Is Bitcoin a dollar 2.0 and what does the CIA have in common with the Bitcoin?
that infects servers and Windows workstations by kicking the Monero cryptocurrency. At least for these reasons, the operating system needs to be protected from the browser, because digging cryptocurrencies is possible even with "off" software for browsing the Internet .
We notice an unmistakably sharp increase in interest in cryptocurrencies. Cybercriminals change the preferences of preferring the extraction of cryptocurrencies rather than ransomware infection . The cryptojaking threat itself is really transparent because it does not infect the user's computer and the only noticeable symptom is increased CPU usage and faster fan speeds. You do not even have to enter the "suspicious" pages with pirate content, to give the computing power of the computer to the owners of the cryptocurrency portfolio. Sometimes it's enough to watch YouTube with ads , visit one of the hacked websites (eg rzeczpospolita.pl
or blackberrymobile.com ) or search for information on the website Polish municipal office . And if you deal with Etherum's "mining" yourself, update the system, because detected bot logging to Ethereum OS and stealing the extracted cryptocurrency.
Cryptojacking is a new attack technique
ESET's antivirus software is very popular in our country (if not the most). And we mean both consumer and business consumption. It is hard not to believe statistics that clearly indicate the changing trend of monetizing cybercrime activities towards cryptocurrencies:
To dig at your expense by powering a cybercriminal's wallet you do not have to be a fan of illegal resources. The more you spend time on a page with attached malicious code, the more CPU cycles can be used for cybercriminals' needs. This explains why cryptojacking sites are usually selected where users remain hours of viewing illegal material. The process can be very profitable. According to Fortinet, criminals attacking popular services, such as The Pirate Bay, can earn up to 12 thousand dollars a month.
The fan runs at full speed for no apparent reason? This is the first symptom of feeding on the processor. In this case, it is worth checking its use and terminating the connection to the infected site. After doing this, you can open the browser again and easily visit other websites.
Is Bitcoin a new currency $dollar 2.0 created by the CIA?
Behind the cryptocurrency Bitcoin stands the US government agency CIA - a very bold thesis. It was made by Natalia Kaspersky, former CEO of Kaspersky Lab, and since 2007 the president of InfoWatch specializing in the information security industry. Natalia was also the wife of Evgeniya. Since 1998, they are no longer married. Natalia said goodbye to Kaspersky Lab in 2011, so her personal position in this matter can not be taken as the official announcement of Kaspersky Lab.
On January 18, 2018 at the ITMO University in St. Petersburg during a conference to commence cooperation between the university and the company InfoWatch, Natalia presented controversial information (which someone photographed and posted on the web) that the US government agency CIA was behind the cryptocurrent Bitcoin.
On one of the slides we read that Bitcoin was designed by the CIA for the financing of projects carried out by the governments of the USA, Great Britain and Canada abroad. Bitcoin technology (or blockchain editor) is private, as is the Internet, GPS and Tor network. In fact, Bitcoin is $ dollar 2.0 controlled by the owners of cryptocurrency exchanges.
Translated from the slide into English:
Bitcoin is a project of American intelligence agencies, which was designed to provide quick funding for US, British and Canadian intelligence activities in different countries. [The technology] is 'privatized,' just like the Internet, GPS and TOR. In fact, it is dollar 2.0. Its rate is controlled by the owners of exchanges.
The blockchain software on which Bitcoin is based is a distributed file system that improves the operation of information systems. Within its framework, customers keep copies of a given file and agree on changes in it. Such a file consists of blocks, each of which contains the cryptographic signature of the previous block. The blockchain technology behind Bitcoin is very secure, but it does not provide 100% anonymity like the Monero cryptocurrency (used in cryptojacking attacks). Perhaps this was the aspect that CIA guided during the creation of Bitcoin - if the information provided by Natalia Kaspersky is true.
On one of the slides there were also other interesting information about the creator of Bitcoin. No, it is not Satoshi Nakamoto as a person, because Satoshi Nakamoto is not a man, but a code name invented by American cryptologists.
