- Feb 4, 2016
- 2,520
........some quotes from the article above:
After a two-week hiatus, WikiLeaks dumped new files as part of the Vault 7 series that supposedly contains CIA-made hacking tools the organization claims it received from hackers and agency insiders.
Today's dump includes the documentation for a CIA tool named CherryBlossom, a multi-purpose framework developed for hacking hundreds of home router models.
The tool is by far one of the most sophisticated CIA malware frameworks in the CIA's possession. The purpose of CherryBlossom is to allow operatives to interact and control SOHO routers on the victim's network.
CherryBlossom installed via tainted firmware updates
The most complex part of using CherryBlossom is by far deploying the tool on a target's routers. This can be done by a field operative, or remotely using a router flaw that allows CIA operators to install new firmware on the targeted device.
Internally, CherryBlossom is made up of different components, each with a very precise role:
FlyTrap - beacon (compromised firmware) that runs on compromised device
CherryTree - command and control server where FlyTrap devices report
CherryWeb - web-based admin panel running on CherryTree
Mission - a set of tasks sent by the C&C server to infected devices
CherryBlossom supports over 200 router models
According to the CIA docs, FlyTraps can be installed on both WiFi routers and access points. There is a separate document that lists over 200 router models that CherryBlossom can target, most of which are older models. This 24-page document is not dated, but the rest of the CherryBlossom manuals are — between 2006 and 2012.
You'll find a list of all WiFi equipment vendors that were included in this document at the bottom of this article. For the full vendor-series list, please refer to the original WikiLeaks document here.