New documents from WikiLeaks point to an apparent CIA programme to hack Apple's iPhones and Mac computers using techniques that users could not disable by resetting their devices.
Security experts said the exploits are plausible but suggest they pose little threat to typical users.
They said that many of the tricks are older - the iPhone hack involves the 3G model from 2008, for instance.
The techniques also typically require physical access to devices, something the CIA would use only for targeted individuals, not a broader population.
"The most notable part of this latest WikiLeaks release is that it shows the CIA doing exactly what we pay them to - exploit specific targets with limited attacks to support our national interests," said Rich Mogull, chief executive of security research firm Securosis.
Apple did not respond to a request for comment.
The CIA has not commented on the authenticity of this and earlier WikiLeaks revelations, but has previously said it complies with a legal prohibition against electronic surveillance "targeting individuals here at home, including our fellow Americans".
The leaks on Thursday come about two weeks after WikiLeaks published thousands of alleged CIA documents describing hacking tools it said the US government employed to break into computers, mobile phones and even smart TVs from companies such as Apple, Google, Microsoft and Samsung.
The latest disclosures are much more focused and consist of just 12 documents, all involving Apple products.
The documents describe techniques for rewriting devices' firmware in ways that would maintain a hacker's access even if a user resets a phone or computer to factory settings.
Doing so wipes out all apps and the operating system and installs a clean version; it is an extreme measure sometimes used to deal with technical problems, but is also the sort of step that someone suspicious of surveillance might take when getting a brand new phone.
A December 2008 document describes NightSkies, a tool apparently designed to target the iPhone 3G; the document claims it can retrieve files such as contact lists and call logs and execute other commands.
WikiLeaks suggested in a press release that the "CIA has been infecting the iPhone supply chain of its targets since at least 2008".
However, the document describes only how to install the malware on a "factory fresh" version of the 3G - specifically, the iPhone 3G running the 2.1 version of Apple's operating system, both of which are now nine years old.
But infecting all phones somewhere in the manufacturing process would be extremely difficult, said Mr Mogull, especially given multiple layers of inspections conducted by Apple and its contractors.
At most, he said, the CIA might have shipped a rogue phone individually to a target.
And while it is possible that the CIA developed similar techniques for later iPhone models, Mr Mogull said iPhones from the past few years have much greater security, including digital security certificates that cannot be overwritten.
A flag would be raised during the set-up process if certificates do not match.
Johannes Ullrich, director of the Internet Storm Centre at the SANS Institute, said NightSkies might not even be a current project given that the document was last updated in 2008, while the leaks appear to have come in 2016.
Other documents released describe similar exploits for Mac computers.
One hides in the firmware of Apple's Thunderbolt-to-Ethernet adapter and requires someone to plug in that adapter to install the malware.
Another targets a specific Mac model, the MacBook Air with the Leopard version of the Mac OS system - current at the time, but now seven generations old.
Mr Ullrich said the Mac exploits all appear old.
He added that some of the Thunderbolt issues have been fixed to make the hack more difficult to pull off.
Why are you making commenting on The Herald only available to subscribers?
It should have been a safe space for informed debate, somewhere for readers to discuss issues around the biggest stories of the day, but all too often the below the line comments on most websites have become bogged down by off-topic discussions and abuse.
heraldscotland.com is tackling this problem by allowing only subscribers to comment.
We are doing this to improve the experience for our loyal readers and we believe it will reduce the ability of trolls and troublemakers, who occasionally find their way onto our site, to abuse our journalists and readers. We also hope it will help the comments section fulfil its promise as a part of Scotland's conversation with itself.
We are lucky at The Herald. We are read by an informed, educated readership who can add their knowledge and insights to our stories.
That is invaluable.
We are making the subscriber-only change to support our valued readers, who tell us they don't want the site cluttered up with irrelevant comments, untruths and abuse.
In the past, the journalist’s job was to collect and distribute information to the audience. Technology means that readers can shape a discussion. We look forward to hearing from you on heraldscotland.com
Comments & Moderation
Readers’ comments: You are personally liable for the content of any comments you upload to this website, so please act responsibly. We do not pre-moderate or monitor readers’ comments appearing on our websites, but we do post-moderate in response to complaints we receive or otherwise when a potential problem comes to our attention. You can make a complaint by using the ‘report this post’ link . We may then apply our discretion under the user terms to amend or delete comments.
Post moderation is undertaken full-time 9am-6pm on weekdays, and on a part-time basis outwith those hours.
Read the rules hereComments are closed on this article