Wikileaks: CIA 'Stole' Russian Malware, Uses It to ‘Misdirect Attribution’ of Cyber Attacks
"Russian" hacking? It could have just as easily been the CIA
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
"Fingerprints" are meaningless.
It's now clear that the CIA is able to "pose" as "Russian hackers" whenever it so chooses.
Just something to think about.
All allegations of "digital fingerprints" left behind by Russian hackers must now be dismissed as either fake or meaningless:
(Hello to our friends visiting from Drudge! If you want to learn more about our delightful alternative media outlet, watch a video of us drinking and playing piano somewhere in Moscow!)
Anyone is free to republish, copy, and redistribute the text in this content (but not the images or videos) in any medium or format, with the right to remix, transform, and build upon it, even commercially, as long as they provide a backlink and credit to Russia Insider. It is not necessary to notify Russia Insider. Licensed Creative Commons.
Click here for our commenting guidelines