Bitcoin mining malware spreading on Skype, researcher says

Bitcoin mining malware spreading on Skype, researcher says

Bitcoin mining malware spreading on Skype, researcher says submitted by bugeyedguy to Bitcoin [link] [comments]

Bitcoin mining malware spreading on Skype, researcher says

Bitcoin mining malware spreading on Skype, researcher says submitted by CryptoJunky to CryptoCurrency [link] [comments]

Bitcoin mining malware spreading on Skype, researcher says

submitted by WhiteHatTX to TechNewsToday [link] [comments]

Bitcoin mining malware spreads on Skype as price rises

Bitcoin mining malware spreads on Skype as price rises submitted by coolbern to Bitcoin [link] [comments]

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 1.3.3.7. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 1.3.3.7. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Epilogue
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

My theory: There was collusion, but Trump ripped off Russia in the deal and has us in a more serious situation than we think. A timeline.

I’m not usually a conspiracy theorist, but it all fit together too well to ignore. Feel free to poke holes in this, I’d like to be proven wrong.
The cold war never ended, it just moved online.
1991 - The cold war is declared over and the internet rises at a lightning pace. Much like the space program had before it. A cyberspace race. By nature of being the bulk of its inventors, the US is untouchable in cyber espionage. The NSA stockpiles all of the malicious code and secret vulnerabilities they can gather and rather than alert the world to them and help create fixes, they leave them active and turn them into tools for their agents to use against foreign powers. Eventually they also turn their attention inward and start using that software against their own people in a surveillance and manipulation program that dwarfs what the KGB had just been destroyed for doing.
2009 - Edward Snowden discovers the NSA running these programs and is outraged by the violation of rights and hypocrisy. He begins complaining in an attempt to get the system shut down and have our dirty little secret ended without national embarrassment. “I had raised these complaints not just officially in writing through email, but to my supervisors, to my colleagues, in more than one office. I did it in Fort Meade. I did it in Hawaii. And many, many of these individuals were shocked by these programs. They had never seen them themselves. And the ones who had, went, "You know, you're right. ... But if you say something about this, they're going to destroy you".
March 2011 – It’s discovered that the US military is developing software to create, spread and control social media sock puppet armies. They promise it’s to use against foreign enemies, we’re told that it’s illegal for them to use against US citizens. https://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
March 2013 - James Clapper blatantly lies to congress and denies the existence of the domestic surveillance program entirely. Snowden says this moment is when he realizes his hope is futile and May 2013 he begins releasing evidence of the collected data to expose the program and force it to stop, then waits out the storm in Hong Kong.
I believe Snowden had an insurance policy. Along with the surveillance data that he had planned to release, he stole an NSA toolkit that would not be released. A drive full of the nastiest bugs and backdoors the NSA could invent that would be released to the public in the event of his death. The US government wouldn’t dare risk it.
July 2013 – The public outrage over what’s been exposed should be astounding…but it’s not. It seems like no one cares. And at this point the NSA knows the toolkit has been stolen, it could destroy us. Desperate times call for desperate measures. The anti-propaganda law is repealed, freeing the US government to use propaganda against its own people. Those sock puppet armies are turned against us and it’s made to look like the majority of the US public doesn’t care about surveillance. Even South Park runs an episode in September mocking people’s indifference to the NSA. https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith-Mundt_Modernization_Act_of_2012
https://www.techdirt.com/articles/20130715/11210223804/anti-propaganda-ban-repealed-freeing-state-dept-to-direct-its-broadcasting-arm-american-citizens.shtml
http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
A massive domestic spy program is uncovered and they get away with it. Snowden isn’t a national hero, no one cares and in mid June 2013 the US files charges against him. He took a shot at the king and missed. The US rescinds his passport and demands Hong Kong extradite him. He’ll use his stolen toolkit to avoid a death penalty.
Russia would have suspected Snowden had this insurance policy. They tell him to spite America, they’ll arrange a flight for him from Hong Kong to Ecuador despite his lack of passport, with just a short layover in Russia. The layover becomes permanent when they refuse to finish the flight due to that lack of passport. Russia tells him he now has a choice, hand over the toolkit or you’ll be killed here and your country won’t care. Russia doesn’t care if his death triggers the release, it’s their intention to do that anyway. He holds out for 39 days in the airport but on August 1st 2013 he caves, is given asylum in Russia and Russia is discretely given the master keys to the internet.
