{"id":437,"date":"2017-07-03T11:29:39","date_gmt":"2017-07-03T05:59:39","guid":{"rendered":"https:\/\/www.hackingtrainer.com\/resources\/?p=437"},"modified":"2017-11-18T14:07:52","modified_gmt":"2017-11-18T08:37:52","slug":"wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware","status":"publish","type":"post","link":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/","title":{"rendered":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware"},"content":{"rendered":"<p>Wikileaks has been releasing CIA sensitive documentation of Hacking Tools as part of their Vault 7 series, this time it made a public documentation by releasing two more hacking tools called Elsa and OutLawCountry.<\/p>\n<p><span style=\"color: #000000\"><strong>OutLawCountry<\/strong><\/span><\/p>\n<p>OutLawCountry is a tool that allows CIA to hack into Linux-based systems and perform a cyberespionage on the victims. According to leaked documents this tool allows CIA to hack into victim linux by manipulating the network traffic.<\/p>\n<p><strong>Working of OutLawCountry<\/strong><\/p>\n<p>The tool works by injecting a Kernel module into the target system through accessing the shell and subsequently creating a Netfilter table that contains rules. The table is created using the iptables command, and these rules can only be seen if the administrator of the affected device knows the table name.<\/p>\n<p>However, since the table name is already hidden, the administrator of the victim has no means to know the name. Furthermore, the CIA uses usual backdoor exploits to infiltrate the system with the tool.<\/p>\n<p>Once installed, the tool simply redirects outbound network traffic to CIA\u2019s computers and allows the CIA operator to extract and perform analysis on the data.<\/p>\n<p><strong>Limitations<\/strong><\/p>\n<p>The documentation released also reveal certain limitations of the tool. Primarily, OutlawCountry\u2019s Kernel modules only work with compatible Linux Kernels. These kernels are usually the default ones since the tool works with the 64-bit CentOS\/RHEL 6.x module.<\/p>\n<p><span style=\"color: #000000\"><strong>ELSA<\/strong><\/span><\/p>\n<p>ELSA is tool which could track down the exact location of the person using Windows PC through public Wi-Fi or hotspots even if they are not connected to it.<\/p>\n<p>The documents show that ELSA works by firstly getting into the system through certain exploits and then scans the infected computer\u2019s Wi-Fi hardware to see if there are any Wi-Fi hot spots nearby, along with the MAC address and the signal strength.<\/p>\n<p>It then stores the information in an encrypted form. The CIA operator can then download these files using further exploits and decrypt them for further analysis.<\/p>\n<p>Essentially, once the CIA operator has the data, he\/she can run a quick search on Google\u2019s database using back-end software to see all the locations of Wi-Fi hotspots and match the hotspot extracted from the data to filter out its exact address.<\/p>\n<p>As such, the CIA can know your exact location even if you are not connected to the internet per say.<\/p>\n<p>More about <a href=\"https:\/\/wikileaks.org\/vault7\/\">Vault 7<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wikileaks has been releasing CIA sensitive documentation of Hacking Tools as part of their Vault 7 series, this time it made a public documentation by releasing two more hacking tools called Elsa and OutLawCountry. OutLawCountry OutLawCountry is a tool that allows CIA to hack into Linux-based systems and perform a cyberespionage on the victims. According [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-hacking-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware\" \/>\n<meta property=\"og:description\" content=\"Wikileaks has been releasing CIA sensitive documentation of Hacking Tools as part of their Vault 7 series, this time it made a public documentation by releasing two more hacking tools called Elsa and OutLawCountry. OutLawCountry OutLawCountry is a tool that allows CIA to hack into Linux-based systems and perform a cyberespionage on the victims. According [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"HACKING TRAINER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hackingtrainerb9\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-03T05:59:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-18T08:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"335\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"HACKINGTRAINER.COM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hackingtrainer\" \/>\n<meta name=\"twitter:site\" content=\"@hackingtrainer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HACKINGTRAINER.COM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\"},\"author\":{\"name\":\"HACKINGTRAINER.COM\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\"},\"headline\":\"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware\",\"datePublished\":\"2017-07-03T05:59:39+00:00\",\"dateModified\":\"2017-11-18T08:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\"},\"wordCount\":399,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png\",\"articleSection\":[\"LATEST HACKING NEWS\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\",\"name\":\"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png\",\"datePublished\":\"2017-07-03T05:59:39+00:00\",\"dateModified\":\"2017-11-18T08:37:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png\",\"contentUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png\",\"width\":640,\"height\":335},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hackingtrainer.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#website\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/\",\"name\":\"HACKING TRAINER\",\"description\":\"The Best Training Institute for Ethical Hacking\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hackingtrainer.com\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\",\"name\":\"HACKINGTRAINER.COM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g\",\"caption\":\"HACKINGTRAINER.COM\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/","og_locale":"en_US","og_type":"article","og_title":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware","og_description":"Wikileaks has been releasing CIA sensitive documentation of Hacking Tools as part of their Vault 7 series, this time it made a public documentation by releasing two more hacking tools called Elsa and OutLawCountry. OutLawCountry OutLawCountry is a tool that allows CIA to hack into Linux-based systems and perform a cyberespionage on the victims. According [&hellip;]","og_url":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/","og_site_name":"HACKING TRAINER","article_publisher":"https:\/\/www.facebook.com\/hackingtrainerb9\/","article_published_time":"2017-07-03T05:59:39+00:00","article_modified_time":"2017-11-18T08:37:52+00:00","og_image":[{"width":640,"height":335,"url":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png","type":"image\/png"}],"author":"HACKINGTRAINER.COM","twitter_card":"summary_large_image","twitter_creator":"@hackingtrainer","twitter_site":"@hackingtrainer","twitter_misc":{"Written by":"HACKINGTRAINER.COM","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#article","isPartOf":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/"},"author":{"name":"HACKINGTRAINER.COM","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02"},"headline":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware","datePublished":"2017-07-03T05:59:39+00:00","dateModified":"2017-11-18T08:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/"},"wordCount":399,"commentCount":0,"image":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png","articleSection":["LATEST HACKING NEWS"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/","url":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/","name":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware","isPartOf":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png","datePublished":"2017-07-03T05:59:39+00:00","dateModified":"2017-11-18T08:37:52+00:00","author":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02"},"breadcrumb":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#primaryimage","url":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png","contentUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2017\/07\/VAULT-7-Wikileaks-Reveals-Massive-Collection-Of-CIA-Documents.png","width":640,"height":335},{"@type":"BreadcrumbList","@id":"https:\/\/www.hackingtrainer.com\/resources\/wikileaks-exposes-cia-linux-hacking-geolocation-tracker-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hackingtrainer.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Wikileaks Exposes CIA\u2019 Linux Hacking, Geolocation Tracker Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.hackingtrainer.com\/resources\/#website","url":"https:\/\/www.hackingtrainer.com\/resources\/","name":"HACKING TRAINER","description":"The Best Training Institute for Ethical Hacking","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hackingtrainer.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02","name":"HACKINGTRAINER.COM","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g","caption":"HACKINGTRAINER.COM"}}]}},"_links":{"self":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts\/437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/comments?post=437"}],"version-history":[{"count":0,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts\/437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/media\/444"}],"wp:attachment":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/media?parent=437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/categories?post=437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/tags?post=437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}