Mar 03

hillary leak teaser

hdr22@clintonemail.com – How A Romanian Hacker Exposed Hillary Clinton’s Secret Email Life (ZeroHedge, March 3, 2015):

While the Hillary Clinton email fiasco is sure to be the talk of the town for the next few days, weeks, and months and may have seriously jeopardized the former SecState’s chances at becoming America’s next president, an even more important story is how the revelation that Hillary exclusively used a private, unencrypted and unsupervised email for 4 years of state-level, official business communications, emerged in the first place.

The answer, shockingly, comes courtesy of a Romanian hacker who was known by the handle “Guccifer”, and who is currently serving time in a Bucharest prison for his online attacks against countless public figures including the infamous leaks of George W. Bush personal paintings. Continue reading »

Tags: , , , , , , , ,

Feb 17

1bn online bank heist

Remote ATM control: Kaspersky Lab details $1bn online bank heist (EXCLUSIVE) (RT, Feb 16, 2015):

Internet security company Kaspersky Lab says the banking industry could be experiencing “a new era in cybercrime.” The company has been investigating a $1 billion attack on financial institutions by a sophisticated hacking group.

The IT security firm says the hackers from the Carabanak group used a complex virus system which was later named after them. It is not like the simple Trojan horse malware used to by-pass security systems, but something much more complex and unique, according to documents exclusively seen by RT.

Russian cyber-security company Kaspersky Lab was invited to look into the matter, after an ATM in the Ukrainian capital Kiev started giving out cash randomly without anyone inserting a card or touching any buttons in late 2013. Continue reading »

Tags: , , , ,

Jan 15

Never mind that …

It Wasn’t North Korea Or Russia: Sony Hack ‘Perpetrator’ Said To Be Laid-Off, Disgruntled Employee

… just use the momentum and attack your enemies …

Obama Sanctions North Korea For Sony Hack Which Was Perpetrated By Disgruntled Former Employee

Flashback:

Senator Jay Rockefeller: Internet Is The ‘No.1 National Hazard’ (Video):

‘It really almost makes you ask the question would it have been better if we had never invented the internet.’


obama-cyberwar

Obama proposes cyber law update in wake of Sony hack (RT, Jan 13, 2015):

The White House has unveiled a proposal aimed at strengthening cybersecurity within the US by encouraging sharing between sectors and installing new penalties after a series of high-profile attacks targeted government and private sector networks.

The initiative, announced by US President Barack Obama during a planned visit on Tuesday to the US Department of Homeland Security in Virginia, calls for new legislation to be adopted by Congress in order to enhance the sharing of electronic threat information between the private sector and the government, while also revamping the Computer Fraud and Abuse Act, or CFAA – the 1984 federal law that outlines when and what hacking charges can be brought against suspected cyber criminals. Continue reading »

Tags: , , , , , , , , , , , ,

Jan 12

Flashback:

“They are doing everything in the world to control the internet.”
– Congressman Ron Paul on the Cyber Security Act

Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act:

“Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.”


Obama-internet-kill-switch

Breaking: Jihadist Group Hacks U.S. Central Command and Is Uploading Pentagon War Game Scenarios and Personal Details of Military Members (SHFTplan, Jan 12, 2015):centcom-hack-th

US Central Command (@Centcom), the unified military command responsible for security across the Arabian Peninsula and into the central Asia region, has had their Twitter account compromised. Cyber Jihadist claiming to be linked to ISIS were actively tweeting and uploading hacked war-game scenarios and other details that include phone numbers and email addresses for U.S. military personnel.

According to the hackers, the documents were obtained from a previous hack of Pentagon defense systems, as well as mobile devices owned by individuals working for or in conjunction with the military.

As of this writing, approximately one hour after the hack was first identified on the Centcom Twitter page, the account has been suspended and all linked data, including pictures releases of war game scenario and personal details of personnel are being wiped, presumably by U.S. National Security teams.

Continue reading »

Tags: , , , , , , , , , , , ,

Jan 12

Flashback:

“They are doing everything in the world to control the internet.”
– Congressman Ron Paul on the Cyber Security Act

Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act:

“Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.”


ISIS Supporters Hack US CentCom’s Twitter, YouTube Account, Threaten US Soldiers, Release “China Scenario” Details (ZeroHedge, Jan 12, 2015):

Update 2: Centcom’s YouTube account has also been hacked…

centcom-hack6

Update: 40 minutes after the first hacked tweet appeared at 12:29pm Eastern, the Centcom account has been suspended.

centcom suspended_0

Another day, another escalation in the conflict between supporters of the Islamic State and western powers, in this case the Twitter account of the US Central Command (@Centcom), which appears to have been hacked, and where compromising tweets revealing details about military members and potential conflict scenarios involving China and North Korea, are being sent out in real time.

This is the threat that was released via the hacked account moments ago:

Pentagon networks hacked

AMERICAN SOLDIERS,

WE ARE COMING, WATCH YOUR BACK. ISIS. #CyberCaliphate

In the name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate under the auspices of ISIS continues its CyberJihad. While the US and its satellites kill our brothers in Syria, Iraq and Afghanistan we broke into your networks and personal devices and know everything about you.

You’ll see no mercy infidels. ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now.

We won’t stop! We know everything about you, your wives and children.

U.S. soldiers! We’re watching you!

Here’s a part of confidential data from your mobile devices:

http://www.4shared.com/zip/2uJtWwfDba/us_army_files.html
http://www.4shared.com/zip/TskSuCl2ba/war_scenarios.html
http://dfiles.eu/files/njgg7yvbx
http://dfiles.eu/files/usybptc71

There is no God but Allah and Muhammad is his Prophet! There is no law but Sharia!

A sampling of the hacked tweets:

Perhaps of increased concern: the disclosure of Centcom’s “China scenarios”

Centcom-Hack2

Centcom-Hack1

* * *

Countdown to Internet kill switch 10…. 9…. 8…. 7….

Obama-internet-kill-switch

WTC-7-collapse

++ Iraq: al Baghdadi appare in immagini in moschea Mossul ++
A welcome distraction: the Islamist dude with the $6.500 James Bond watch.

Related info:

They Have Butchered Children (Veterans Today)

Israel Acts As ISIS’ Air Force … Repeatedly Bombs Syria

Senior Aide To President Putin: Mossad Training ISIL Terrorists

ISIS, Al-Qaeda Join The M&A Bubble, Agree To Fight ‘Common Foes’ Together In Syria

George Galloway On ISIS (Video )

Israel And Turkey Are Directly Supporting ISIS And Al-Qaeda Terrorists In Syria

The Khorasans: As Fake As the Kardashians

What Iraq Thinks: “It Is Obvious To Everyone That ISIS Is A Creation Of The United States And Israel”

The Fake Beheadings of the Arch-Zionist Crime Syndicate

ISIS EXPOSED 100% AS CIA OPERATION: ‘The Next Osama Bin Laden is Here’ (Video)

Meeting ISIL (Documentary)

ISIL Leader Al-Baghdadi Is Mossad Agent Simon Elliot

McCain and his buddy, ISIS leader Al-Baghdadi:

ISIS-leader-Al-Baghdadi-Mccain

McCain-ISIS

The U.S. has armed and trained ISIS:

Veterans Today: CIA And US Military Fight Under Al Qaeda Command In Syria (Video)

U.S. Special Forces Train Syrian Rebels In Jordan (Le Figaro)

Americans Are Training Syria Rebels In Jordan: Spiegel (Reuters)

CIA-Armed And Trained Syrian Rebels ‘On Way To Battlefield’

‘Military Intervention In Syria’, US Training ‘Rebels’ Since 2011 And The Complete Grand Plan – The March 2012 Leak

mossadISISmeme

Baghdadi Mossad Trained
Source

Flashback:

… all of them coming directly from from our Al-CIAda unit …

Robin-Cook-There-is-no-al-qaeda

Why Was A Sunday Times Report On US Government Ties To Al-Qaeda Chief Spiked? & Gladio B

Hillary Clinton: ‘We Created Al-Qaeda’ — The Protagonists Of The ‘Global War on Terrorism’ Are The Terrorists (Video)

‘GLADIO, THE LIVING PROOF THERE IS NO AL-QAEDA, NO WAR ON TERROR’ – ‘GLADIO Is AL-QAEDA’ (Veterans Today)

Just one month after this article has been published in the Guardian Robin Cook DIED:

Former British Foreign Secretary Robin Cook: ‘Al-Qaida, Literally “The Database”, Was Originally The Computer File Of The Thousands Of Mujahideen Who Were Recruited And Trained With Help From The CIA To Defeat The Russians’

Al Qaeda Doesn’t Exist or How The US Created Al Qaeda (Documentary)

BBC: Al-Qaeda Does Not Exist (Documentary)

Retired U.S. General Wesley Clark

… at the Commonwealth Club of California:

U.S. 4 Star General Wesley Clark, Oct 3, 2007: ‘We’re Gonna Attack And Destroy The Governments In 7 Countries In 5 Years’ … ‘Iraq, Syria, Lebanon, Libya, Somalia, Sudan And Iran’ (Video)

… or here in this interview with Democracy Now:

Interview With US General Wesley Clark (Ret.): US Government Planned To ‘Take Out 7 Countries In 5 Years’: ‘Starting With Iraq, Syria, Lebanon, Libya, Somalia, Sudan And Finishing Off Iran’ (Video)

 

Tags: , , , , , , , , , , ,

Dec 21


21.12.2014

Description:

The White House claims North Korea is responsible for the Sony hack; As usual no evidence

Tags: , , , , , , , ,

Dec 20

Defiant North Korea Says Can Prove It Is Not Behind Hack “Without Resorting To Torture Like The CIA” (ZeroHedge, Dec 20, 2014):

Just hours after the FBI announced that, with absolute certainty, it had determined that North Korea was behind the Sony hack, a “theory” that has become the butt of global jokes, we learned, in a far less prominent release, that according to an internal inquiry, FBI evidence if “often mishandled.” According to the NYT, “F.B.I. agents in every region of the country have mishandled, mislabeled and lost evidence, according to a highly critical internal investigation that discovered errors with nearly half the pieces of evidence it reviewed.

The evidence collection and retention system is the backbone of the F.B.I.’s investigative process, and the report said it is beset by problems.

It gets better: according to the report, the F.B.I. was storing more weapons, less money and valuables, and two tons more drugs than its records had indicated. Almost as if the FBI was siphoning off cash, while hoarding guns and blow. Continue reading »

Tags: , , , , , , , ,

Dec 19

–  The Interview Is “Desperately Unfunny”, “Will Flop” If Not Cancelled According To Leaked Sony Emails (ZeroHedge, Dec 19, 2014):

The conspiracy theories surrounding the story of The Interview’s cancellation in the aftermath of the North Korean “hacking” just keep getting stranger by the day, (and will, in 6-9, months lead to the blockbuster drama: “How ‘The Interview’ Got Cancelled“)

First, as we previously reported, at the same time as the NYT reported that according to the US the hack “undisputedly” originated in North Korea, Wired magazine released an article explaining why it is impossible to make such a determination (see Someone is Lying). That, however, did not stop the US on its inexplicable witch hunt, and moments ago Reuters reported that according to the US, it was indeed North Korea who was responsible for the hacks (although, the report adds, North Korea may have had a little help from China so nobody really know but whatever).

From Reuters: Continue reading »

Tags: , , ,

Dec 17

H/t reader squodgy:

“If you really believe N.Korea is behind this, I have some of Saddam’s nuclear weapons for sale.

Hackers? How about a pretense for enacting cyber martial law (censorship of alternative media while PNAC engages in the next step of making war vs Russia.)

At the council of the Beast:
“Hey, fellow lizard-people [bankers, khazars, and other parasitic demons of this planet], we seem to be some 18 to 60 trillion dollars in debt. We desperately need a false flag scapegoat to blame for our impending financial collapse, now that BRICS are raining down on us. Let’s set up a global campaign of false flags, including cyberattacks and our pet armies of IS [let’s not degrade the name of the Goddess, please], leading up to our grand finale when we nuke wall street and send a fleet of MiG drones to attack European civilians, then we can implement the endgame of PNAC, because we have already lost to Eurasia economically and must start the main phase of WW-PNAC before BRICS military capability exceeds ours, which will happen very soon at the present rate.”

Author said:
“For example, what happens if the same group […] decides to
hack […] nuclear power plants and force them into critical meltdowns?”

