Quantcast
Published On: Tue, Mar 7th, 2017

Wikileaks releases CIA ‘Umbrage’ documents confirming stolen Russian malware, makes hacking look like Moscow did it

The CIA’s Remote Devices Branch‘s UMBRAGE groupcollects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

To translate: US CIA operatives can perform a hack and make it look as though it was Russia who performed the attack. It would be noteworthy that Wikileaks denied Russian ties to their release of documents from the DNC and John Podesta, claiming it was an “insider.”

photo/ Gerd Altmann via pixabay

The CIA is able to “pose” as “Russian hackers” whenever it so chooses.

Here’s the quote from Zero Hedge: “the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

 “With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Called “Vault 7,” the document dump is massive, with over 8,000 documents.

Here’s part of the introduction: A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

Yes, that is correct: your phone or Smart TV can be converted to a microphone.

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. READ: MICHAEL HASTINGS DEATH

Julian Assange Wikileaks founder

Photo/Espen Moe via wikimedia commons

On the DISPATCH: Headlines  Local  Opinion

Subscribe to Weekly Newsletter

* indicates required
/ ( mm / dd ) [ALL INFO CONFIDENTIAL]

About the Author

- Writer and Co-Founder of The Global Dispatch, Brandon has been covering news, offering commentary for years, beginning professionally in 2003 on Crazed Fanboy before expanding into other blogs and sites. Appearing on several radio shows, Brandon has hosted Dispatch Radio, written his first novel (The Rise of the Templar) and completed the three years Global University program in Ministerial Studies to be a pastor. To Contact Brandon email [email protected] ATTN: BRANDON

Tags
Displaying 1 Comments
Have Your Say
  1. Russia investigation: Charges filed, details could arrive Monday | The Global Dispatch says:

    […] with the DNC to produce the now discredited Trump dossier and may be linked to the Russian hack of John Podesta’s email which resulted in countless documents landing on Wikileaks ahead of the final November […]

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Sign up for our Weekly Newsletter



Recent Posts

When Should You Order Valentine’s Day Flowers?

February 2, 2023, Comments Off on When Should You Order Valentine’s Day Flowers?

Paulette Chaffee Shares Why Private Tutoring is a Powerful Educational Tool

January 31, 2023, Comments Off on Paulette Chaffee Shares Why Private Tutoring is a Powerful Educational Tool

How is a Car Accident Claim Filed? And Other Questions A Lawyer Can Answer

January 27, 2023, Comments Off on How is a Car Accident Claim Filed? And Other Questions A Lawyer Can Answer

The Best Uses for a Home Equity Loan

January 24, 2023, Comments Off on The Best Uses for a Home Equity Loan

Top 8 Reasons to Get an Outdoor Kitchen

January 22, 2023, Comments Off on Top 8 Reasons to Get an Outdoor Kitchen

How is a Christian Wedding Invite Different than a Secular Wedding Invite

January 16, 2023, Comments Off on How is a Christian Wedding Invite Different than a Secular Wedding Invite

Fun and Unusual Ways to Encourage Kids to Stay Healthy

January 12, 2023, Comments Off on Fun and Unusual Ways to Encourage Kids to Stay Healthy

Health Carousel Honors Dr Franklin Shaffer with the DAISY Lifetime Achievement Award

January 12, 2023, Comments Off on Health Carousel Honors Dr Franklin Shaffer with the DAISY Lifetime Achievement Award

Categories

Archives