- Subscribe to PCF Networked Blog Daily Updates
- Subscribe to our Twitter / Google / Yahoo Daily Updates
McAfee Labs warns
of a cyber-attack planned for the spring of 2013 that will steal
millions of dollars from customer accounts. Thirty USZ banks have been
named as a nameless, faceless band of “criminals” have released a Trojan
virus that will remove digital currency from accounts at banks like:
• JPMorgan Chase & Co
• Wells Fargo
• Citibank
• PayPal/eBay
• Fidelity
• Charles Schwab
• Wachovia
• Capital One
• Bank of America
• Suntrust
• eTrade
• Ameritrade
• Navy Federal Credit Union
The scheme is referred to as ‘Project Blitzkrieg” (PB). In a beta-testing of the assault, it is reported that 300 bank accounts were affected in the USZ. The recruitment for PB is being linked to Russian cyber-criminals and an alleged cyber-mafia headed by an anonymous NSD. Those who enter into PB are tasked with infecting specified USZ computers with predetermined malware, cloning, syphoning passwords and login information, transferring digital information from customer accounts.
Pat Calhoun, a senior vice president at McAfee said: “Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the USZ that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.”
When a customer logs into the bank website, security questions are enabled to keep the customer information protected; however the Trojan will utilize a cloned version of the bank website and retain information imputed by the user to be used against them later. A version of the Gozi Trojan called “Gozi Prinimalka” is believed to have already been used to extract $5 million from banking institutions.
These anonymous cyber-criminals will slowly drain accounts with small incremental amounts without tripping off withdrawal limits. Calhoun explains that defensive measures must be taken. She said: “Since we know about it, we will be able to protect against it,” Calhoun said. “We’re working very closely with law enforcement and a lot of the potential targets to make sure they understand this and know how to behave or how to protect themselves against it.”
The Russian “thief-in-law”, which refers to an elite band of criminals that are somehow able to operate above law enforcement, are being identified as the culprits of this plot. An anonymous person named vorVzakone, was the first to announce PB which was described as a “collaborative effort designed to exploit the USZ banking industry’s lack of anti-fraud mechanisms relative to European financial institutions, which generally require two-factor authentication for all wire transfers.”
Phone lines are expected to be tied up while the digital currency is removed from the customer accounts which would prevent the bank from alerting the customer of changes to their account balance. Another false flag attack on the banks includes distributed denial-of-service (DDoS) on PHP-based websites such as Joomla, WordPress sites and the TimThunb plug-in.
Dan Holdren and Curt Wilson, security engineers at Arbor Networks claim: “Unmaintained sites running out-of-date extensions are easy targets and the attackers took full advantage of this to upload various PHP webshells which were then used to further deploy attack tools.”
The newest threat to the banking world are the Russians. In September, Senator and self-proclaimed Zionist Joseph Lieberman declared that it was Iran who cyber-attacked Bank of America and JPMorgan Chase in 2011 and began with more frequency this year. Lieberman, as the chairman of the Homeland Security and Government Affairs Committee states that the financial attack was spurned from the state-sponsored anti-Muslim film circulating the Middle East thanks to CIA-operatives al-Qaeda.
The timing of the newly formed “digital al-Qaeda” and their expressed anger over the USZ-produced anti-Muslim film are questionable considering how the USZ and Israhelli government are setting the stage for a justified war with Iran. This fake hacker group is threatening other countries controlled by the Zionist regime, such as France, Germany and Britain. According to the false flag group: “The army was recently formed and we have started to work as a team after we used to work individually. The hacking operations are of course a response to the offence against the prophet, peace and blessing be upon him.”
Radware, a security firm, analyzed the attacks and concluded that the alleged Iranian nameless, faceless cyber army accused to attacking BoA and JPMorgan Chase did not conduct the attack.
In August, Kaspersky Lab, a Moscow-based computer security firm has found a new cyber surveillance virus that has been spying on banking transactions, stealing login information for social networks, email and instant messaging in the Middle East – specifically targeting Lebanon’s BlomBank, ByblosBank and Credit Libanais. And infected computers also include CitiGroup Inc.’s Citibank and eBay’s Paypal online payment system.
This virus’ focus on online banking makes it a potential threat to banking systems worldwide. Researchers are still trying to determine if this virus is simply conducting surveillance on banking transactions or if it is being used to steal money out of targeted accounts.
Being called Gauss by the Kaspersky Lab, who confirmed that the new virus is related to Stuxnet, Flame and Duqu, yet a more sophisticated, state-sponsored cyber-espionage tool.
Guass, which is an online banking surveillance virus, has the capability of electronically transferring information out of customer accounts to be redirected to another location. The banking industry would be devastated if suddenly they were infiltrated by Gauss which would cause every banking customer to become insolvent overnight.
This sets the stage for the banking holiday that we’ve all been warned about. For example, the mainstream media would be used to announce that Gauss has infected the all domestic banking computer systems. In order to purge the virus, all banks would need to shut down for a specified amount of time in order to reconfigure their computers. Perhaps on a Friday afternoon, the major banks will all announce that they will shut down to customer activity so they can “get rid of” Gauss from their system. The banks might say that they will reopen to the public on Monday morning.
Customers would not be able to conduct any financial transactions, either in the bank or online over that weekend. And with the promise that everything will be ok on Monday, there is no threat of a banking holiday because the cover story is that a virus must be purged before regular banking can continue.
However this would be a false flag meant to pacify the public to avert mass panic. While the general public would fall for the cover story, the banking cartels would simply electronically transfer all customer funds from private checking accounts out to off-shore banks where they could not be touched and cover their tracks.
