????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????[one][sixty eight] Amongst the tactics borrowed by UMBRAGE was the file wiping implementation employed by Shamoon. In line with Computer system Planet, a number of the techniques and code snippets have already been employed by CIA