HOW CAN THEY EVER COME BACK TO THE WANGBLOWS BOTNET
>Today, June 29th 2017, WikiLeaks publishes >documents from the OutlawCountry project of >the CIA that targets computers running the >Linux operating system. OutlawCountry allows >for the redirection of all outbound network >traffic on the target computer to CIA controlled >machines for ex- and infiltration purposes. The >malware consists of a kernel module that >creates a hidden netfilter table on a Linux >target; with knowledge of the table name, an >operator can create rules that take precedence >over existing netfilter/iptables rules and are >concealed from an user or even system >administrator.
>Literally just a regular fucking virus >No remote exploits or any actual major bugs wow its literally nothing
Thomas Brooks
Sooo... nothing?
They still need access to the PC to do it.
Bentley White
its a big something
no ((((they)))) can put the bloat via airdrop on cloud only if port69 is open
Angel Morales
It's not even a virus.
David Collins
>I'm using >meme arrows every >two words so I hopefully >fit in and >make more people mad >xdddd >talking about my >one virus that is off course >worse than all hundreds of windows viruses that are around >LOOOOOL time to cry u faggots xdddddddddddddddddddd
Nolan Brown
OpenBSD doesn't have this problem
Jaxson Scott
XD
Gavin Sanders
It's not even a virus. It's a kernel module.
Sebastian Cook
what the hell is a kernel
Connor Brown
Not sure if retarded or just a desperate attempt at damage control.
Lucas Hill
>DAMANGE BUNGLE
Luke Thomas
oh yeah you're right, I even overestimated it when ridiculing >Harm can be done when having access to someone's computer Oh fuggggggggggggggggggg
Ayden Cruz
BLOATWARE
Grayson Gray
Alpine with a hardened linux kernel doesn't have this problem.
Camden Moore
Only works on enterprise distros like red hat, try again pajeet.
David Morris
>The installation and persistence method of the malware is not described in detail in the document; an operator will have to rely on the available CIA exploits and backdoors to inject the kernel module into a target operating system.
>backdoors
Samuel Wright
And there is also this.......
Evan Nguyen
fuck off phoner
Cameron Lewis
>mfw Centos at work
Nolan Miller
lsmod | grep nf_table returns nothing
Grayson Morgan
Aww.... Does that make you mad? Should I go turn my laptop back on instead?
Austin Morales
I don't think the cia niggers care about your work. Unless you work for Russians or chinks.
Michael Carter
>not realizing loonix is backdoored
Loonix has freedom, aka the freedom for CIA to sneak shit in there because despite the code being open nobody ever really checks it
Loonix is only safer because less people use it so it's targetted less
Ayden Bennett
Exactly this!! Plus, what normie is going to be able to decipher the source code anyway??
John Reyes
>OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with default kernels. >CentOS/Rhel 6.X >Curent version of CentOS=7.X Wew.
Brayden Thompson
A function that you can choose to add or not when you compile your kernel (i.e. something that you can only install while sitting in front of the computer). Fucking newfag. Get out of my board asshole.
Kayden Murphy
CIA can't touch the people they want and only the really naive and reckless fall on their clutches. Paranoia means freedom for some people here and they don't want be arrested.
Asher Rogers
or host an irc network for anonymous
Camden Young
>The >malware consists of a kernel module
Jeremiah Bell
>the operator must already have shell access
top kek I always knew the CIA was a bunch of fags
Isaac Smith
>NAT table >CentOS/RHEL gateway ISHYGDDT
James Gray
>Operator must have shell acess kek
Lincoln Kelly
>requires local root access >pwnd
Aiden Russell
I encrypt and sign all my sensitive messages on an airgapped low power sbc and broadcast them to my other PCs via headphone jack. HOW YOU GUYS DOIN?
I'd just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux”, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.
Levi Reyes
>CentOS/RHEL 6.x >kernel version 2.6.32 >must have shell access And it fucking nothing.
Hudson Cruz
it's*
Ryan Cox
He warned us.
Jason Allen
>uses iptables >ditched iptables for nftables a year ago
Caleb Morris
Reassuring for Linuxfags that NSA has all sorts of gee-whiz end-to-end stuff for Windows but only a poorly maintained rootkit with limited portability for Linux.
Those guns aren't pointed at you.
Elijah Stewart
>must have shell access
is this a fucking joke or what. I wouldn't even patch this low severity garbage if all it took was sudo apt-get update cmd
Hunter Perry
Protip: This is really just a data exfiltration package. you install it on a target machine (using an exploit perhaps, or by hand) and it'll work as a nice little package that takes data out of the target machine.
Probably includes keyloggers and directory navigation as well as way to access memory to get sensitive keys and such.
Jonathan Williams
So can you show where in the code the backdoor is?
Brayden Sanders
You know you need to give it Permission to run and then run it, right?
Kayden Martinez
Damage control by who? Linux is literally opensource.
