Fine Dining

WikiLeaks dumped today "Vault 7," 930 MB of manuals and documentation files for exploits, zero-days, and hacking tools the organization claims belong to the CIA.

Along the tens of hacking tools included, there was one that was different from the others. Named "Fine Dining," this isn't a zero-day exploit or vulnerability like most, but a collection of malware-laced applications.

Fine Dining is a collection of malware-laced applications

Designed for field operations, Fine Dining is for situations where the agent has to infect a computer while being watched by the victim.

CIA field agents receive one or more of these decoy applications, which they store on an USB. While on a mission, they insert the USB in a target's computer and run one of the applications.

Just like in the movies, while the agent is using the app, let's say to show a slideshow presentation in Prezi, the decoy app also runs malicious code that scans the victim's storage space and steals a list of selected file types. Exfiltration can be via the Internet, or by storing the stolen data on the USB itself.

Currently, Fine Dining includes modules that can be used to weaponize applications such as:

VLC Player Portable
Irfan View
Chrome Portable
Opera Portable
Firefox Portable
ClamWin Portable
Kaspersky TDSS Killer Portable
McAfee Stinger Portable
Sophos Virus Removal
Thunderbird Portable
Opera Mail
Foxit Reader
Libre Office Portable
Prezi
Babel Pad
Notepad++
Skype
Iperius Backup
Sandisk Secure Access
U3 Software
2048
LBreakout2
7-Zip Portable
Portable Linux CMD Prompt

According to WikiLeaks, Fine Dining was developed by OSB (Operational Support Branch), a division of the CIA's Center for Cyber Intelligence.

Fine Dining decoy apps generated on a per-mission basis

Another WikiLeaks document reveals that Fine Dining is extremely versatile and can be configured for a wide range of deployment scenarios.

Before every mission, CIA agents have to answer a form with 20 questions. Based on their answers, a case officer generates a custom version of the final decoy app(s).

Questions included in the survey query the agent on details such as the target's operating system, if the target uses any security software, if the machine is Internet connected, if the agent can access the target's PC more than once, and more. The full survey is below.

  1. Who will be the operator of the tool?
    1. Case Officer or TIO (Only allow case officers to run removable media collection
    2. Asset
    3. Developmental
    4. Liaison or Liaison Asset
  2. Who is the target of the collection?
    1. Asset
    2. Developmental
    3. Liaison Asset
    4. Foreign Information Operations
    5. Foreign Intelligence Agency
    6. Foreign Government Entity
    7. System Administrator or Comparable Technical Target
    8.  Other
  3. Will the operator of the tool be watched while the collection is occurring?
    1. Yes
    2. No
    3. Unknown
  4. Does the target machine reside in a Hard Target country?
    1. Yes
    2. No
  5. Do you intend to collect data from the targets Removable Media (Thumb Drive, SD Cards, CDs, etc) or from the targets machine (Laptop, Desktop, Surface, or Server)?
    1. Removable Media
    2. Machine
  6. What is the target?
    1. Laptop
    2. Desktop
    3. Windows Server
    4. Microsoft Surface
    5. Unknown
  7. What is the Operating System running on the target machine?
    1. Windows XP
    2. Windows Vista
    3. Windows Seven
    4. Windows 8/8.1
    5. Windows 10
    6. Unknown
  8. If known, check applications running on the machine (will have a list of known PSPs, Data Loss Prevention Software, USB protection, and monitoring tools)
    1. PSPs
    2. DLP, USB Guard?
    3. Monitoring Tools
    4. Unknown
  9. Is the machine connected to the internet?
    1. Yes
    2. No
    3. Unknown
  10. Will you have recurring access to the target?
    1. Yes
    2. No
    3. Unknown
  11. How much time will you have on target?
    1. < 1 minutes
    2. < 5 minutes
    3. 5 - 10 minutes
    4. 10 - 30 minutes
    5. 30+ minutes
  12. Data Path (internal routing)?
  13. Would you like a survey of the target machine to be collected (recommended)?
    1. Yes
    2. No
  14. What information about the machine would you like to obtain?
    1. Geo-locational (How aggressive?)
    2.  User Information / Positive Identification
    3. Counter Intelligence / ARMS
    4. Pattern Of Life
    5. Return Information
    6. General Machine Information (How aggressive should network be?)
  15. Would you like to collect files on the target machine?
    1. Yes
    2. No
  16. What types of files would you like to collect?
    1. Office Documents (Microsoft Office, Open Office, Adobe PDF Documents (Word, Excel, Powerpoint granularity?)
    2. Images
    3. Audio
    4. Video
    5. Custom File Formats
  17. Does the operator have administrator access on the machine?
    1. Yes
    2. No
    3. Unknown 
  18. Questions regarding cover application 
  19. Operation Crypt and/or Asset Crypt (Internal Tracking Purposes Only)
  20. Feature Request (Internal Uses Only)