Quantcast
Published On: Tue, Mar 7th, 2017

Wikileaks releases CIA ‘Umbrage’ documents confirming stolen Russian malware, makes hacking look like Moscow did it

The CIA’s Remote Devices Branch‘s UMBRAGE groupcollects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

To translate: US CIA operatives can perform a hack and make it look as though it was Russia who performed the attack. It would be noteworthy that Wikileaks denied Russian ties to their release of documents from the DNC and John Podesta, claiming it was an “insider.”

photo/ Gerd Altmann via pixabay

The CIA is able to “pose” as “Russian hackers” whenever it so chooses.

Here’s the quote from Zero Hedge: “the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

 “With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Called “Vault 7,” the document dump is massive, with over 8,000 documents.

Here’s part of the introduction: A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

Yes, that is correct: your phone or Smart TV can be converted to a microphone.

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. READ: MICHAEL HASTINGS DEATH

Julian Assange Wikileaks founder

Photo/Espen Moe via wikimedia commons

On the DISPATCH: Headlines  Local  Opinion

Subscribe to Weekly Newsletter

* indicates required
/ ( mm / dd ) [ALL INFO CONFIDENTIAL]

About the Author

- Writer and Co-Founder of The Global Dispatch, Brandon has been covering news, offering commentary for years, beginning professionally in 2003 on Crazed Fanboy before expanding into other blogs and sites. Appearing on several radio shows, Brandon has hosted Dispatch Radio, written his first novel (The Rise of the Templar) and completed the three years Global University program in Ministerial Studies to be a pastor. To Contact Brandon email [email protected] ATTN: BRANDON

Displaying 1 Comments
Have Your Say
  1. Russia investigation: Charges filed, details could arrive Monday | The Global Dispatch says:

    […] with the DNC to produce the now discredited Trump dossier and may be linked to the Russian hack of John Podesta’s email which resulted in countless documents landing on Wikileaks ahead of the final November […]

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

like_us_on_facebook

 

The Global Dispatch Facebook page- click here

Movie News Facebook page - click here

Television News Facebook page - click here

Weird News Facebook page - click here 

DISPATCH RADIO

dispatch_radio

THE BRANDON JONES SHOW

brandon_jones_show-logo

Archives