National Cyber Range Building Attack Tools

Moderators: Elvis, DrVolin, Jeff

Postby Penguin » Sat Jul 11, 2009 7:57 am

http://it.slashdot.org/story/09/07/10/0 ... f-Destruct

"Several news sources are reporting that the tens of thousands of Microsoft Windows systems infected with the Mydoom worm and being used in an ongoing denial of service attack against US and S. Korean government Web sites will likely have their hard drives wiped of data come Friday. From The Washington Post's Security Fix blog, the malware is 'designed to download a payload from a set of Web servers. Included in that payload is a Trojan horse program that overwrites the data on the hard drive with a message that reads "memory of the independence day," followed by as many "u" characters as it takes to write over every sector of every physical drive attached to the compromised system.' ChannelNews Asia carries similar information."

http://voices.washingtonpost.com/securi ... ttack.html
http://www.channelnewsasia.com/stories/ ... 24/1/.html

Interesting...
Is this some sorta cyber-terror false flag or a real thing, thats another level of interesting. Criminals, spooks or a state actor? All of em?
Penguin
 
Posts: 5089
Joined: Thu Aug 23, 2007 5:56 pm
Blog: View Blog (0)


Postby Penguin » Mon Jul 13, 2009 8:16 am

So Im not the only one musing along exactly those same lines...
Hardly surprising.

That independence day hoopla is a nice touch!

the former director of DHS' National Cybersecurity Division told Federal Computer Week: "I think at this point it is highly unlikely, highly improbable that any reliable attack-attribution data is available. It's a very intense process and it could take weeks. ... The analysis here--both technical and nontechnical--is not trivial and takes time."

In other words, NIS pronouncements should be taken with the proverbial grain of salt. After all, this is an agency with a repressive pedigree and its own dodgy agenda. "Trained-up fierce" by the CIA and the Pentagon, the South Korean intelligence service has been involved in some of the worst human rights abuses in East Asia.

According to a series of reports by investigative journalist Tim Shorrock, the agency was involved in the mass murder of their own citizens. In 1980, the Army's feared "Black Beret" Special Forces and the KCIA were given a "green light" by Washington to suppress a pro-democracy uprising in the southern city of Kwangju in which some 2,000 students and workers were massacred; hundreds more were "disappeared," tortured and imprisoned.

And with hostilities between Washington, Seoul and Pyongyang steadily on the rise, one cannot rule out the possibility that the cyberattacks are an exploitable entré by enterprising security agencies for further escalating the current crisis. Recent U.S. history is replete with examples of "intelligence and facts ... being fixed around the policy."
Penguin
 
Posts: 5089
Joined: Thu Aug 23, 2007 5:56 pm
Blog: View Blog (0)

Postby MinM » Tue Jul 14, 2009 7:48 pm

Cyber Attacks Traced to the U.S., Britain | Threat Level | Wired.com

* By Kim Zetter Email Author
* July 14, 2009 |
* 2:58 pm |
* Categories: Cybersecurity


Image
International fingerpointing in the recent cyber attacks against U.S. and South Korean websites has widened to include Great Britain, as researchers examining the attacks trace them to a server in the United Kingdom.

But the British company that owns the server says it, in turn, traced the attacks to a VPN connection originating in Miami, Florida.

With hawks in Congress and the press urging President Barack Obama to launch an all-out cyber war in retaliation for the website outages, things are looking bad for the Sunshine State. Though it should be noted that the Miami connection was likely just another proxy used by the hacker, who could be based in the U.S. or anywhere else...
http://www.wired.com/threatlevel/2009/0 ... attack-us/
Earth-704509
User avatar
MinM
 
Posts: 3281
Joined: Wed Jun 04, 2008 2:16 pm
Location: Mont Saint-Michel
Blog: View Blog (0)

Postby MinM » Wed Jul 15, 2009 1:29 pm

American Dream wrote:While some researchers (including this one) question Madsen's overreliance on anonymous sources and undisclosed documents, in fairness it should be pointed out that nine months before The New York Times described the NSA's secret e-mail collection database known as Pinwale, Madsen had already identified and broken the story...

To give the Devil his due again :twisted: It looks like Madsen nailed this one too:

NSA Gave Up Names of Americans Wiretapped to John Bolton - Democratic Underground
Image
NSA Turned Over Names of Americans Wiretapped to Ex-State Dept. Official | The Public Record


NSA intercepts for Bolton masked as 'training missions'

The unholy trinity of electronic snooping: Bolton, Negroponte and Hayden

Special Reports
Earth-704509
User avatar
MinM
 
Posts: 3281
Joined: Wed Jun 04, 2008 2:16 pm
Location: Mont Saint-Michel
Blog: View Blog (0)

Postby Penguin » Wed Jul 15, 2009 2:49 pm

MinM wrote:International fingerpointing in the recent cyber attacks against U.S. and South Korean websites has widened to include Great Britain, as researchers examining the attacks trace them to a server in the United Kingdom.

But the British company that owns the server says it, in turn, traced the attacks to a VPN connection originating in Miami, Florida.



I knew it!
Penguin
 
Posts: 5089
Joined: Thu Aug 23, 2007 5:56 pm
Blog: View Blog (0)

Postby American Dream » Thu Jul 23, 2009 7:40 am

Brighton company involved in cyber attack on US and South Korea, investigators claim
Richard Lloyd Parry

www.technology.timesonline.co.uk
July 15, 2009

The master computer which controlled last week’s massive cyber attack on websites in the US and South Korea is in Britain, Asian computer security investigators claim.

The attack, which paralysed the websites of South Korean and United States government agencies, banks and businesses over the course of a week, was first blamed on communist North Korea. But having traced the attack back via proxy computers used in the attack, a security company in Vietnam has identified a server belonging to Global Digital Broadcast, a Brighton-based internet television company as the source of the attacks.

The analysis, by a Vietnamese company, Bach Khoa Internetwork Security (BKIS), was carried out at the request of the South Korean government. Yesterday, South Korea emphasised that it was not clear whether Global Digital Broadcast was the origin of the attacks or whether it was also being manipulated by a master computer.

"The [Brighton] server appears to have controlled compromised handler servers,” Park Cheol Soon of South Korea’s communications commission. told Agence France Presse. “However, it needs more investigation to confirm whether this server was the final attacker server or not.”

Global Digital Broadcast wrote on its website that it was aware of the issue and had “treated it with utmost severity” but had “discounted it as coming from a North Korean Government site” suggesting the source of the attack was based in America.

A Serious Organised Crime Agency spokesman said: “We are involved, and are aware from the information and are assisting with the information.

“We have spoken to the company involved. But this this is not our investigation, we’re just dealing with the company on the UK side.” ...

Continued:

http://technology.timesonline.co.uk/tol ... 715109.ece
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Postby AhabsOtherLeg » Mon Nov 02, 2009 9:52 am

Canadian_watcher wrote:DARPA is one of the scariest outfits on Earth.

apologies if this has been posted already but it's too eerie not to bring to the board's attention for those who haven't seen it:

http://www.youtube.com/watch?v=W1czBcnX1Ww


I don't know why exactly, but I honestly couldn't watch that video all the way through. It Uncanny Valley-ed me to the point of nearly vomiting. Haven't slept in two days, though, and I think I've got swine flu - but even normally that video would strike me as deeply, deeply disturbing. It's the noise it makes, and those legs moving without will or choice... in a forest, a natural environment. Imagine that at night!

Creepy as all hell. Even if I'd made that thing myself I'd want to destroy it.

This link has undoubtedly been posted before as well, but is an interesting DARPA-related read:

http://www.commondreams.org/views04/0305-01.htm

Skip down to the bit where it says Willard and his Wild Pals.
.
User avatar
AhabsOtherLeg
 
Posts: 3285
Joined: Sun Dec 30, 2007 8:43 pm
Blog: View Blog (0)

Re:

Postby MinM » Sun Jun 09, 2013 10:57 pm

MinM » Wed Jul 15, 2009 12:29 pm wrote:
American Dream wrote:While some researchers (including this one) question Madsen's overreliance on anonymous sources and undisclosed documents, in fairness it should be pointed out that nine months before The New York Times described the NSA's secret e-mail collection database known as Pinwale, Madsen had already identified and broken the story...

To give the Devil his due again :twisted: It looks like Madsen nailed this one too:

NSA Gave Up Names of Americans Wiretapped to John Bolton - Democratic Underground
Image
NSA Turned Over Names of Americans Wiretapped to Ex-State Dept. Official | The Public Record


NSA intercepts for Bolton masked as 'training missions'

NSA insiders report that Hayden approved special intercept operations on behalf of Bolton and had them masked as "training missions" in order to get around internal NSA regulations that normally prohibit such eavesdropping on U.S. citizens.

