Vault7 - Home
Vault7 - Home
(https://wikileaks.org/ciav7p1/cms/index.html)
Contents
• Press Release
• Analysis
• Examples
• Frequently Asked Questions
Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the
U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the
largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and
files from an isolated, high-security network situated inside the CIA's Center for
Cyber Intelligence (https://wikileaks.org/ciav7p1/files/org-chart.png) in Langley,
Virgina. It follows an introductory disclosure last month of CIA targeting French
political parties and candidates in the lead up to the 2012 presidential election
(https://wikileaks.org/cia-france-elections-2012).
Recently, the CIA lost control of the majority of its hacking arsenal including
malware, viruses, trojans, weaponized "zero day" exploits, malware remote
control systems and associated documentation. This extraordinary collection,
which amounts to more than several hundred million lines of code, gives its
possessor the entire hacking capacity of the CIA. The archive appears to have
been circulated among former U.S. government hackers and contractors in an
unauthorized manner, one of whom has provided WikiLeaks with portions of
the archive.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 1/16
3/25/2018 Vault7 - Home
"Year Zero" introduces the scope and direction of the CIA's global covert
hacking program, its malware arsenal and dozens of "zero day" weaponized
exploits against a wide range of U.S. and European company products,
include Apple's iPhone, Google's Android and Microsoft's Windows and even
Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the
U.S. National Security Agency (NSA). The CIA found itself building not just its
now infamous drone fleet, but a very different type of covert, globe-spanning
force — its own substantial fleet of hackers. The agency's hacking division
freed it from having to disclose its often controversial operations to the NSA
(its primary bureaucratic rival) in order to draw on the NSA's hacking
capacities.
By the end of 2016, the CIA's hacking division, which formally falls under the
agency's Center for Cyber Intelligence (https://wikileaks.org/ciav7p1/files/org-
chart.png) (CCI), had over 5000 registered users and had produced more than
a thousand hacking systems, trojans, viruses, and other "weaponized"
malware. Such is the scale of the CIA's undertaking that by 2016, its hackers
had utilized more code than that used to run Facebook. The CIA had created,
in effect, its "own NSA" with even less accountability and without publicly
answering the question as to whether such a massive budgetary spend on
duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say
urgently need to be debated in public, including whether the CIA's hacking
capabilities exceed its mandated powers and the problem of public oversight of
the agency. The source wishes to initiate a public debate about the security,
creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber 'weapon' is 'loose' it can spread around the world in
seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Wikileaks has carefully reviewed the "Year Zero" disclosure and published
substantive CIA documentation while avoiding the distribution of 'armed'
cyberweapons until a consensus emerges on the technical and political nature
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 2/16
3/25/2018 Vault7 - Home
of the CIA's program and how such 'weapons' should analyzed, disarmed and
published.
Analysis
CIA malware targets iPhone, Android, smart
TVs
CIA malware and hacking tools are built by EDG (Engineering Development
Group), a software development group within CCI (Center for Cyber
Intelligence), a department belonging to the CIA's DDI (Directorate for Digital
Innovation). The DDI is one of the five major directorates of the CIA (see this
organizational chart (https://wikileaks.org/ciav7p1/files/org-chart.png) of the
CIA for more details).
The EDG is responsible for the development, testing and operational support
of all backdoors, exploits, malicious payloads, trojans, viruses and any other
kind of malware used by the CIA in its covert operations world-wide.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 3/16
3/25/2018 Vault7 - Home
As of October 2014 the CIA was also looking at infecting the vehicle control
systems used by modern cars and trucks
(https://wikileaks.org/ciav7p1/cms/page_13763790.html). The purpose of such
control is not specified, but it would permit the CIA to engage in nearly
undetectable assassinations.
