Get all your news in one place.
100’s of premium titles.
One app.
Start reading
The Independent UK
The Independent UK
National
Andrew Griffin

WikiLeaks files detail CIA 'UMBRAGE' project, which would allow spies to pin attacks on other countries

The CIA had a special programme allowing it to trick people into thinking they had been hacked by other countries, according to WikiLeaks.

The agency was cataloguing the hacking methods of outside cyber attackers, including those from Russia, according to files published by the organisation. Once it had them catalogued, it could use them to break into other countries or people's computers or phones – making it look like a different country had done so.

WikiLeaks made specific reference to the Russian Federation. Tensions between the US and Russia have escalated in recent months, in particular since American intelligence agencies blamed the hack of Democratic emails – credited with swaying the election of Donald Trump – on the country.

The project, called UMBRAGE, is just one of a range of different hacking tools that appear to be have been revealed by the leak. The files also include details on programmes for hacking into iPhones, laptops and even smart TVs and turning them into listening devices – though none of the details have yet been confirmed.

UMBRAGE works in part by getting around the problems of those hacking techniques. Any cyber attack inevitably leaves a trace of how it was done – but by cataloguing other hackers' tricks, those traces could look like they come from someone else entirely.

"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation," WikiLeaks wrote in its release. "With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from."

The UMBRAGE project includes a variety of cyber weapons, including tools that can allow data to be deleted, webcams to be spied on and various other survey techniques, according to the documents.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.