Tuesday, October 16, 2012
GLOBAL CYBER WARFARE IN FULL SWING
CIA and Mossad have developed Flame, Stuxnet, Gauss, Miniflame, and three
additional malware to conduct clandestine cyberwar and espionage, targeting
computer systems in Iran. USA has attacked many foreign computer systems, having
the ability to attack, degrade or destroy the e-grids of adversaries. The heavy
encryption and nature of the newest malware fits the profile of military
Miniflame, a new cyber espionage program linked to Flame and Gauss malware now
runs wild. The global cyber warfare is in full swing and will escalate in 2013.
Miniflame has already infected computers in Iran, Syria, Egypt, Pakistan,
Lebanon, France, and Lithuania. It's a small and highly flexible malicious
program designed to steal data and control infected systems during targeted
cyber espionage operations.
Using malware, USA not only has delayed the Iranian nuclear bomb, but it can
also explode the bomb once it's developed! Let the Iranians hide the bomb deep
inside a mountain, and the Americans will detonate it like a piece of cake
inside the mountain! Iranians are in for a big surprise!
Miniflame is an interoperable tool that could be used as an independent
malicious program, or concurrently as a plug-in for both the Flame and Gauss
malware. Miniflame's ability to be used as a plug-in by either Flame or Gauss
clearly connects the collaboration between the development teams of both Flame
and Gauss. Since the connection between Flame, Stuxnet, and Duqu has already
been revealed, it can be concluded that all these advanced threats come from the
same cyber warfare factory.
Governments and gangs realize malware is much cheaper than mainstream warfare.
Malware, short for malicious software, consists of programming designed to
disrupt operation, gather information that leads to loss of privacy or
exploitation, gain unauthorized access to system resources, and other abusive
behavior. Malware includes computer viruses, worms, trojan horses, spyware,
dishonest adware, scareware, crimeware, rootkits, and other malicious and
unwanted software or program. In law, malware is sometimes known as computer
Miniflame in meant for installation on machines already infected by those
viruses. Miniflame is a high-precision attack tool. It's a targeted cyber weapon
used as the second wave of a cyber attack. First, Flame or Gauss are used to
infect as many victims as possible to collect large quantities of information.
After data is collected and reviewed, a potentially interesting victim is
defined and identified, and Miniflame is installed in order to conduct more
in-depth surveillance and cyber-espionage.
Malware makers can hide their tracks using spoofing, VPNs, proxy services, and
other means to make it look like they are based in any number of countries -
when in truth they are somewhere completely different.
Miniflame can also take screenshots of an infected computer while it is running
a specific program or application in such as a web browser, Microsoft Office
program, Adobe Reader, instant messenger service or FTP client. Miniflame's
developers have created dozens of different modifications of the program.
Occident has developed electronic weapons that could be used to defend the West
against cyber attacks or prevent them. Occident is prepared to strike first in a
cyber conflict. Cyber arms grow out of control. No government can guarantee it
can protect a country or entity against cyber attack. In future wars, there will
be a cyber element. Countries hope that if they threaten to use missiles to
retaliate against a cyber attack, others will think twice about launching one.
Global cyber warfare tactics are becoming more sophisticated while also becoming
more threatening. The latest malicious virus attack on the world's largest oil
and gas company, Saudi Aramco, last August shows how dependent we are today on
the Internet and information technology in general, and how vulnerable we are.
Internet security firms make more money when people are more scared of malware,
declaring that cyber terrorism can bring the end of civilization! A global
Internet blackout and crippling attacks against key infrastructure are among two
possible cyber-pandemics. Cyber terrorism is just beginning. Very soon, many
countries around the world will know it beyond a shadow of a doubt. It will be
the end of the world as we know it!
Smart words are more effective than smart bombs! Mighty words of a charismatic
keynote speaker can transform your people to a new dimension of organizational
climate, efficiency, self-actualization, enthusiasm, belonging, and motivation.
I would like very much to speak at your conference in order to explain critical
points much further. email@example.com
The evolution from cyber war to cyber terrorism comes from the indiscriminate
nature of cyber weapons. Very much like a modern-day Pandora's Box, Flame and
other forms of malware cannot be controlled upon release. Faced with a
replicating threat that knows no national boundaries, cyber weapons can take
down infrastructure around the world, hurting scores of innocent victims along
Uncontrolled security threats on the Internet could return much of the planet to
an era without electricity or automated transportation. The United States had
yet to resolve basic questions about how to police the Internet, let alone how
to defend critical infrastructure such as electric generation plants. The past
three years have seen an escalation of an unprecedented theft of trade secrets
and mounting threats to infrastructure.
Extremely sophisticated malware have infiltrated computers and energy facilities
in the Middle East. Researchers are now dissecting heavily encrypted malware,
such as Stuxnet, Flame, and Gauss, designed by American and Israel intelligence.
But these malware would become templates. They were written by cautious
professionals who minimized collateral damage. The knock-off versions by others
will be much less discriminating. An electronic assault that disabled thousands
of computers at Saudi Arabia's Aramco had followed a separate infection reported
by an Iranian oil company.
Mounting a defense against nation-sponsored attacks will be extraordinarily
difficult, as it requires new operating systems designed to manage equipment at
crucial facilities. Stopping criminals and terrorists who will adopt the same
techniques would take strong international cooperation and deeper monitoring of
the Internet, which many oppose on privacy grounds. The US Defense Department
has defined cyberspace as a warfare domain that it must dominate. Governments
and companies recognize that they have all been hacked and focus more on
limiting the damage from breaches.