The NSA is in an impossible position. They should alert the world that their monster has escaped its cage and help us secure our systems from it. But to do that would be to admit an indefensible extent of surveillance and now manipulation they themselves had carried out for years. The people would overthrow them immediately. In addition, every vulnerability they fix removes it from Russia’s arsenal but also from their own. I suspect they were using some of those vulnerabilities to sabotage the North Korean missile and Iranian nuclear programs. To fix them now would be to let those programs progress unhindered. I suspect this sort of catch-22 is how the Obama administration originally justified the surveillance to itself. And so the US does nothing.
Russia now has almost unfettered access on the internet, a backdoor on every computer manufactured before that date. I believe their Kompromat program became limitless. I believe they gathered every secret that existed to be found, on every member of our government and corporate world and what couldn’t be found could be planted. I’ll reference this again on *April 8 2016. *
February 2014 - Emboldened by our silence Russia moves to take Crimea 6 months later. We do not stay silent.
March 2014 - Obama uses Crimea as a cover to impose crippling sanctions on Russia. It cuts their currency and GDP in half.
November 2014 - Sony suffers a massive hack. Supposedly, by North Korea in retaliation over a Seth Rogan movie. It’s embarrassing but mostly inconsequential. North Korea denies involvement, no one believes them. I believe it’s a message from Russia. “We have the weapon and we know how to use it.”
February 2015 – Kaspersky Labs, a Russian company, exposes to the world how deeply the NSA’s infiltration has gone. All hard drives have been shipped with an NSA backdoor preinstalled. http://www.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2
Through 2015 Microsoft makes an oddly strong push to get us all to update to Windows 10. Even bootleggers can get a free upgrade. A disguised evacuation from the badly compromised XP, 7 and 8? Or pushing a new OS into the world to give the NSA a new playing field to regain an advantage on?
I suspect Putin now reaches out to Robert Mercer, financier of data mining company Cambridge Analytica. He offers to make Mercer an American oligarch. Putin will provide the most advanced data gathering tools the NSA could create, Mercer will use them to collect data that lets his candidates target voters with uncanny accuracy and win elections. Kushner later raves about the complexity of their marketing system. https://www.forbes.com/sites/stevenbertoni/2017/05/26/jared-kushner-in-his-own-words-on-the-trump-data-operation-the-fbi-is-reportedly-probing/#619dd401a90f
At the same time, Mercer will share that data with Putin who then uses botnets and other illegitimate means to influence the same voters, in the same direction, but without being visibly connected to the candidate. Later there will be controversy over a server in Trump Tower communicating with a Russian bank. I believe this is that sharing. http://www.cnn.com/2017/03/09/politics/fbi-investigation-continues-into-odd-computer-link-between-russian-bank-and-trump-organization/index.html
In 2015 Cambridge Analytica first backs Ted Cruz. The most hated man in DC and a proven track record of bringing the system to a grinding halt. The obvious choice. But Trumps bombastic personality and Cruz’s lack of one threatens the plan. In December 2015 when a Quinnipiac poll shows Cruz in second place behind Trump, Cambridge Analytica promptly dumps Cruz and picks up Trump. Sometime later Trump paranoidly projects that the only way Hillary can win is by rigging the election.
July 2016 - Trump wins the Republican nomination.
August 2016 - A hacker group called The Shadow Brokers makes the news. I believe this is Putin finally flaunting to the world what he’s done. They tell us they’ve stolen a toolkit from The Equation Group, who have been suspected to be the NSA. The files in the toolkit are NSA but only as recent as 2013, a few months after Snowden’s departure. I suspect the file dates were altered just enough to give Snowden deniability. They release half of them to the public as proof. It’s bad, we’re warned that a lot of horrible malware will come from this for years to come. And now that the code is public, those attacks could plausibly come from anyone. The other half is kept encrypted, promised to be worse, and they comically struggle and fail to sell it on the black market. No one seems willing to touch it.
November 2016 - Our election is hit by an unprecedented number of attacks. 5 per second 24 hours a day in Illinois. 150,000 total in South Carolina. 39 states altogether. Everyone who was anyone took Putin’s free gift and hit us with it. https://www.engadget.com/2017/07/17/south-carolina-150-000-election-day-hacking-attempts/
Trump wins the election.
His first, maybe only job, is to lift the sanctions. Russia needs it done yesterday. Instead, Trump immediately gets into a fight with the media over the size of his inauguration crowd and makes a wild claim of 3 million illegal votes.
I believe Cambridge Analytica using NSA tools, had the ability to analyze every American voter’s online habits and predict their vote. I believe they promised Trump a win over Hillary and gave him a very specific vote count. When Hillary wins the popular vote with 3 million more votes, Trump is paranoid that she must have added her own fake votes which threw his prophesized number. And maybe she did. But with no evidence that he can admit to the rest of us, Trump blames it on illegal immigrants and starts demanding voter information so that he can compare the numbers.
This eats Trumps fragile ego alive. For eternity his legitimacy will be questioned in history books. Trumps attitude toward Russia sours. “You promised me a win and cost me the popular vote, our deal is void.” Trump does what he’s done to so many of the people he’s worked with before and decides he’s not going to pay his end of the deal. He busies himself putting Gorsuch on the SCOTUS, the beginnings of his wall and an immigration ban, ignoring Russia publicly and privately.
