Saturday, June 17, 2023

Who are the cyber criminals? Domestic online terrorists? The USG?

Check out CISA, the federal Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security

https://edition.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html

Several US federal government agencies have been hit in a global cyberattack by Russian cybercriminals that exploits a vulnerability in widely used software, according to a top US cybersecurity agency.

https://www.theepochtimes.com/us-government-hit-in-global-hacking-campaign_5336379.html

Eric Goldstein, the executive assistant director for cybersecurity at the U.S. Cybersecurity and Infrastructure Security Agency (CISA), said in a statement that several federal agencies had been compromised after the discovery of a vulnerability in the file transfer software MOVEit.

CISA did not identify the affected agencies or specify how they were affected. It did not respond promptly to requests for additional comment.

Progress Software Corp’s (PRGS.O) MOVEit is typically utilized by businesses to transmit files between partners and customers. Progress stock declined by 4%.

The online extortion group Cl0p, which has claimed responsibility for the MOVEit breach, has stated in the past that it would not use any data stolen from government agencies.

The group wrote that government agencies, cities, and police services shouldn’t worry because they had already erased the data.

https://www.rt.com/news/578105-us-government-agencies-cyberattack/

The US Cybersecurity and Infrastructure Security Agency “is providing support to several federal agencies that have experienced intrusions,” an agency official told the American broadcaster. “We are working urgently to understand impacts and ensure timely remediation.”

A White Hat/Black hat “online extortion group” that breaks into government databases but only steals from the private sector? Hmmm, that sounds more like a government-rewarded hacking group to me. Or maybe a cyber group within the USG.

It also sounds like they broke into a LOT of different places. Now here is something you may not know. Companies pay hackers large bounties to discover vulnerabilities. And hackers can use that excuse to justify breaking into a system, if caught. So hackers are constantly trying and finding ways to break into computer systems.

https://www.pcmag.com/news/7-huge-bug-bounty-payouts

Bug bounties have become so commonplace that third-party brokers like Bugcrowd and HackerOne exist to connect hackers with bounty money. As detailed in HackerOne's 2018 Hacker Report, the company has paid out over $23 million to the 166,000 hackers in its network alone, who have fixed over 72,000 vulnerabilities. That's a lot of good work—for a lot less money than a true hack can cost a company in money and reputation.

The Cybersecurity and Infrastructure Security Agency has been in hot water recently. It has been doing its best to erase its tracks after calling us domestic terrorists for simply using our First Amendment right to communicate and speak. The Foundation for Freedom Online, whose praises I have repeatedly sung, tells us more about the not so subtle erasures of what CISA has been up to. They are desperate to hang onto their new terminology of “Misinformation, disinformation and malinformation” but had to shut down their unit of the same name because it was illegally spying on and censoring Americans. So now they have decided to blame foreigners instead of domestic US persons—at leasst in public. This is almost certainly a result of the Missouri v Biden discovery (and the Twitter files’ deep dive) into only a fraction of what the USG agencies were doing to silence any dissent.

https://foundationforfreedomonline.com/wp-content/uploads/2023/03/FFO-FLASH-REPORT-REV.pdf

There is lots more about this subject at the Foundation for Freedom online here.

More later on the crimes of the USG cyber villains. And go look at the Foundation for Freedom Online website with all it has to offer. It is a goldmine.

No comments: