Categories: NewsSecurity

The CIA’s Aeris Malware Can Exfiltrate Data From Linux Systems

Not a week goes by without WikiLeaks unveiling some more condemning evidence of the CIA’s malware tools. The latest reveal is Aeris, an automated implement which affects many different distributions of the Linux operating system. This particular tool packs quite a lot of features under the hood in an effort to gather as much intelligence as possible. This is surely not the last tool of its kind we will meet.

Aeris Malware Likes to Infiltrate Linux Servers and Systems

Even though most technology experts consider Linux to be the most secure operating system, that is not entirely accurate. Over the past few months, we have seen multiple malware types targetting the Linux OS, either to install cryptocurrency mining software or to exfiltrate important data. Never one to sit on the sidelines, the CIA has built its own set of tools to infiltrate Linux servers around the world. One of these is Aeris, a disruptive type of malware capable of affecting popular Linux distros.

Aeris can infiltrate systems running Debian Linux 7, Red Hat Enterprise Linux 6, Solaris 11, FreeBSD 8 and seniors 5.3 and 5.7. That is a large list, considering that a lot of those Linux flavors are very common. Aeris can successfully infiltrate all of these systems and does its work unabated. Its tools include a way to snoop on encrypted communication, hook into SMTP communication, and exfiltrate files automatically.

It is not the first time we have come across CIA malware, and the Wikileaks team has done an outstanding job of keeping tabs on all of these discoveries. The agency has developed many versions of malware to serve the same purpose. No operating system in the world is safe from CIA infiltration these days, even though some of its tools are no longer usable by the look of things. It is unclear whether Aeris is still an active threat, but it seems plausible to assume that could be the case.

Related Post

Hacking tools are often developed by intelligence agencies as ways to keep the world safe from threats. However, these tools can also be used for less legitimate purposes such as stealing information from consumers and corporations alike. It is impossible to tell whether the CIA ever deployed this malware, and if so, who its target or targets were. There was some abuse of this tool along the way, as no one can resist the temptation of having the world’s information in the palm of their hand.

The leaked Aeris manual does not contain any specific information on how the tool collects data. It is possible this is just one tool in a multi-pronged attack plan by the CIA, although that has yet to be officially confirmed. If CIA operators have, in fact, combined multiple hacking tools to infiltrate servers and obtain sensitive information, WikiLeaks may have yet to unveil the bigger “tools” developed by the agency. 

The CIA — an intelligence agency tasked with keeping the U.S. safe — may have abused its power on multiple occasions. Spying during the Cold War is very different from snooping in this day and age of digitization. Tools such as Aeris can go a long way in collecting valuable information on threats to national security while remaining hidden in the dark corners of the internet. At this rate, it is almost frightening to think of what WikiLeaks may uncover next.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

SkyAI’s Explosive 20x Surge Raises Red Flags As On-Chain Data Points To Possible Market Manipulation

The cryptocurrency market is in the crosshairs once again, an explosive price move in SkyAI…

8 hours ago

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

23 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

2 days ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

2 days ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

3 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

4 days ago