• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Government

WikiLeaks Unexpectedly Releases Over 80 Types of Malware Potentially Harmful to Devices

Paul Balo by Paul Balo
August 17, 2016
in Government, Security
Share on FacebookShare on Twitter

In a surprising turn of events, WikiLeaks, renowned whistle-blowing platform, has reportedly dispersed more than 80 variants of malware in its ongoing quest to “snuff out governmental dishonour and publicize veiled state activities.” Established in 2006 by Julian Assange, WikiLeaks aims to promote transparency and combat corruption. However, its approach and timing of releases often spark controversy, attracting critique even from infamous ex-NSA contractor Edward Snowden. Snowden’s tweet in July last year addressed WikiLeaks’ contentious timing of leaks, which interestingly, coincided with the convention of the Democratic Party.

The leaks unveiled an elaborate campaign by certain factions within the party to sabotage the political rise of Bernie Sanders, Hillary Clinton’s rival. The exposé sent shockwaves across the political landscape, leading to high profile resignations, including the party’s Chairperson. This chain of events fueled theories among American analysts that WikiLeaks might be a tool of Russia, alleged to be keen on swaying the electoral pendulum towards Donald Trump, perceived to be more Russia-friendly than President Obama and Secretary Clinton. Critics, on the other hand, contend that the Democratic Party as a private entity should have been spared from such intrusive scrutiny. No matter where one stands in this ideological tug of war, the issue of malware dissemination by WikiLeaks is an undeniable concern.

Prominent cyber-security expert Vesselin Bontchev revealed on Github that WikiLeaks might have propagated 80 types of malware in its latest publication concerning Turkey’s ruling AKP party. The most recent batch of leaks included a multitude of spam and phishing emails, which unsurprisingly, major news outlets such as the New York Times found to be vaguely related, if at all, to political corruption within the Turkish government. An illuminating Twitter thread offers more details about this development. In an insightful analysis by Engadget, it was noted that the WikiLeaks Twitter account had falsely attributed over 1,400 emails in the leak to Fethullah Gülen, a cleric accused by the Turkish government of orchestrating a recent coup. However, the term “gülen” in Turkish also translates to “smiling.” Consequently, the majority of these emails were merely advertisements for Mediterranean holiday destinations, rather than incriminating evidence.

While WikiLeaks has certainly carved a niche for itself in the battle against governmental deceit and corruption, the timing and consequences of its information dumps often invite suspicion. Only a year into its operation, WikiLeaks had amassed a database of more than 1.2 million confidential documents, including classified CIA files. The recent information dump pertaining to Turkey occurred amidst a chaotic period of political unrest in the country, following a botched coup attempt that led to mass arrests and a slew of dismissals from government positions.

As we continue to discuss the role and impact of WikiLeaks in modern politics, caution is advised when accessing these files, given the potential risk of harmful malware brewing within these data dumps.

Related Posts:

  • Palo Alto Networks Earnings: A Strong Surge in…
  • Smartphone with Tik Tok logo is seen in front of displayed Oracle logo in this illustration
    TikTok Grants Oracle Full Access To Code: A…
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Irembo-Blue-Logo-400×600-1
    Irembo Rwanda Debut To Lead e-Government Penetration…
  • Singapore Is Not Looking To Regulate A.I. Just Yet,…
  • Telegram Kenya
    Telegram Faces Temporary Shutdown in Kenya.
  • laptop usage
    Addressing Data Corruption: 5 Practical Strategies
  • black-ops-2
    Leak: Call of Duty 2025 Black Ops 2 Sequel Set in 2035

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: malwaresecuritywikileaks
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Breaking: Google Keeps Chrome, But Judge Orders Search Data Sharing September 2, 2025
  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025
  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.