Categories: NewsSecurity

The CIA’s Aeris Malware Can Exfiltrate Data From Linux Systems

Not a week goes by without WikiLeaks unveiling some more condemning evidence of the CIA’s malware tools. The latest reveal is Aeris, an automated implement which affects many different distributions of the Linux operating system. This particular tool packs quite a lot of features under the hood in an effort to gather as much intelligence as possible. This is surely not the last tool of its kind we will meet.

Aeris Malware Likes to Infiltrate Linux Servers and Systems

Even though most technology experts consider Linux to be the most secure operating system, that is not entirely accurate. Over the past few months, we have seen multiple malware types targetting the Linux OS, either to install cryptocurrency mining software or to exfiltrate important data. Never one to sit on the sidelines, the CIA has built its own set of tools to infiltrate Linux servers around the world. One of these is Aeris, a disruptive type of malware capable of affecting popular Linux distros.

Aeris can infiltrate systems running Debian Linux 7, Red Hat Enterprise Linux 6, Solaris 11, FreeBSD 8 and seniors 5.3 and 5.7. That is a large list, considering that a lot of those Linux flavors are very common. Aeris can successfully infiltrate all of these systems and does its work unabated. Its tools include a way to snoop on encrypted communication, hook into SMTP communication, and exfiltrate files automatically.

It is not the first time we have come across CIA malware, and the Wikileaks team has done an outstanding job of keeping tabs on all of these discoveries. The agency has developed many versions of malware to serve the same purpose. No operating system in the world is safe from CIA infiltration these days, even though some of its tools are no longer usable by the look of things. It is unclear whether Aeris is still an active threat, but it seems plausible to assume that could be the case.

Related Post

Hacking tools are often developed by intelligence agencies as ways to keep the world safe from threats. However, these tools can also be used for less legitimate purposes such as stealing information from consumers and corporations alike. It is impossible to tell whether the CIA ever deployed this malware, and if so, who its target or targets were. There was some abuse of this tool along the way, as no one can resist the temptation of having the world’s information in the palm of their hand.

The leaked Aeris manual does not contain any specific information on how the tool collects data. It is possible this is just one tool in a multi-pronged attack plan by the CIA, although that has yet to be officially confirmed. If CIA operators have, in fact, combined multiple hacking tools to infiltrate servers and obtain sensitive information, WikiLeaks may have yet to unveil the bigger “tools” developed by the agency. 

The CIA — an intelligence agency tasked with keeping the U.S. safe — may have abused its power on multiple occasions. Spying during the Cold War is very different from snooping in this day and age of digitization. Tools such as Aeris can go a long way in collecting valuable information on threats to national security while remaining hidden in the dark corners of the internet. At this rate, it is almost frightening to think of what WikiLeaks may uncover next.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

The Calculated Collapse of $TG: How a “Utility” Token Was Engineered for a Rug Pull

In the unpredictable world of cryptocurrency, new tokens launch daily, each one a shining beacon…

23 hours ago

Staked Ethereum Hits Record High as Whale Accumulation Signals Bullish Long-Term Sentiment

Once more, Ethereum is commanding the spotlight as fresh figures indicate that the amount of…

23 hours ago

Arbitrum Sees Surge in Protocol Revenue and EIP-7702 Adoption Following ArbOS 40 Upgrade

The ecosystem on Arbitrum keeps flaunting its robust foundations, with a steady incline in the…

23 hours ago

Ethereum Whale Accumulation Surges as Long-Term Confidence Outweighs Short-Term Volatility

Once again, major market players are focusing on Ethereum. The whale activity surrounding the second-largest…

4 days ago

Week in AI: Fartcoin Steals the Spotlight Amid Market Turmoil

It has been a tumultuous week for the artificial intelligence sector in crypto. Sharp valuation…

5 days ago

BSC Foundation Resumes Strategic Accumulation: VIXBT, CAKE, LISTA, and MOOLAH Under Spotlight

Following a brief stint of dormancy, the BSC Foundation is back in action, reestablishing its strategic…

6 days ago