Home LifeStyle & Tech Carberp Trojan code for malware deployment?

Carberp Trojan code for malware deployment?

by TrickyScribe
Tricky Scribe Media Ventures Private Limited

WikiLeaks reveals CIA’s modern espionage tools

WikiLeaks on Friday (April 7, 2017) released Vault 7, Grasshopper, 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper contains modules that can be used by a CIA operator as blocks to construct a customized implant that behaves differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only (be) installed if the target has the right configuration”.

Through this grammar, CIA operators can build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP (personal security products) avoidance, so that PSPs like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’, whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit (a set of software tools).”

Confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online and has allowed AED/RDB to steal components easily as needed from the malware.”

While the CIA claims that “(most) of Carberp was not used in stolen goods” they, however, do acknowledge that “(the) persistence method and parts of the installer, were taken and modified to fit our needs,” providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of the material leaked from Italian company “HackingTeam”.

The documents published by WikiLeaks provide an insight into the process of building modern espionage tools and how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.
seo checker

You may also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More