April 7, 2017
1 min read

Vault 7: Grasshopper Framework

WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise

Leaked Documents

Julian Assange

Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of leaks.

Previous Story

Vault 7: Marble Framework

Next Story

Vault 7: Weeping Angel

Latest from All Leaks

Hunter Biden Email Archive

WikiLeaks publishes large array of emails extracted from a digital device belonging to Hunter Biden. This publication is not exclusive, in accordance with our principles, but provides additional opportunity for analysis to

Fishrot

Fishrot Files All Releases  /  Documents Fishrot Files – Part 2 Today WikiLeaks releases documents pertaining to the Fishrot case that have come to light as a result of investigation into bribes,

Pope’s Orders

All Releases  /  Documents Pope’s Private Letter Reveals Early Involvement in Power Struggle Documents released by WikiLeaks today shed light on a power struggle within the highest offices of the Catholic Church.

US Embassy Shopping List

Today WikiLeaks publishes confidential documents from dozens of United States Embassies around the world. The embassies’ requests ranged widely, from supplies of gardening equipment to hiring a Chinese company to create Chinese-language

Amazon Atlas

WikiLeaks publishes a “Highly Confidential” internal document from the cloud computing provider Amazon. The document from late 2015 lists the addresses and some operational details of over one hundred data centers spread

Most Popular

Amazon Atlas

October 11, 2018
WikiLeaks publishes a “Highly Confidential” internal document from the cloud
Go toTop