{"id":94381,"date":"2017-06-26T12:00:12","date_gmt":"2017-06-26T11:00:12","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=94381"},"modified":"2017-06-22T12:50:21","modified_gmt":"2017-06-22T11:50:21","slug":"vault-7-brutal-kangaroo","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-brutal-kangaroo\/","title":{"rendered":"Vault 7: Brutal Kangaroo"},"content":{"rendered":"<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-90223\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Today, June 22nd 2017, WikiLeaks publishes documents from the <em>Brutal Kangaroo<\/em> project of the CIA. <em>Brutal Kangaroo<\/em> is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. <em>Brutal Kangaroo<\/em> components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.<\/p>\n<p>The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects an Internet-connected computer within the organization (referred to as &#8220;primary host&#8221;) and installs the <em>BrutalKangaroo<\/em> malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN\/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration\/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" >Stuxnet<\/a> worked.<\/p>\n<p>The <em>Brutal Kangaroo<\/em> project consists of the following components: <em>Drifting Deadline<\/em> is the thumbdrive infection tool, <em>Shattered Assurance<\/em> is a server tool that handles automated infection of thumbdrives (as the primary mode of propagation for the <em>Brutal Kangaroo<\/em> suite), <em>Broken Promise<\/em> is the <em>Brutal Kangaroo<\/em> postprocessor (to evaluate collected information) and <em>Shadow<\/em> is the primary persistence mechanism (a stage 2 tool that is distributed across a closed network and acts as a covert command-and-control network; once multiple <em>Shadow<\/em> instances are installed and share drives, tasking and payloads can be sent back-and-forth).<\/p>\n<p>The primary execution vector used by infected thumbdrives is a vulnerability in the Microsoft Windows operating system that can be exploited by hand-crafted link files that load and execute programs (DLLs) without user interaction. Older versions of the tool suite used a mechanism called <em>EZCheese<\/em> that was a <a target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-0096\" >0-day exploit until March 2015<\/a>; newer versions seem use a similar, but yet unknown link file vulnerability (<em>Lachesis<\/em>\/<em>RiverJack<\/em>) related to the library-ms functionality of the operating system.<a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-90672 alignright\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png 399w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2 style=\"padding-left: 30px;\">Leaked Documents<\/h2>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Brutal_Kangaroo-DriftingDeadline-V1_2-User_Guide\/\" >Brutal Kangaroo &#8212; Drifting Deadline v1.2 &#8211; User Guide <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/EzCheese-v6_3-User_Guide_Rev__2014-01-07\/\" >EzCheese v6.3 &#8211; User Guide <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/EzCheese-v6_2-User_Guide_Rev_B_2013-07-18\/\" >EzCheese v6.2 &#8211; User Guide (Rev. B) <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/EzCheese-v6_2-User_Guide_Rev_A_2013-04-12\/\" >EzCheese v6.2 &#8211; User Guide (Rev. A) <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/EZCheese-v6_2_IVV_TDR-Slides_07172013\/\" >EZCheese v6.2 &#8211; IVV TDR Slides <\/a><\/p>\n<p>_______________________________________________<\/p>\n<p><strong><em>All Releases:<\/em><\/strong><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-cherry-blossom\/\" >Vault 7: Cherry Blossom<\/a> \u2013 15 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-pandemic\/\" >Vault 7: Pandemic<\/a> \u2013 1 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-athena\/\" >Vault 7: Athena<\/a> \u2013 19 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/aftermidnight-assassin-frameworks\/\" >Vault 7: AfterMidnight &amp; Assassin Frameworks<\/a> \u2013 12 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-archimedes\/\" >Vault 7: Archimedes \u2013<\/a> 5 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-scribbles-project\/\" >Vault 7: Scribbles Project<\/a> \u2013 28 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-weeping-angel\/\" >Vault 7: Weeping Angel<\/a> \u2013 21 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-hive-project\/\" >Vault 7: Hive Project<\/a> \u2013 14 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/grasshopper\/\" >Vault 7: Grasshopper Framework<\/a> \u2013 7 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/marble-framework\/\" >Vault 7: Marble Framework<\/a> \u2013 31 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/dark-matter\/\" >Vault 7: Project Dark Matter<\/a> \u2013 23 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/03\/vault-7-cia-hacking-tools-revealed\/\" >Vault 7: CIA Hacking Tools Revealed<\/a> \u2013 7 Mar 2017<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Brutal%20Kangaroo\" >Go to Original \u2013 wikileaks.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-94381","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/94381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=94381"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/94381\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=94381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=94381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=94381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}