Susanne Posel
Occupy Corporatism
December 15, 2012
McAfee Labs warns of a cyber-attack planned for the spring of 2013 that will steal millions of dollars from customer accounts. Thirty US banks have been named as a nameless, faceless band of “criminals” have released a Trojan virus that will remove digital currency from accounts at banks like:
• JPMorgan Chase & Co
• Wells Fargo
• Citibank
• PayPal/eBay
• Fidelity
• Charles Schwab
• Wachovia
• Capital One
• Bank of America
• Suntrust
• eTrade
• Ameritrade
• Navy Federal Credit Union
The scheme is referred to as ‘Project Blitzkrieg” (PB). In a beta-testing of the assault, it is reported that 300 bank accounts were affected in the US. The recruitment for PB is being linked to Russian cyber-criminals and an alleged cyber-mafia headed by an anonymous NSD. Those who enter into PB are tasked with infecting specified US computers with predetermined malware, cloning, syphoning passwords and login information, transferring digital information from customer accounts.
Pat Calhoun, a senior vice president at McAfee said: “Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the U.S. that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.”
When a customer logs into the bank website, security questions are enabled to keep the customer information protected; however the Trojan will utilize a cloned version of the bank website and retain information imputed by the user to be used against them later. A version of the Gozi Trojan called “Gozi Prinimalka” is believed to have already been used to extract $5 million from banking institutions.
These anonymous cyber-criminals will slowly drain accounts with small incremental amounts without tripping off withdrawal limits.
Calhoun explains that defensive measures must be taken. She said: “Since we know about it, we will be able to protect against it,” Calhoun said. “We’re working very closely with law enforcement and a lot of the potential targets to make sure they understand this and know how to behave or how to protect themselves against it.”
The Russian “thief-in-law”, which refers to an elite band of criminals that are somehow able to operate above law enforcement, are being identified as the culprits of this plot. An anonymous person named vorVzakone, was the first to announce PB which was described as a “collaborative effort designed to exploit the U.S. banking industry’s lack of anti-fraud mechanisms relative to European financial institutions, which generally require two-factor authentication for all wire transfers.”
Phone lines are expected to be tied up while the digital currency is removed from the customer accounts which would prevent the bank from alerting the customer of changes to their account balance.
Another false flag attack on the banks includes distributed denial-of-service (DDoS) on PHP-based websites such as Joomla, WordPress sites and the TimThunb plug-in.
Dan Holdren and Curt Wilson, security engineers at Arbor Networks claim: “Unmaintained sites running out-of-date extensions are easy targets and the attackers took full advantage of this to upload various PHP webshells which were then used to further deploy attack tools.”
The newest threat to the banking world are the Russians. In September, Senator and self-proclaimed Zionist Joseph Lieberman declared that it was Iran who cyber-attacked Bank of America and JPMorgan Chase in 2011 and began with more frequency this year.
Lieberman, as the chairman of the Homeland Security and Government Affairs Committee states that the financial attack was spurned from the state-sponsored anti-Muslim film circulating the Middle East thanks to CIA-operatives al-Qaeda.
The timing of the newly formed “digital al-Qaeda” and their expressed anger over the US-produced anti-Muslim film are questionable considering how the US and Israeli government are setting the stage for a justified war with Iran. This fake hacker group is threatening other countries controlled by the Zionist regime, such as France, Germany and Britain. According to the false flag group: “The army was recently formed and we have started to work as a team after we used to work individually. The hacking operations are of course a response to the offence against the prophet, peace and blessing be upon him.”
Radware, a security firm, analyzed the attacks and concluded that the alleged Iranian nameless, faceless cyber army accused to attacking BoA and JPMorgan Chase did not conduct the attack... Continue reading>
Occupy Corporatism
December 15, 2012
McAfee Labs warns of a cyber-attack planned for the spring of 2013 that will steal millions of dollars from customer accounts. Thirty US banks have been named as a nameless, faceless band of “criminals” have released a Trojan virus that will remove digital currency from accounts at banks like:
• JPMorgan Chase & Co
• Wells Fargo
• Citibank
• PayPal/eBay
• Fidelity
• Charles Schwab
• Wachovia
• Capital One
• Bank of America
• Suntrust
• eTrade
• Ameritrade
• Navy Federal Credit Union
The scheme is referred to as ‘Project Blitzkrieg” (PB). In a beta-testing of the assault, it is reported that 300 bank accounts were affected in the US. The recruitment for PB is being linked to Russian cyber-criminals and an alleged cyber-mafia headed by an anonymous NSD. Those who enter into PB are tasked with infecting specified US computers with predetermined malware, cloning, syphoning passwords and login information, transferring digital information from customer accounts.
Pat Calhoun, a senior vice president at McAfee said: “Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the U.S. that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.”
When a customer logs into the bank website, security questions are enabled to keep the customer information protected; however the Trojan will utilize a cloned version of the bank website and retain information imputed by the user to be used against them later. A version of the Gozi Trojan called “Gozi Prinimalka” is believed to have already been used to extract $5 million from banking institutions.
These anonymous cyber-criminals will slowly drain accounts with small incremental amounts without tripping off withdrawal limits.
Calhoun explains that defensive measures must be taken. She said: “Since we know about it, we will be able to protect against it,” Calhoun said. “We’re working very closely with law enforcement and a lot of the potential targets to make sure they understand this and know how to behave or how to protect themselves against it.”
The Russian “thief-in-law”, which refers to an elite band of criminals that are somehow able to operate above law enforcement, are being identified as the culprits of this plot. An anonymous person named vorVzakone, was the first to announce PB which was described as a “collaborative effort designed to exploit the U.S. banking industry’s lack of anti-fraud mechanisms relative to European financial institutions, which generally require two-factor authentication for all wire transfers.”
Phone lines are expected to be tied up while the digital currency is removed from the customer accounts which would prevent the bank from alerting the customer of changes to their account balance.
Another false flag attack on the banks includes distributed denial-of-service (DDoS) on PHP-based websites such as Joomla, WordPress sites and the TimThunb plug-in.
Dan Holdren and Curt Wilson, security engineers at Arbor Networks claim: “Unmaintained sites running out-of-date extensions are easy targets and the attackers took full advantage of this to upload various PHP webshells which were then used to further deploy attack tools.”
The newest threat to the banking world are the Russians. In September, Senator and self-proclaimed Zionist Joseph Lieberman declared that it was Iran who cyber-attacked Bank of America and JPMorgan Chase in 2011 and began with more frequency this year.
Lieberman, as the chairman of the Homeland Security and Government Affairs Committee states that the financial attack was spurned from the state-sponsored anti-Muslim film circulating the Middle East thanks to CIA-operatives al-Qaeda.
The timing of the newly formed “digital al-Qaeda” and their expressed anger over the US-produced anti-Muslim film are questionable considering how the US and Israeli government are setting the stage for a justified war with Iran. This fake hacker group is threatening other countries controlled by the Zionist regime, such as France, Germany and Britain. According to the false flag group: “The army was recently formed and we have started to work as a team after we used to work individually. The hacking operations are of course a response to the offence against the prophet, peace and blessing be upon him.”
Radware, a security firm, analyzed the attacks and concluded that the alleged Iranian nameless, faceless cyber army accused to attacking BoA and JPMorgan Chase did not conduct the attack... Continue reading>