New National Bank opening. no paper trail.

Labels: Electoral fraud, fraud, hacking, voters, Voting, Voting system
Intelligence Field notes
( WE are THE top "War Intel" Blog.)
A Competitive Intelligence Service.
Labels: Electoral fraud, fraud, hacking, voters, Voting, Voting system
Labels: al qaeda, Al-Qaeda, hacking, Identity theft, Islam, members
New Chinese hacker program making the rounds called Chinese Vampire v2.2.1 (starving anti-virus) billed as a trojan downloader tool, ARP attack, QQ tail…etc. The screenshot below shows the downloader interface:
From what I have read about the tool, it is very effective. So effective in fact, that another Chinese hacker calling himself Sadness, from the Black Wolf hacker group, stole it. Yes, he did. Look at the trackback URLs associated with this screenshot compared to the one above (circled in red). Notice that our thief has changed it to the Black Wolf website instead of the www.( NOT FROM ME, G) address.
The true author of Vampire v2.2.1 runs the website pictured below and calls himself SKSgod…sigh. He was really unhappy with the theft of his property and posted a pretty nasty response to Sadness. Yeah, hacker on hacker violence doesn’t concern me in the least.
Now the truly exciting part of this post, there is also a female hacker involved in the marketing of this fine product named Jiajia (佳佳). Hmmm, you say…that name sounds familiar? Well it should! It is the same name as one of the members of the Six Golden Flowers.
Jiajia of the Six Golden FlowersIs the same Jiajia? I don’t think it is but not sure. On her blog, this Jiajia claims that due to the controversy over the stolen program, there are only two legitimate sites to download Vampire v2.2.1. One is her site and the other at SKSgod’s. Yes, there was a picture associated with Jiajia’s website:
Now this girl certainly doesn’t look like Jiajia number one and she appears to be a bit younger. Also, the characters next to the picture said “Sleepless Night.” Hell, this could be the picture off an album cover (and yes I did try to see if I could find a record called Sleepless Night) for all I know. She may just be the Brittany Spears of China. Thought I would include it anyway…sue me.
XXXXXXXXXXXXXXXXXXXXX
OUR BARB SAYS IT CAN BE DANGEROUS TO EVEN VISIT THESE HACKER PAGES,
ESPECIALLY IF THEY ARE FEUDING.
G 09.30.09
Labels: ARP, Ethics, FAQs Help and Tutorials, GAMES, hacker, hacking, Merchandise, United States
Labels: CYBER, hacking, Jihadist, Teams, terrorists
Labels: al qaeda, cyberwarfare, hacking, silver hadid
in turn putting all login data and ongoing user xxxxxxxxxxxxxxxxxx activity that the database stores opening it to the authority. Also the transmission of login data is not properly encoded or encrypted and someone xxxxxxxxxxxxxxxx using the proper packet sniffer captured login packets and stole and recorded the users login data.
This means that an "authority" has captured this data and they have isolated the true location and have a record of them logging in and engaging in "terrorist activities".
There is a fake email associated with this el_fatak@hotmail.com, which they are back tracking.
A privacy vulnerability exists in the applications interaction xxxxxxxxxxxxxxx with the Windows firewall and how it authorizes itself for use. One of the methods is xxxxxxxxxxxx value to the ProxyEnable key in the registry xxxxxxxxxxx. If you are using a proxy for any purpose but especially for anonymity, the xxxxxxxxxxxxxxxxxxxxxxxxxx of this registry key will temporally disable your proxy and leave your raw IP visible.
The ones that track back to Internet cafes, the security cams, available on the Internet are used to collect photos of the "terrorist hackers"
The IP's have been collected and processed. Their is nothing the terrorists can do but wait for the knock.
After analyzing that program and data someone worked with two pro-Muslim, Christian sites and just recently worked with the Radio Vatican site informing them of impending attacks and who and where the attackers are..
.They monitor their program and activities then proactively notify and work with target sites to mitigate any potential outages and loss. Eventually they will take down the program distributors and users, PRISON or worse.
The wanabe jihadist have exposed their entire network, IPs, passwords, Emails, even some photos. Just a matter of time. Nice work fascists hackers.
They know about the exploit which is why membership is currently almost dead, and they go begging.
MORE:
turning the Snort 2.6.1 DCE/RPC flaw into a working exploit.
http://www.securityfocus.com/bid/22616
Labels: cyber warfare, Douglas Maughan, Gen. T. Michael Moseley, hacking, Jihad Silver, Jim Christy, Marine Brig. Gen. John Davis, war