It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The fast-moving Conficker computer worm, a scourge of the Internet that has infected at least 3 million PCs, is set to spring to life in a new way on Wednesday — April Fools' Day.
That's when many of the poisoned machines will get more aggressive about "phoning home" to the worm's creators over the Internet. When that happens, the bad guys behind the worm will be able to trigger the program to send spam, spread more infections, clog networks with traffic, or try and bring down Web sites.
Technically, this could cause havoc, from massive network outages to the creation of a cyberweapon of mass destruction that attacks government computers.
More likely, these researchers say, the programming change that goes into effect April 1 is partly symbolic — an April Fools' Day tweaking of Conficker's pursuers, who for now have been able to prevent the worm from doing significant damage.
So far, Conficker-infected machines have been trying to connect each day to 250 Internet domains — the spots on the Internet where Web sites are parked. The bad guys need to get just one of those sites under their control to send their commands to the botnet. (The name Conficker comes from rearranging letters in the name of one of the original sites the worm was connecting to.)
Now those efforts will get much harder. On April 1, many Conficker-infected machines will generate a list of 50,000 new domains a day that they could try. Of that group, the botnet will randomly select 500 for the machines to actually query.
The bad guys still need to get only one of those up and running to connect to their botnet. And the bigger list of possibilities increases the odds they'll slip something by the security community.
Researchers already know which domains the infected machines will check, but pre-emptively registering them all, or persuading the registrars to neutralize all of them, is a bigger hurdle.
"We expect something will happen, but we don't quite know what it will look like," said Jose Nazario, manager of security research for Arbor Networks, a member of the "Conficker Cabal," an alliance trying to hunt down the worm's authors.
Conficker's authors also have updated the worm so infected machines have new ways to talk to each other. They can share malicious commands rather than having to contact a hacked Web site for instructions.
That variation is important because it shows that even as security researchers have neutralized much of what the botnet might do, the worm's authors "didn't lose control of their botnet," said Michael La Pilla, manager of the malicious code operations team at VeriSign Inc.'s iDefense division.
In what has become a bit of a disturbing trend this week, yet another computer infiltration article was posted today on CNN.com.
According to the article, "nearly 1,300 computers in more than 100 countries have been attacked and have become part of an computer espionage network apparently based in China, security experts alleged in two reports Sunday."
The mysterious network, dubbed "Ghostnet" by researchers, has many dubious capabilities, including the ability to see everything in a network, as well as "hear the people using it", according to the article. "GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras," the report says."
The sudden rash of these types of stories over the span of just a few days seems more than just a strange coincidence. Especially given the fact, according to an article posted by earlier this week here at Underground Brooklyn, Australia is moving toward an "Internet Blacklist". In the article, I outlined how the list is "not censorship of the type practiced by China or Saudi Arabia", it has effectively included over 2,400 sites, including a dentist's office, poker sites and a PG-rated site displaying images by a controversial Australian photographer.
This move by the Australian government, combined with major pushes from Europe for extreme net censorship and the dire warnings about this Chinese "Ghostnet", is indeed putting up red flags
According to a post on the "ReleaseLog" blog on Wednesday (directly sourced from PC World), "China appears to be blocking all access to YouTube...YouTube use from China started dropping off the map sometime Monday night, with traffic nearly reaching a standstill by Tuesday morning. Google (which owns YouTube) has confirmed the apparent ban, though its staff is not certain of the cause. “We do not know the reason for the blockage, and we’re working as quickly as possible to restore access to our users in China,” a spokesperson says. Google does believe the Chinese government knowingly cut the access. The spokesperson, however, questions why officials wouldn't have just blocked a specific video, as they’ve done before, rather than nixing the entire site."