It is noteworthy that in the fictional movie "Enemy of the State," it was under the authority of a "training mission" that renegade NSA officials targeted U.S. civilians for eavesdropping. United States Signals Intelligence Directive (USSID) 18, the NSA's "Bible" for the conducting of surveillance against U.S. persons, allows "U.S. material," i.e., listening to U.S. persons, to be used for training missions. However, USSID 18 also requires that all intercepts conducted for such training missions are to be completely destroyed after completion of the training operation...

http://www.politicsforum.org/forum/view ... 42&t=41741

The unholy trinity of electronic snooping: Bolton, Negroponte and Hayden

Special Reports

@nycjim: NSA whistleblower: "If I wanted to see your emails or your wife's phone, all I have to do is use intercepts."
User avatar
MinM
 
Posts: 3281
Joined: Wed Jun 04, 2008 2:16 pm
Location: Mont Saint-Michel
Blog: View Blog (0)

Re: Re:

Postby MinM » Sat May 30, 2015 9:24 am

American Dream wrote:While some researchers (including this one) question Madsen's overreliance on anonymous sources and undisclosed documents, in fairness it should be pointed out that nine months before The New York Times described the NSA's secret e-mail collection database known as Pinwale, Madsen had already identified and broken the story...

Once again Wayne Madsen was way ahead of a story ...
Wayne Madsen, who is generally held by 'journalists' to be completely beneath contempt, got the background of this story entirely right years ago. What if Madsen is right about everything?

Senate Links to Pagegate Scandal

Wayne Madsen | October 10 2006

On October 2, WMR was the first media outlet to report on the involvement of Arizona Republican Rep. Jim Kolbe, the only openly gay GOP congressmen, in the Pagegate matter. We reported that Kolbe was a member and chairman of the House Page Board at the time reports of ex-Florida GOP Rep. Mark Foley's inappropriate sexual conduct with underage male pages was known to the Republican House leadership. WMR reported:

"From 2000 to 2001, the Page Board Chair was Rep. Sue Kelly (R-NY) and members included Rep. Jim Kolbe (R-AZ) (inexplicably replaced as chairman by Kelly), Kildee, Trandahl, and Livingood. Crews was the program coordinator. From 1999 to 2000, the Chairman was Kolbe and members included Rep. Jo Ann Emerson (R-MO), Kildee, Transdahl, and Livingood. The coordinator was Crews. From 1998 (when the allegations first reportedly surfaced about Foley), the Chair was Tillie Fowler (R-FL) and members were Kildee, Kolbe, House Clerk Robin Carle, and Livingood. The page coordinator was Hugh Addington. Foley became a congressman in 1995."

The Washington Post is reporting today, rather belatedly, that Kolbe was aware of Foley's salacious e-mails with an underage page in 2000. One of Foley's Instant Messages sent in January 2002 to a page stated that Kolbe once invited four pages to use his Washington home while Kolbe was in Arizona.

There is also much focus on the relationship between House Speaker Dennis Hastert and his chief of staff, 56-year old Scott Palmer. Hastert and Palmer, Hastert's longtime unmarried adviser, live together in a DC townhouse along with Hastert's Deputy Chief of Staff, Mike Stokke, while Hastert's wife Jean lives in Yorkville, Illinois and stays at a hotel when she visits Washington.

WMR has also learned of additional Senate links to the Pagegate scandal. There is much focus on GOP Sen. George Allen's predominantly white male staff. There is also interest in the activities of a senior GOP Senator from a Rocky Mountain state.

WMR's State Department sources have also reported that the visits of Hastert and other congressional leaders and staff members to certain Southeast Asian nations and the Northern Marianas should come under the scrutiny of the House Ethics Committee, now officially investigating "Pagegate." The Northern Marianas became infamous in the scandals involving Tom DeLay and Jack Abramoff because of the presence in the US slave labor territory of Asian children being used as prostitutes. Conveniently, Foley co-chaired the House Caucus on Missing and Exploited Children, which would have had authority to investigate charges of child prostitution in the Northern Marianas...

http://www.prisonplanet.com/articles/Oc ... gegate.htm

http://cannonfire.blogspot.com/2015/05/ ... -room.html
Earth-704509
User avatar
MinM
 
Posts: 3281
Joined: Wed Jun 04, 2008 2:16 pm
Location: Mont Saint-Michel
Blog: View Blog (0)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 8 guests