Category Archives: #WANNACRY

– #AFTERMIDNIGHT, #ASSASSIN #HERA – Global Ransomware Cyberattack, Israel? CIA/Microsoft

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

Advertisement

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday.

Meet Adylkuzz – the new cyberattack that “is much bigger than WannaCry.”

Instead of completely disabling an infected computer by encrypting data and seeking a ransom payment, Adylkuzz uses the machines it infects to “mine” in a background task a virtual currency, Monero, and transfer the money created to the authors of the virus.

Proofpoint said in a blog that symptoms of the attack include loss of access to shared Windows resources and degradation of PC and server performance, effects which some users may not notice immediately.

“As it is silent and doesn’t trouble the user, the Adylkuzz attack is much more profitable for the cyber criminals. It transforms the infected users into unwitting financial supporters of their attackers,” said Godier.

Proofpoint said it has detected infected machines that have transferred several thousand dollars worth of Monero to the creators of the virus. The firm believes Adylkuzz has been on the loose since at least May 2, and perhaps even since April 24, but due to its stealthy nature was not immediately detected. Proofpoint’s vice president for email products, Robert Holmes, told AFP...

“We don’t know how big it is” but “it’s much bigger than WannaCry”,

“We have seen that before — malwares mining cryptocurrency — but not this scale,” said Holmes.

It uses the hacking tools recently disclosed by the NSA “in a more stealthy manner and for a different purpose.” As InfoRiskToday details…

Source: “It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Cyber attacks are the perfect trigger for a stock market crash 

Image result for wannacry

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Software and internet corporate monoliths have long been cooperating with the NSA through programs like PRISM to provide government agencies backdoor access to computer systems worldwide. Edward Snowden vindicated numerous “conspiracy theorists” in 2013 with his comprehensive data dumps, exposing collusion between corporations and the NSA including Microsoft, Skype, Apple, Google, Facebook and Yahoo. And make no mistake, nothing has changed since then.

The level of collusion between major software developers and the establishment might be shocking to some, but it was rather well known to alternative analysts and researchers. The use of legislation like the Foreign Intelligence Surveillance Act (FISA) to skirt Constitutional protections within the 4th Amendment has been open policy for quite some time. It only made sense that government agencies would use it as a rationale to develop vast protocols for invading people’s privacy, including American citizens.

The issue is, in the process of engineering software and networks with Swiss cheese-like security in the name of “national security,” such exploits make vast spreads of infrastructure vulnerable to attack. I think it likely this was the intention all along. That is to say, the NSA and other agencies have created a rather perfect breeding ground for false flag attacks, real attacks and general crisis…

Source: Cyber attacks are the perfect trigger for a stock market crash | Tea Party

Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? 

by Brendon O’Connell

IN THIS BLOG POST YOU WILL LEARN:

1) How Israel planned over 40 years ago to dominate the high technology communications sector.

2) How Israel trained officers from Israeli Military Intelligence to become private entrepreneurs. Now they dominate both the public and private high technology sector.

3) How this plan was titled “Operation Talpiot”.

4) How Israel dominates databases of all kinds from banking to medical, to policing, to NSA sub contractors, to government encrypted communications, to video surveillance systems for Class A critical infrastructure.

5) How Israel and Jewish Power have a tradition of the Sayanim or Helper who assist Israeli Intelligence where ever these Jews live and work, anywhere in the world, giving access to all sorts of public and private sensitive locations.

6) How Israel is setting up high technology co-operation schools under The Technion – their premiere research facility. This co-operation is used to infiltrate into the country of interest.

“INFORMATION IS POWER”

1) THE ISRAELI STATE HAS THE DEEPEST ACCESS TO ALL PRIVATE AND GOVERNMENT COMMUNICATIONS.

2) AUSTRALIA IS BUYING UP COMPROMISED ISRAELI MILITARY HIGH TECHNOLOGY COMMUNICATIONS EQUIPMENT.

3) THE ISRAELI STATE IS THE MOST FOUL, RACIST AND SUPREMACIST STATE EVER ALLOWED TO EXIST – WHERE IS THE MEDIA?…

Source: Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? | Blogging/Citizen Journalism

Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

While a second variant of the WannaCry(pt) ransomware (based on NSA’s EternalBlue exploit) was spreading across the globe yesterday, The FT reports criminal hacking groups have repurposed a second classified cyber weapon stolen from US spies and have made it available on the so-called dark web.

On Monday, the WannaCry attack, which hit 370,000 computers across 150 countries, appeared to slow. Europol, the European police agency, said the spread of the virus had stalled in Europe. But while infection rates have slowed, a Europol spokeswoman warned, “we do not think this is the end of the crisis. The hackers have already evolved the malware, and will probably continue to do so.”

Notably as Europe woke up (and US opened), the infection rate started to rise once again…

But as The FT reports, intelligence and law-enforcement officials said they fear WannaCry may foreshadow a wave of similarly damaging attacks, as criminals and others race to make use of digital weapons that for years were only available to the most technologically sophisticated nation states.

At least a dozen other NSA tools are currently being discussed and worked on as the basis of potential new cyber weapons on hacking forums on the dark web, parts of the internet not accessible via normal search engines.

The hacking tool, developed by the US National Security Agency and called EsteemAudit, has been adapted and is now available for criminal use, according to security analysts.

As with the NSA’s EternalBlue, the tool on which WannaCry was based, EsteemAudit exploits a vulnerability in older versions of Microsoft’s Windows software in the way in which networked machines communicate with each other…

Source: Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

NSA Has Fraudently Taken Control Over All Electronic Voting 

The so-called Ransom Computer virus, for short has a hidden benefit for the globalists. America may have just had their last semi-honest election in which the results are 100% predetermined by the globalists. But now, winners and losers can be selected by the touch of a button.  Here is the story on how your political choice has been stolen.

Source: NSA Has Fraudently Taken Control Over All Electronic Voting | Conspiracy Theories

“Who’s Behind The Malware WannaCry?”

Now in over 150 countries effecting banks across the globe this Malware has not taken on a different form.

A Malware being a product covering Viruses and all other programming errors.

Today over 200,000 computers out of 1 billion have been infected – but interestingly enough it happens to be the computers of the banks that have declared themselves as insolvent.

Further – many Hospitals that were failing Financially have also been hit hard in their computing systems and as they download the patch Microsoft’s Smart Cloud now runs their financial computers.

WannaCry Ransom Ware seems to be very selective in what it actually effects and it would not surprise us based on the Identical World Wide Reporting on the subject if the GSA sent money to SERCO  to set this whole thing up.

GSA sends SERCO Dollars, SERCO Company creates the disaster and sends the results to ENTRUST Company – which uses the program DEMON to send out the reports to every news agency in the world.

Do you not find it funny that…

Source: http://drwilliammount.blogspot.com.au/2017/05/welcome-to-smartest-most-active-and-one.html

DR WILLIAM MOUNT: Banks Fracture as Microsoft Takes Over The Planet

Just got word that our banks in the West are fracturing – loosing control.

With over $1,000 Trillion dollars of Hedge Funds now teetering on the verge of a collapse – $70 Trillion alone with Deutsche Bank  – we are now seeing Microsoft reaching out to control all computing systems world wide.

The last President has done a Great Job in setting this One world Dictatorship up.

ZEIG HEIL

With the recent release of a virus that is greatly effecting all non-Windows 10 users in over 104 different nations – users – like the World’s Banking System – Microsoft has  now come out and stated that they released the CURE before the Virus was released.

Sounds like Ebola and HIV – Who’s cure we had in our US Army Medical Manuals before these diseases were even seen.

Now Microsoft has come up with a release stating that just before the release of the deadly Virus they had published the “Cure.”

We never got the Updates for our computers, did you?

We run computers using Windows 95, Window’s Vista and Window’s 7.

Not one update to solve this problem. The only updates we received were to try and force us into Windows 10 – on all 4 computers.

So now Microsoft controls everything and the New Updates put your computer into Window’s 11 – the Smart Cloud.

Source: DR WILLIAM MOUNT: Banks Fracture as Microsoft Takes Over The Planet

24 Hours Later: “Unprecedented” Fallout From “Biggest Ransomware Attack In History” | Zero Hedge

The ransomware has been identifed as WannaCry

24 hours after it first emerged, it has been called the first global, coordinated ransomware attack using hacking tools developed by the NSA, crippling over a dozen hospitals across the UK, mass transit around Europe, car factories in France and the UK, universities in China, corporations in the US, banks in Russia and countless other mission-critical businesses and infrastructure.

According to experts, “this could be one of the worst-ever recorded attacks of its kind.” The security researcher who tweets and blogs as MalwareTech told The Intercept, “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over 9 million computers in nearly 200 countries.

The fallout, according to cyber-specialists, has been “unprecedented”: it has left unprepared governments, companies and security experts from China to the United Kingdom on Saturday reeling, and racing to contain the damage from the audacious cyberattack that spread quickly across the globe, raising fears that people would not be able to meet ransom demands before their data are destroyed.

As reported yesterday, the global efforts come less than a day after malicious software, transmitted via email and stolen from the National Security Agency, exposed vulnerabilities in computer systems in almost 100 countries in one of the largest “ransomware” attacks on record. The cyberattackers took over the computers, encrypted the information on them and then demanded payment of $300 or more from users in the form of bitcoin to unlock the devices.

The ransomware was subsequently identified as a new variant of “WannaCry” that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft’s Windows operating system.

 

Source: 24 Hours Later: “Unprecedented” Fallout From “Biggest Ransomware Attack In History” | Zero Hedge

The Recent Cyber Attack | Simon Parkes Official Website Current Intel

The Recent Cyber Attack

Sunday, May 14, 2017

The cyber attack that took down some of the British National Health Service computers has spread and has taken down a large portion of the People’s Bank of China cash machines and could also have been responsible for the recent Greek train crash.

Source: The Recent Cyber Attack | Simon Parkes Official Website

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge

The ransomware has been identifed as WannaCry

* * *

Update 4: According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details,

Today’s WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon that would have allowed the spy agency’s hackers to break into any of millions of Windows computers by exploiting a flaw in how certain version of Windows implemented a network protocol commonly used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in a March software update, the safety provided there relied on computer users keeping their systems current with the most recent updates. Clearly, as has always been the case, many people (including in governments) are not installing updates. Before, there would have been some solace in knowing that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from the moment the agency lost control of its own exploit last summer, there’s been no such assurance.

Today shows exactly what’s at stake when government hackers can’t keep their virtual weapons locked up.

As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it, “I am actually surprised that a weaponized malware of this nature didn’t spread sooner.”

Update 3: Microsoft  has issued a statement, confirming the status the vulnerability…

Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt.

In March, we provided a security update which provides additional protections against this potential attack.

Those who are running our free antivirus software and have Windows updates enabled, are protected. We are working with customers to provide additional assistance.

Source: “Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge