Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
SECRET//20350112
1 (U) INTRODUCTION...........................................................................................7
2 (U) RELATED DOCUMENTS..............................................................................7
3 (U) POINTS OF CONTACT.................................................................................7
4 (U) SYSTEM DESCRIPTION AND DEFINITIONS..............................................8
4.1 (U) Description..............................................................................................................8
4.2 (U) Definitions.............................................................................................................10
4.3 (U) Acronyms..............................................................................................................11
5 (U) SYSTEM COMPONENTS AND FEATURES..............................................12
5.1 (U) Claymore...............................................................................................................12
5.2 (U) Flytrap...................................................................................................................12
5.2.1 (U) Overview............................................................................................................12
5.2.2 (U) Device Support...................................................................................................12
5.2.3 (U) Features .............................................................................................................12
5.2.3.1 (S) Encrypted/Authenticated/Covert Communication through PoP..............13
5.2.3.2 (U) Communications Can Transit a Squid Proxy Server in Default
Configuration.............................................................................................................13
5.2.3.3 (U) Beacon.....................................................................................................13
5.2.3.4 (U) Mission Tasking......................................................................................13
5.2.3.5 (U) Target Detection......................................................................................14
5.2.3.6 (S) VoIP Target Detection (Roundhouse Devices Only)...............................14
5.2.3.7 (U) Target Alerting........................................................................................14
5.2.3.8 (U) Target Monitoring...................................................................................15
5.2.3.9 (U) Target Actions.........................................................................................15
5.2.3.10 (U) Global Actions.......................................................................................17
5.2.3.11 (S) VoIP Copy Actions (Roundhouse Devices Only)..................................17
5.2.3.12 (U) Harvest Mode........................................................................................18
5.2.3.13 (U) Minimal Resource Usage .....................................................................18
5.2.3.14 (U) Minimal Interference with Normal Device Operation or Look and Feel
....................................................................................................................................18
5.2.3.15 (U) Suicide...................................................................................................18
5.2.3.16 (U) Kill.........................................................................................................19
5.2.3.17 (U) Default Gateway Discovery (DGD)......................................................19
5.2.3.18 (S) Firmware Upgrade Inhibit and Upgrade Alert.......................................19
5.2.3.19 (S) Obfuscation of Implant Binaries............................................................20
5.2.3.20 (U) Application Execution...........................................................................20
5.2.3.21 (S) Roundhouse Geolocation.......................................................................20
5.3 (U) Point of Presence (PoP).........................................................................................21
5.4 (U) CherryTree............................................................................................................21
5.4.1 (U) Overview............................................................................................................21
5.4.2 (U) Encrypted and Authenticated Communication through PoP..............................21
2
SECRET//20350112