Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Saturday July 08 2017, @09:30AM   Printer-friendly
from the feeling-secure? dept.

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems using different attack vectors.

Secure Shell or SSH is a cryptographic network protocol used for remote login to machines and servers securely over an unsecured network.

Dubbed BothanSpy — implant for Microsoft Windows Xshell client, and Gyrfalcon — targets the OpenSSH client on various distributions of Linux OS, including CentOS, Debian, RHEL (Red Hat), openSUSE and Ubuntu.

Both implants steal user credentials for all active SSH sessions and then sends them to a CIA-controlled server.

BothanSpy is installed as a Shellterm 3.x extension on the target machine and only works if Xshell is running on it with active sessions.

[...] Gyrfalcon targets Linux systems (32 or 64-bit kernel) using a CIA-developed JQC/KitV rootkit for persistent access.

Source: The Hacker News

The latest addition to WikiLeaks' Vault 7 cache of CIA tools and documents gives details of tools used by the agency to attack Windows and Linux computers. The BothanSpy and Gyrfalcon projects can be used to intercept and exfiltrate SSH (Secure Shell) credentials.

BothanSpy is used to target Windows, while Gyrfalcon is used for Linux machines, with both working in different ways. A number of popular distros can be hit by Gyrfalcon, including CentOS, Debian, RedHat, openSUSE and Ubuntu, and both tools function as implants that steal credentials before transmitting them to a CIA server.

The leaked documentation for the tools was updated as recently as March 2015, and the file relating to BothanSpy reveals that XShell needs to be installed as it itself installs as a Shellterm extension. There are smatterings of humor throughout the file, with a warning that: "It does not destroy the Death Star, nor does it detect traps laid by The Emperor to destroy Rebel fleets." There is also the introductory quip: "Many Bothan spies will die to bring you this information, remember their sacrifice."

Source: BetaNews


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by isostatic on Saturday July 08 2017, @06:52PM (2 children)

    by isostatic (365) on Saturday July 08 2017, @06:52PM (#536605) Journal

    Bobby trap memory sections?

    Is he related to Bobby Tables?

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by kaszz on Saturday July 08 2017, @11:06PM (1 child)

    by kaszz (4211) on Saturday July 08 2017, @11:06PM (#536677) Journal

    Rather set memory regions as protected areas so any access will segfault where the snooping process will not expect it. But which will normally not be triggered because no other process is supposed to read there. Another way is some kind of breakpoint but that is likely setup the same way.

    • (Score: 0) by Anonymous Coward on Monday July 10 2017, @02:11PM

      by Anonymous Coward on Monday July 10 2017, @02:11PM (#537116)

      I'm pretty sure he was referring to your misspelling of "booby trap".