Well, i dunno, why don’t you ask the programmers of STUXNET over at CIA-Mossad? They seem to have experience with such things, having earned the record for the worst friendly-fire incident ever, when their virus leaked from Iran to Japan, causing Fukushima Daiichi’s emergency systems to fail, killing or mutating all life in and on the Pacific?”


The-interview-Sony-hack

Hackers in charge: Sony hack and theater pullback reveals new era of hackers trouncing multinational corporations (Natural news, Dec 17, 2014):

Note the day of December 16th, 2014. That day will mark a milestone in history because it was the first time a U.S. cinema chain censored the launch of a movie due to threats from hackers.

“Carmike Cinemas has canceled the nationwide Christmas Day release of Sony’s ‘The Interview,’ the first theater chain to do so on the day hackers threatened 9/11-like attacks on theaters that showed the movie,” reported The Wrap today. [1]

Sony pictures has been under siege ever since an elaborate hack stole studio files and emails, some of which have already been released to the great embarrassment of studio executives and Hollywood stars. Natural News hasn’t covered any of this because it all seemed so pointless… until today. Continue reading »

Tags: , , , ,

Dec 14

we-are-anonymous

Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers (RT, Dec 14, 2014):

Swedish government email accounts have been hacked by the Anonymous hacktivist group, in response to last week’s seizure of The Pirate Bay servers by Swedish police.

The group also claimed to have hacked into the government email accounts of Israel, India, Brazil, Argentina, and Mexico.

The hacktivist group also left a message at the end of the leak: “Warning: Merry Christmas & a Happy New Year to all!! Bye :*” Continue reading »

Tags: , , , , , , ,

Dec 13

Sony suspends filming after hackers hit payments (The Times, Dec 13, 2014):

The Hollywood studio that made the James Bond and Spider-Man films has abandoned shoots after hackers crippled its computer network, and leaked four films and thousands of documents.

Agencies filming for Sony Pictures have cancelled shoots because the problems have left it unable to process payments, a source told The Times.

The attack by Guardians of Peace, a hacking collective suspected of having links with North Korea, has taken most of Sony Pictures’ computers offline.

Tags: , ,

Oct 05

JPMorgan hack exposed data of 83 mln, among biggest breaches in history (Reuters, Oct 2, 2014):

Oct 2 (Reuters) – Names, addresses, phone numbers and email addresses of the holders of some 83 million households and small business accounts were exposed when computer systems at JPMorgan Chase & Co were recently compromised by hackers, making it one of the biggest data breaches in history.

The bank revealed the scope of the previously disclosed breach on Thursday, saying that there was no evidence that account numbers, passwords, user IDs, birth dates or Social Security numbers had been stolen.

It added that it has not seen “unusual customer fraud” related to the attack which exposed contact information for 76 million households and 7 million small businesses. Continue reading »

Tags: , , ,

Aug 05

Airplanes could be taken over through inflight entertainment systems, hacker claims (RT, Aug 4, 2014):

A security researcher says that ships, aircraft and industrial facilities are all at risk of being compromised — perhaps with catastrophic results — and intends to explain how at a major hacker conference this week.

Ruben Santamarta, a 32-year-old consultant for cyber security firm IOActive, is expected to present a talk titled “SATCOM Terminals: Hacking by Air, Sea and Land” on Thursday at the annual Black Hat conference in Las Vegas, Nevada, and during it he plans to demonstrate how satellite communications systems used by the likes of commercial airliners and oil rigs alike can be infiltrated by malicious actors and altered to let unauthorized attackers take control. Continue reading »

Tags: , , ,

Jun 14

Even Toilets Aren’t Safe as Hackers Target Home Devices (Bloomberg, June 10, 2014):

Come home to a hot iron and smoldering clothes this afternoon? Soon, it may not be a sign of forgetfulness, but rather evidence that you’ve been hacked.

In coming years, your smartphone will be able to lock your house, turn on the air conditioning, check whether the milk is out of date, or even heat up your iron. Great news, except that all that convenience could also let criminals open your doors, spy on your family or drive your connected car to their lair.

“As these technologies become more sophisticated, it opens up a broader spectrum of threats,” said Gunter Ollmann, chief technology officer of IOActive, a tech security firm in Seattle. A world of connected devices makes it possible “for the bad guys to have permanent entry into your household.”

