The latest bombshell to come out of
WikiLeaks’ Vault7 series of leaks from the
CIA, exposes a tool codenamed “Grasshopper”, which allows operatives to deploy persistent
surveillance and
hacking payloads on target Windows-based computer systems and remain undetected from popular anti-malware and anti-virus tools.
WikiLeaks has an array of documentation on-line, including an in-depth user’s guide for Grasshopper. The user’s guide explains that Grasshopper is
“a software tool used to build custom installers for target computers running Microsoft Windows operating systems”, which seems straightforward enough, and quite frankly the kind of thing you’d expect an intelligence agency to have at its disposal. But a deeper look at the documents reveals some much more alarming details.

Image Source: The Grasshopper User's Guide
The Grasshopper user’s guide also explains that,
“executables may contain considerable equities, including persistence techniques and any number of payloads. With this in mind, it is important to consider carefully the tradecraft of building and executing a Grasshopper”. The user’s guide also says that the operation
“uses an unspecified tool” to run the Grasshopper executable within a particular Windows process that has the necessary permissions for the intended task, of which there can be many – key logging, collecting stored passwords, data detection and destruction, you name it.
Another interesting part of the story is that the “unspecified tool” mentioned in the user’s guide may have stemmed from
Russian organized crime. Grasshopper uses something called the “Stolen Goods 2.1 (SG2)” persistence module, which is based on third-party malware. A document detailing SG2 reveals,
“The components were taken from malware known as Carberp, a suspected Russian rootkit used by organized crime. The source of Carberp was published online, and has allowed AED\RDB to easily borrow' components as needed from the malware.”
There is a myriad of Grasshopper-related documentation on the
WikiLeaks site and their Twitter
feed is rife with some of the scarier excerpts as well. One Tweet contains some payload execution details for Grasshopper that outline how the tool can invade the Windows Update Service and reinstall automatically every 22 hours.
Marco Chiappetta
Marco's interest in computing and technology dates all the way back to his early childhood. Even before being exposed to the Commodore P.E.T. and later the Commodore 64 in the early ‘80s, he was interested in electricity and electronics, and he still has the modded AFX cars and shop-worn soldering irons to prove it. Once he got his hands on his own Commodore 64, however, computing became Marco's passion. Throughout his academic and professional lives, Marco has worked with virtually every major platform from the TRS-80 and Amiga, to today's high end, multi-core servers. Over the years, he has worked in many fields related to technology and computing, including system design, assembly and sales, professional quality assurance testing, and technical writing. In addition to being the Managing Editor here at HotHardware for close to 15 years, Marco is also a freelance writer whose work has been published in a number of PC and technology related print publications and he is a regular fixture on HotHardware’s own Two and a Half Geeks webcast. - Contact: marco(at)hothardware(dot)com