Saturday, October 22, 2016

ALERT! - More Massive cyberattack shuts down large sections of the Internet


Wikileaks exposed!



BARACK OBAMA AND THE GOLDEN AGE OF CRONY BANKSTER LOOTING…. And not one went to prison!

FOR 8 YEARS BARACK OBAMA’S BANKSTER CRONIES AT CITIGROUP RULED AMERICA’S ECONOMY AND LOOTED IT INTO A DEPRESSION

“Citigroup’s recommendations came just three days after then-President George W. Bush signed into law the Troubled Asset Relief Program, which allocated $700 billion in taxpayer money to rescue the largest Wall Street banks. The single biggest beneficiary was Citigroup, which was given $45 billion in cash in the form of a government stock  purchase, plus a $306 billion government guarantee to back up its worthless mortgage-related assets.”

MUCH MORE HERE:


“As president, Obama not only funneled trillions of  dollars to the banks, he saw to it that not a single leading Wall Street executive faced prosecution for 
the orgy of speculation and swindling that led to the financial collapse and Great Recession, and he personally intervened to block legislation capping 
executive pay at bailed-out firms.”
“So when Clinton was hobnobbing with  Goldman Sachs CEO Blankfein in 2013, while  investigations of wrongdoing by Goldman and the other Wall Street banks were still ongoing, she was consorting with a man who belonged in prison.”



Massive cyberattack shuts down large sections of the Internet

Massive cyberattack shuts down large sections of the Internet

By Kevin Reed 
22 October 2016
Websites around the globe became inaccessible on Friday 
then the servers of Dyn—a major US provider of services that 
direct Internet traffic—were disabled by multiple and 
internationally coordinated distributed denial of service 
(DDoS) attacks. Located in Manchester, New Hampshire, Dyn
 began reporting that a cyberattack had hit its domain name 
system (DNS) infrastructure on the east coast of the US at 
around 7:10 a.m. Friday.
The outage—which spread across the US in three waves throughout the day—impacted popular sites such as Amazon, Twitter, Spotify, Netflix, PayPal and Reddit as well as the World Socialist Web Site. The sites were shut down for hours at a time as users and readers were unable to login to their accounts or gain access to web pages from their browsers and mobile devices.
The DNS services provided by Dyn and others are critical to the operation of the World Wide Web. The servers perform the function of translating a named web address—entered as a URL such as “wsws.org” in a browser, for example—into the numeric, machine readable Internet (IP) address that identifies the actual web server on the Internet. A DDoS attack overwhelms the targeted DNS server with such large numbers of requests that it gets bogged down, becomes inoperable or crashes.
While DDoS attacks are not uncommon today, in this particular case the assault was very large in scale and sophisticated in coordination. According to Dyn representatives, the cyberattack came from tens of millions of Internet locations internationally and arrived in three waves: 7a.m., just before noon and a little after 4 p.m.
Kyle York, Dyn’s chief strategist, told the New York Times that his and other DNS host companies have been the target of increasingly powerful attacks. He said, “The number and types of attacks, the duration of attacks and the complexity of these attacks are all on the rise.”
Several media reports said that Friday’s attack likely included so-called “Internet of Things” technologies such as smart appliances, webcams and DVRs that had been infected by malware and converted into an army of remotely-controlled cyber assault devices called a botnet. Although no specific or definitive evidence has been presented, it is being suggested that the scale of the assault could only have been carried out if the DDoS hackers had commandeered such malware infected devices and pointed them at the Dyn servers.
PopularMechanics reported that the botnet issue has been building up for months prior to Friday’s attack. Earlier in October the source code for the Mirai botnet—malware specifically targeting poorly secured “Internet of Things” devices—had been released on the web. It is known that the biggest ever DDoS attack took place last September and was mounted by devices compromised by Mirai.
Major news outlets are reporting that the FBI and 
Department of Homeland Security are investigating the 
outage and determined that it was the result of a malicious 
attack. They are treating it as a criminal act or “an act of state 
sponsored cyberwarfare.” According to a report in 
the L os A ngeles Times, an anonymous federal law 
enforcement official said: “Investigators have come to a 
preliminary conclusion as to who carried them out, but 
are not planning to make that public for now.”
The Dyn attack follows a number of recent events that have pointed to the vulnerability of Internet technologies to coordinated cyber assault, as well as the attempts by the US ruling establishment to use these developments for their own political and military purposes. The appearance on WikiLeaks of the hacked private email of Hillary Clinton’s campaign chairman John Podesta has been blamed on Russia by both the Democratic Party leadership and much of the capitalist media. Meanwhile, the recent announcement that 500 million Yahoo email accounts were hacked in 2014 was also charged to an unnamed “state-sponsored actor.”
It is a well-established fact that the US government and its state-within-the-state organizations, such as the NSA, are responsible for the majority of the world’s cyberespionage and illegal malware activity. There is every reason to expect an increase in incidence of cyberwarfare as a component part of plans to ramp up militarism abroad and attacks on democratic rights at home after the November 8 elections.

OBAMA – CLINTON and the MEX FASCIST MOVEMENT:

FUNDED BY THE AMERICAN TAX PAYER AND OPERATING OUT OF THE OBAMA WHITE HOUSE UNDER LA RAZA V.P. CECLIA MUNOZ, THE MEXICAN FASCIST PARTY of LA RAZA “The Race” ENDORSES HILLARIA CLINTON FOR HER LONG HISTORY OF HISPANDERING, ADVOCACY FOR OPEN BORDERS, JOS TO MEXICANS FIRST, AND THE NATIONWIDE EXPANSION OF THE LA RAZA WELFARE STATE ON THE LEGALS’ BACKS


http://mexicanoccupation.blogspot.com/2016/10/the-racist-mexican-fascist-party-of-la.html


 

OPEN BORDERS – HOW THE DEMOCRAT PARTY DESTROYED THE GOP, THE AMERICAN WORKER and then AMERICA!




 

 

MEXICANS JUMP AMERICA’S OPEN & UNDEFENDED BORDERS FOR HILLARIA’S AMNESTY

 


"Even though it has gone virtually unreported by corporate media, Breitbart News has extensively documented the Clintons’ longstanding support for “open borders.” Interestingly, as the Los Angeles Times observed in 2007, the Clinton’s praise for globalization and open borders frequently comes when they are speaking before a wealthy foreign audiences and donors."

 

 

BILL  CLINTON  SUCKS  IN  BRIBES  FROM  ISIS DONORS!


The Muslim Sheikhdom Qatar is a major sponsor of ISIS and global anti-American terrorism. How disturbing is it that Bill Clinton sucked in a bribe of ONE MILLION DOLLARS under the guise of a birthday gift? There is NO one the Clintons will not sell us out to and have already!


 

"Even though it has gone virtually unreported by corporate media, Breitbart News has extensively documented the Clintons’ longstanding support for “open borders.” Interestingly, as the Los Angeles Times observed in 2007, the Clinton’s praise for globalization and open borders frequently comes when they are speaking before a wealthy foreign audiences and donors."



SOARING POVERTY AND UNEMPLOYMENT  UNDER OBAMA’S OPEN

 

BORDERS POLICIES.


http://mexicanoccupation.blogspot.com/2016/10/millions-of-americans-legals-unemployed.html



October 22, 2016

Ridiculously easy: How hackers took down the internet on Friday



If you live on the East Coast, you probably suffered some sort of internet slowdown yesterday.  That's because of a Distributed Denial of Service (DDoS) attack carried out by as yet unknown party or parties.  The attack t...



