Andrew Anglin
Daily Stormer
March 29, 2020
The media already has its invisible enemy that justifies any conceivable action in the Coronavirus. I don’t know why they need to keep promoting the hacking hoax.
But it do.
A U.S. cybersecurity firm said Wednesday it has detected a surge in new cyberspying by a suspected Chinese group dating back to late January, when coronavirus was starting to spread outside China.
FireEye Inc. (FEYE.O) said in a report it had spotted a spike in activity from a hacking group it dubs “APT41” that began on Jan. 20 and targeted more than 75 of its customers, from manufacturers and media companies to healthcare organizations and nonprofits.
There were “multiple possible explanations” for the spike in activity, said FireEye Security Architect Christopher Glyer, pointing to long-simmering tensions between Washington and Beijing over trade and more recent clashes over the coronavirus outbreak, which has killed more than 17,000 people since late last year.
The report said it was “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years.”
FireEye declined to identify the affected customers. The Chinese Foreign Ministry did not directly address FireEye’s allegations but said in a statement that China was “a victim of cybercrime and cyberattack.” The U.S. Office of the Director of National Intelligence declined comment.
HAHAHA
They didn’t even say who was hacked!
If I was an entrepreneur, I would start a “cyber security” company.
I wouldn’t hire any employees, I would just write up fake reports about how I’ve tracked foreign hackers. The government will just give you money for this. They don’t require any evidence at all. They just want reports from a company that has a website saying that it is a “cyber security firm.” Any old firm will do. The reports don’t even have to make sense. No one is going to read them, especially not the government that is paying you for them.
They just want something to wave around.
That is what all of these companies are doing. Seriously. Their claims that they are able to track hackers are nonsensical on the face of it, given that tracking hackers isn’t possible.
I always bring up the case of Dread Pirate Roberts, Ross Ulbricht, owner of the Silk Road drug selling website, who they caught by connecting his username to his real name by scanning the internet and then had to gain access to his laptop by tricking him at a cafe to confirm it was him.
Ulbricht was first connected to “Dread Pirate Roberts” by Gary Alford, an IRS investigator working with the DEA on the Silk Road case, in mid-2013. The connection was made by linking the username “altoid”, used during Silk Road’s early days to announce the website, and a forum post in which Ulbricht, posting under the nickname “altoid”, asked for programming help and gave his email address, which contained his full name. In October 2013, Ulbricht was arrested by the FBI while at the Glen Park branch of the San Francisco Public Library, and accused of being the “mastermind” behind the site.
To prevent Ulbricht from encrypting or deleting files on the laptop he was using to run the site as he was arrested, two agents pretended to be quarreling lovers. When they had sufficiently distracted him, according to Joshuah Bearman of Wired, a third agent grabbed the laptop while Ulbricht was distracted by the apparent lovers’ fight and handed it to agent Thomas Kiernan. Kiernan then inserted a flash drive in one of the laptop’s USB ports, with software that copied key files.
This was the most wanted cybercriminal on earth, and the entire US government wasn’t capable of figuring out who he was using “backtrace” methods.
You can’t just “do a backtrace” on professional hackers. The entire concept is false.
These companies doing this are probably run by Jews who understand the scam.
But if you want to get in on the scam, all you have to do is exactly what I said.
If you get rich, send me a huge donation for giving you the idea.