HAPPENING NEW VAULT 7 LEAK!
https://twitter.com/wikileaks/status/850285712696061953
>WikiLeaks:
>=RELEASE: CIA malware for Windows "Grasshopper" -- which includes its own language
https://wikileaks.org/vault7/?g#Grasshopper
Julian Assange Press Conference and Q&A on Vault 7, Year Zero and the CIA (03-09-2017): https://youtu.be/uxmMt4EW3PQ
>Today, April 7th 2017, WikiLeaks releases Vault 7 "Grasshopper" -- 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.
>Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to "perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration". Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.
>Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like 'MS Security Essentials', 'Rising', 'Symantec Endpoint' or 'Kaspersky IS' on target machines do not detect Grasshopper elements.
>>59783030
>One of the persistence mechanisms used by the CIA here is 'Stolen Goods' - whose "components were taken from malware known as Carberp, a suspected Russian organized crime rootkit." confirming the recycling of malware found on the Internet by the CIA. "The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.". While the CIA claims that "[most] of Carberp was not used in Stolen Goods" they do acknowledge that "[the] persistence method, and parts of the installer, were taken and modified to fit our needs", providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company "HackingTeam".
>The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise
>>59783030
Gotta love based Assange, the absolute madman.
>all the /g/ cucks saying how windows 7 is superior BTFO
top kek
Where the fuck do I sign up to work for the CIA because id love to build tools like these without the feds knocking down my door.
>>59783323
Don't call us, we'll call you.
When will Winkiddies ever learn?
>>59783615
Have you not been paying attention?
Literally every OS is completely compromised.
This is your weekly friendly reminder to install a sane GNU/Linux distro (that doesn't use systemd).
>>59783658
There is nothing wrong with systems faggot
>>59783677
Systemd has over 1000000000000 SLOC, any other init system has way less. Statistically speaking systemd has an order of magnitude more vulns than any other init system.
>>59784196
Great. Tell me how you would attack a system which uses systemd. Should be easy for you
>>59783644
>smugbsduser.jpg
>>59783030
This posts are very useful, I always forget to check the wikileaks page. Thank you very much.
Winblows gon' winblow
>>59784545
>if you can't do it neither can the CIA
you're a fucking genius