[1][68] Amongst the methods borrowed by UMBRAGE was the file wiping implementation employed by Shamoon. In keeping with Personal computer Environment, a lot of the approaches and code snippets have been used by CIA in its interior tasks, whose consequence cannot be inferred through the leaks. PC Planet commented the apply of planting "false flags"