View Full Version : Coming Bank Virus or Cyber-Attack Will Wipe Out All Customer Accounts?
Dennis Leahy
28th April 2013, 16:27
Article: Coming Bank Virus or Cyber-Attack Will Wipe Out All Customer Accounts
Source: http://www.occupycorporatism.com/coming-bank-virus-or-cyber-attack-will-wipe-out-all-customer-accounts/
"Banks have been attacked in wave after wave of systematic network and data center compromises that have lead the US government to suspect (http://www.nytimes.com/2013/01/09/technology/online-banking-attacks-were-work-of-iran-us-officials-say.html?_r=0) the Iranian government as retaliating against America for imposing sanctions on the Middle Eastern nation.
Using cloud services, banks like Bank of America (BoA), Wells Fargo, US Bancorp, Capital One, HSBC and PNC have had distributed denial of service (DDoS) attacks that disrupt their ability to conduct online business.
The US government is planting (http://occupycorporatism.com/mega-banks-plan-to-steal-your-money-and-blame-fake-muslim-cyber-attack/) the propaganda seed that according to “highly classified” documents provided by the Joint Chiefs of Staff’s Intelligence Directorate confirm that Iranian hackers are committing cyber-attacks against US financial institutions. This report assures that US mega-banks are a “valid target” of the Iranian “cyber army”.
According to rumored (http://www.wall-street.com/2012/10/iran-cybercorps-linked-to-saudi-u-s-cyber-attacks-2/) “US intelligence”, Iran’s military is suspected of having created a cybercorps in 2011 that would respond to potential cyberwar from the US. Highly classified documents held by the Joint Chiefs of Staff’s Intelligence Directorate claim that Iranian hackers are committing cyber-attacks against US financial institutions. These anonymous “officials” say that Iran’s cyber capabilities are far greater than those of Russia and China based on covert probes that confirmed the Middle Eastern nation was aiming toward stealing intellectual property for the expressed purpose of attacking US banking institutions as well as hacking into government agencies.
The security firm Radware stated (http://www.foxbusiness.com/industries/2012/10/05/version-bank-cyber-attack-tools-found-in-saudi-arabia/?cmpid=cmty_twitter_fb?cmpid=cmty_plus_fb) that attacks on US banks last year originated in Saudi Arabia. Radware said that the malware was created “live” on a server; and came from an independent data center which held servers for corporations that conduct business with financial institutions in America. The logical assessment was that these relationships, by their nature, may be purposefully less secure, thereby allowing hacker attacks to take place."So, if this is true, and it sounds very logical to me, my comment was:
How could the international banking cabal orchestrate a scam whereby the entire "Middle Class" is wiped out of all savings, making everyone 100% debt slaves forever (not just partially, like now), enabling them to foreclose on every home and piece of property and small and medium business, AND get US citizens to cheer as bombs are dropped on Iran?
This.
Dennis
p.s. But maybe if this coming cyber attack plan is true, but if this information went viral first, then maybe that would destroy the plot?
InCiDeR
28th April 2013, 16:36
They really want their Cyber Intelligence Sharing and Protection Act (CISPA) to come true...
ghostrider
28th April 2013, 16:48
If we leave Iran alone, they just might leave us alone... If we get out of the middle east, it just might calm things down...
Dennis Leahy
28th April 2013, 19:09
As a friend of mine mentioned (the obvious) that not only would this need to happen, but that *somehow* the virus would have to miraculously get into all backup copies of the banking records as well, and completely destroy those.
However, if this did transpire, I could easily envision the banking cabal saying that the virus was in the backups as well, and destroyed the backups. A handful of highly credentialed IT guys would come forward and state that it is not possible (like the 1700 architects and engineers did for 9/11), and the mainscream news would call them "conspiracy theorists" or ignore them to death. Money and banking as well as databases and backups are completely mysterious unknowns to the vast majority of people, and so they would believe whatever the talking head "news" person was reading off the teleprompter.
Dennis
RMorgan
28th April 2013, 19:21
Hey Dennis,
Well, I´m not sure if this scenario is possible.
I believe banks have serious security measures to protect them against such attacks.
I´m not sure how their backup systems work, but I expect them to be seriously secure, state-of-the-art secure. They probably use some of those ultra technical and specific Unix platforms as their OS, which would make them immune to Windows viruses...And certainly they have offline backups as well...and backups of these backups...
Raf.
ThePythonicCow
28th April 2013, 20:06
I´m not sure how their backup systems work, but I expect them to be seriously secure, state-of-the-art secure. They probably use some of those ultra technical and specific Unix platforms as their OS, which would make them immune to Windows viruses...And certainly they have offline backups as well...and backups of these backups...
... and geographically dispersed across multiple locations on multiple continents :).
(just saying that because that's all how we handle this forum's backups so one would hope at least some banks do so as well ...)
InCiDeR
28th April 2013, 20:14
As I stated earlier, in my opinion it is more likely that this is a way for them to stronger manifest the need of CISPA in peoples (and Obamas) mindset.
Backers argue that CISPA is necessary to protect the U.S. against cyber attacks from countries like China and Iran. But opponents said that it would allow companies to easily hand over users' private information to the government thanks to a liability clause. This, according to the Electronic Frontier Foundation, "essentially means CISPA would override the relevant provisions in all other laws—including privacy laws."
