SMALL WARS COUNCIL
Go Back   Small Wars Council > Small Wars Participants & Stakeholders > Media, Information & Cyber Warriors

Media, Information & Cyber Warriors Getting the story, dealing with those who do, and operating in the information & cyber domains. Not the news itself, that's here.

Reply
 
Thread Tools Display Modes
Old 1 Day Ago   #221
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

Alex Jones heads Infowars an ultra right wing conspiracy blogsite which uses often Russian propaganda/fake news taken from Russia Today and Sputnik...


Conspiracy theorist Alex Jones backs off "Pizzagate" claims
http://wapo.st/2ogxtqy
OUTLAW 09 is offline   Reply With Quote
Old 1 Day Ago   #222
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

For the last two years on the Ukrainian and Syrian threads I have been beating this drum....

I have since the release of the Russian military doctrine non linear warfare which is used as the vehicle for Russian political warfare been stating the two key corner stones of that doctrine are...

1. cyber warfare
2. information warfare or what some call the weaponization of information.

The CIA has said it...as well as NATO and EU and now NSA officially states it....

BUT WAIT what is the attitude of our President...Bannon and Miller....they use it via Infowars and Breotbart.com and all the other ultra right
blogsites supported by massive Russian twittier botnets..Russia Today and Sputnik International...as well as roving bands of Russian hacking criminals...AND then claim it does not exist.

AND it is happening in Bulgarian..Moldavia..France..Holland....Germany and UK...

Quote:
Asked whether the NSA had any inkling that the Kremlin was going to orchestrate the release of hacked Democratic National Committee emails last July, he demurred. “I actually don’t want to talk about that.”
At the same time, he said, what Moscow did was “no strategic surprise.” Rather, “what may have been a tactical surprise was that they would do it the way they did.”

Campaigns of propaganda and disinformation, dating back to the Soviet Union, have long been a staple of the Kremlin’s foreign policy. Now, however, it is making effective use of its hacking prowess to weaponize information and combine it with its influence operations, or what intelligence officials call “active measures.”

“In general, if you’re responding to nation-state actions like that, you have to find out what are the levers that will move the nation-state actors and are you able and willing to pull those levers?” said Ledgett when asked how the United States should respond.
http://www.msn.com/en-us/news/politi...cid=spartanntp
OUTLAW 09 is offline   Reply With Quote
Old 23 Hours Ago   #223
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

WH demotes someone for being a jerk to media? That would be a first. Seems more like a Russia connection issue.

https://www.nytimes.com/2017/03/25/u...-iphone-share#
OUTLAW 09 is offline   Reply With Quote
Old 22 Hours Ago   #224
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

Have seen Russian darknet chatter on this Chinese attack method....

Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
Wednesday, March 22, 2017
Swati Khandelwal

Quote:
Chinese Hackers have taken Smishing attack to the next level, using rogue cell phone towers to distribute Android banking malware via spoofed SMS messages.

SMiShing — phishing attacks sent via SMS — is a type of attack wherein fraudsters use number spoofing attack to send convincing bogus messages to trick mobile users into downloading a malware app onto their smartphones or lures victims into giving up sensitive information.

Security researchers at Check Point Software Technologies have uncovered that Chinese hackers are using fake base transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android banking malware that once appeared neutralized after its authors were arrested in a police raid.

This is the first ever reported real-world case in which criminals played smart in such a way that they used BTS — a piece of equipment usually installed on cellular telephone towers — to spread malware.

The phishing SMS, which masquerades itself as the one coming from Chinese telecom service providers China Mobile and China Unicom, contains very convincing text with a link to download malicious Android APK.

Since Google Play Store is blocked in China, the SMS easily tricks users into installing the APK from an untrusted source.
"Using a BTS to send fake messages is quite sophisticated, and the SMS content is very deceptive. The message tricks users into clicking a malicious URL which installs malware," the researchers said in the blog post.
Once installed, the Swearing malware distributes itself by sending automated phishing SMSes to a victim's contacts.

However the maximum range of a BTS antenna may be as low as 10-22 miles, the technique is very successful and sophisticated in targeted attacks.

Discovered last year by Tencent Security researchers, the Swearing Trojan has the capability to steal bank credentials and other sensitive information from victim Android devices and to bypass two-factor authentication by replacing a user's legit SMS app with a malicious version that intercepts incoming SMS messages.

What's more interesting? To avoid detection of any malicious activity, the Swearing trojan doesn't connect to any remote command-and-control (C&C) server. Instead, it uses SMS or emails to send stolen data back to the hackers.
"This provides the malware with good cover for its communications and hinders attempts to trace any malicious activity."
While this particular malware campaign has usually targeted Chinese users, Check Point researchers warned in a blog post that the threat could quickly spread worldwide when adopted by Western malware.

The malware scheme seems to be larger than previously thought, as according to researchers, only 21cn.com email addresses were used in the initial malware campaign, while new attacks used other popular Chinese email service providers, such as 163.com, sina.cn, and qq.com, and Alibaba Cloud and other cloud service hosted email accounts as well.

Check Point also points out the nasty HummingBad malware trojan that was also discovered in the Chinese mobile market, and "turned out to be early birds which continued to spread worldwide" if adopted by western malware.
OUTLAW 09 is offline   Reply With Quote
Old 18 Hours Ago   #225
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

Russian government hacking Russian oppositionists....

Russian website monitoring police detentions at protests @OvdInfo is down due to a reported DDoS attack.
https://meduza.io/news/2017/03/26/sa...za-ddos-ataki#

DDoS attack is coming from inside Russia not outside....
OUTLAW 09 is offline   Reply With Quote
Old 13 Hours Ago   #226
OUTLAW 09
Council Member
 
Join Date: Nov 2013
Posts: 31,344
Default

The FBI Says It Can't Find Hackers to Hire Because They All Smoke Pot
https://motherboard.vice.com/en_us/a...rce=vicefbanz#
OUTLAW 09 is offline   Reply With Quote
Reply

Bookmarks

Tags
cyber, disinformation, information operations, politics, russia, subversion

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Russian Info, Cyber and Disinformation (Catch all till 2017) TheCurmudgeon Media, Information & Cyber Warriors 373 02-14-2017 10:30 AM
Syria in 2016 (January-March) davidbfpo Middle East 3135 03-31-2016 08:51 PM
Social Media: the widest impact of (merged thread) zenpundit Media, Information & Cyber Warriors 55 02-29-2016 05:57 AM
Ukraine: Russo-Ukr War (June-December 2015) davidbfpo Europe 3393 12-31-2015 10:53 PM


All times are GMT. The time now is 06:43 AM.


Powered by vBulletin® Version 3.8.9. ©2000 - 2017, Jelsoft Enterprises Ltd.
Registered Users are solely responsible for their messages.
Operated by, and site design © 2005-2009, Small Wars Foundation