X

CIA's hackers are allegedly fixated on Pokemon

At least eight of the CIA's exploits to spy on Android devices are named after Pokemon, according to WikiLeaks.

Alfred Ng Senior Reporter / CNET News
Alfred Ng was a senior reporter for CNET News. He was raised in Brooklyn and previously worked on the New York Daily News's social media and breaking news teams.
Alfred Ng
2 min read
pokemon-go-update.jpg
Enlarge Image
pokemon-go-update.jpg

Totodile, a starter in Pokemon Gold and Silver, is also the name of one of the CIA's Android exploits, according to WikiLeaks.

Niantic

Gotta hack 'em all.

There are several Pokemon hidden among the CIA's Android exploits and hacking techniques divulged in thousands of documents released by WikiLeaks on Tuesday. The agency's hackers allegedly used security vulnerabilities to take control of a device remotely, and could then collect information like a user's location, texts and voice communications, as well as activate the phone's camera and microphone.

CNET is unable to verify if the documents are real or unaltered. WikiLeaks has a long track record of releasing top secret government documents, and experts said the CIA's hacks appear legitimate, according to CBS News.

Watch this: How do WikiLeaks' CIA hacking claims differ from Snowden NSA?

Of the CIA's alleged techniques to take control of Android devices, nearly one-third of them have code names inspired by Pokemon.

The choice of code names is an amusing quirk in an otherwise serious potential breach of US spy craft. It speaks to how much of a cultural phenomenon Pokemon has been since its release in 1996. It enjoyed a renewed wave of popularity last year thanks to Pokemon Go . Now, it looks like Nintendo's critters are finding themselves in the CIA's catalog of hacks.

screen-shot-2017-03-07-at-1-15-46-pm.png
Enlarge Image
screen-shot-2017-03-07-at-1-15-46-pm.png

"Starmie" and "Spearow" are among the Pokemon-inspired code names for the CIA's hacking programs.

WikiLeaks

An exploit named "Dugtrio," after the three-headed digging Pokemon, affected devices on Android 4.0 to 4.1.2, allowing hackers to gain remote access to devices. Another vulnerability code-named Starmie, a popular sea-star Pokemon, affected Samsung tablets , the Galaxy Note and devices on Android 4.0 to 4.3.

The Spearow vulnerability gave hackers remote access to private information, according to WikiLeaks. The code names only go up to the second generation of Pokemon, with Lugia as the only legendary Pokemon to become an Android exploit.

Pokemon like Totodile, Steelix, Snubbull and Flaaffy also popped up as code names.

It's unclear how or why the CIA would pick these names, and the intelligence agency is not commenting on WikiLeaks' allegations. The bizarre monikers aren't limited to just Pokemon, however.

WikiLeaks accused the CIA of using programs with interesting names like "Weeping Angel" to hack into devices and spy on people. The "Weeping Angel" program was used to infiltrate Samsung's smart TVs to turn them into hidden microphones, with a "Fake-Off" mode. Other ridiculous code names included "Hammer Drill" and "Brutal Kangaroo."

I spy with an iPhone: What tech's open to the CIA?

See all photos

It's Complicated: This is dating in the age of apps. Having fun yet? These stories get to the heart of the matter.

Batteries Not Included: The CNET team reminds us why tech is cool.