The cold war warms up.
January 23 – Trump appoints Ajit Pai to head the FCC. He is hell bent on reversing net neutrality laws, making it legal to throttle or block websites to citizens. Later, congress claims this was a direct order from Trump. Along with being able to predict how people will vote based on their browsing habits, they’ll now be able to directly influence those browsing habits. https://techcrunch.com/2017/08/06/10-members-of-congress-rake-fcc-over-the-coals-in-official-net-neutrality-comment/
February 9 – Jeff Sessions is made Attorney General to defend Trump from both an angry Russia and angry Congress. He’ll later recuse himself and Trump will state that if he had known that he wouldn’t have hired him in the first place.
February 10 – Russia considers giving Snowden to US as a gift. https://www.cnbc.com/2017/02/10/russia-eyes-sending-snowden-to-us-as-gift-to-trump-official-tells-nbc-news.html
February 13 – Trump seemingly is not interested. Michael Flynn’s Russian connections are “discovered” by the White House and he resigns.
February 14 – Russia violates a cold war arms treaty and shows that it has been developing cruise missiles. “I can reach you.” It says to Trump. https://www.nytimes.com/2017/02/14/world/europe/russia-cruise-missile-arms-control-treaty.html
February 14 – Congress starts to question their too-good-to-be-true win and a republican senator calls for an investigation into ties between Trump and Russia. Most squabble over healthcare. http://www.cnn.com/2017/02/14/politics/kfile-roy-blunt-flynn-investigation/index.html
February 27 – Trump makes major cuts to agencies and dumps all $54 billion of it into defense spending. They’re going to need it. https://www.washingtonpost.com/powerpost/trump-to-propose-10-percent-spike-in-defense-spending-massive-cuts-to-other-agencies/2017/02/27/867f9690-fcf2-11e6-99b4-9e613afeb09f_story.html?utm_term=.ed55293971c8
February 28 – Amazon has a major failure and the East coast US suffers an internet outage. http://bgr.com/2017/02/28/internet-outage-amazon-web-services/
March 7 – North Korea finally gets its missiles to survive launch and sends 4 towards a US base in Japan. I suspect Russia has made them aware of the vulnerabilities that had been plaguing their program. The US deploys its own missiles in South Korea. https://www.nytimes.com/2017/03/07/world/asia/thaad-missile-defense-us-south-korea-china.html
March 16 – Dan Coats, an anti-Russia senator is appointed by Trump as Director of National Intelligence, James Clappers old position. Kind of poetic really. A concept stolen from Russia, turned into a monster by Clapper, stolen back by Russia and used to remove Clapper, whose successor is now sent to kill it.
March 23 – Senate Republicans vote to allow the sale of citizen’s private browser history. Making the kind of data collection and manipulation I suspect Cambridge Analytica of doing, now legal for future use. https://www.buzzfeed.com/hamzashaban/the-republican-controlled-senate-votes-to-strip-internet?utm_term=.duwxxZYeY5#.sygwwvZkZj
March 30 – Michael Flynn offers to testify on Russia.
April 4 – 4 days after Tillerson had told Assad he could stay in power, Assad appears to drop chemical weapons on his own people. Assad denies it. The receiving hospital is also hit with conventional weapons in an effort to kill surviving witnesses. I believe it was Russia embarrassing the US.
April 7 – In response Trump hits a nearly empty airfield with 59 Tomahawk missiles. We’re told that it was retaliation against Syria and that Russia was warned beforehand and evacuated. I don’t believe they were. I believe Trump picked the most empty airfield shared by both Syria and Russia where damage would be minimal and bombed it without warning to either of them in an attempt to scare Russia. Russia condemns the strike and suspends air cooperation with the US. The airfield returns to operations the same day.
April 8 - The Shadow Brokers post an open letter to Trump that begins *“Respectfully, what the fuck are you doing?” * and telling him to remember his base, remember who got him elected. Again, I believe this is Putin speaking directly to Trump. He hints at the dirt he either has or can plant on McCain and Lindsay Graham, if only Trump will ask. The things he hints at are extreme. It is at this point that I now suspect Putin has gained this kind of information on a vast majority of our government and business world. Even if the blackmail victims are willing to face the shame to alert us to what’s happening, they’re warned that if the operations is exposed, everyone’s secrets will be released. The country would suddenly need a special election for half of its government and half of its corporations would crumble. It would be chaos. Mutually assured destruction. All anyone caught by Putin can do, is furrow their brow and be deeply disturbed.
In this same letter the Shadow Brokers ask Trump why he hasn’t yet filed charges against all powerful entities in the US. “Doing so, you could be seizing all their IT systems, freeze their financial assets, arrest key leadership.” This was a key step in Putin’s rise to power. I believe that even if Trump and Putin are having a couples squabble, Putin still needs Trump to remember this step. They release more of the NSA code as punishment. https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
The emergency siren system in Dallas is set off. https://www.usatoday.com/story/news/2017/04/08/hacker-triggers-all-156-emergency-sirens-dallas/100212412/
April 12 – Tillerson is sent to Moscow to meet with Putin to discuss tensions “over the Syria strike”. They are unable to come to agreements.
April 13 –Trump drops the Mother of All Bombs on Afghanistan for Russia to see.
April 14 - The Shadow Brokers dump more NSA exploits. Included in this batch is EternalBlue, one of the most destructive exploits that’s been seen in years.
April 14 – North Korea, whose missiles can now fly in a more or less straight line, threatens a preemptive strike on the US. The US threatens a strike back. Trump gets out of town and heads to Mar-a-Lago just in case. http://thehill.com/policy/international/328796-north-korean-official-warns-of-preemptive-strike-of-its-own
http://www.nbcnews.com/news/world/u-s-may-launch-strike-if-north-korea-reaches-nuclear-n746366
http://www.cnn.com/2017/04/14/politics/donald-trump-north-korea-mar-a-lago/
April 15 – North Korea unveils an ICBM that can theoretically hit all of the United States. I believe that in exchange for stopping America’s sabotage of their nuclear program, NK is acting as Russia’s nuclear attack dog. He’s long wanted to be the one to do it. Now he’ll have Russian defense if he does.
April 21 - The power grids in New York, LA and San Francisco fail, it’s blamed on mechanical failure. https://www.inverse.com/article/30635-everything-we-know-la-nyc-sf-power-outages
May 9 – Comey is fired by Trump as he works on the Russian investigation. Trump justifies it by quoting and mocking Chuck Schumer with a tweet… *“Cryin' Chuck Schumer stated recently, "I do not have confidence in him (James Comey) any longer." Then acts so indignant.” *
May 12 – The Wanna Cry ransomware scares the world. Built from the previously released EternalBlue exploit, it begins in Russia and races across the globe, locking computers and demanding a bitcoin ransom. It looks to be a catastrophic infection. Our hospitals are particularly crippled by it. The name mocks Trumps own words days before.
May 13 – By dumb luck a kill switch is left in the Wanna Cry code and British security researcher Marcus Hutchins disables it by registering a $10 website domain. What should have been a ransom in the billions of dollars tops out at $130,000. https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
After the attack, Kaspersky Labs will identify North Korea as being the attacker. North Korea will deny it. Later, Kaspersky will be cut out of the defense budget and banned from US government computers. Later still, Kaspersky will file an antitrust lawsuit against Microsoft, claiming that Windows 10 removes Kaspersky software from users computers when they upgrade.
https://www.cyberscoop.com/kaspersky-banned-us-dod-ndaa-russian-influence/
https://www.theverge.com/2017/6/6/15745164/kaspersky-antitrust-complaint-microsoft-european-commission
May 27 – British airways has a massive system failure which they blame on outsource employee ineptitude. I suspect this is a warning to Theresa May in response to England preventing Wanna Cry. “Stay out of this.” http://www.mirror.co.uk/news/uk-news/british-airways-caused-bank-holiday-10520182
June 7 – Amazon goes down. https://www.theverge.com/2017/6/7/15759046/amazon-product-pages-down-outage-offline-503
June 19 – A cyber analyst finds an unsecured Amazon server owned by GOP voter targeting firm Deep Root Analytics with almost all American voters records and analytics that predict who they will vote for and why. This confirms my suspicions that Cambridge Analytica used the same method to influence the presidential election. I believe that since the March 23 legalization of the selling of citizens browser histories, the GOP has been building its own voter prediction software in order to win the 2018 elections without help from Russia’s stolen data. http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/
June 19 – All major cellular carriers go down. http://www.cbsnews.com/news/cell-phone-internet-outages-reported-across-the-u-s/
June 19 – Microsoft Skype goes down. https://techcrunch.com/2017/06/20/skype-outage-causing-connectivity-issues-company-says-its-a-global-incident/
June 27 – The Petya ransomware, built on EternalBlue, the second iteration of Wanna Cry, hits the world but seems targeted at Ukraine. Paying the ransom in this case does not unlock the data, Petya is tailored for maximum damage. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine
June 30 – Microsoft Office 365 goes down. https://www.exoprise.com/2016/07/01/office-365-email-outage-june-2016/
July 3 – Chase bank goes down. https://www.washingtonpost.com/news/business/wp/2017/07/03/chase-bank-website-down-ahead-of-independence-day/?utm_term=.2135e79c6c8b
July 3 – NASDAQ suffers an attack. http://www.wired.co.uk/article/nasdaq-hack-july
July 4 – USS Hornet and much of Alameda California are hit by a power failure, 4th of July events are canceled. http://www.eastbaytimes.com/2017/07/04/alameda-power-outage-knocks-out-july-4-celebration-at-uss-hornet/
July 27 – HBO suffers the largest Hollywood hack in history. https://www.cnbc.com/2017/08/02/largest-hollywood-hack-in-history-may-have-compromised-hbo.html
July 30 – East coast power grid goes down. https://www.nytimes.com/2017/07/30/us/outer-banks-evacuation-power.html
Putin is livid.
August 3 - Marcus Hutchins, the man who saved us from Wanna Cry, is arrested by Trumps new CIA director on unrelated charges while he is in the US for a conference. He now faces 40 years in prison. https://www.theguardian.com/technology/2017/aug/03/researcher-who-stopped-wannacry-ransomware-detained-in-us
August 3 – Trump is finally forced to sign the Russian sanctions bill, making his position official. Putin will not be paid for services rendered.
August 5 – Trump schedules a vacation to be out of Washington DC for much of the next month. http://www.cnn.com/2017/08/04/politics/donald-trump-vacation-obama/index.html
I am nervous about August.
submitted by justajackassonreddit to esist [link] [comments]

