Internet Anthropologist Think Tank: Equation Group Potential

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Tuesday, February 17, 2015

    Equation Group Potential

    More of our INTEL

    Equation Group is significant because this omnipotent cyber espionage entity managed to stay under the radar for almost 15 yrs.

    They walk through all security programs, multitude of methods
    to get on PC, “Equation Group”, apparently part of the NSA, which it said was able to embed spyware in computers that gives it total control over them, even after the hard disk has been erased and the operating system reinstalled.

    Re-flash hard drive’s firmware, thats what the OS
    interfaces with at level of metal.Sophisticated bootkit,  hijacks the OS loading mechanisms,
    implements its own encrypted Virtual File System (VFS) inside the Windows registry.
    There are no malicious executable modules at all on the filesystem of an infected system and mapping of air-gapped networks.

    At the level of firmware its invisible, out of reach of any Security
    products and OWNs that PC.

    NSA's Equation Group repackaged #Stuxnet in New Cyber Missile,
    re-flashes Stuxnet payload into "FIRMWARE" invisible,unreachable,w/ User admin privileges.
    Old Stuxnet 3.0 most powerful weapon EVER.

    This is a game changer,
    and the biggest news in the history of cyber security.

    Equation Group almost superhuman technical feats illustrate Equation Group's extraordinary skill, painstaking work, and unlimited resources.

    Russian Kaspersky researchers to conclude that Equation Group is probably the most sophisticated computer attack group in the world.

    "It seems to me Equation Group are the ones with the coolest toys," Costin Raiu, director of Kaspersky Lab's global research and analysis team.

    Good explanation here; with TECH details.


    What does it mean?
    World leaders & Military naked,
    Cyber WnD (Weapon of nation Destruction)

    You can't see it,
    You can't delete it,
    You can't defeat it.

    It turns the PC into a Slave.
    Equation Group's '“GrayFish”, re-flashs the hard drive’s firmware,
    RE FORMATTING has no effect,
    it remains a slave PC.

    It can do any thing the user can do.
    What does that mean if its Putins PC?
    Or Defence ministers PC?
    Or a Generals PC?
    Or the Central Banks PC?
    Or FSB head Alexander Bortnikov PC?
    Now think in terms of networks and clouds.

    Or controlling Russian nuke launch computers,
    re-target from USA to Russian facilities,
    Russia would have not a clue till launched.

    Imagine a war with the opponent controlling
    your networks.
    Not gona be much of a war.

    It knows your plans, strategies, funding, CHAIN of command.
    It can turn your PC into a paper weight, DEAD and ERASED.

    A Equation Group strike could leave the Enemy
    with literally nothing left for a counter strike.


    NSA, never say anything.

    Equivalent era?
    When US was only one with A Bomb.

    "Computer Security" is an Oxymoron.

    What does this mean for the future of Internet?

    There is a Sheriff on the WWW, now
    but what will he do?

    You can't put the toothpaste back in the tube.
    If NSA doesn't have it, somebody else will eventually.

    Its here we have to learn how to deal with it.

    Internet Anthropologist



    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home