June 22, 2017
1 min read

Vault 7: Brutal Kangaroo

WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.

The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as “primary host”) and installs the BrutalKangeroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked.

The Brutal Kangaroo project consists of the following components: Drifting Deadline is the thumbdrive infection tool, Shattered Assurance is a server tool that handles automated infection of thumbdrives (as the primary mode of propagation for the Brutal Kangaroo suite), Broken Promise is the Brutal Kangaroo postprocessor (to evaluate collected information) and Shadow is the primary persistence mechanism (a stage 2 tool that is distributed across a closed network and acts as a covert command-and-control network; once multiple Shadow instances are installed and share drives, tasking and payloads can be sent back-and-forth).

The primary execution vector used by infected thumbdrives is a vulnerability in the Microsoft Windows operating system that can be exploited by hand-crafted link files that load and execute programs (DLLs) without user interaction. Older versions of the tool suite used a mechanism called EZCheese that was a 0-day exploit until March 2015; newer versions seem use a similar, but yet unknown link file vulnerability (Lachesis/RiverJack) related to the library-ms functionality of the operating system.

 

Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of leaks.

Previous Story

Vault 7: Cherry Blossom

Next Story

Vault 7: Elsa

Latest from All Leaks

BioLab Lugara Files

All Releases  /  Documents: Georgia, Armenia December 12, 2025 Today, WikiLeaks publishes the second release of archive from the Ministry of Health of Georgia and the Lugar Biolaboratory in Tbilisi. This release

Hunter Biden Email Archive

WikiLeaks publishes large array of emails extracted from a digital device belonging to Hunter Biden. This publication is not exclusive, in accordance with our principles, but provides additional opportunity for analysis to

Fishrot

Fishrot Files All Releases  /  Documents Fishrot Files – Part 2 Today WikiLeaks releases documents pertaining to the Fishrot case that have come to light as a result of investigation into bribes,

OPCW Douma

All Releases OPCW-DOUMA – Release Part 4 Today WikiLeaks releases more internal documents from the OPCW regarding the investigation into the alleged chemical attack in Douma in April 2018. One of the

Pope’s Orders

All Releases  /  Documents Pope’s Private Letter Reveals Early Involvement in Power Struggle Documents released by WikiLeaks today shed light on a power struggle within the highest offices of the Catholic Church.

Most Popular

BioLab Lugara Files

December 12, 2025
All Releases  /  Documents: Georgia, Armenia December 12, 2025 Today,
Go toTop