http://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/blog/cia-wikileaks-encryption
Some of the techniques currently at CIA’s disposal via UMBRAGE include: keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. Vault7 reveals that the CIA has also produced rules (new window) on how its malware should be hidden when deployed to avoid any fingerprints leading back to the US or the agency.