allows for the redirection of all outbound network site visitors to the target Personal computer to CIA controlled machines for ex- and infiltration purposes. The malware is made of a kernel module that generates a concealed netfilter desk on the Linux goal; with expertise in the desk name, an operator can generate policies that just take precedenc