Despite iPhone's minority share (14.5%) of the global smart phone market in
2016, a specialized unit in the CIA's Mobile Development Branch produces
malware to infest, control and exfiltrate data from iPhones and other Apple
products running iOS, such as iPads
(https://wikileaks.org/ciav7p1/cms/space_2359301.html). CIA's arsenal
includes numerous local and remote "zero days"
(https://wikileaks.org/ciav7p1/cms/page_13205587.html) developed by CIA or
obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors
such as Baitshop. The disproportionate focus on iOS may be explained by the
popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google's Android which is used to run the majority of the
world's smart phones (~85%) including Samsung, HTC and Sony
(https://wikileaks.org/ciav7p1/cms/space_11763721.html). 1.15 billion Android
powered phones were sold last year. "Year Zero" shows that as of 2016 the
CIA had 24 "weaponized" Android "zero days"
(https://wikileaks.org/ciav7p1/cms/page_11629096.html) which it has
developed itself and obtained from GCHQ, NSA and cyber arms contractors.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 4/16
3/25/2018 Vault7 - Home
Many of these infection efforts are pulled together by the CIA's Automated
Implant Branch (AIB) (https://wikileaks.org/ciav7p1/cms/space_3276805.html),
which has developed several attack systems for automated infestation and
control of CIA malware, such as "Assassin" and "Medusa".
The CIA has developed automated multi-platform malware attack and control
systems covering Windows, Mac OS X, Solaris, Linux and more, such as
EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are
described in the examples section below.
"Year Zero" documents show that the CIA breached the Obama
administration's commitments. Many of the vulnerabilities used in the CIA's
cyber arsenal are pervasive and some may already have been found by rival
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 5/16
3/25/2018 Vault7 - Home
The same vulnerabilities exist for the population at large, including the U.S.
Cabinet, Congress, top CEOs, system administrators, security officers and
engineers. By hiding these security flaws from manufacturers like Apple and
Google the CIA ensures that it can hack everyone &mdsh; at the expense of
leaving everyone hackable.
While nuclear proliferation has been restrained by the enormous costs and
visible infrastructure involved in assembling enough fissile material to produce
a critical nuclear mass, cyber 'weapons', once developed, are very hard to
retain.
Cyber 'weapons' are in fact just computer programs which can be pirated like
any other. Since they are entirely comprised of information they can be copied
quickly with no marginal cost.
Securing such 'weapons' is particularly difficult since the same people who
develop and use them have the skills to exfiltrate copies without leaving traces
— sometimes by using the very same 'weapons' against the organizations that
contain them. There are substantial price incentives for government hackers
and consultants to obtain copies since there is a global "vulnerability market"
that will pay hundreds of thousands to millions of dollars for copies of such
'weapons'. Similarly, contractors and companies who obtain such 'weapons'
sometimes use them for their own purposes, obtaining advantage over their
competitors in selling 'hacking' services.
Over the last three years the United States intelligence sector, which consists
of government agencies such as the CIA and NSA and their contractors, such
as Booz Allan Hamilton, has been subject to unprecedented series of data
exfiltrations by its own workers.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 6/16
3/25/2018 Vault7 - Home
Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T.
Martin III with 20 counts of mishandling classified information. The Department
of Justice alleged that it seized some 50,000 gigabytes of information from
Harold T. Martin III that he had obtained from classified programs at NSA and
CIA, including the source code for numerous hacking tools.
Once a single cyber 'weapon' is 'loose' it can spread around the world in
seconds, to be used by peer states, cyber mafia and teenage hackers alike.
CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber
Intelligence Europe" (https://wikileaks.org/ciav7p1/cms/page_20251151.html)
or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers
(https://wikileaks.org/ciav7p1/cms/page_26607630.html) make Germany's
counter-intelligence efforts appear inconsequential: "Breeze through German
Customs because you have your cover-for-action story down pat, and all they
did was stamp your passport"
Once in Frankfurt CIA hackers can travel without further border checks to the
25 European countries that are part of the Shengen open border area —
including France, Italy and Switzerland.
A number of the CIA's electronic attack methods are designed for physical
proximity. These attack methods are able to penetrate high security networks
that are disconnected from the internet, such as police record database. In
these cases, a CIA officer, agent or allied intelligence officer acting under
instructions, physically infiltrates the targeted workplace. The attacker is
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 7/16
3/25/2018 Vault7 - Home
provided with a USB containing malware developed for the CIA for this
purpose, which is inserted into the targeted computer. The attacker then
infects and exfiltrates data to removable media. For example, the CIA attack
system Fine Dining (https://wikileaks.org/ciav7p1/cms/page_20251107.html),
provides 24 decoy applications for CIA spies to use. To witnesses, the spy
appears to be running a program showing videos (e.g VLC), presenting slides
(Prezi), playing a computer game (Breakout2, 2048) or even running a fake
virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is
on the screen, the underlaying system is automatically infected and ransacked.