CyberWar #1 - The Infection Spread  WannaCry Nuclear powered Bitcoin mining in Belarus! Guilty until proven innocent in LA? Adam outside! Cryptocurrency Mining Bot Spread via Facebook Messenger  Digmine Malware How to be Safe? Cryptocurrency Mining Virus Spreading Through Facebook Messenger Bitcoin Miner Malware  Incredibly Stealthy!

Bitcoin mining malware spreading on Skype, researcher says A new Skype spam campaign directs users to malware that uses the computer's CPU to mine Bitcoins, according Kaspersky Lab researchers Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Skype users beware. Last week, TheNextWeb reported a new Skype malware that has been spreading at 2000 clicks per hour. The malware tries to convince Skype users to click on a link, unloading a Bitcoin mining application into your system. Cybercriminals have figured out that distributed Bitcoin mining is a perfect task for botnets and have started developing malware that can abuse the CPUs and GPUs of infected computers to generate... Bitcoin-mining malware spreading through Skype. By David Murphy 08 April 2013. more than 2,000 users per hour have been clicking on the Skype-sent link for the Bitcoin-themed malware.

[index] [14370] [26024] [21407] [25551] [24324] [27553] [11290] [22224] [2730] [10811]

CyberWar #1 - The Infection Spread WannaCry

There's a horrible bitcoin mining virus spreading through Russia. This Russian Bitcoin Virus is stealing credit card info. Putin Adviser on bitcoin ransomeware : “In regions with lower bandwidth ... Quick Security Update News: Hello Friends, today we talk about digimine cryptocurrency mining malware. it is a cryptojacking bot spreading via FB messenger f... Bitcoin Miners can tax your CPU and use up your system resources without you even knowing. When you open task manger to investigate, the malware process stealthily and silently terminates. Close ... Digmine malware is being used to mine Monero, an alternative cryptocurrency to the wildly valuable and volatile Bitcoin. I hope you like this video. I will bring the latest tech news like this ... The WannaCry ransomware attack was a worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and ...

Flag Counter