“Each technique it has created forms a ‘fingerprint’ that can be used by forensic investigators to attribute multiple different attacks to the same entity.
That’s where the CIA’s UMBRAGE team comes in. WikiLeaks describes UMBRAGE team’s activities:
The UMBRAGE team maintains a library of application development techniques borrowed from in-the-wild malware. The goal of this repository is to provide functional code snippets that can be rapidly combined into custom solutions. Rather than building feature-rich tools, which are often costly and can have significant CI value, this effort focuses on developing smaller and more targeted solutions built to operational specifications.
According to WikiLeaks, the UMBRAGE team then “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.”
Read more at Breitbart
CIA steals other groups virus and malware facilitating false flag attacks #Vault7https://t.co/K7wFTdlC82pic.twitter.com/Z0nat1Lqsv