BE-related
Kai Frederik Lorentzen
lorentzen at hotmail.de
Wed Mar 8 02:42:30 CST 2017
> UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. <
Emphasis added.
Am 07.03.2017 um 15:35 schrieb Thomas Eckhardt:
'"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.'
https://wikileaks.org/ciav7p1/
The passphrase has some historical significance:
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
-
Pynchon-l / http://www.waste.org/mail/?list=pynchon-l
.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://waste.org/pipermail/pynchon-l/attachments/20170308/8f2dc9dc/attachment.html>
More information about the Pynchon-l
mailing list