If you live on the East Coast, you probably suffered some sort of internet slowdown yesterday.  That's because of a Distributed Denial of Service (DDoS) attack carried out by as yet unknown party or parties.  The attack targeted Dyn, an internet performance company located in New Hampshire.
A DDoS attack is relatively simple in concept, as this video explains:
The prospect that this will happen again is the stuff of nightmares for cyber-security experts:
As part of its business, Dyn provides DNS services for a given swath of the Internet, effectively its address book. DNS stands for Domain Name System, the decentralized network of files that list the domain names human beings use, such as usatoday.com, with their numeric Internet Protocol addresses, such as 184.50.238.11, which is how computers look for websites. These are computers that contain databases of URLs and the Internet Protocol addresses they represent.
"If you go to a site, say yahoo.com, your browser needs to know what the underlying Internet address that’s associated with that URL is. DNS is the service that does that conversion,”  said Steve Grobman, chief technology officer for Intel Security.
For example, the IP address for yahoo.com is 209.191.88.254.
The attack hit the Dyn server that contains that address book. Dyn provides that service to multiple Internet companies. For anyone linked to a computer that used the service, when they entered twitter.com or tumblr.com or Spotify.com, via a complex series of jumps the address book is able to tell their browser which numerical IP address to look at.
The DDoS attack floods that server with illegitimate requests, so many that very few real requests can get through. The user gets a message that the server is not available. Service is intermittent because a few requests are sometimes still able to go through.
What made this attack unique is that the hackers used hundreds of thousands of "smart" devices like DVRs, "smart" refrigerators and thermostats, and other things connected to the internet in your home to launch a crippling assault on Dyn.  This is made possible by a snippet of code developed by an anonymous hacker that was posted to the internet last month.
The potential problem has been bubbling up for months, but reached a peak earlier this month when the source code for something called the "Mirai" botnet was released onto the web. Designed to target the Internet of Things specifically, Mirai can scoop up connected devices and add them to a botnet simply by attempting to log into them with their factory-default username and password. Have you changed the password on your smart fridge lately? I thought not.
The Mirai code focuses on all kinds of smart devices including cameras to internet-connected fridges, but its bread and butter is DVRs. Of the nearly 500,000 devices known to be compromised by the Mirai malware, some 80 percent of them are DVRs, according to an in-depth investigation of by Level 3 communications.
These infected DVRs, along with a few thousand other gadgets, can drive ludicrous amounts of traffic. Devices compromised by this malware were responsible for a 620Gbps attack against the security website Krebs on Security in September, the biggest DDoS the world had ever seen, at the time. Reports from the security firm Flashpoint, by way of Brian Krebs, suggest that it is a botnet based on exactly this technology that is responsible for today's outages, and Dyn has since confirmed this suspicion to TechCrunch.
Now comes the scary part.  There is a chance that this was some sort of test run for an election day attack that could throw the U.S. into chaos.
Or it could be some smart kid with a million "zombie" computers at his beck and call who just wants to cause trouble.  The scary thing is that we won't be able to tell the difference when it happens again.
And it will happen again.
Daily Beast:
What has happened over the last few years is businesses have consolidated to professional managed DNS providers, ironically in part due to the difficulty in mitigating denial of service attacks.  This has created new centralized platforms for hackers to target.
And they are being targeted. Within the past month there was a distributed denial of service attack which totalled over 1,000 gigabits per second of traffic. That’s more bandwidth than many countries have. It’s a staggering volume of traffic, multiple times more than anything seen previously. (In 2015, Arbor networks reported what was then the world’s biggest DDoS attack: 334 gigabits per second.)
This is aiming to become the new normal. It is extremely difficult and costly to defend against — only a small number of companies can do it currently.
Homeland Security has been scrambling to harden state election sites from attack, but as yesterday's incident shows, hackers don't even have to break into a system to cause chaos.  We have been sleepwalking into being terribly vulnerable to both evil people and mischevious teenagers.
The arms race between hackers and cyber-security experts is currently being won by the bad guys.  And this is a race we cannot afford to lose.

No comments: