Results 1 to 6 of 6

Thread: US Revives Debunked Electrical Grid Hacking Charges Against Russia

  1. #1

    US Revives Debunked Electrical Grid Hacking Charges Against Russia



    US Revives Debunked Electrical Grid Hacking Charges Against Russia:


    Putative cyberattacks were already debunked in late 2016

    While they always stopped short of official allegations in the past, US officials have, since 2016, repeatedly insinuated that Russia had been trying to hack the US electrical grid. Thursday the Trump Administration directly made those allegations for the first time.

    This new report appears to be timed to come out with new US sanctions against Russia, which cited “malicious cyberattacks” as one of their justifications. The allegations, however, stem from accusations which have been out since the Obama Administration-era, and have long since been discredited.

    The report itself is largely just a whitepaper on how hacking in general works, with scant mention of what Russia is even alleged to have done. The report dates the incidents to “since 2016,” however, and the description clearly mirrors the much vaunted Burlington Electric hack in Vermont in 2016.

    The problem is that this Burlington story was preposterously overblown. Far from an attack on the US electrical grid, it represented a single computer that happened to be owned by a single electrical company, but which wasn’t attached to the grid system in the first place, getting infected with malware.

    The type of malware this single laptop was infected with was similar to types that were Russian made. This led to the conclusion that this was a Russian plot, despite similar malware being common worldwide. This was then spun into a Russian attack on the electrical grid, despite it having nothing to do with the grid, no definitive link to Russia, and only tangential links to anything electrical.

    Still it was a popular story for the Washington Post in 2016, and even though it was complete nonsense, the Trump Administration seems comfortable trotting it back out in 2018, assuming that media outlets will again report it unquestioningly. So far, that appears to be the case for many outlets.

    https://news.antiwar.com/2018/03/15/...gainst-russia/
    Last edited by charrob; 03-15-2018 at 11:46 PM.



  2. Remove this section of ads by registering.
  3. #2
    This is disturbing...
    https://www.zerohedge.com/news/2018-...-starting-2016

    Why.
    Cuz Russia?
    No.
    Cuz ZH is putting out garbage like this and now propping the false narrative.

    It's disturbing and signals it may have been co-opted by U Gno Hoo.
    Sad 2 see a pathetic reportage quoting nothing but Reuters, NYT and CNN.

    Their 'merits' rest on their content.
    Something's changed?? It is definitely suspect imo.
    Other 'content' seems 'normal' for them...
    so
    maybe I'll give them a one time pass... but my antennae R twitching.

    ======

    Cyberwarfare and the 'Grid' is now at LEAST a 25 year old scenario (movie Sneakers, 1992)
    and no doubt EVERY gov't has toyed and probed the possibilities. (see Israel, stuxnet etc. etc.)
    Every teenage computer brat in every Country has probably tried it from their mom's basement.
    This is not 'news'.
    The STORY is why NOW?
    Why a 'government report' and Trumpster tweet NOW?
    There is no 'other' story.
    Why suddenly re-heat yesterday's leftovers?
    Last edited by goldenequity; 03-16-2018 at 08:27 AM.

  4. #3

  5. #4
    Russian Hackers Attacked U.S. Aviation as Part of Breaches

    https://www.bloomberg.com/news/articles/2018-03-16/russian-hackers-penetrated-u-s-aviation-sector-early-last-year
    Pfizer Macht Frei!

    Openly Straight Man, Danke, Awarded Top Rated Influencer. Community Standards Enforcer.


    Quiz: Test Your "Income" Tax IQ!

    Short Income Tax Video

    The Income Tax Is An Excise, And Excise Taxes Are Privilege Taxes

    The Federalist Papers, No. 15:

    Except as to the rule of appointment, the United States have an indefinite discretion to make requisitions for men and money; but they have no authority to raise either by regulations extending to the individual citizens of America.

  6. #5
    Quote Originally Posted by Danke View Post
    Russian Hackers Attacked U.S. Aviation as Part of Breaches

    https://www.bloomberg.com/news/articles/2018-03-16/russian-hackers-penetrated-u-s-aviation-sector-early-last-year
    What did you do to anger Putin?
    Never attempt to teach a pig to sing; it wastes your time and annoys the pig.

    Robert Heinlein

    Give a man an inch and right away he thinks he's a ruler

    Groucho Marx

    I love mankind…it’s people I can’t stand.

    Linus, from the Peanuts comic

    You cannot have liberty without morality and morality without faith

    Alexis de Torqueville

    Those who fail to learn from the past are condemned to repeat it.
    Those who learn from the past are condemned to watch everybody else repeat it

    A Zero Hedge comment

  7. #6


    Beyond Stuxnet, it appears our government infects computers in other countries with malware as well, including computers of innocent victims and in entire regions:



    Was Destructive ‘Slingshot’ Malware Deployed by the Pentagon?


    Cybersleuths think they've uncovered a military spyware attack, with troubling implications.

    Earlier this March, cyber-security firm Kaspersky Labs released information on a newly discovered, highly advanced piece of malware dubbed Slingshot. The malware targeted Latvian-made Internet routers popular in the Middle East, Africa, and Southeast Asia.

