Thursday, December 5, 2024
HomeMalwareVault 7 Leaks : CIA Malware "OutlawCountry" Controls Linux Machine and Redirect...

Vault 7 Leaks : CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

Published on

SIEM as a Service

WikiLeaks Revealed another Secret Document of  CIA Malware called “OutlawCountry” that targets Linux Running Machines which Control and Redirect all outbound network traffic on the target computer to CIA controlled machines.

Few days Before WikiLeaks Revealed anather CIA Malware CalledELSA have an ability to Tracking Geo-Location information of Wi-Fi enabled Windows OS.

According to Leaked Document  to perform this Direct Operation , this malware consist of  kernel module that creates a hidden netfilter table in the Victims Linux Machine.

- Advertisement - SIEM as a Service

OutlawCountry Malware using this hidden netfilter table an operator can create rules that take precedence over existing netfilter/iptables rules and are concealed from an user or even system administrator.

OutlawCountry v1.0 only supports adding covert DNAT rules to the PREROUTING chain.

OutlawCountry Cause more Damage with Servers

OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x.This module will only work with default kernels.

To perform successful attack on the target victims Linux Machine ,CIA need Shell access and root privileges are needed to install Malware.

Initial Installation need to select the appropriate kernel module for the Target machine.

CIA  Test OutlawCountry Malware required 2 WEST and EAST Networks and 5 Hosts.

 
OutlawCountry Test Environment

The module creates a new netfilter table with an obscure name. The new table allows certain rules to be created using the “iptables” command.

These rules take precedence over existing rules, and are only visible to an administrator if the table name is known. When the Operator removes the kernel module, the new table is also remove.

CIA operatives must compromise machines via other Methods before deploying this malware strain.

This Malware can be used both servers and Desktops which running under Linux Environment.

Once Victims Traffic successful Redirected to CIA operator Control, then CIA can able to sniff Victims Activities and it will be used for other Attacks and it leads to compromise entire Victims network.

If the Malware  leads to occur more damage if its performed with Linux Based servers and it cause to sniff many users traffic which under the compromised server control.

The installation and persistence method of the malware is not described in detail in the document.

Previous CIA Leaked Tools by WikiLeaks

ELSA – Vault 7 Leaks : CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

Brutal Kangaroo – CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

CherryBlossom –  Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Pandemic –  New CIA Cyberweapon Malware “Pandemic” installed in Victims Machine and Replaced Target files where remote users use SMB to Download

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT

The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in...

ElizaRAT Exploits Google, Telegram, & Slack Services For C2 Communications

APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated...

New CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms

CleverSoar, a new malware installer, targets Chinese and Vietnamese users to deploy advanced tools...