According to media reports, however, WikiLeaks wasn't entirely comfortable with sharing information without stipulating a few demands of its own - including its wish to exercise its right to make details of the flaws public if they were not fixed by vendors within 90 days.
WikiLeaks, continuing its data dump of leaked CIA hacking tools, released a set of documents on Thursday that appear to show how the agency was able to spy on Apple's Mac computers and iPhones.
And to give an idea of how much data there is in this current leak, WikiLeaks notes on the release's FAQ that there are "considerably more stories than there are journalists or academics who are in a position to write them".
An older implant, and possibly Der Starke's precursor, is described in a document from 2009 for Macbook Air computers under the codename DarkSeaSkies.
"Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStarke" are also included in this release".
You may recall that Apple said after the first WikiLeaks Vault 7 dump that it had already patched most of the vulnerabilities the organization had revealed.
The CIA has consistently refused to comment on the authenticity of documents released by Wikileaks, with the Agency merely stating it complies with legal prohibitions on electronic surveillance that targets individuals on USA soil, and U.S. citizens overseas - this set of exposures is no exception.
Apple said that its preliminary assessment of the WikiLeaks documents show that the "alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released". Apple also said the Mac vulnerabilities were all fixed in all Macs launched after 2013. According to data of Wikileaks malware Central Intelligence Agency penetrated at the firmware of computers, it couldn't get uninstalled from the machine even if one format while other "weapons" infiltrated into regional computer as Sticks and USB external drives and stealing information.
On the heels of its CIA hacking bombshell, WikiLeaks on Thursday published another trove of documents outlining how the spy agency has been uploading secret software to Apple devices dating back to 2008. Numerous tricks such as the iPhone hack involving the 3G model from 2008, are older.
The ability to install rootkits inside the EFI of Mac computers is not new.
Most of the CIA's exploits seem to revolve around one thing: physical access to a device. However, it is unknown at this point whether these companies will be able to agree to work with Wikileaks as the company is in possession of stolen documents. Sonic Screwdriver can be introduced via a Thunderbolt or USB port, allowing the installation of other tools on the device without the user's knowledge.