6. 2019年8月07日 18:17:11 : cdpamxHl6U : YUc3TW56WDhIU2c=[1]
ウィキリークス情報によれば、CIAは、ある国で作られたマルウェアを収集して、ハッキングしたサーバーに、偽の痕跡、マルウェアが作られた国の指紋を、故意に残すことができる。
> The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
The CIA, as well as other services, have whole databases of such ‘stolen’ tools. They may combine them in a way that looks attributable to China, compile the source code at local office time in Beijing or “forget to remove” the name of some famous Chinese emperor in the code. The CIA could use this to fake a “Chinese hacking attack” on South Korea to raise fear of China and to, in the end, sell more U.S. weapons.
http://www.moonofalabama.org/2017/03/cia-leak-russian-election-hackers-may-work-in-langley.html
http://www.asyura2.com/19/kokusai27/msg/117.html#c6