Dylan Thompson
It's free software, not open source.
Ian Rivera
And you're gay, what's your point?
Blake Lewis
Sounds like a bizarre conspiracy to me, I'm sure someone will find such a thing. Why not just use the processor backdoor?
Isaac Morgan
didn't know your mom is male
Cooper Lee
This is actually a fake. Basically GNU/Linux is very secure and it pisses the CIA and FBI off because they can't find any zero day exploits or backdoors and such so they decided to play it smart: If you can't hack an OS then trick people into not using that OS. So they leaked fake news to wikileaks that linux is filled with holes which will scare people into switching to windows, which is filled with holes and backdoors in all editions and CIA/NSA can access it effortlessly.
>Linux-2.6 >netfilter >needing an operator to get shell access first >unironically mounting unsigned kernel modules you have to be 16 degrees of retarded to fail victim to this
Jordan Perez
You didn't actually read it, did you?
Jonathan Ortiz
...
Jonathan Long
Wonder how many actual real world systems that would cover. Single digits?
Colton Cooper
I was going to joke about that old Linux version, but it seems it's still updated. Though the attacker needs shell access, this is relevant.
I hope Wikileaks really is sending the actual malware/exploits to upstream so they can patch it. I don't want insecure machines so the CIA/NSA can """"catch terrorists"""".
Evan Phillips
did you guys hear about the rm rf exploit?
Josiah Sanchez
This is a post exploitation module retards They use this after they pop the box and are already running as root to monitor traffic afterwards
Nolan Hill
>OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x
>using anything besides Ubuntu AUTISTS BTFO
HOW WILL THEY EVER RECOVER?
Adam Watson
Pretty sure there are still a ton of openvz boxes on old kernels
Oliver Reyes
interesting
Carter Bennett
>-n Non-standard
>base32 Retarded
>cbc mode Lmao, are we in the 90s?
>AES Enjoy your ancient shitty crypto algo
>no MAC Good job you retard
Jayden Martinez
To be frank linux is a bloated mess consisting of millions upon millions of lines of code. Proper OSes are based on a microkernel architecture and thus have small kernels.
Adam Peterson
Also, does not specify a KDF.
Jaxson Lopez
What do you suggest for symmetric crypto then?
Nathan Brooks
> Kernel 2.6 lol? I think I was still using Windows 98 when that series came out, not joking...
Also, this is a fucking KERNEL MODULE that someone MUST install in the system, not a bug, you stupid micro$hill.
Sage and reported.
Adrian Peterson
no, it hasn't had an official release in almost 7 years linux-2.6.32.27.tar.bz2 09-Dec-2010 21:32 64445765
it might be maintained by other people, however (such as distro maintainers)
Levi Peterson
It's a rootkit you autistic fuck, are you trying to say rootkits aren't malware?
William Brooks
2.6 came out dec 2003 i was using ME up until 2004 a lot of people were still running win98 in 2003
Hudson Price
It is maintained by Red Hat. >6.9, also termed Update 9, March 21, 2017; 3 months ago (kernel 2.6.32-696)
The last update was 3 months ago.
Eli Adams
can't blame linux devs for it's use, it's been out of their hands for some time
that's 2.6.0, not 2.6.32.27 the version numbers sped up after 3.0, it was 2.6.x for quite a while
Grayson Turner
Do you know what a "Kernel series" mean? Oh you don't, because you work at Microsoft. FUCK OFF FAGGOT!
Sebastian Robinson
Wait wait wait
Shell access?
Does to be clear
Does that mean, the login screen?
Or that means they are logged into the terminal as a user (any user), and can issue shell commands?
Jackson Murphy
>your kernel must be 10 years old AND your PC must already be infected Wow. This is nothing. Only idiot corporations wouldn't have a more up to date kernel.
Evan Brooks
I'm not blaming them, just pointing that this malware targets a version of Linux (or, as it makes sense in this case, GNU/Linux) that still has commercial support.
Its different from malware targetting, let's say, Windows XP.
Jack Thomas
>2.6.x required >shell access required
Blake Perez
i'm not sure what you're trying to say that 2.6.0 and 2.6.32.27 are basically the same thing? no way, by the end of it things were so different that "2.6" might as well have been a single digit, being the series, and the "32" was essentially the major version it's no wonder 2.6 was replaced simply with 3
Benjamin Watson
>Or that means they are logged into the terminal as a user (any user), and can issue shell commands? this
>Does that mean, the login screen? that would be graphical console access, though it's not typical to provide access to this without authentication
Camden Smith
>I don't understand exploitation or operations but I'm going to talk anyways! Fuck off retard
Jacob Myers
>one linux exploit, with new windows exploits coming out every day sage
Sebastian Allen
Chacha20 or Keccak with a Carter-Wegman style MAC like poly1305 Or NORX/Keyak if you want a sponge-based thing that calculates the MAC in a single pass.