Fri Oct 21, 2016, 06:45 PM
wonderwarthog (8,217 posts)
Ongoing Cyber Attack is being launched by "Wikileaks supporters"
"A massive co-ordinated series of cyber attacks has forced hundreds of major websites from Amazon to Twitter offline across the globe - and WikiLeaks believes its supporters were responsible.
It urged its backers to 'stop taking down the US internet', saying 'Mr Assange is still alive and WikiLeaks is still publishing'.
It then tweeted 'The Obama administration should not have attempted to misuse its instruments of state to stop criticism of its ruling party candidate.'
The Department of Homeland Security has already launched an urgent investigation into the crash, amid claims it could be a precursor to an attempt to disrupt the US Presidential election further. "
HIT THEM BACK, FOR CHRISSAKES!!!
P.S. - by "Wikileaks supporters", I mean RUSSIA.
20 replies, 860 views
Ongoing Cyber Attack is being launched by "Wikileaks supporters" (Original post)
|Grumpy Pickle||Oct 2016||#3|
|Attila Gorilla||Oct 2016||#5|
|Attila Gorilla||Oct 2016||#7|
|Attila Gorilla||Oct 2016||#10|
|Attila Gorilla||Oct 2016||#12|
|Attila Gorilla||Oct 2016||#14|
|Attila Gorilla||Oct 2016||#16|
Response to wonderwarthog (Original post)
Fri Oct 21, 2016, 07:09 PM
Thorson (4,342 posts)
2. I don't believe it's the Russians. Assange is Australian and doesn't represent any government.
The leaks have come from insiders, not Russian hackers.
Manning and Snowden aren't Russians. Snowden ended up in Russia because that's the airport he was in when his passport was cancelled.
Response to Grumpy Pickle (Reply #3)
Fri Oct 21, 2016, 07:53 PM
FORD (10,140 posts)
4. No, actually most of todays problem came from the "internet of things".
Some people, for whatever reason, think that they need to have their refrigerator, their washer & dryer, their home heating/cooling system and other "headless" devices (i.e. you can't log in and run a graphic software program on them like a PC/tablet/smart phone or even smart TV)
Of course since you can't add software to these devices, that means they don't have the typical anti-virus/spyware/malware software that's running on your PC or mobile device. Some of the devices might be technically capable of running such software, but you would probably need to be a serious geek to attempt that. They also don't have software firewalls on such devices, so unless you have a properly configured router blocking the crap from reaching the devices, they are vulnerable for hackers that can write malware code for linux (which I'm guessing most of these embedded devices run on - and the internet itself certainly does.)
Response to FORD (Reply #4)
Sat Oct 22, 2016, 04:15 AM
exindy (11,095 posts)
9. Apparently a malware called Mirai
infected a bunch of homed devices and had then perform the attack,
From a piece on Huff (I won't bother with the link):
Dyn Chief Strategy Officer Kyle York said the attack came from “tens of millions” of devices that were infected with malware called Mirai. The New York Times reported that web cameras and home routers were among hundreds of thousands of devices used in the attack without their owners’ awareness.
Refrigerators, DVRs and other machines making up the so-called Internet of Things could have been used in the attack as well, according to Popular Mechanics. They are potentially vulnerable to hackers because consumers are less likely to protect these smart appliances with strong passwords, according to the magazine’s website.
Doing a search on Mirai yields this link: https://www.us-cert.gov/ncas/alerts/TA16-288A
In order to remove the Mirai malware from an infected IoT device, users and administrators should take the following actions:
Disconnect device from the network.
While disconnected from the network and Internet, perform a reboot. Because Mirai malware exists in dynamic memory, rebooting the device clears the malware .
Ensure that the password for accessing the device has been changed from the default password to a strong password. See US-CERT Tip Choosing and Protecting Passwords for more information.
You should reconnect to the network only after rebooting and changing the password. If you reconnect before changing the password, the device could be quickly reinfected with the Mirai malware.
Prompts the question: If the device doesn't supply the internal password, how can it be changed?
Hope I didn't interrupt the wild goose chase that seems to be going on.
Response to exindy (Reply #9)
Sun Oct 23, 2016, 09:10 AM
def_con5 (3,327 posts)
17. This is accurate but misleading
Not important what type of device i.e. web cam. What is important is whether it has a TCP stack. TCP is used to communicate on the internet, pretty universal, with a few exceptions.
The DOS was a quite common TCP SYN (trying to establish a connection) attack.
Response to def_con5 (Reply #17)
Sun Oct 23, 2016, 10:43 AM
exindy (11,095 posts)
18. You don't see vulnerability as an essential part of the attack?
That those devices offered an easy access point followed by an exploitation of an unsuspecting victim (and unknowing accomplice)?
Did you ever hear the joke about the helicopter caught in the fog in Seattle?
Response to def_con5 (Reply #19)
Sun Oct 23, 2016, 11:25 AM
exindy (11,095 posts)
20. Not only important, vital to the intent
Tho this version of the joke uses engineers, in the original I heard, the office was MSFT in Bellevue,
Two guys are in a helicopter.
During their flight the helicopter encounters some dense fog and quickly becomes lost. After a few minutes of careful maneuvering, the two find themselves hovering next to a large building where they can see a guy in his office, sitting at his desk.
Thinking quickly, the copilot grabs a piece of paper, writes "WHERE ARE WE?" in huge letters on it, and holds it up for the officeworker to read. The officeworker grabs a sheet of paper off his desk, scribbles quickly, and holds up his response: "YOU ARE IN A HELICOPTER."
"Okay, no problem," says the pilot. "I know where we are. We're over the local college and that's the engineering school."
"How do you know that?" asks the copilot.
"Because," says the pilot, "the answer he gave us was technically correct but completely useless."
Response to Attila Gorilla (Reply #5)
Fri Oct 21, 2016, 10:04 PM
TM999 (2,283 posts)
6. A learning moment for you
is that what you call 'Russian characters' is actually the Cyrillic alphabet.
Guess how many languages use the Cyrillic alphabet?
Oh, hell, I will tell you because you obviously don't know. Fifty. Yup, fifty languages use 'Russian characters'.
So you sure it is the Russians now?!
Response to TM999 (Reply #11)
Sat Oct 22, 2016, 12:20 PM
Attila Gorilla (15,046 posts)
12. The paragraph he posted is from an article
about a different cyber attack, dumbass.