Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: ifinnegan
I’m talking about computer hacking attacks.

And these have *what* to do with this ship going off course?

16 posted on 03/28/2024 1:58:36 PM PDT by Chad C. Mulligan
[ Post Reply | Private Reply | To 14 | View Replies ]


To: Chad C. Mulligan

“ And these have *what* to do with this ship going off course?”

I have no idea, probably nothing.

Why are you obsessed with thinking the ship crashed due to hacking?


17 posted on 03/28/2024 2:00:39 PM PDT by ifinnegan (Democrats kill babies and harvest their organs to sell)
[ Post Reply | Private Reply | To 16 | View Replies ]

To: Chad C. Mulligan

The Chicom hacking cyber attacks as they are called are constant and large scale.

This is the only article posted I’ve seen that even touches on it.

I agree about the clickbait aspects.


18 posted on 03/28/2024 2:08:03 PM PDT by ifinnegan (Democrats kill babies and harvest their organs to sell)
[ Post Reply | Private Reply | To 16 | View Replies ]

To: Chad C. Mulligan
This ship was likely targeted by chicom hackers who work for the govt. or Chinese army like Volt Typhoon which I think are "the" likely hackers.

There is a post on Gateway that shows that the ships capt. did most everything right from communicating with the coast guard,port authorities and others that the ship was out of control.

They also put their anchor out to drag the ship a bit slower. However,if you look at the video closely you will see that a turn to the super structure of the bridge was made late in the ships path toward the bridge.

That makes no sense.

There is a group called Volt Typhoon which uses living off the land techniques as opposed to other hacking methods What is Living off the Land attack?

https://darktrace.com/blog/living-off-the-land-how-hackers-blend-into-your-environment Living off the Land is a strategy which involves threat actors leveraging the utilities readily available within the target organization's digital environment to move through the cyber kill chain. This is a popular method because It is often cheaper, easier, and more effective to make use of an organization's own infrastructure in an attempt to attack rather than writing bespoke malware for every heist. easier to spot like APT31 which uses malware easier to spot:

The charged defendants’ roles in the conspiracy consisted of testing and exploiting the malware used to conduct these intrusions, managing infrastructure associated with these intrusions, and conducting surveillance and intrusions against specific U.S. entities.,

IMHO,its more likely that volt typhoon using the living off the land technique of using only methods commonly used by those being hacked is likely responsible,but in the end who knows.

23 posted on 03/30/2024 3:11:08 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 16 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson