Thursday, February 27, 2025
HomeMalwareNew CIA Cyberweapon Malware "Pandemic" installed in Victims Machine and Replaced Target...

New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Published on

SIEM as a Service

Follow Us on Google News

One of the  CIA Cyberweapon  Called  “Pandemic” Document Leaked by Vault 7 Projects of WikiLeaks.This Malware tool Specifically interact and run as kernel shellcode to install File system Driver.

This Malware will the attack the Victim Machine if user accesses the file via SMB, the Payload files will be Replaced to the  Actual Target file .This Function will work in Read-only Mode.

Already Released CIA cyberweapon’s DoublePulsar and MicroBotMassiveNet having some Sophisticated Futures and also affected by same SMB.

“Pandemic” Malware’s Actual  Goal is to be installed in Victims Machine when the Victims remote users use SMB to download/execute PE files.

According the Leaked CIA’s “Pandemic” Secret Document,  It won’t make sense and it will not replace the Target file if the file is opened on the machine Where Pandemic is running on.

Pandemic Leads to Unchanged the File But Replaced

While “Pandemic” entered into the Victims Machine when user accesses the file via SMB,it will not do any physical Changes in the Target Files.

According to leaked Source of Vault 7 ,Users that are targeted by Pandemic, and use SMB to download the targeted file, will receive the ‘replacement’ file.

“Pandemic” can operate both 32 and 64 bit .CONOP(Concept of Operation) done by the CIA ,version 1.0 can works only on 64 bit targets.

A “Pandemic” Tool ability to Replace up to  20 files by using the Latest version of  Pandemic 1.0.

As per the Document “The 1.1 builder will dynamically re-size the output bin file to the  appropriate size needed to contain all the payload data, so there is no longer an absolute cap on total output bin size. There is, however, a hard-coded cap on the maximum size a single replacement file can be (800MB). Pandemic 1.1 also made some changes to improve the robustness of the swapping mechanism”

File Information of “Pandemic”

First version (1.0) of the “Pandemic” Developed on17 April, 2014 by Engineering Development Group of CIA and the versions has been updated on16 January 2015 with some extra capability including Replaced files up to 20 in victims machines.

Files Executable and DLL looks like Pandemic_Builder.exe, Control.dll

According to the  Leaked Sources File Registry access by “Pandemic” Performs like below

“S//NF) Pandemic registers a minifilter driver using Windows’ Flt* functions. As a result, FltMgr requires that all drivers registering as minifilters contain certain registry keys. Pandemic uses the ‘Null’ service key (on all Windows systems) as its own driver service key. Pandemic will create 2 sub keys and 3 values under the ‘Null’ service key in the registry. These values and sub keys are deleted when Pandemic is uninstalled at the end of its configured run timer, or when it is uninstalled via a special F&F (v2) DLL.These keys will NOT//NOT be deleted if the system is rebooted before the aforementioned scenarios occur”

you can Access full Leaked Document of CIA cyber weapon of Pandemic in WikiLeaks.

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting...