Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ransomnote; bitt
Has this been posted? Bears repeating even if it has

From January 14, 2013

The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies

"To control the network of infected machines, the attackers created more than 60 domain names and several server hosting locations in different countries (mainly Germany and Russia). The C&C infrastructure is actually a chain of servers working as proxies and hiding the location of the true -mothership- command and control server."

1,777 posted on 01/01/2021 1:47:13 AM PST by Ymani Cricket ( "Pressure Makes Diamonds" ~General Patton)
[ Post Reply | Private Reply | To 1776 | View Replies ]


To: Ymani Cricket
Has this been posted? Bears repeating even if it has

From January 14, 2013

The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies

"To control the network of infected machines, the attackers created more than 60 domain names and several server hosting locations in different countries (mainly Germany and Russia). The C&C infrastructure is actually a chain of servers working as proxies and hiding the location of the true -mothership- command and control server."

~~~~~~~~~~

I wonder if this is related. Just so happens it's dated November 4, 2020. I wondered what they were using distributed computing for.

United States Seizes 27 Additional Domain Names Used By Iran’s Islamic Revolutionary Guard Corps To Further A Global, Covert Influence Campaign

So assuming it's elections, then the 2018 EO seizing assets comes into play (like Flynn said, easier to find countries WEREN'T involved in our election). Prayers up for all our service men and women, particularly those serving in the Middle East.

11/29/2020 10:38:39 AM PST · by ransomnote · 7 replies

justice.gov ^ | November 4, 2020 | U.S. Attorney’s Office Northern District of California

1,779 posted on 01/01/2021 2:04:57 AM PST by ransomnote (IN GOD WE TRUST)
[ Post Reply | Private Reply | To 1777 | View Replies ]

To: Ymani Cricket

“To control the network of infected machines, the attackers created more than 60 domain names and several server hosting locations in different countries (mainly Germany and Russia). The C&C infrastructure is actually a chain of servers working as proxies and hiding the location of the true -mothership- command and control server.”
~~~~~~~~~~

I remember we were talking about a new super computer a few threads back. Some found it an odd fit for the organization - what was it needed for etc. I can’t remember who it was that had acquired it. DO you remember that discussion?


1,782 posted on 01/01/2021 2:22:47 AM PST by ransomnote (IN GOD WE TRUST)
[ Post Reply | Private Reply | To 1777 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson