Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.


The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - November 24, 2017


- THE RV WAS RELEASED DAYS AGO, BUT NO 800#'s YET.


(WHAT ELSE MUST BE DONE TO RELEASE THE 800#'s?)


- THERE IS AN INCREASING AMOUNT OF INTENSIFYING PRESSURE ON THE APTB/NPTB TO ALLOW THE EXCHANGES TO BEGIN BEFORE CHRISTMAS.


- THE LAST STEP IS 800#'s WHICH WILL MARK THE END OF THE CABAL'S RULE OVER THIS PLANET FOREVER.


(WILL THEY ALLOW IT OR MUST MORE BATTLES BE FOUGHT?)


- REPORTS ARE COMING IN OF A BATTLE BEING FOUGHT IN ANTARCTICA.


http://2012portal.blogspot.com/2017/11/battle-for-antarctica_23.html


(IS THIS HUMANITY'S "BATTLE OF JAKKU"?)


http://starwars.wikia.com/wiki/Battle_of_Jakku


- WE PATIENTLY WAIT FOR THE ARRIVAL OF THE FINAL OUTCOME.


---


FOR MORE INFORMATION ABOUT THE RV/GCR VISIT:


http://www.dinarchronicles.com/intel.html


---

Featured Post

Restored Republic via a GCR as of Nov. 24, 2017

Restored Republic via a GCR Update as of Nov. 24 2017 Compiled 12:01 am 24 Nov. EDT by Judy Byington, MSW, LCSW, ret, CEO, Child Abuse Rec...

Thursday, June 29, 2017

NSA Software is Behind the Latest Global Ransomware Attack



Source: The Daily Sheeple | by Zero Hedge

"We confirm our company's computer network was compromised today as part of global hack," Merck said in a statement on Tuesday. "Other organizations have also been affected. We are investigating the matter and will provide additional information as we learn more."

We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2)

— Merck (@Merck) June 27, 2017

Merck employees were instructed to disconnect all mobile devices from the company network and advised not to speak to reporters or post messages on social media accounts.

Computers at Merck facilities in Pennsylvania and New Jersey locked up Tuesday morning around 8am local time, according to the Inquirer.

Back in mid-May, when WannaCry spread with tremendous speed around the globe, many said that it's only a matter of time before the virus returns in a more advanced, weaponized version. Sure enough, cyber security experts quoted by Reuters said those behind the attack appeared to have exploited the same hacking tool used in the WannaCry ransomware attack that infected hundreds of thousands of computers in May before a British researcher created a temporary kill-switch.

Hypponen said he expected the outbreak to spread in the Americas as workers turned on vulnerable machines, allowing the virus to attack. "This could hit the U.S.A. pretty bad," he said. And, as Merck confirmed, it already has.

Within hours of the first attack, the U.S. Department of Homeland Security said it was monitoring reports of cyber attacks around the world and coordinating with other countries.

The first reports of organizations being hit emerged from Russia and Ukraine, but the impact quickly spread westwards to computers in Romania, the Netherlands, Norway, and Britain.

Within hours, the attack had gone global. 


Petrwrap/Petya ransomware variant with contact wowsmith123456@posteo.net spreading worldwide, large number of countries affected.

— Costin Raiu (@craiu) June 27, 2017

In addition to the US, a Swiss government agency also reported computer systems were affected in India, though the country's cyber security agency said it had yet to receive any reports of attacks according to Reuters.

For those infected, there may be just one option: pay the ransom. One victims of the cyber attack, a Ukrainian media company, said its computers were blocked and it had a demand for $300 worth of the Bitcoin crypto-currency to restore access to its files.



"If you see this text, then your files are no longer accessible, because they have been encrypted. Perhaps you are busy looking for a way to recover your files, but don't waste your time. Nobody can recover your files without our decryption service," the message said, according to a screenshot posted by Ukraine's Channel 24. The same message appeared on computers at Maersk offices in Rotterdam and at businesses affected in Norway.

Other companies that said they had been hit by a cyber attack included Russian oil producer Rosneft, French construction materials firm Saint Gobain and the world's biggest advertising agency, WPP – though it was not clear if their problems were caused by the same virus. "The building has come to a standstill. It's fine, we've just had to switch everything off," said one WPP employee who asked not to be named.

The virus was seen on various Ukraine ATMs, leading to jokes that while normally you ask ATMs for money, in hacked Ukraine, ATMs ask you.



Cyber security firms scrambled to understand the scope and impact of the attacks, seeking to confirm suspicions hackers had leveraged the same type of hacking tool exploited by WannaCry, and to identify ways to stop the onslaught. Experts said the latest ransomware attacks unfolding worldwide, dubbed GoldenEye, were a variant of an existing ransomware family called Petya.

It uses two layers of encryption which have frustrated efforts by researchers to break the code, according to Romanian security firm Bitdefender. "There is no workaround to help victims retrieve the decryption keys from the computer," the company said.

Russian security software maker Kaspersky Lab, however, said its preliminary findings suggested the virus was not a variant of Petya but a new ransomware not seen before.

As noted earlier, Ukraine was quick to accuse Russia. An advisor to Ukraine's interior minister said the virus got into computer systems via "phishing" emails written in Russian and Ukrainian designed to lure employees into opening them. According to the state security agency, the emails contained infected Word documents or PDF files as attachments.

But whatever the origin of the geographic hacking operation, the actual software used is the same that was created by the NSA and subsequently leaked by a disgruntled non-Russian employee. Now we are just waiting for the confirmation.

Just talked with Group IB expert in cybercrime who said there's no evidence yet that Petya hack used leaked NSA tools.

— Andrew Roth (@ARothWP) June 27, 2017

As a reminder, the quick proliferation of the original WannCry malware, which infected nearly 300,000 computers worldwide within a day, was due entirely to its use of two powerful software exploits that were released to the public in April by the anonymous hacker group calling itself the Shadow Brokers, which said the exploits were developed by the US National Security Agency (NSA).

On Tuesday, Edward Snowden asked "How many times does @NSAGov's development of digital weapons have to result in harm to civil infrastructure before there is accountability?"

How many times does @NSAGov's development of digital weapons have to result in harm to civil infrastructure before there is accountability? https://t.co/VOu28Ce9ee

— Edward Snowden (@Snowden) June 27, 2017

Apparently, not enough.

Meanwhile, governments and so-called experts had laughably come to the conclusion that the North Korean government was behind the original WannaCry attack. We just can't wait for the those same "experts" to again blame this latest global malware attack on Kim and his team of crack blackhats.

Finally, for those who want to keep track of how many people have made the ransom payment, there is a twitter for that: there is now a Twitter bot, @petya_payments, that will tweet each time a new ransom payment is made to the bitcoin wallets associated with the Petya attack.

The bitcoin wallet tied to #Petya ransomware has so far received 11 payments totaling 1.37807212 BTC ($3,246.4 USD).

— petya_payments (@petya_payments) June 27, 2017

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.