READ MORE (http://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act)
One more control system in place, demanded by the people themselves who will be afraid loosing their money. The usual card in play: Problem Reaction Solution
Lazlo
28th April 2013, 22:55
I have a friend who works IT security and engineering at one of the megabanks. He told me this week that the DOS attacks have gotten so bad that the bank is creating a new department just to deal with it.
As I understand it, DOS attacks effect your ability to do business but don't compromise security. They basically fill the servers with so many requests that you get a "busy signal" when there is a legitimate request.
norman
28th April 2013, 23:10
Actually, Denis, I'd far rather have this version than the other version - a nuclear wipeout of the data centers, that is predicted by some very realistic observers that Alex Jones talks to from time to time ( can't remember the names ).
Also, I l know a few "middle class" types with their fat pension funds etc, and I'd be delighted if their smug faces suddenly looked shocked. I might finally get a hearing from them about the facts.
There's a lot worse that could happen.
Dennis Leahy
29th April 2013, 02:00
I have a programming background and I know enough about backups to realize that it could not really happen.
However, as I mentioned in post #4, "if this did transpire, I could easily envision the banking cabal saying that the virus was in the backups as well, and destroyed the backups."
It doesn't matter if what they would say is pure BS and impossible, it comes down to: could they get away with SAYING that's what happened? Could they get away with it?
How many people know, with utter certainty, that what was officially said about 9/11 was a lie? Millions? But they did get away with it.
Dennis
gripreaper
29th April 2013, 02:12
Let me translate:
We need you to believe in a bogey man, so that we can create divisiveness, so that you will fight amongst yourselves as programmed slaves. In order for us to roll out our agenda, we need to have the "appearance" of events which stimulate you into fear, and therefore you abdicate your power and defense and allow us to do whatever we want unimpeded.
It has always amazed us as to how easy this is to do. We keep running the same play, the same Problem. We get the same reaction every time and we implement the same solution.
More draconian fascist imperialistic war mongering blood letting oligarchical totalitarian terrorism and slavery and you sheeple lap it up like little puppy dogs. That is why you can never have control of this planet and why we are compelled to control you and exterminate you as we see fit.
You're not capable of running this planet and you have proven it countless times. We tell you what we are going to do, put it out there in plain sight, and you just ignore it, playing your stupid entertainment games and stuffing your faces with the latest food and aggrandizing yourselves with the latest fashions, while inebriating yourselves with libations and watching pointless ball games. What did you expect?
We tell you that you can own stuff and accumulate assets, and you bought it. You don't own anything, so why are you surprised when your bank accounts are raided? You gave them to us a long time ago without even a whimper.
There's no money, or assets! How stupid can you be? And then you complain when we take your children away. Well, guess what, they are not yours. You GAVE them to us! You willingly signed the certificate and handed them over to the state, which is us.
You people are amazing. We've been running a separate economy, a separate currency, a separate technology right under your noses, which is 1200 years in advance to the antiquated infrastructure you have, and you don't even see it! It's right in front of your eyes!
The electrical grid, the oil grid, the fiat currency, IS ALL BOGUS and we can pull the plug on it any time we want, and we would not skip a beat or miss a meal. We have stellar space technology, anti gravity, teleportation, Tesla power, so we don't need any of the crap you cling to.
What bozos! HAHAHAHAHAH!!!!!!!!!!!
norman
29th April 2013, 02:53
.... Could they get away with it?.............
How many people know, with utter certainty, that what was officially said about 9/11 was a lie? Millions? But they did get away with it............
Dennis
So far, Denis, so far.............
InCiDeR
29th April 2013, 08:47
I have a friend who works IT security and engineering at one of the megabanks. He told me this week that the DOS attacks have gotten so bad that the bank is creating a new department just to deal with it.
As I understand it, DOS attacks effect your ability to do business but don't compromise security. They basically fill the servers with so many requests that you get a "busy signal" when there is a legitimate request.
Well there are many variants of DOS attacks, for example PDoS acts a bit differently:
...A permanent denial-of-service (PDoS), also known loosely as phlashing, is an attack that damages a system so badly that it requires replacement or reinstallation of hardware. Unlike the distributed denial-of-service attack, a PDoS attack exploits security flaws which allow remote administration on the management interfaces of the victim's hardware, such as routers, printers, or other networking hardware. The attacker uses these vulnerabilities to replace a device's firmware with a modified, corrupt, or defective firmware image—a process which when done legitimately is known as flashing. This therefore "bricks" the device, rendering it unusable for its original purpose until it can be repaired or replaced.
The PDoS is a pure hardware targeted attack which can be much faster and requires fewer resources than using a botnet in a DDoS attack. Because of these features, and the potential and high probability of security exploits on Network Enabled Embedded Devices (NEEDs), this technique has come to the attention of numerous hacker communities...
Many times that variant of attack is combined with following:
...A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web.
Malware can carry DDoS attack mechanisms; one of the better-known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack.
Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents. These collections of systems compromisers are known as botnets...
Read more (http://en.wikipedia.org/wiki/Denial-of-service_attack)
Powered by vBulletin™ Version 4.1.1 Copyright © 2026 vBulletin Solutions, Inc. All rights reserved.