Thank God.
Welcome aboard, Mr. Assange.
How da fuq do you do that Q???
False Attribution.
Description: Appealing to an irrelevant, unqualified, unidentified, biased, or fabricated source in support of an argument (modern usage).
….
ob·fus·ca·tion
/ˌäbfəˈskāSH(ə)n/
noun
The action of making something obscure, unclear, or unintelligible.
This is known as obfuscation.
The goal of obfuscation is to anonymize cyberattackers, reduce the risk of exposure, and hide malware by changing the overall signature and fingerprint of malicious code – despite the payload being a known threat.
Obfuscation can include a variety of techniques to hide malware, creating layers of obscurity which Cylance compares to "nested figures in a Russian doll."
These techniques include:
Packers: These software packages will compress malware programs to hide their presence, making original code unreadable.
Crypters: Crypters may encrypt malware programs, or portions of software, to restrict access to code which could alarm an antivirus product to familiar signatures.
Dead code insertion: Ineffective, useless code can be added to malware to disguise a program's appearance.
Instruction changes: Threat actors may alter instruction codes in malware from original samples that end up changing the appearance of the code – but not the behavior – as well as change the order and sequence of scripts.
Exclusive or operation (XOR): This common method of obfuscation hides data so it cannot be read unless trained eyes apply XOR values of 0x55 to code.
ROT13: This technique is an ASM instruction for "rotate" which substitutes code for random letters.