There are several Pokemon hidden among the CIA's Android exploits and hacking techniques divulged in thousands of documents released by WikiLeaks on Tuesday. The agency's hackers allegedly used security vulnerabilities to take control of a device remotely, and could then collect information like a user's location, texts and voice communications, as well as activate the phone's camera and microphone.
CNET is unable to verify if the documents are real or unaltered. WikiLeaks has a long track record of releasing top secret government documents, and experts said the CIA's hacks appear legitimate, according to CBS News.
Watch this: How do WikiLeaks' CIA hacking claims differ from Snowden NSA?
The choice of code names is an amusing quirk in an otherwise serious potential breach of US spy craft. It speaks to how much of a cultural phenomenon Pokemon has been since its release in 1996. It enjoyed a renewed wave of popularity last year thanks to
. Now, it looks like Nintendo's critters are finding themselves in the CIA's catalog of hacks.
An exploit named "Dugtrio," after the three-headed digging Pokemon, affected devices on Android 4.0 to 4.1.2, allowing hackers to gain remote access to devices. Another vulnerability code-named Starmie, a popular sea-star Pokemon, affected
and devices on Android 4.0 to 4.3.
The Spearow vulnerability gave hackers remote access to private information, according to WikiLeaks. The code names only go up to the second generation of Pokemon, with Lugia as the only legendary Pokemon to become an Android exploit.
Pokemon like Totodile, Steelix, Snubbull and Flaaffy also popped up as code names.
It's unclear how or why the CIA would pick these names, and the intelligence agency is not commenting on WikiLeaks' allegations. The bizarre monikers aren't limited to just Pokemon, however.
WikiLeaks accused the CIA of using programs with interesting names like "Weeping Angel" to hack into devices and spy on people. The "Weeping Angel" program was used to infiltrate Samsung's smart TVs to turn them into hidden microphones, with a "Fake-Off" mode. Other ridiculous code names included "Hammer Drill" and "Brutal Kangaroo."
I spy with an iPhone: What tech's open to the CIA?