaks. However, Healey pointed to WikiLeak’s suspected ties to Russian cyberspies as a major area of concern.Assuming the stolen CIA hacking tools are real, Healey suggests that the U.S. government intervene and help vendors patch the vulnerabilities involved in this particular leak.“Don’t let them (the tech vendors) go to WikiLeaks for the information,” he said. “Let them hear it from the U.S. and not maybe from the Russians.”Other security experts said that while it’s possible WikiLeaks could be holding on to other secret hacking tools, the document dumps so far haven’t shown anything alarming. Will Strafach, CEO of Sudo Security Group, said that WikiLeaks has actually been exaggerating the capabilities of the leaked CIA hacking tools.For instance, the CIA-developed iOS exploits in the documents show that the hacking tools appear to be largely out-of-date and no longer work on iOS 10 or higher, he said.“The products are already patched,” he said. “They (WikiLeaks) are definitely trying to mislead people here.”On Wednesday, Google also said it reviewed the stolen documents and is confident that its Android OS can “already shield users from many of these alleged vulnerabilities.”However, tech vendors didn’t immediately comment on whether they are reaching out to WikiLeaks.The controversial disclosures apparently won’t win the site any fans from the CIA.“Such disclosures not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm,” the agency said in a statement. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe