Still in the business of publishing information regarding malware and means allegedly used by the US government and cohorts, Wikileaks has made public another set of manuals for digital attack tools.
Regarding a supposed project from the CIA, named “Imperial” the tools are outlined to allow attack surfaces on Mac OS and Linux-based systems.
Sequentially, the first one is called Achilles, which gives the attackers to “Trojan an OS X disk image installer” with executable malicious codes for a one-time action.
The second in line as listed on the site is Aeris. Aeris is supposedly written in C and targets POSIX-based systems like Debian, FreeBSD, CentOS, and others.
According to Wikileaks, Aeris was designed to target portable systems, Aeris also supports “automated file exfiltration, configurable beacon interval, and jitter, stand-alone and Collide-based HTTPS LP support and SMTP protocol support – all with TLS encrypted communications with mutual authentication.”
The system combines the command and control features similarly structured to some Windows-infecting software.
Thirdly, SeaPea, a Mac OS rootkit attacking version 10.6 and 10.7 of the operating system.
The code conceals itself in the operating system files and incorporates itself into the system upon reboot.
SeaPea has previously associated iPhone hacking tools.
However, these files and details might be partially unverified, and WikiLeaks has been known for revealing secrets and collaborations so it worth taking with skepticism. It is no new news that electronic devices and digital devices are being targeted.