Results 1 to 20 of 1043

Thread: Russian Info, Cyber and Disinformation (Jan-June 2017).

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    EU Mythbusters

    @EUvsDisinfo
    Read #DisinfoReview for the latest pro-Kremlin disinformation trends. This week's report
    :
    http://eepurl.com/cHFI1T

    Ukrainian hacking group mostly active against Russia....

    Cyberwar: top operations of Ukrainian Cyber Alliance (UCA) in 2016 -
    http://goo.gl/ejtSsN

  2. #2
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Russia propaganda media spread & amplified fake news to help Trump. Now that he's in WH, Sputnik wants WH press pass
    http://politi.co/2nSXiAN

  3. #3
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Pure hate speech. Baltic States "conduct ethnocide against Russian people" claims propoganda site
    http://windowoneurasia2.blogspot.de/...ssia.html?m=1#

  4. #4
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Alex Jones heads Infowars an ultra right wing conspiracy blogsite which uses often Russian propaganda/fake news taken from Russia Today and Sputnik...


    Conspiracy theorist Alex Jones backs off "Pizzagate" claims
    http://wapo.st/2ogxtqy

  5. #5
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    For the last two years on the Ukrainian and Syrian threads I have been beating this drum....

    I have since the release of the Russian military doctrine non linear warfare which is used as the vehicle for Russian political warfare been stating the two key corner stones of that doctrine are...

    1. cyber warfare
    2. information warfare or what some call the weaponization of information.

    The CIA has said it...as well as NATO and EU and now NSA officially states it....

    BUT WAIT what is the attitude of our President...Bannon and Miller....they use it via Infowars and Breotbart.com and all the other ultra right
    blogsites supported by massive Russian twittier botnets..Russia Today and Sputnik International...as well as roving bands of Russian hacking criminals...AND then claim it does not exist.

    AND it is happening in Bulgarian..Moldavia..France..Holland....Germany and UK...

    Asked whether the NSA had any inkling that the Kremlin was going to orchestrate the release of hacked Democratic National Committee emails last July, he demurred. “I actually don’t want to talk about that.”
    At the same time, he said, what Moscow did was “no strategic surprise.” Rather, “what may have been a tactical surprise was that they would do it the way they did.”

    Campaigns of propaganda and disinformation, dating back to the Soviet Union, have long been a staple of the Kremlin’s foreign policy. Now, however, it is making effective use of its hacking prowess to weaponize information and combine it with its influence operations, or what intelligence officials call “active measures.”

    “In general, if you’re responding to nation-state actions like that, you have to find out what are the levers that will move the nation-state actors and are you able and willing to pull those levers?” said Ledgett when asked how the United States should respond.
    http://www.msn.com/en-us/news/politi...cid=spartanntp

  6. #6
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    WH demotes someone for being a jerk to media? That would be a first. Seems more like a Russia connection issue.

    https://www.nytimes.com/2017/03/25/u...-iphone-share#

  7. #7
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Have seen Russian darknet chatter on this Chinese attack method....

    Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
    Wednesday, March 22, 2017
    Swati Khandelwal

    Chinese Hackers have taken Smishing attack to the next level, using rogue cell phone towers to distribute Android banking malware via spoofed SMS messages.

    SMiShing — phishing attacks sent via SMS — is a type of attack wherein fraudsters use number spoofing attack to send convincing bogus messages to trick mobile users into downloading a malware app onto their smartphones or lures victims into giving up sensitive information.

    Security researchers at Check Point Software Technologies have uncovered that Chinese hackers are using fake base transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android banking malware that once appeared neutralized after its authors were arrested in a police raid.

    This is the first ever reported real-world case in which criminals played smart in such a way that they used BTS — a piece of equipment usually installed on cellular telephone towers — to spread malware.

    The phishing SMS, which masquerades itself as the one coming from Chinese telecom service providers China Mobile and China Unicom, contains very convincing text with a link to download malicious Android APK.

    Since Google Play Store is blocked in China, the SMS easily tricks users into installing the APK from an untrusted source.
    "Using a BTS to send fake messages is quite sophisticated, and the SMS content is very deceptive. The message tricks users into clicking a malicious URL which installs malware," the researchers said in the blog post.
    Once installed, the Swearing malware distributes itself by sending automated phishing SMSes to a victim's contacts.

    However the maximum range of a BTS antenna may be as low as 10-22 miles, the technique is very successful and sophisticated in targeted attacks.

    Discovered last year by Tencent Security researchers, the Swearing Trojan has the capability to steal bank credentials and other sensitive information from victim Android devices and to bypass two-factor authentication by replacing a user's legit SMS app with a malicious version that intercepts incoming SMS messages.

    What's more interesting? To avoid detection of any malicious activity, the Swearing trojan doesn't connect to any remote command-and-control (C&C) server. Instead, it uses SMS or emails to send stolen data back to the hackers.
    "This provides the malware with good cover for its communications and hinders attempts to trace any malicious activity."
    While this particular malware campaign has usually targeted Chinese users, Check Point researchers warned in a blog post that the threat could quickly spread worldwide when adopted by Western malware.

    The malware scheme seems to be larger than previously thought, as according to researchers, only 21cn.com email addresses were used in the initial malware campaign, while new attacks used other popular Chinese email service providers, such as 163.com, sina.cn, and qq.com, and Alibaba Cloud and other cloud service hosted email accounts as well.

    Check Point also points out the nasty HummingBad malware trojan that was also discovered in the Chinese mobile market, and "turned out to be early birds which continued to spread worldwide" if adopted by western malware.

Similar Threads

  1. Malware & other nasty IT / cyber things
    By AdamG in forum Media, Information & Cyber Warriors
    Replies: 111
    Last Post: 02-07-2018, 10:37 PM
  2. Russian Info, Cyber and Disinformation (Catch all till 2017)
    By TheCurmudgeon in forum Media, Information & Cyber Warriors
    Replies: 373
    Last Post: 02-14-2017, 11:30 AM
  3. Syria in 2016 (January-March)
    By davidbfpo in forum Middle East
    Replies: 3135
    Last Post: 03-31-2016, 08:51 PM
  4. Social Media: the widest impact of (merged thread)
    By zenpundit in forum Media, Information & Cyber Warriors
    Replies: 55
    Last Post: 02-29-2016, 06:57 AM
  5. Ukraine: Russo-Ukr War (June-December 2015)
    By davidbfpo in forum Europe
    Replies: 3393
    Last Post: 12-31-2015, 11:53 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •