This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at https://www.rt.com/viral/394631-cia-wikileaks-linux-surveillance/

The article has changed 2 times. There is an RSS feed of changes available.

Version 0 Version 1
OutlawCountry: ‘CIA hacking tool’ targets Linux operating system (IMAGE) OutlawCountry: ‘CIA hacking tool’ targets Linux operating system (IMAGE)
(1 day later)
WikiLeaks has published leaked documents purportedly from ‘OutlawCountry’, an alleged CIA program designed to overcome and alter firewalls on a Linux operating device.WikiLeaks has published leaked documents purportedly from ‘OutlawCountry’, an alleged CIA program designed to overcome and alter firewalls on a Linux operating device.
An apparent user guide bearing the symbol of the US Central Intelligence Agency was published on the WikiLeaks website Thursday.An apparent user guide bearing the symbol of the US Central Intelligence Agency was published on the WikiLeaks website Thursday.
“OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA-controlled machines for ex- and infiltration purposes,” WikiLeaks said in a statement.“OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA-controlled machines for ex- and infiltration purposes,” WikiLeaks said in a statement.
A type of malware, the virus targets a very specific version of the Linux operating system.A type of malware, the virus targets a very specific version of the Linux operating system.
“The target must be running a compatible 64-bit version of CentOS/RHEL 6.x (kernel version 2.6.32),” the program’s user guide says.“The target must be running a compatible 64-bit version of CentOS/RHEL 6.x (kernel version 2.6.32),” the program’s user guide says.
READ MORE: CIA can hack & track Windows devices via their wifi connectionsREAD MORE: CIA can hack & track Windows devices via their wifi connections
The reasons for installing the bug are not explained in the OutlawCountry engineering guide, other than it gives users the opportunity to alter a computer’s security settings.The reasons for installing the bug are not explained in the OutlawCountry engineering guide, other than it gives users the opportunity to alter a computer’s security settings.
OutlawCountry is made up of a file that creates a “hidden netfilter table” or new set of firewall settings, the user manual states.OutlawCountry is made up of a file that creates a “hidden netfilter table” or new set of firewall settings, the user manual states.
“With knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules,” the document reads.“With knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules,” the document reads.
All evidence of the virus is destroyed when the netfilter table is removed by the operator.All evidence of the virus is destroyed when the netfilter table is removed by the operator.
Red Hat, a provider of Linux open source software, told RT.com that its security team has “crafted a knowledgebase article about OutlawCountry.”
“The article explains that this is not a vulnerability in any Red Hat product. The manual outlines the details of a tool that can be used once an attacker already has local and root access to a system,” a Red Hat spokesperson said.
The article, which appears on the Red Hat website, advises people using a Linux system that has been targeted by the exploit to upgrade to a newer version. A guide on how to manually upgrade can be found here.