Support Russia Insider - Go Ad-Free!

Wikileaks: CIA 'Stole' Russian Malware, Uses It to ‘Misdirect Attribution’ of Cyber Attacks

"Russian" hacking? It could have just as easily been the CIA


This post first appeared on Russia Insider


From the Wikileaks "Year Zero" dump:

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

<figcaption>Busted</figcaption>
Busted

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Everyone knew it. Now we have proof.

"Fingerprints" are meaningless.

It's now clear that the CIA is able to "pose" as "Russian hackers" whenever it so chooses.

Just something to think about.

All allegations of "digital fingerprints" left behind by Russian hackers must now be dismissed as either fake or meaningless:

(Hello to our friends visiting from Drudge! If you want to learn more about our delightful alternative media outlet, watch a video of us drinking and playing piano somewhere in Moscow!)


Support Russia Insider - Go Ad-Free!

This post first appeared on Russia Insider

Anyone is free to republish, copy, and redistribute the text in this content (but not the images or videos) in any medium or format, with the right to remix, transform, and build upon it, even commercially, as long as they provide a backlink and credit to Russia Insider. It is not necessary to notify Russia Insider. Licensed Creative Commons


Our commenting rules: You can say pretty much anything except the F word. If you are abusive, obscene, or a paid troll, we will ban you. Full statement from the Editor, Charles Bausman.