6 Million Bitcoins Hacked

I’ve said before that I am not a friend of bitcoin.

I do not recommend bitcoin, because it is a virtual currency and once the system goes down all those bitcoins may just go “puff” and disappear in the ether, unlike physical gold and silver. 

I also find it kind of suspicious that Bilderberg members are promoting it and that the alternative media is going so (positively) hysterical about it.

However, I may be proven to be completely wrong.


 

bitcoin-stolen

6 Million Bitcoins Hacked:

Paul Vernon, also known as Big Vern, is the founder of Cryptsy—the international cyber currency company (bitcoins). More than a year ago, Cryptsy was hacked by the developer of Lucky7Coin. During this time, the company was recovering it’s respect and reputation i.e. paying back money to user’s wallet.

How did the hacker (developer of Lucky7Coin) manage to access Cryptsy and steal bitcoins? The hacker injected Trojan malware into Cryptsy, which helps hackers gain access to the confidential data, allowing the hacker to grab the cyber currencies i.e. bitcoins.

Read more6 Million Bitcoins Hacked

Russian Government Hacked White House Computer System, CNN Reports

FYI.


Russian Government Hacked White House Computer System, CNN Reports (ZeroHedge, April 7, 2015):

Update: even the White House appears embarrassed by this “report.” According to Bloomberg, the CNN report that Russia breached the White House computer system is “speculating on the attribution of the activity of concern on the unclassified” White House network that was “disclosed last year,” NSC spokesperson Mark Stroh says.”This report is not referring to a new incident.” Stroh says in e-mail statement.

* * * * *

A few months ago, Sony used a ridiculous “hacking” publicity stunt to generate some $40 million more in revenues for what would otherwise have been the latest Seth Rogen “comic” flop, in which the film agency blamed North Korea – which has about ten ultramodern 80386 computers in the entire country – for hacking its firewall, a hack which was subsequently revealed to be the result of disgruntled former employee. Fast forward to today, when moments ago CNN reported that Russian hackers which according to left “tell-tale codes and other markers that they believe point to hackers working for the Russian government”, had penetrated the White House computer system.

Read moreRussian Government Hacked White House Computer System, CNN Reports

Anonymous ‘knocks out’ Mossad website over Israel’s Gaza offensive

​Anonymous ‘knocks out’ Mossad website over Israel’s Gaza offensive (RT, July 31, 2014):

Hacker group Anonymous has reportedly taken down the website of the Israeli secret service Mossad in protest of Israel’s military incursion in Gaza. The ‘hacktivists’ have already targeted a number of organizations in their mission to stop the “genocide.”

Mossad’s website went offline at around 00:40 GMT and is still down at the time of writing. The Israeli government has yet to make any comment on the supposed hack attack.

Read moreAnonymous ‘knocks out’ Mossad website over Israel’s Gaza offensive

China Summons US Envoy Over Cyber-Spying Charges, Vows Retaliation

China123

China summons US envoy over cyber-spying charges, vows retaliation (RT, May 20, 2014):

China has dismissed all US accusations of industrial cyber-espionage against five of its military officials and published proof that Washington is actually stealing data from China. Beijing also summoned the US ambassador for an explanation.

Beijing reacted to Washington’s recent round of industrial espionage accusations by publishing its latest data on US cyber-attacks against China.

China’s National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) reported that during just two months, from March 19 to May 18, the US directly controlled 1.18 million host computers in China using 2,077 Trojan horse networks or botnet servers.

Read moreChina Summons US Envoy Over Cyber-Spying Charges, Vows Retaliation

Critical Crypto Bug Leaves Linux, Hundreds Of Apps Open To Eavesdropping

Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping (Ars Technica, March 4, 2014):

This GnuTLS bug is worse than the big Apple “goto fail” bug patched last week.

Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.

The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.

The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates. The coding error, which may have been present in the code since 2005, causes critical verification checks to be terminated, drawing ironic parallels to the extremely critical “goto fail” flaw that for months put users of Apple’s iOS and OS X operating systems at risk of surreptitious eavesdropping attacks. Apple developers have since patched the bug.

Read moreCritical Crypto Bug Leaves Linux, Hundreds Of Apps Open To Eavesdropping

This iPhone-Sized Device Can Hack A Car

The CAN Hacking Tool, or CHT
The CAN Hacking Tool, or CHT

This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate (Forbes, Feb 5, 2014):

Auto makers have long downplayed the threat of hacker attacks on their cars and trucks, arguing that their vehicles’ increasingly-networked systems are protected from rogue wireless intrusion. Now two researchers plan to show that a few minutes alone with a car and a tiny, cheap device can give digital saboteurs all the wireless control they need.

Read moreThis iPhone-Sized Device Can Hack A Car

NSA Seeks To Build Quantum Computer That Could Crack Most Types Of Encryption

nsa-321

NSA seeks to build quantum computer that could crack most types of encryption (Washington Post, Jan 2, 2014):

In room-size metal boxes ­secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.

“If you think you understand quantum mechanics, you don’t understand quantum mechanics,” said the late Nobel laureate Richard Feynman, widely regarded as the pioneer in quantum computing. The science video blog Vertiasium tries to help make sense of it.

Pulitzer Prize Journalist Chris Hedges: Feeding The Flame Of Revolt


Protesters stand in front of the federal courthouse during the arraignment of Jeremy Hammond in Manhattan on May 14, 2012.

Feeding the Flame of Revolt (truthdig, Nov 17, 2013):

By Chris Hedges

NEW YORK—I was in federal court here Friday for the sentencing of Jeremy Hammond to 10 years in prison for hacking into the computers of a private security firm that works on behalf of the government, including the Department of Homeland Security, and corporations such as Dow Chemical. In 2011 Hammond, now 28, released to the website WikiLeaks and Rolling Stone and other publications some 3 million emails from the Texas-based company Strategic Forecasting Inc., or Stratfor.

The sentence was one of the longest in U.S. history for hacking and the maximum the judge could impose under a plea agreement in the case. It was wildly disproportionate to the crime—an act of nonviolent civil disobedience that championed the public good by exposing abuses of power by the government and a security firm. But the excessive sentence was the point. The corporate state, rapidly losing credibility and legitimacy, is lashing out like a wounded animal. It is frightened. It feels the heat from a rising flame of revolt. It is especially afraid of those such as Hammond who have the technical skills to break down electronic walls and expose the corrupt workings of power.

Read morePulitzer Prize Journalist Chris Hedges: Feeding The Flame Of Revolt

Linux – Who Rooted Kernel.org Servers Two Years Ago, How Did It Happen, And Why?

See also:

Linus Torvalds Talks Linux Development at LinuxCon (eWeek, Sep 18, 2013):

NSA Backdoor

Torvalds was also asked if he had ever been approached by the U.S. government to insert a backdoor into Linux. Torvalds responded “no” while nodding his head “yes,” as the audience broke into spontaneous laughter.


Who rooted kernel.org servers two years ago, how did it happen, and why? (Ars Technica, Sep 24, 2013):

Maintainers of Linux still haven’t delivered promised autopsy of serious breach.

More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system kernel, officials still haven’t released a promised autopsy about what happened.

The compromise, which began no later than August 12, 2011, wasn’t detected for at least 16 days, a public e-mail and interviews immediately following the intrusion revealed. During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers.

Read moreLinux – Who Rooted Kernel.org Servers Two Years Ago, How Did It Happen, And Why?

Syrian Electronic Army Hacks ‘Marines.com’; Calls Them ‘Brothers’ In Arms And Obama A ‘Traitor’

Syrian Electronic Army Hacks “Marines.com”; Calls Them “Brothers” In Arms (ZeroHedge, Sep 2, 2013):

Following President Obama’s decision to pass the blame buck to Congress (and its oh-so-great track record of making decisions), the Syrian Electronic Army has struck again. This time right at the heart of the matter – defacing the “Marines.com” website. As The Independent reports, the US Marines received a message calling for support from their “brothers, the Syrian army soldiers” – in the form of a web attack changing the homepage of the official Marines recruitment site to a page entitled ““Hacked by SEA.” The message also stated, “Obama is a traitor who wants to put your lives in danger to rescue al-Qaida insurgents,” which seems to fit with many of their perspectives as we have noted previously.

Full text and screenshot below…

Full text:

“This is a message written by your brothers in the Syrian Army, who have been fighting al-Qaida for the last 3 years. We understand your patriotism and love for your country so please understand our love for ours. Obama is a traitor who wants to put your lives in danger to rescue al- Qaida insurgents.

Marines, please take a look at what your comrades think about Obama’s alliance with al-Qaida against Syria. Your officer in charge probably has no qualms about sending you to die against soldiers just like you, fighting a vile common enemy. The Syrian army should be your ally not your enemy.

Read moreSyrian Electronic Army Hacks ‘Marines.com’; Calls Them ‘Brothers’ In Arms And Obama A ‘Traitor’