July 6, 2017
1 min read

Vault 7: BothanSpy

WikiLeaks publishes documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors.

BothanSpy is an implant that targets the SSH client program Xshell on the Microsoft Windows platform and steals user credentials for all active SSH sessions. These credentials are either username and password in case of password-authenticated SSH sessions or username, filename of private SSH key and key password if public key authentication is used. BothanSpy can exfiltrate the stolen credentials to a CIA-controlled server (so the implant never touches the disk on the target system) or save it in an enrypted file for later exfiltration by other means. BothanSpy is installed as a Shellterm 3.x extension on the target machine.

Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms (centos,debian,rhel,suse,ubuntu). The implant can not only steal user credentials of active SSH sessions, but is also capable of collecting full or partial OpenSSH session traffic. All collected information is stored in an encrypted file for later exfiltration. It is installed and configured by using a CIA-developed root kit (JQC/KitV) on the target machine.

Leaked Documents

Tim Stigal

Independent and free in every sense Chechen journalist, financial analyst and trader who believes in God and defends the rights and honor of oppressed people.

Previous Story

Vault 7: OutlawCountry

Next Story

Vault 7: Highrise

Previous Story

Vault 7: OutlawCountry

Next Story

Vault 7: Highrise

Latest from Blog

Secret Congressional Reports

6,780 reports comprising over 127,000 pages of material on some of the most contentious issues in the nation, from the US relationship with Israel to the financial collapse. Change you can download:

Amazon Atlas

WikiLeaks publishes a “Highly Confidential” internal document from the cloud computing provider Amazon. The document from late 2015 lists the addresses and some operational details of over one hundred data centers spread

Dealmaker: Al Yousef

Today WikiLeaks publishes a secret document from the International Chamber of Commerce (ICC) International Court of Arbitration, pertaining to a dispute over commission payment in relation to a $3.6 billion arms deal

Vault 8

Source code and analysis for CIA software projects including those described in the Vault7 series. This publication will enable investigative journalists, forensic experts and the general public to better identify and understand

Vault 7: Protego

WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware/software manuals from Microchip Technology Inc.). The project was maintained between 2014 and 2015.
Go toTop