[🇺🇸] While CIA is sleeping, Russian hackers are deeply penetrating American computer infrastructure

Reply (Scroll)
Press space to scroll through posts
G   American Defense
[🇺🇸] While CIA is sleeping, Russian hackers are deeply penetrating American computer infrastructure
More threads by Suresh Naresh

Joined
Mar 7, 2024
Messages
947
Solutions
1
Reaction score
410
Nation

Residence

Axis Group

Date of Event: Aug 5, 2014
Source : https://www.PKDefense.com
In 2014 there was a Russian hacking incident resulting in the theft of over 1.2 billion internet credentials, including usernames, passwords and corresponding e-mail addresses. What was reported was a tip of the iceberg. This data theft was just a small part of the larger project of cyber attacks against American computer infrastructure organised by Russian Intelligence Agencies. In fact, even this particular hacking incident wouldn't have been revealed had Russia didn't want to check it's rival's reactions.

Since then, this project has progressed by leaps and bounds. Russians have been meticulously laying the foundations to strike at America's infrastructure, at a time most advantageous to Russia. USA would be caught by surprise. Russian Intelligence has been doing it's homework. CIA is not doing it's homework. While CIA is sleeping, the penetration by Russian hackers into USA's infrastructure has been extensive and deep.
 
Last edited:
  • Intelligence agencies: According to reports, the project was a collaboration between the U.S. National Security Agency (NSA) and Israel's military and intelligence services. Edward Snowden also stated that the malware was developed in cooperation between the U.S. and Israel.
 
  • Intelligence agencies: According to reports, the project was a collaboration between the U.S. National Security Agency (NSA) and Israel's military and intelligence services. Edward Snowden also stated that the malware was developed in cooperation between the U.S. and Israel.
10% of Iran's centrifuges were affected. A Siemens techie affiliated with the IAEA introduced Stuxnet via a jump drive. Now Iran's nuke facilities are completely air gaped and anyone entering/ leaving is thoroughly checked. Since the IAEA has been suspected of being affiliated with western intelligence, all access to Iran's reprocessing/ enrichment sites has been revoked.
 
10% of Iran's centrifuges were affected. A Siemens techie affiliated with the IAEA introduced Stuxnet via a jump drive. Now Iran's nuke facilities are completely air gaped and anyone entering/ leaving is thoroughly checked. Since the IAEA has been suspected of being affiliated with western intelligence, all access to Iran's reprocessing/ enrichment sites has been revoked.
10% of Iran's centrifuges were affected. A Siemens techie affiliated with the IAEA introduced Stuxnet via a jump drive. Now Iran's nuke facilities are completely air gaped and anyone entering/ leaving is thoroughly checked. Since the IAEA has been suspected of being affiliated with western intelligence, all access to Iran's reprocessing/ enrichment sites has been revoked.
10% of Iran's centrifuges were affected. A Siemens techie affiliated with the IAEA introduced Stuxnet via a jump drive. Now Iran's nuke facilities are completely air gaped and anyone entering/ leaving is thoroughly checked. Since the IAEA has been suspected of being affiliated with western intelligence, all access to Iran's reprocessing/ enrichment sites has been revoked.

CIA is not sleeping

woh bhi karte cyber attcks

@Lulldapull stuxnet yaad hai ?

@Vsdoc @Cryptonian
 
Some good reading, Iranian hackers did retaliate, some targeted at Saudi Infra and some directly at US infra - this is old news from ten years ago.

Cyber snooping and Cyber-war is already mainstream.

Post Stuxnet - Iranian hacking sophistication increased by leaps and bounds because they invested in training their hackers - some say with Russian and North Korean help. Granted some of the following is technical, but I can possibly explain 90% of it.

The Mandiant M-Trends Security Report discusses Iranian hacking capabilities and activities - among other things. Here is a GitHub folder where there are hundreds of other reports - knock yourself out.







 
Last edited:
Some good reading, Iranian hackers did retaliate, some targeted at Saudi Infra and some directly at US infra - this is old news from ten years ago.

Cyber snooping and Cyber-war is already mainstream.

Post Stuxnet - Iranian hacking sophistication increased by leaps and bounds because they invested in training their hackers - some say with Russian and North Korean help. Granted some of the following is technical, but I can possibly explain 90% of it.

The Mandiant M-Trends Security Report discusses Iranian hacking capabilities and activities - among other things. Here is a GitHub folder where there are hundreds of other reports - knock yourself out.







They're watching all over the place, most likely.

"They", as in, gorments the world over.

Log bhi easy to track hain these days, everyone's almost always connected to the networks, OBL did well staying hidden for so long.

No one is safe, the machine knows all.
 

Members Online

Latest Posts

Latest Posts

Back