Security Market Segment LS
Friday, 01 September 2017 10:10

Vault 7: Malware can run implants on XP, Windows 7


WikiLeaks has released documents from the CIA's Angelfire project, a five-component utility that can load and run custom implants on Windows XP or Windows 7.

Angelfire's components are Solartime, Wolfcreek, Keystone, BadMFS and the Windows Transitory Filesystem.

The dump of documents is part of the ongoing Vault 7 leaks which began on 7 March and are claimed to be the largest leak of CIA material.

Each component has a particular role, according to the documentation released by WikiLeaks. Solartime can change the boot sector partition to make it possible for Wolfcreek to run when device drivers are loaded at boot time.

Additional implants can be loaded but this would cause memory leaks that can be detected on infected machines, indicating that the software is not the best written.

Keystone is part of Wolfcreek and can start malicious user applications. Implants that are run do not touch the filesystem of the infected machine so it is not detected, as it disguises itself as C:\Windows\system32\svchost.exe, the name of a legitimate Windows service.

BadMFS implements a covert filesystem which is created at the end of the active partition and stores all drivers and implants that Wolfcreek runs.

The last component, Windows Transitory Filesystem, is a new method of getting Angelfire on a system. It allows an attacker to create transitory files for specific actions.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments