Anonymous ID: 2a696e March 11, 2022, 2:32 p.m. No.15842259   🗄️.is 🔗kun   >>2422 >>2496 >>2552 >>2617 >>2631 >>2697 >>2856

>>15841093 (previous notable)

 

Judge Cooper would not strike from the record.

 

Maybe the tech was this guy

 

some excerpts - maybe he applied the same techniques? Operation Aurora (BLACKCOFFEE, the software that APT17 used for its offenses?)

 

CrowdStrike's Chief Technology Officer Dmitri Alperovitch wrote in a June blog post. The other group, nicknamed Fancy Bear, remotely grabbed control of the DNC's computers.

 

Investigators found malware written in Mandarin, code that had been compiled in a Chinese operating system and time-stamped in a Chinese time zone, and other clues investigators had previously seen in attacks originating from China, DeWalt said.

 

https://www.cnet.com/tech/computing/how-experts-decided-russia-hacked-dnc-election/

Anonymous ID: 2a696e March 11, 2022, 3 p.m. No.15842496   🗄️.is 🔗kun   >>2631 >>2856

>>15842259

 

Q1714 - 26-Jul-2018 2:45:24 PM EDT

How do you hide a message in clear sight?

 

Operation Aurora – 2010 - I was briefing the State Department as they crafted statements for Hillary Clinton to make publicly about the issue.

https://www.technologyreview.com/innovator/dmitri-alperovitch/

 

Threat actors have found a new way to dodge security professionals, using popular websites’ legitimate functionalities to hide their hacking operations. FireEye Threat Intelligence and Microsoft Threat Intelligence Center discovered a China-based threat group dubbed APT17 using Microsoft’s TechNet blog for its Command-and-Control (CnC) operation.

 

https://www.mandiant.com/resources/apt17-hiding-in-plain-sight-fireeye-and-microsoft-expose-obfuscation-tactic

 

Hackers Are Using Popular Websites To Attack Governments And Other Targets

 

BLACKCOFFEE, the software that APT17 used for its offenses

 

https://techcrunch.com/2015/05/14/hackers-are-using-popular-websites-to-attack-governments-and-other-targets/

Anonymous ID: 2a696e March 11, 2022, 3:12 p.m. No.15842617   🗄️.is 🔗kun   >>2694

>>15842259 - How did Q know?

 

Q3764

28-Dec-2019 1:23:27 PM EST

 

Why did FBI accept 'indirect' evidence re: DNC server(s) 'hack'break-in' by Crowdstrike [Ukraine]?

 

From 12/27/21

Why Putin Plans to Invade Ukraine & What the West Can Do About It | Dmitri Alperovitch

What prompted this conversation was a Twitter thread that Dmitri published recently, in which he explained why he believes

the Kremlin has already made its decision to invade Ukraine later this winter—in late January or possibly early February—

and that military confrontation is in fact the preferred route for Putin at this point. It’s a fascinating thread and we encourage you all to read through it after listening to today’s episode.

Kofinas and Alperovitch spend the first half of their conversation discussing the various signals that Dimitri believes point to the increased likelihood of a military invasion of Ukraine and the partitioning of the country by Russia in the next several months, as well Putin’s possible motivations and objectives in doing so.

The second part of their conversation, which is available to premium subscribers focuses on the cyber component of this conflict, including evidence of increased cyber intrusions into the Ukrainian government and civilian networks, what the targets have been, and what can be further inferred about the Kremlin’s objectives based on the nature of those targets. Alperovitch also shares his views on how he thinks the Biden administration can credibly respond to the mounting pressure on Ukraine’s defenses, the effectiveness of sanctions as a tool for dissuading Russian aggression as well as for punishing Kremlin leadership after the fact, and the similarities between Ukraine and Taiwan and what lessons the Chinese communist party may be drawing from our response or failure to respond to mounting Russian aggression on Ukraine’s eastern border.

https://hiddenforces.io/podcasts/dmitri-alperovitch-crowdstrike-invade-ukraine/

Anonymous ID: 2a696e March 11, 2022, 3:22 p.m. No.15842697   🗄️.is 🔗kun

>>15842259

 

The "APT" designation for the Chinese threat actors responsible for attacking Google is APT17.[19]

 

The report suggested that it was part of an ongoing campaign in which attackers have "broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002."[27

 

https://en.wikipedia.org/wiki/Operation_Aurora