What the industry calls “the Internet of things” has been heralded as the next wave of tech riches. By 2020, some 26 billion such devices may be connected to the Internet, up from 3 billion today, researcher Gartner Inc. (IT) estimates. That’s almost four times the number of smartphones, tablets and PCs that will be in use.

The vision is to connect almost everything — from cars to fridges, lamps, even toilets. Forget to flush? There’s an app for that. Continue reading »

Tags: , ,

May 19

China Responds To “Ridiculous” Hacking Charges, Warns “Will Harm Relations With US”, Demands US “Rectify Mistake” (ZeroHedge, May 19, 2014):

While we wait (in vain) for the US to lob sanctions at China for doing what Russia has done and amass a military presence on its border with Vietnam, here is what China had to say about the earlier announcement by the DOJ charging China with espionage and “penetrating” US companies (if having nothing to add regarding the NSA). From the wires:

  • CHINA FOREIGN MINISTRY SAYS CHARGES HARM RELATIONS WITH U.S.
  • CHINA FOREIGN MINISTRY SAYS CHINA HAS ALREADY PROTESTED TO U.S., URGES U.S. TO IMMEDIATELY RECTIFY MISTAKE
  • CHINA FOREIGN MINISTRY ‘STRONGLY REFUTES’ U.S. CHARGES
  • CHINA FOREIGN MINISTRY SAYS U.S. MADE UP FACTS IN SPYING CASE
  • CHINA FOREIGN MINISTRY URGES U.S. TO `CORRECT ITS MISTAKES’
  • CHINA SAYS U.S. VIOLATES BASIC PRINCIPLES OF INTL RELATIONSHIPS
  • CHINA FOREIGN MINISTRY CALLS CHARGES `BASELESS,’ `RIDICULOUS’
  • CHINA FOREIGN MINISTRY URGES U.S. TO `WITHDRAW CHARGES’

And the enigmatic:

  • CHINA TO MAKE FURTHER RESPONSES ACCORDING TO DEVELOPMENTS

Full Statement from China’s Foreign Ministry: Continue reading »

Tags: , , , , , , ,

Apr 28

Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Continue reading »

Tags: , , , , , ,

Apr 07

anonymous-israel-cyber-attack-.si

#OpIsrael: Anonymous attacks hundreds of Israeli websites (RT, April 6, 2014):

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group’s anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel’s policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.” Continue reading »

Tags: , , , , , , , ,

Mar 12

Isn’t It Ironic: Mt.Gox Hacker Demands Ransom From Exchange Users To Not Reveal Their Personal Data (ZeroHedge, March 11, 2014)

The bankruptcy of the once largest Bitcoin exchange may be history, but now the real drama begins.

First, over the weekend, allegations surfaced that not the whole truth may have been revealed during the heartfelt announcement by Mt. Gox CEO, Mark Karpeles, who claimed that $400 million in Bitcoin were stolen by hackers. As Forbes reported, hackers took over the Reddit account and personal blog of Mark Karpeles, to reveal that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users.

Continue reading »

Tags: , ,

Mar 10

FYI.


Japanese reports blame collapse of the company on hackers overloading the website

bitcoin-111
Unlike traditional currencies, which are backed by central banks, Bitcoin is created by complex interactions between a large network of computers across the globe.

Bitcoin exchange MtGox ‘faced 150,000 hack attacks every second’ (Telegraph, March 9, 2014):

Troubled Bitcoin exchange MtGox was reportedly attacked 150,000 times per second by hackers in the days leading up to its collapse last month.

The Tokyo-based exchange, which filed for bankruptcy protection in February, was hit with crippling distributed denial-of-service (DDoS) attacks, according to the Yomiuri Shimbun newspaper.

During DDoS attacks, hackers take control of multiple computers to send a flood of data to the target, causing servers to crash and making websites unavailable.

Lawyers for MtGox said that during the attacks, which lasted for several days, 750,000 Bitcoins belonging to customers were stolen, worth an estimated $575m (£344m).

Continue reading »

Tags: , , , ,

Jan 20

Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes (Liberty Blitzkrieg, Jan 20, 2014):

The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes.”

It’s actually hard to be this incompetent if you tried.

More from the Washington Times:

Continue reading »

Tags: , , , , , , , , , ,