Then on Monday morning, while the reports that the banking industry suffered greater infiltration than expected, the DHS and USZ armed forces would be poised to enact martial law to control the potential for domestic insurrection caused by the realization that every American has had their money stolen from them by the banking cartels in one fail swoop.
Pakistan Cyber Force
• JPMorgan Chase & Co
• Wells Fargo
• Citibank
• PayPal/eBay
• Fidelity
• Charles Schwab
• Wachovia
• Capital One
• Bank of America
• Suntrust
• eTrade
• Ameritrade
• Navy Federal Credit Union
The scheme is referred to as ‘Project Blitzkrieg” (PB). In a beta-testing of the assault, it is reported that 300 bank accounts were affected in the USZ. The recruitment for PB is being linked to Russian cyber-criminals and an alleged cyber-mafia headed by an anonymous NSD. Those who enter into PB are tasked with infecting specified USZ computers with predetermined malware, cloning, syphoning passwords and login information, transferring digital information from customer accounts.
Pat Calhoun, a senior vice president at McAfee said: “Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the USZ that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.”
When a customer logs into the bank website, security questions are enabled to keep the customer information protected; however the Trojan will utilize a cloned version of the bank website and retain information imputed by the user to be used against them later. A version of the Gozi Trojan called “Gozi Prinimalka” is believed to have already been used to extract $5 million from banking institutions.
These anonymous cyber-criminals will slowly drain accounts with small incremental amounts without tripping off withdrawal limits. Calhoun explains that defensive measures must be taken. She said: “Since we know about it, we will be able to protect against it,” Calhoun said. “We’re working very closely with law enforcement and a lot of the potential targets to make sure they understand this and know how to behave or how to protect themselves against it.”
The Russian “thief-in-law”, which refers to an elite band of criminals that are somehow able to operate above law enforcement, are being identified as the culprits of this plot. An anonymous person named vorVzakone, was the first to announce PB which was described as a “collaborative effort designed to exploit the USZ banking industry’s lack of anti-fraud mechanisms relative to European financial institutions, which generally require two-factor authentication for all wire transfers.”
Phone lines are expected to be tied up while the digital currency is removed from the customer accounts which would prevent the bank from alerting the customer of changes to their account balance. Another false flag attack on the banks includes distributed denial-of-service (DDoS) on PHP-based websites such as Joomla, WordPress sites and the TimThunb plug-in.
Dan Holdren and Curt Wilson, security engineers at Arbor Networks claim: “Unmaintained sites running out-of-date extensions are easy targets and the attackers took full advantage of this to upload various PHP webshells which were then used to further deploy attack tools.”
The newest threat to the banking world are the Russians. In September, Senator and self-proclaimed Zionist Joseph Lieberman declared that it was Iran who cyber-attacked Bank of America and JPMorgan Chase in 2011 and began with more frequency this year. Lieberman, as the chairman of the Homeland Security and Government Affairs Committee states that the financial attack was spurned from the state-sponsored anti-Muslim film circulating the Middle East thanks to CIA-operatives al-Qaeda.
The timing of the newly formed “digital al-Qaeda” and their expressed anger over the USZ-produced anti-Muslim film are questionable considering how the USZ and Israhelli government are setting the stage for a justified war with Iran. This fake hacker group is threatening other countries controlled by the Zionist regime, such as France, Germany and Britain. According to the false flag group: “The army was recently formed and we have started to work as a team after we used to work individually. The hacking operations are of course a response to the offence against the prophet, peace and blessing be upon him.”
Radware, a security firm, analyzed the attacks and concluded that the alleged Iranian nameless, faceless cyber army accused to attacking BoA and JPMorgan Chase did not conduct the attack.
In August, Kaspersky Lab, a Moscow-based computer security firm has found a new cyber surveillance virus that has been spying on banking transactions, stealing login information for social networks, email and instant messaging in the Middle East – specifically targeting Lebanon’s BlomBank, ByblosBank and Credit Libanais. And infected computers also include CitiGroup Inc.’s Citibank and eBay’s Paypal online payment system.
This virus’ focus on online banking makes it a potential threat to banking systems worldwide. Researchers are still trying to determine if this virus is simply conducting surveillance on banking transactions or if it is being used to steal money out of targeted accounts.
Being called Gauss by the Kaspersky Lab, who confirmed that the new virus is related to Stuxnet, Flame and Duqu, yet a more sophisticated, state-sponsored cyber-espionage tool.
Guass, which is an online banking surveillance virus, has the capability of electronically transferring information out of customer accounts to be redirected to another location. The banking industry would be devastated if suddenly they were infiltrated by Gauss which would cause every banking customer to become insolvent overnight.
This sets the stage for the banking holiday that we’ve all been warned about. For example, the mainstream media would be used to announce that Gauss has infected the all domestic banking computer systems. In order to purge the virus, all banks would need to shut down for a specified amount of time in order to reconfigure their computers. Perhaps on a Friday afternoon, the major banks will all announce that they will shut down to customer activity so they can “get rid of” Gauss from their system. The banks might say that they will reopen to the public on Monday morning.
Customers would not be able to conduct any financial transactions, either in the bank or online over that weekend. And with the promise that everything will be ok on Monday, there is no threat of a banking holiday because the cover story is that a virus must be purged before regular banking can continue.
However this would be a false flag meant to pacify the public to avert mass panic. While the general public would fall for the cover story, the banking cartels would simply electronically transfer all customer funds from private checking accounts out to off-shore banks where they could not be touched and cover their tracks.
Then on Monday morning, while the reports that the banking industry suffered greater infiltration than expected, the DHS and USZ armed forces would be poised to enact martial law to control the potential for domestic insurrection caused by the realization that every American has had their money stolen from them by the banking cartels in one fail swoop.
Pakistan Cyber Force
No comments:
Post a Comment