• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Government

WikiLeaks Unexpectedly Releases Over 80 Types of Malware Potentially Harmful to Devices

Paul Balo by Paul Balo
August 17, 2016
in Government, Security
Share on FacebookShare on Twitter

In a surprising turn of events, WikiLeaks, renowned whistle-blowing platform, has reportedly dispersed more than 80 variants of malware in its ongoing quest to “snuff out governmental dishonour and publicize veiled state activities.” Established in 2006 by Julian Assange, WikiLeaks aims to promote transparency and combat corruption. However, its approach and timing of releases often spark controversy, attracting critique even from infamous ex-NSA contractor Edward Snowden. Snowden’s tweet in July last year addressed WikiLeaks’ contentious timing of leaks, which interestingly, coincided with the convention of the Democratic Party.

The leaks unveiled an elaborate campaign by certain factions within the party to sabotage the political rise of Bernie Sanders, Hillary Clinton’s rival. The exposé sent shockwaves across the political landscape, leading to high profile resignations, including the party’s Chairperson. This chain of events fueled theories among American analysts that WikiLeaks might be a tool of Russia, alleged to be keen on swaying the electoral pendulum towards Donald Trump, perceived to be more Russia-friendly than President Obama and Secretary Clinton. Critics, on the other hand, contend that the Democratic Party as a private entity should have been spared from such intrusive scrutiny. No matter where one stands in this ideological tug of war, the issue of malware dissemination by WikiLeaks is an undeniable concern.

Prominent cyber-security expert Vesselin Bontchev revealed on Github that WikiLeaks might have propagated 80 types of malware in its latest publication concerning Turkey’s ruling AKP party. The most recent batch of leaks included a multitude of spam and phishing emails, which unsurprisingly, major news outlets such as the New York Times found to be vaguely related, if at all, to political corruption within the Turkish government. An illuminating Twitter thread offers more details about this development. In an insightful analysis by Engadget, it was noted that the WikiLeaks Twitter account had falsely attributed over 1,400 emails in the leak to Fethullah Gülen, a cleric accused by the Turkish government of orchestrating a recent coup. However, the term “gülen” in Turkish also translates to “smiling.” Consequently, the majority of these emails were merely advertisements for Mediterranean holiday destinations, rather than incriminating evidence.

While WikiLeaks has certainly carved a niche for itself in the battle against governmental deceit and corruption, the timing and consequences of its information dumps often invite suspicion. Only a year into its operation, WikiLeaks had amassed a database of more than 1.2 million confidential documents, including classified CIA files. The recent information dump pertaining to Turkey occurred amidst a chaotic period of political unrest in the country, following a botched coup attempt that led to mass arrests and a slew of dismissals from government positions.

As we continue to discuss the role and impact of WikiLeaks in modern politics, caution is advised when accessing these files, given the potential risk of harmful malware brewing within these data dumps.

Related Posts:

  • Palo Alto Networks Earnings: A Strong Surge in…
  • Smartphone with Tik Tok logo is seen in front of displayed Oracle logo in this illustration
    TikTok Grants Oracle Full Access To Code: A…
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Irembo-Blue-Logo-400×600-1
    Irembo Rwanda Debut To Lead e-Government Penetration…
  • Singapore Is Not Looking To Regulate A.I. Just Yet,…
  • Telegram Kenya
    Telegram Faces Temporary Shutdown in Kenya.
  • laptop usage
    Addressing Data Corruption: 5 Practical Strategies
  • black-ops-2
    Leak: Call of Duty 2025 Black Ops 2 Sequel Set in 2035

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: malwaresecuritywikileaks
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Meta Previews New AI Parental Controls October 18, 2025
  • ChatGPT Mobile App Sees Drop in Usage and Downloads October 18, 2025
  • Facebook’s AI Now Suggests Photo Edits on Phones October 18, 2025
  • Reddit Expands AI Search to 5 New Languages October 18, 2025
  • Meta Ends Messenger Desktop Apps for Mac and Windows October 18, 2025
  • Microsoft Rolls Out New Windows 11 AI Copilot Features October 16, 2025

Browse Archives

October 2025
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
2728293031 
« Sep    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.