Although the installation and method of OutlawCountry are not described in detail, it seems that CIA hackers rely only on exploiting holes and the back door to bring the kernel module into the Linux machine.
However, there are some limitations when using this tool because the kernel module only works with the corresponding kernel kernels.
'OutlawCountry 1.0 includes a kernel module for CentOS / RHEL 6.x 64-bit, this module only works with predefined kernels. In addition, OutlawCountry 1.0 only supports hidden DNAT rules into PREROUTING, 'WikiLeaks said.
CIA Vault 7 leak earlier
Last week, WikiLeaks also launched a top secret CIA malware that tracked the location of PCs and laptops running Windows operating systems. With the name ELSA, this malware takes the ID of a nearby public wifi hotspot and merges it with the global data of the public wifi location.
Since March, 14 cases have been revealed by Vault 7, including:
Brutal Kangaroo - the CIA suite for Windows machines towards closed networks or air-gap computers in organizations and businesses without direct access.
Cherry Blossom - the CIA framework, usually implanted based on firmware for remote control, is used to monitor the Internet activity of the target machine by exploiting errors on Wifi devices.
Pandemic - the CIA project allows spy organizations to turn Windows file servers into hidden attack machines, which can silently infect other machines on the target network.
Athena - spyware is designed to completely control remote Windows machines, works with all Windows versions, from Windows XP to Windows 10.
Archimedes - an intermediate attack tool thought to be created by a spy organization, targeting computers inside the LAN.
Scribbles - software designed to embed web beacons into confidential documents, allowing CIA hackers to monitor internally.
Grasshopper - framework allows CIA to create arbitrary malware to break into Windows system and overcome anti-virus tool.
Marble - the source of the tool makes it difficult to find anti-forensic computers, mostly code sneaky or packaged to hide the true source of malware.
Dark Matter - exploit vulnerability designed and used to target iPhone and Mac.
Weeping Angel - a spy tool used by the CIA to invade smart TVs, turning them into hidden microphones.
Year Zero - a tool to hack popular software and hardware.