{"id":32756,"date":"2017-07-28T10:44:21","date_gmt":"2017-07-28T14:44:21","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-cia-targets-red-hat-with-hacking-tool-wral-tech-wire.php"},"modified":"2017-07-28T10:44:21","modified_gmt":"2017-07-28T14:44:21","slug":"wikileaks-cia-targets-red-hat-with-hacking-tool-wral-tech-wire","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-cia-targets-red-hat-with-hacking-tool-wral-tech-wire.php","title":{"rendered":"Wikileaks: CIA targets Red Hat with hacking tool &#8211; WRAL Tech Wire"},"content":{"rendered":"<p><p>Updated Jul. 28, 2017 at 8:49 a.m.         <\/p>\n<p>      Published: 2017-07-28 08:47:00      Updated: 2017-07-28 08:49:21    <\/p>\n<p>    By RICK SMITH, WRAL TechWire Editor  <\/p>\n<p>    Raleigh, N.C.  The top software    product from Raleigh-based Red Hat is the target of a hacking    tool developed by the CIA, according to documents published by    WikiLeaks.  <\/p>\n<p>    Red Hat Enterprise Linux is one of the world's most popular    software platforms used by global financial firms, and services    related to RHEL is among Red Hat's most profitable revenue    streams. Red Hat is the world's best-known developer of Open    Source Linux software.  <\/p>\n<p>    WikiLeaks says Red Hat's RHEL was targeted under a CIA program called \"Imperial.\"  <\/p>\n<p>    National Security Agency-born hacking programs were utilized in    two major global ransomware attacks, according to researchers.  <\/p>\n<p>    The program taking aim at RHEL is called Aeris, perhaps named    after a character in the Final Fantasy VII game. And it appears    to be quite dangerous. (An image of Aeris from the game is    included with the \"users guide\" Wikileaks published.)  <\/p>\n<p>    \"The malware includes features for    data exfiltration and can be used to build customized attacks,\"    says tech news site Inquirer.  <\/p>\n<p>    Led by Julian Assange, WikiLeaks did not identify the source of    the latest document dump.  <\/p>\n<p>    \"RELEASE: CIA 'Aeris' implant targeting Debian, Red Hat,    Solaris, FreeBSD and Centos users,\" WikiLeaks declared in a    tweet on Thursday.  <\/p>\n<p>    The targets  <\/p>\n<p>    The software targets two versions of Red Hat Enterprise Linux.  <\/p>\n<p>    Red Hat calls RHEL\"the leading open source platform for modern    datacenters\" and says it \"delivers military-grade security,    99.999% uptime, support for business-critical workloads, and so    much more. Ultimately, the platform helps you reallocate    resources from maintaining the status quo to tackling new    challenges. It's just 1 reason why more than 90% of Fortune    Global 500 companiesuse Red Hat products and solutions.\"  <\/p>\n<p>    According to Wikileaks, Aeris is an \"automated implant\" that    \"supports automated file exfiltration.\"  <\/p>\n<p>    Written in \"C\" programming language, Aeris also targets other    software: Debian, Solaris, FreeBSD and CentOS.  <\/p>\n<p>    Wikileaks adds that Aeris is \"similar\" to \"implants\" also used    to penetrate Windows systems.  <\/p>\n<p>    WRAL TechWire has reached out to Red Hat for reaction.  <\/p>\n<p>    The full explanation  <\/p>\n<p>    Here's the description about Aeris as published by Wikileaks:  <\/p>\n<p>    \"Aeris is an automated implant written in C that supports a    number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD,    CentOS). It supports automated file exfiltration, configurable    beacon interval and jitter, standalone and Collide-based HTTPS    LP support and SMTP protocol support - all with TLS encrypted    communications with mutual authentication. It is compatible    with the NOD Cryptographic Specification and provides    structured command and control that is similar to that used by    several Windows implants.\"  <\/p>\n<p>    Other hacking tools  <\/p>\n<p>    Aeris is one of three tools unveiled by WikiLeaks in its latest    expose, include one that penetrates Apple Mac operating    systems.  <\/p>\n<p>    The tools are called \"Achilles\" and \"SeaPea.\"  <\/p>\n<p>    \"Achilles is a capability that provides an operator the ability    to trojan an OS X disk image (.dmg) installer with one or more    desired operator specified executables for a one-time    execution,\" Wikileaks says.  <\/p>\n<p>    \"SeaPea is an OS X Rootkit that provides stealth and tool    launching capabilities. It hides files\/directories, socket    connections and\/or processes. It runs on Mac OSX 10.6 and    10.7.\"  <\/p>\n<p>    Read more at:  <\/p>\n<p>    <a href=\"https:\/\/wikileaks.org\/vault7\/releases\/#Imperial\" rel=\"nofollow\">https:\/\/wikileaks.org\/vault7\/releases\/#Imperial<\/a>  <\/p>\n<p>    WRAL TechWire any time: Twitter,    Facebook  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/wraltechwire.com\/wikileaks-cia-targets-red-hat-with-hacking-tool-\/16846341\/\" title=\"Wikileaks: CIA targets Red Hat with hacking tool - WRAL Tech Wire\">Wikileaks: CIA targets Red Hat with hacking tool - WRAL Tech Wire<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Updated Jul. 28, 2017 at 8:49 a.m. Published: 2017-07-28 08:47:00 Updated: 2017-07-28 08:49:21 By RICK SMITH, WRAL TechWire Editor Raleigh, N.C. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32756","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32756"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32756"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32756\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}