June 15, 2017
3 mins read

Vault 7: Cherry Blossom

WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).

CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for “Man-In-The-Middle” attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.

The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.

Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target’s browser (e.g., to Windex for browser exploitation) or the proxying of a Target’s network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytrap’s WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult).

Leaked Documents

Julian Assange

Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of leaks.

Previous Story

Vault 7: Pandemic

Next Story

Vault 7: Brutal Kangaroo

Latest from All Leaks

Hunter Biden Email Archive

WikiLeaks publishes large array of emails extracted from a digital device belonging to Hunter Biden. This publication is not exclusive, in accordance with our principles, but provides additional opportunity for analysis to

Fishrot

Fishrot Files All Releases  /  Documents Fishrot Files – Part 2 Today WikiLeaks releases documents pertaining to the Fishrot case that have come to light as a result of investigation into bribes,

OPCW Douma

All Releases OPCW-DOUMA – Release Part 4 Today WikiLeaks releases more internal documents from the OPCW regarding the investigation into the alleged chemical attack in Douma in April 2018. One of the

Pope’s Orders

All Releases  /  Documents Pope’s Private Letter Reveals Early Involvement in Power Struggle Documents released by WikiLeaks today shed light on a power struggle within the highest offices of the Catholic Church.

US Embassy Shopping List

Today WikiLeaks publishes confidential documents from dozens of United States Embassies around the world. The embassies’ requests ranged widely, from supplies of gardening equipment to hiring a Chinese company to create Chinese-language

Most Popular

Amazon Atlas

October 11, 2018
WikiLeaks publishes a “Highly Confidential” internal document from the cloud

Dealmaker: Al Yousef

September 28, 2018
Today WikiLeaks publishes a secret document from the International Chamber
Go toTop