Friday, 7 July 2017
One comments

Wikileaks Vault-7 Publishes New CIA Exploit Tools BothanSpy And Gyrfalcon

Wikileaks and CIA

Wikileaks Vault-7 Publishes New CIA Exploit Tools BothanSpy And Gyrfalcon


The latest addition of Wikileaks Vault 7 of CIA tools is BothanSpy and Gyrfalcon, used for a remotely cyber attack on Windows and Linux systems to steal SSH Credentials.


BothanSpy is used for targeting on Windows computer system, whereas Gyrfalcon for Linux Machines. Gyrfalcon encrypts and stores the data into a file on Linux Computer system. The attacker must have knowledge of Linux/Unix commands and shells like sh, csh and bash.

In the documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors.

BothanSpy is an implant that targets the SSH client program Xshell on the Microsoft Windows platform and steals user credentials for all active SSH sessions. These credentials are either username and password in case of password-authenticated SSH sessions or username, filename of private SSH key and key password if public key authentication is used. BothanSpy can exfiltrate the stolen credentials to a CIA-controlled server (so the implant never touches the disk on the target system) or save it in an enrypted file for later exfiltration by other means. BothanSpy is installed as a Shellterm 3.x extension on the target machine.

Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms (centos,debian,rhel,suse,ubuntu). The implant can not only steal user credentials of active SSH sessions, but is also capable of collecting full or partial OpenSSH session traffic. All collected information is stored in an encrypted file for later exfiltration. It is installed and configured by using a CIA-developed root kit (JQC/KitV) on the target machine.

Do you really think Linux System is secure?

Read Previous Leaks..

1 comments:

  1. GLOBAHACKING CONSULTANT
    We are No 1 leading IT Company in United State
    * Hack and UPGRADE UNIVERSITY GRADES * Hack into any BANK WEBSITE * Hack into any COMPANY WEBSITE * Hack into any GOVERNMENT AGENCY WEBSITE * Hack into SECURITY AGENCY WEBSITE and ERASE CRIMINAL RECORDS * Hack into any DATA BASE * Hack PAYPAL ACCOUNT * Hack WORDPRESS Blogs * Untraceable IP etc * We can restore LOST FILES AND DOCUMENTS , no matter how long they have been missing NOTE We can also teach you how to do the following with our e-Book and online tutorials *
    We have worked for many company and organizations from different location in the universe. Our team are best hackers alive.
    Is your partner cheating on you, we can teach you how to TAP INTO THEIR CALL AND MONITOR THEIR CONVERSATION * Email and Text message interception * Hack and use Credit Card to shop online * Monitor any phone and email address * Hack Android & iPhone our team have never disappoint before and we can not start with you. our job is neat and clean with guarantee.contact us and we will meet your need and you will never forget to tell your friend about us contact us at: [email protected]

    ReplyDelete

 
Toggle Footer
Top