WikiLeaks revealed malware of CIA hacks and spies on Linux computers
Called OutlawCountry, this project allows CIA hackers to redirect outbound network traffic on the target machine to the computer system controlled by CIA to retrieve I / O data.
This OutlawCountry tool includes a kernel module that the CIA hacker downloads through the shell to the target system and creates a Netfilter table hidden with a vague name on the user's Linux machine.
'This new table allows creating certain rules, using the iptables command. These rules will hijack the rules currently in use and the administrator will only see them when they know the table name. When removing the kernel module, the table will also be deleted '.
Many CIA tools help hack Linux computers
Although the installation and method of OutlawCountry are not described in detail, it seems that CIA hackers rely only on exploiting holes and the back door to bring the kernel module into the Linux machine.
However, there are some limitations when using this tool because the kernel module only works with the corresponding kernel kernels.
'OutlawCountry 1.0 includes a kernel module for CentOS / RHEL 6.x 64-bit, this module only works with predefined kernels. In addition, OutlawCountry 1.0 only supports hidden DNAT rules into PREROUTING, 'WikiLeaks said.
CIA Vault 7 leak earlier
Last week, WikiLeaks also launched a top secret CIA malware that tracked the location of PCs and laptops running Windows operating systems. With the name ELSA, this malware takes the ID of a nearby public wifi hotspot and merges it with the global data of the public wifi location.
Since March, 14 cases have been revealed by Vault 7, including:
- Brutal Kangaroo - the CIA suite for Windows machines towards closed networks or air-gap computers in organizations and businesses without direct access.
- Cherry Blossom - the CIA framework, usually implanted based on firmware for remote control, is used to monitor the Internet activity of the target machine by exploiting errors on Wifi devices.
- Pandemic - the CIA project allows spy organizations to turn Windows file servers into hidden attack machines, which can silently infect other machines on the target network.
- Athena - spyware is designed to completely control remote Windows machines, works with all Windows versions, from Windows XP to Windows 10.
- Archimedes - an intermediate attack tool thought to be created by a spy organization, targeting computers inside the LAN.
- Scribbles - software designed to embed web beacons into confidential documents, allowing CIA hackers to monitor internally.
- Grasshopper - framework allows CIA to create arbitrary malware to break into Windows system and overcome anti-virus tool.
- Marble - the source of the tool makes it difficult to find anti-forensic computers, mostly code sneaky or packaged to hide the true source of malware.
- Dark Matter - exploit vulnerability designed and used to target iPhone and Mac.
- Weeping Angel - a spy tool used by the CIA to invade smart TVs, turning them into hidden microphones.
- Year Zero - a tool to hack popular software and hardware.
You should read it
- Learn about Ethical hacking using Kali Linux and Raspberry Pi
- Vault 8: WikiLeaks reveals the source code of the CIA malware control system
- What is hardware hacking? Is it worrisome?
- Basic hacking techniques - Attendance - Part III
- The list of nearly 600 MAC addresses was targeted in the recent hacking of millions of ASUS computer users
- Basic Hack Techniques - Part I
- Security term
- How to Make It Look Like You Are Hacking
- So frustrated with the learning situation, students hack the school's computer system
- Basic hacking techniques - Part II
- Growth Hacking growth strategy - Part 1
- Instagram account of a series of famous stars hacked and used as a means of fraud
May be interested
Mobile malware infection rate increased by 400% in the past year. Android has the highest rate
No anti-virus software can detect this extremely dangerous new Ransomware on Android
It took three years for Google to discover this dangerous Spyware on Android
You will have to play the game if you want to get rid of this new Ransomware
The new threat in Linux operating system can have 'incalculable' consequences.
Download and sell Windows patches for all versions to avoid being hit by a massive cyber attack, affecting 150 countries and still spreading