The presentation also contained less bold theses. On one of the slides there was information that personal smartphones, which humanity is enjoying so much "are packed with spy electronics and spy software. Smartphones are remotely controlled devices designed for entertainment, work and at the same time for spying on the owner. The user, using a smartphone, 99% agrees to everything. "- In this sentence, we do not seek conspiracy theories. All you have to do is to follow a few articles, eg about the fact that in 36 smartphones from top manufacturers found preinstalled malware or about the fact that more than one Trojan is hiding in the official firmware for Android . If the infecting of smartphones at the production stage is not very reliable information for the reader, what about the idea of a German MP who offered directly implementation of the backdoor in EVERY device electronic? So preventive, for the good of humanity ...
Kaspersky Lab is once again ricocheting off the US, but...
It all started with the law introducing banning the use of Kaspersky Lab's software. At the beginning, the ban was imposed on the US Department of Defense to extend the restriction to all state-owned entities some time later. In response, Russia forbade the use of western antiviruses.
A few months ago, an "anonymous informant" was blowing up a media storm about alleged backdoors that were to have Kaspersky Lab solutions . Of course, no evidence was presented. The political war of Trump-Putin continues.
There are no plans to warn against the use of Kaspersky Lab's products, because BSI does not have any evidence of the company's impropriety or any weaknesses in its software. (...) At present, BSI does not have any information that could indicate that the activities described in the media have taken place.
Noboru Nakatani, director of Interpol Global Complex for Innovation (IGCI), spoke in a similar vein, commenting on geopolitical activities in the IT security industry as follows:
Balkanization, especially in relation to the cyber security community that we observe, is a problem that needs to be resolved. The reality is that cybercriminals work together, share information and help each other to make more money. Do you think that governments are doing the same?
Referring to the situation related to Kaspersky Lab, Noboru Nakatani added :
The situation in which Kaspersky Lab found itself is an example of balkanization. Interpol, which coordinates international efforts in the fight against cybercrime, has not received any information from the United States about allegations made to Kaspersky Lab. Kaspersky Lab is fighting against cybercriminals and it is obvious. The company works with governments and organizations around the world. We should all work together.
In December 2017, Kaspersky Lab software was banned by the British National Center for Cyber Security (NCSC), which issued a warning addressed to government units. In it, he stated that Kaspersky Lab software can be used by the Russian government - writes BusinessInsider . The authorities stress that the decision was made on the basis of risk analysis, not on the basis of a specific case of espionage.
A few days ago, the portal wPolityce.pl announced that the US administration has published a list of 114 Russian politicians and 96 oligarchs (colloquially Putin's list) who, in Washington's opinion, benefited from links with Russian President Vladimir Putin. On this list is also Jewgienij Kaspersky, which was also predictable before the list was published.
In the case of alleged backdoors, there is absolutely no hard evidence in the Kaspersky Lab software that we could take seriously. For persistent readers in the search for the truth, we recommend extensive material about " Polish case and Kaspersky Lab ", which was prepared by CRN Polska. The article by Andrzej Gontarz discusses interesting, because legal aspects of using "higher risk" software in state-owned institutions.
So far, the only known victim of the alleged implemented backdoor is the American National Security Agency (NSA), whose employee took home more unknown hacking tools, storing them on a computer protected by Kaspersky. Did anyone believe it? The anti-virus has rightly identified these programs as malicious and sent standard information to the producer's servers, from which the western media reported (without providing evidence) - they reached the Russian intelligence agency.
May we never be forced to use such grotesque protection:
If you opt out of Kaspersky products, it will not make the world better and we will make users safer. Countries such as the USA, Israel, China, the United Kingdom, Russia, France and Germany have advanced technologies, unlimited financial resources and the ability to break into almost any computer, system and network. But if someone finally presented irrefutable technical evidence of the guilt of Kaspersky Lab ... Before we start to hang dogs on a producer from Russia, let's remind the other side of the coin, ie the program PRISM , which everyone has already forgotten about, and which the world learned thanks to a man named Edward Snowden.
We recommend HEAVEN application to people who are afraid of surveillance. privacy protection without affecting the profiling of third parties. The application uses smartphone sensors (microphone, motion sensor, light detector, camera) to monitor changes in the surroundings from this angle and records everything, recording these events in graphic or audio form in the device's memory.
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.