Category Archives: WARFARE

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

Advertisements

#Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’

The latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems. Read Full Article at RT.com

via #Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’ — RT – Daily news

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday.

Meet Adylkuzz – the new cyberattack that “is much bigger than WannaCry.”

Instead of completely disabling an infected computer by encrypting data and seeking a ransom payment, Adylkuzz uses the machines it infects to “mine” in a background task a virtual currency, Monero, and transfer the money created to the authors of the virus.

Proofpoint said in a blog that symptoms of the attack include loss of access to shared Windows resources and degradation of PC and server performance, effects which some users may not notice immediately.

“As it is silent and doesn’t trouble the user, the Adylkuzz attack is much more profitable for the cyber criminals. It transforms the infected users into unwitting financial supporters of their attackers,” said Godier.

Proofpoint said it has detected infected machines that have transferred several thousand dollars worth of Monero to the creators of the virus. The firm believes Adylkuzz has been on the loose since at least May 2, and perhaps even since April 24, but due to its stealthy nature was not immediately detected. Proofpoint’s vice president for email products, Robert Holmes, told AFP...

“We don’t know how big it is” but “it’s much bigger than WannaCry”,

“We have seen that before — malwares mining cryptocurrency — but not this scale,” said Holmes.

It uses the hacking tools recently disclosed by the NSA “in a more stealthy manner and for a different purpose.” As InfoRiskToday details…

Source: “It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Cyber attacks are the perfect trigger for a stock market crash 

Image result for wannacry

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Software and internet corporate monoliths have long been cooperating with the NSA through programs like PRISM to provide government agencies backdoor access to computer systems worldwide. Edward Snowden vindicated numerous “conspiracy theorists” in 2013 with his comprehensive data dumps, exposing collusion between corporations and the NSA including Microsoft, Skype, Apple, Google, Facebook and Yahoo. And make no mistake, nothing has changed since then.

The level of collusion between major software developers and the establishment might be shocking to some, but it was rather well known to alternative analysts and researchers. The use of legislation like the Foreign Intelligence Surveillance Act (FISA) to skirt Constitutional protections within the 4th Amendment has been open policy for quite some time. It only made sense that government agencies would use it as a rationale to develop vast protocols for invading people’s privacy, including American citizens.

The issue is, in the process of engineering software and networks with Swiss cheese-like security in the name of “national security,” such exploits make vast spreads of infrastructure vulnerable to attack. I think it likely this was the intention all along. That is to say, the NSA and other agencies have created a rather perfect breeding ground for false flag attacks, real attacks and general crisis…

Source: Cyber attacks are the perfect trigger for a stock market crash | Tea Party

Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? 

by Brendon O’Connell

IN THIS BLOG POST YOU WILL LEARN:

1) How Israel planned over 40 years ago to dominate the high technology communications sector.

2) How Israel trained officers from Israeli Military Intelligence to become private entrepreneurs. Now they dominate both the public and private high technology sector.

3) How this plan was titled “Operation Talpiot”.

4) How Israel dominates databases of all kinds from banking to medical, to policing, to NSA sub contractors, to government encrypted communications, to video surveillance systems for Class A critical infrastructure.

5) How Israel and Jewish Power have a tradition of the Sayanim or Helper who assist Israeli Intelligence where ever these Jews live and work, anywhere in the world, giving access to all sorts of public and private sensitive locations.

6) How Israel is setting up high technology co-operation schools under The Technion – their premiere research facility. This co-operation is used to infiltrate into the country of interest.

“INFORMATION IS POWER”

1) THE ISRAELI STATE HAS THE DEEPEST ACCESS TO ALL PRIVATE AND GOVERNMENT COMMUNICATIONS.

2) AUSTRALIA IS BUYING UP COMPROMISED ISRAELI MILITARY HIGH TECHNOLOGY COMMUNICATIONS EQUIPMENT.

3) THE ISRAELI STATE IS THE MOST FOUL, RACIST AND SUPREMACIST STATE EVER ALLOWED TO EXIST – WHERE IS THE MEDIA?…

Source: Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? | Blogging/Citizen Journalism

Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

While a second variant of the WannaCry(pt) ransomware (based on NSA’s EternalBlue exploit) was spreading across the globe yesterday, The FT reports criminal hacking groups have repurposed a second classified cyber weapon stolen from US spies and have made it available on the so-called dark web.

On Monday, the WannaCry attack, which hit 370,000 computers across 150 countries, appeared to slow. Europol, the European police agency, said the spread of the virus had stalled in Europe. But while infection rates have slowed, a Europol spokeswoman warned, “we do not think this is the end of the crisis. The hackers have already evolved the malware, and will probably continue to do so.”

Notably as Europe woke up (and US opened), the infection rate started to rise once again…

But as The FT reports, intelligence and law-enforcement officials said they fear WannaCry may foreshadow a wave of similarly damaging attacks, as criminals and others race to make use of digital weapons that for years were only available to the most technologically sophisticated nation states.

At least a dozen other NSA tools are currently being discussed and worked on as the basis of potential new cyber weapons on hacking forums on the dark web, parts of the internet not accessible via normal search engines.

The hacking tool, developed by the US National Security Agency and called EsteemAudit, has been adapted and is now available for criminal use, according to security analysts.

As with the NSA’s EternalBlue, the tool on which WannaCry was based, EsteemAudit exploits a vulnerability in older versions of Microsoft’s Windows software in the way in which networked machines communicate with each other…

Source: Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge