#Vault7: How CIA steals hacking fingerprints from Russia & others to cover its tracksFollowing revelations that the CIA can reportedly attribute its hacking activity to others, an anti-virus expert has said that attacks previously blamed on others are now attributable to the CIA, according to WikiLeaks founder Julian Assange. News that the CIA could make its malware look as if it derived from Russia, China or other actors emerged as part of WikiLeaks’ ‘Year Zero’ data release on Tuesday.https://www.rt.com/viral/379779-vault7-cia-hacking-fingerprints/
According to the leaked information, the CIA’s malware allows the intelligence agency to not only steal hacking techniques, but also to leave false “fingerprints” to make it appear as if others were responsible for the attack.https://www.rt.com/news/380051-assange-malware-cia-fingerprints/
As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by “leaving behind the ‘fingerprints’ of the very groups that the attack techniques were stolen from.”events over the past few months suggest that UMBRAGE may have been used for other, more nefarious purposes. After the outcome of the 2016 U.S. presidential election shocked many within the U.S. political establishment and corporate-owned media, the CIA emerged claiming that Russia mounted a “covert intelligence operation” to help Donald Trump edge out his rival Hillary Clinton.Prior to the election, Clinton’s campaign had also accused Russia of being behind the leak of John Podesta’s emails, as well as the emails of employees of the Democratic National Committee (DNC).http://www.globalresearch.ca/wikileaks-reveals-cias-umbrage-allows-agency-to-carry-out-false-flag-cyber-attacks/5578786
UMBRAGEThe CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.https://wikileaks.org/ciav7p1/
I get my bullshit propaganda from CNN and all the other fake news sites.