Wikileaks releases CIA ‘Umbrage’ documents confirming stolen Russian malware, makes hacking look like Moscow did it
The CIA’s Remote Devices Branch‘s UMBRAGE groupcollects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
To translate: US CIA operatives can perform a hack and make it look as though it was Russia who performed the attack. It would be noteworthy that Wikileaks denied Russian ties to their release of documents from the DNC and John Podesta, claiming it was an “insider.”

photo/ Gerd Altmann via pixabay
The CIA is able to “pose” as “Russian hackers” whenever it so chooses.
Here’s the quote from Zero Hedge: “the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”
Called “Vault 7,” the document dump is massive, with over 8,000 documents.
Here’s part of the introduction: A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
Yes, that is correct: your phone or Smart TV can be converted to a microphone.
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. READ: MICHAEL HASTINGS DEATH

Photo/Espen Moe via wikimedia commons
[…] with the DNC to produce the now discredited Trump dossier and may be linked to the Russian hack of John Podesta’s email which resulted in countless documents landing on Wikileaks ahead of the final November […]