And finally, in a video posted on YouTube by Russia Today on Thursday, under a newly proposed "international copyright treaty", the government may be given open access to people's personal computers. The video can be seen below:
Whether or not any of this pans out into an actual massive cyberattack, false-flag or legitimate, remains to be seen, of course. However, the eerie resemblances it all has to the "terror drills" carried out by the US Government in the weeks leading up to, as well as on the day of, the 9\11 attacks in New York City and Washington, cannot be denied.
London, Mar. 29 (ANI): Intelligence chiefs have cautioned the Gordon Brown Government about the possibility of China launching a cyber attack on Britain’s telecom system.
British Telecom’s new communications network has been installed by Chinese telecom giant ‘Huawei’, which is allegedly funded by Beijing and has links to the People’s Liberation Army.
In case of a war like situation, China could use BT to halt critical services such as power, food and water supplies, Times Online quotes intelligence officials, as saying.
In January, the Chairman of the Joint Intelligence Committee, Alex Allan, briefed a ministerial committee led by Home Secretary Jacqui Smith about the threat from China, Whitehall sources have claimed.
The ministerial committee on national security was told that Huawei components that form key parts of BT’s new 10 billion pound network might already contain malicious elements waiting to be activated by China.
Experts seconded intelligence chiefs’ warnings.
Originally posted by Vitchilo
And Rockefeller saying Internet is a big threat to them... They sure want to take down internet to put us into internet controlled so 9/11 truth and exposing of governement ends.
an event that hits the computer world only once every few years, security experts are racing against time to mitigate the impact of a bit of malware which is set to wreak havoc on a hard-coded date. As is often the case, that date is April 1.
Malware creators love to target April Fool's Day with their wares, and the latest worm, called Conficker C, could be one of the most damaging attacks we've seen in years.
Conficker first bubbled up in late 2008 and began making headlines in January as known infections topped 9 million computers. Now in its third variant, Conficker C, the worm has grown incredibly complicated, powerful, and virulent... though no one is quite sure exactly what it will do when D-Day arrives.
Conficker is clever in the way it hides its tracks because it uses an enormous number of URLs to communicate with HQ. The first version of Conficker used just 250 addresses each day -- which security researchers and ICANN simply bought and/or disabled -- but Conficker C will up the ante to 50,000 addresses a day when it goes active, a number which simply can't be tracked and disabled by hand.
At this point, you should be extra vigilant about protecting your PC: Patch Windows completely through Windows Update and update your anti-malware software as well. Make sure your antivirus software is actually running too, as Conficker may have disabled it.
Microsoft also offers a free online safety scan here, which should be able to detect all Conficker versions.
The fast-moving Conficker computer worm, a scourge of the Internet that has infected at least 3 million PCs, is set to spring to life in a new way on Wednesday — April Fools' Day.
That's when many of the poisoned machines will get more aggressive about "phoning home" to the worm's creators over the Internet. When that happens, the bad guys behind the worm will be able to trigger the program to send spam, spread more infections, clog networks with traffic, or try and bring down Web sites.
Technically, this could cause havoc, from massive network outages to the creation of a cyberweapon of mass destruction that attacks government computers. But researchers who have been tracking Conficker say the date will probably come and go quietly.
CBC's technology analyst Jesse Hirsh said no one really knows what's going to happen on April 1, if anything at all. Conficker could be the equivalent of a "digital Pearl Harbor," he said. Or, it could be the world's biggest April Fool's joke, as postulated in the New York Times.
Conficker will work like this, says Hirsh. On April 1, the worm will wriggle into computers through weaknesses in the Windows operating system. (Worms don't come in attachments the way viruses do.) It will turn off any anti-viral software and then direct that computer to connect to 500 web URLs a day from among a group of 50,000. One of those thousands of URLs will contain instructions for what the computer is to do next.
"There's two likely scenarios. One is like an April Fool's joke, which will be a type of vandalism, say, targeting a famous website, but what really has security people worried is that millions of computers may direct themselves against the root servers, the arteries that allow the internet to flow freely," said Hirsh.
Microsoft has a tool that people can download that both identifies and removes Conficker, said Hirsh.