Why the CIA chose to make its cyberarsenal unclassified reveals how
concepts developed for military use do not easily crossover to the 'battlefield'
of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate
with their control programs over the internet. If CIA implants, Command &
Control and Listening Post software were classified, then CIA officers could be
prosecuted or dismissed for violating rules that prohibit placing classified
information onto the Internet. Consequently the CIA has secretly made most of
its cyber spying/war code unclassified. The U.S. government is not able to
assert copyright either, due to restrictions in the U.S. Constitution. This means
that cyber 'arms' manufactures and computer hackers can freely "pirate" these
'weapons' if they are obtained. The CIA has primarily had to rely on
obfuscation to protect its malware secrets.
Conventional weapons such as missiles may be fired at the enemy (i.e into an
unsecured area). Proximity to or impact with the target detonates the ordnance
including its classified parts. Hence military personnel do not violate
classification rules by firing ordnance with classified parts. Ordnance will likely
explode. If it does not, that is not the operator's intent.
Over the last decade U.S. hacking operations have been increasingly dressed
up in military jargon to tap into Department of Defense funding streams. For
instance, attempted "malware injections" (commercial jargon) or "implant
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 8/16
3/25/2018 Vault7 - Home
drops" (NSA jargon) are being called "fires" as if a weapon was being fired.
However the analogy is questionable.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for
days or even years after it has reached its 'target'. CIA malware does not
"explode on impact" but rather permanently infests its target. In order to infect
target's device, copies of the malware must be placed on the target's devices,
giving physical possession of the malware to the target. To exfiltrate data back
to the CIA or to await further instructions the malware must communicate with
CIA Command & Control (C2) systems placed on internet connected servers.
But such servers are typically not approved to hold classified information, so
CIA command and control systems are also made unclassified.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 9/16
3/25/2018 Vault7 - Home
CIA hackers developed successful attacks against most well known anti-virus
programs. These are documented in AV defeats
(https://wikileaks.org/ciav7p1/cms/page_2064514.html), Personal Security
Products (https://wikileaks.org/ciav7p1/cms/page_13762910.html), Detecting
and defeating PSPs (https://wikileaks.org/ciav7p1/cms/page_7995642.html)
and PSP/Debugger/RE Avoidance
(https://wikileaks.org/ciav7p1/cms/page_2621845.html). For example, Comodo
was defeated by CIA malware placing itself in the Window's "Recycle Bin"
(https://wikileaks.org/ciav7p1/cms/page_5341269.html). While Comodo 6.x
has a "Gaping Hole of DOOM"
(https://wikileaks.org/ciav7p1/cms/page_5341272.html).
CIA hackers discussed what the NSA's "Equation Group" hackers did wrong
and how the CIA's malware makers could avoid similar exposure
(https://wikileaks.org/ciav7p1/cms/page_14588809.html).
Examples
The CIA's Engineering Development Group (EDG) management system
contains around 500 different projects (only some of which are documented by
"Year Zero") each with their own sub-projects, malware and hacker tools.
The majority of these projects relate to tools that are used for penetration,
infestation ("implanting"), control, and exfiltration.
Some example projects are described below, but see the table of contents
(https://wikileaks.org/ciav7p1/cms/index.html) for the full list of projects
described by WikiLeaks' "Year Zero".
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency.
Each technique it has created forms a "fingerprint" that can be used by
forensic investigators to attribute multiple different attacks to the same entity.
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 10/16
3/25/2018 Vault7 - Home
With UMBRAGE and related projects the CIA cannot only increase its total
number of attack types but also misdirect attribution by leaving behind the
"fingerprints" of the groups that the attack techniques were stolen from.
Fine Dining
Fine Dining comes with a standardized questionnaire i.e menu that CIA case
officers fill out. The questionnaire is used by the agency's OSB (Operational
Support Branch (https://wikileaks.org/ciav7p1/cms/space_1736706.html)) to
transform the requests of case officers into technical requirements for hacking
attacks (typically "exfiltrating" information from computer systems) for specific
operations. The questionnaire allows the OSB to identify how to adapt existing
tools for the operation, and communicate this to CIA malware configuration
staff. The OSB functions as the interface between CIA operational staff and the
relevant technical support staff.
Among the list of possible targets of the collection are 'Asset', 'Liason Asset',
'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence
Agencies' and 'Foreign Government Entities'. Notably absent is any reference
to extremists or transnational criminals. The 'Case Officer' is also asked to
specify the environment of the target like the type of computer, operating
system used, Internet connectivity and installed anti-virus utilities (PSPs) as
well as a list of file types to be exfiltrated like Office documents, audio, video,
images or custom file types. The 'menu' also asks for information if recurring
access to the target is possible and how long unobserved access to the
computer can be maintained. This information is used by the CIA's
'JQJIMPROVISE' software (see below) to configure a set of CIA malware
suited to the specific needs of an operation.
Improvise (JQJIMPROVISE)
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 11/16
3/25/2018 Vault7 - Home
HIVE
HIVE is a multi-platform CIA malware suite and its associated control software.
The project provides customizable implants for Windows, Solaris, MikroTik
(used in internet routers) and Linux platforms and a Listening Post
(LP)/Command and Control (C2) infrastructure to communicate with these
implants.
The implants are configured to communicate via HTTPS with the webserver of
a cover domain; each operation utilizing these implants has a separate cover
domain and the infrastructure can handle any number of cover domains.
In Febuary the Trump administration has issued an Executive Order calling for
a "Cyberwar" review to be prepared within 30 days.
While the review increases the timeliness and relevance of the publication it
did not play a role in setting the publication date.
Redactions
Names, email addresses and external IP addresses have been redacted in the
released pages (70,875 redactions in total) until further analysis is complete.
1. Over-redaction: Some items may have been redacted that are not
employees, contractors, targets or otherwise related to the agency, but
are, for example, authors of documentation for otherwise public projects
that are used by the agency.
2. Identity vs. person: the redacted names are replaced by user IDs
(numbers) to allow readers to assign multiple pages to a single author.
Given the redaction process used a single person may be represented
by more than one assigned identifier but no identifier refers to more than
one real person.
3. Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all
the file names in the archive. As the archive content is assessed it may
be made available; until then the archive is redacted.
4. Attachments with other binary content are replaced by a hex dump of
the content to prevent accidental invocation of binaries that may have
been infected with weaponized CIA malware. As the content is assessed
it may be made available; until then the content is redacted.
5. The tens of thousands of routable IP addresses references (including
more than 22 thousand within the United States) that correspond to
possible targets, CIA covert listening post servers, intermediary and test
systems, are redacted for further exclusive investigation.
6. Binary files of non-public origin are only available as dumps to prevent
accidental invocation of CIA malware infected binaries.
Organizational Chart
The organizational chart (https://wikileaks.org/ciav7p1/files/org-chart.png)
corresponds to the material published by WikiLeaks so far.
Since the organizational structure of the CIA below the level of Directorates is
not public, the placement of the EDG and its branches within the org chart of
the agency is reconstructed from information contained in the documents
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 13/16
3/25/2018 Vault7 - Home
Wiki pages
"Year Zero" contains 7818 web pages with 943 attachments from the internal
development groupware. The software used for this purpose is called
Confluence, a proprietary software from Atlassian. Webpages in this system
(like in Wikipedia) have a version history that can provide interesting insights
on how a document evolved over time; the 7818 documents include these
page histories for 1136 latest versions.
The order of named pages within each level is determined by date (oldest
first). Page content is not present if it was originally dynamically created by the
Confluence software (as indicated on the re-constructed page).
WikiLeaks has obtained the CIA's creation/last modification date for each page
but these do not yet appear for technical reasons. Usually the date can be
discerned or approximated from the content and the page order. If it is critical
to know the exact time/date contact WikiLeaks.
Top
WL Research Tor is an encrypted Tails is a live operating The Courage Bitcoin uses peer-to-
Community - user anonymising network system, that you can Foundation is an peer technology to
contributed research that makes it harder to start on almost any international operate with no central
based on documents intercept internet computer from a DVD, organisation that authority or banks;
published by communications, or USB stick, or SD card. supports those who managing transactions
WikiLeaks. see where It aims at preserving risk life or liberty to and the issuing of
communications are your privacy and make significant bitcoins is carried out
(https://our.wikileaks.org/)
coming from or going anonymity. contributions to the collectively by the
to. historical record. network.
(https://tails.boum.org/)
(https://www.torproject.org/) (https://www.couragefound.org/)
(https://www.bitcoin.org/)
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 15/16
3/25/2018 Vault7 - Home
(https://www.facebook.com/wikileaks) (https://twitter.com/wikileaks)
file:///C:/Users/OPTIMUM/Downloads/Vault7%20-%20Home.htm 16/16