Another revelation from WikiLeaks has been released. This time, there are eight exploits used by CIA in spying Android devices that conceal identity under Pokemon names.

The most recent revelations released by WikiLeaks Vault 7 have sent ripples across the globe. The information provided are massive and alarming if they are indeed true. One of the many interesting information that was recently revealed is about Pokemon hiding among exploits and hacking stunts orchestrated by the CIA.

Allegedly, according to the WikiLeaks Vault 7 reveal, the hackers took advantage of the security weak spots to remotely take control of a certain device and amass information from it. This includes user's text, voice communications, locations, and activating the device's microphone and camera.

Reportedly, out of all the CIA's hacking methods of taking control over Android devices, one-third are using Pokemon code names. For instance, an exploit termed as Dugtrio, coined after the three-headed digger Pokemon, was found to on devices running on Android 4.0 to 4.1.2. Another alleged CIA exploits named after a popular sea-star Pokemon Starmie is found on Samsung tablets as well as Galaxy Note and devices running on 4.0 to 4.3 Android.

Aside from the two, WikiLeaks Vault 7 revealed that the Spearow susceptibility gave hackers distant access to private information. In addition, Totodile, Steelix, Snubbull, and Flaaffy were also discovered used as code names. At present, Lugia is the only legendary Pokemon that was used as a code name. It is also worth noting that the code names used were only limited to Gen 2 Pokemon.

The WikiLeaks did not reveal as to how and why did the CIA use these Pokemon for code names. The agency has not made any comment about the allegations released by WikiLeaks, which started on March 7.

As to whether the information provided by the WikiLeaks Vault 7 is true or not remains to be verified. WikilLeaks, however, has a long record of releasing the top and classified government documents. Moreover, several experts confirmed that the CIA's hacks so far, appear legitimate.