    Kaspersky’s reports reveal that the malware had been active since at least 2012, and speculates that it was government-made, owing to its sophistication and its use of novel techniques rarely seen elsewhere.

    Those investigating the matter further have drawn the conclusion that Slingshot was developed by the U.S. government, with some reports quoting former officials as connecting it to the Pentagon’s JSOC special forces. For those following the cyber security and malware sphere, this is a huge revelation, putting the U.S. government in the hot seat for deploying cyber attacks that harm a much greater range of innocent users beyond their intended targets.

    Kaspersky’s own findings note that the code was written in English, using a driver flaw to allow the implanting of various types of spyware. Among those mentioned by Moscow-based Kaspersky was an implant named “GOLLUM,” which notably was mentioned in one of the leaked Edward Snowden documents.

    Further findings suggest that Slingshot had common code with only two other known pieces of software, both malwares, which were attributed to the NSA and CIA, respectively, by analysts. Though various U.S. agencies are all denying comment, things are clearly pointing uncomfortably in their direction.

    Cyberscoop, one of the first news outlets to break the story, reported a mixed reaction among officials. Some noted that Kaspersky Labs was simply doing what a security company is supposed to do. Others, however, were less agreeable, suggesting it was an intentional attempt by Kaspersky to undermine U.S. security.

    The argument, as far as it goes, is that given the ostensible target areas—the Middle East, North Africa, Afghanistan—Kaspersky should have concluded it was related to the War on Terror and sat on their findings. The Trump administration already views Kaspersky as a sort of hostile actor—banning the use of Kaspersky products by any government or civilian federal contractor in December, citing Kremlin influence (a charge that has been vehemently denied by the company). This just gives them more justification for seeing Kaspersky as an adversary in the space.

    Unfortunately for the Russian company, some American retailers have even followed suit, pulling the software from the shelves on the grounds that it’s Russian, and that therefore suspect.

    There has been no clear evidence that Kaspersky’s software was serving as a backdoor for Russian intelligence, though it was reported last fall that sensitive documents were stolen from a National Security Agency (NSA) contractor’s laptop via its Kaspersky-made antivirus software. In a statement at the time, the company said, “Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage efforts.” Turns out that Israeli spies, spying on the Russian spies, disclosed the intrusion to U.S. officials.

    Kaspersky has consistently ranked near the top of antivirus ratings from virtually all third-party reviewers. The company has sold its products to nearly 400 million users worldwide, with 60 percent in the U.S. and Western Europe. Until now, Kaspersky was being used by several major agencies in the federal government, including the State Department and Department of Defense.

    Ironically, this new Slingshot issue itself appears just to be a testament to how well the company’s security works at digging up extremely dangerous malware. It also underscores the uneasy reality that the U.S. has been engaging in its own brand of cyber warfare all along.

    Any claims that a specific piece of U.S. malware—in this case, Slingshot—was targeting only al-Qaeda or ISIS bad guys is disingenuous as well. The exploit on routers is hitting an entire region, infecting an untold number of innocent people. Internet cafés are said to have been hit in this, meaning everyone going into the cafes is at risk.

    Malware is not a precision munition, it hits wide targets and spreads out to bystanders. This is particularly disturbing to note if, as some reports are indicating, this malware was Pentagon in origin.

    U.S. civilian government surveillance is already doing great harm to general Internet security, and does so by remaining in denial about the balance of good to harm that is being done. The U.S. military, by contrast, has shown its willingness to inflict major harm on innocents in pursuit of any war goal. As they start hitting regions with malware, all bets are off on how far it will spread.

    Security companies like Kaspersky Labs only afford the private user limited protection from all of this malware, because they’re constantly playing catch-up, finding new variants and new exploits that the various pieces of software are using. Slingshot, for instance, went undetected for six solid years.

    The discovery means fixes can finally be implemented for the routers and the computers. Novel exploits like this are rarely a one-time fix, however, as a slew of similar exploits from other sources tend to crop up after one gets taken out. It’s a never-ending battle.

    In August, President Trump made U.S. Cyber Command a formal military command, reflecting the growing view of the Internet as a military objective. Much as America’s other battlefields result in collateral damage on the ground, the cyberwar is going to have a deleterious impact on day-to-day life in cyberspace. The big questions are how bad things will get, and how quickly.

    http://www.theamericanconservative.c...-the-pentagon/

    Last edited by charrob; 03-29-2018 at 10:25 PM.



Similar Threads

  1. US Intel Vets Dispute Russia Hacking Claims
    By AZJoe in forum 2016 Presidential Election: GOP & Dem
    Replies: 5
    Last Post: 12-14-2016, 01:10 AM
  2. US Officially Accuses Russia of Hacking to Influence Election
    By jllundqu in forum 2016 Presidential Election: GOP & Dem
    Replies: 3
    Last Post: 10-07-2016, 08:31 PM
  3. Kremlin campaign revives Stalin's reputation in Russia
    By FrankRep in forum World News & Affairs
    Replies: 6
    Last Post: 12-26-2009, 09:11 PM
  4. China & Russia Hack U.S. Electrical Grid
    By Reason in forum World News & Affairs
    Replies: 11
    Last Post: 04-08-2009, 11:14 PM

Select a tag for more discussion on that topic

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •