McAfee Anti-Virus Company Warns of Plan Rumored To Be Executed On Major U.S. Banks In Early 2013. Is This A False Flag or False Alarm. If True Could It Bring The U.S. Economy Down, Steal Americans Money, And Open The Door To Martial Law?
Is this Real? Is it Possible? Is it just another Conspiracy Theory put out by those who love NWO Conspiracy?
Well known Anti-Virus Software Company McAfee has warned of planned cyber-attacks early in 2013 that could potentially swindle unknown millions from major U.S. Banks
A group of purported criminals have allegedly released a Trojan Virus which through digital transfers will steal millions from US Banks. Some of the Banks whose names came up in this potential cyber-attack are as follows:
JPMorgan Chase & Co
• Wells Fargo
• Charles Schwab
• Capital One
• Bank of America
• Navy Federal Credit Union
The code name for this cyber-attack is “Project Blitzkrieg“. During a supposed beta test over 250 U.S. Banks were affected. Russian cyber-criminals are being linked to the recruiting for this attack as well as a cyber-mafia headed-up by a reported anonymous NSD. Those who join this cyber-attack are given the task of infecting targeted U.S. computers with malware designed to aid and assist in this elaborate high stakes scheme.
This malware is said to be capable of cloning, and sniffing passwords as well as login information and transferring other necessary digital information from Bank customers accounts. Yes folks, potentially your accounts.
Senior Vice President at McAfee Pat Calhoun stated, and this is a quote: “Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the U.S. that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.”
Typically a set of security questions are presented to a bank customer when they access their bank online, but this Trojan will present the customer with a counterfeit page and be able to store the data for future use against the bank customer.
A revision of the GOZI Trojan refereed to as GOZI Prinimalka is thought to have already been utilized in extracting around $5 million from Banks.
The cyber thugs plan to slowly tap bank accounts on a wide scale. Small enough to not set off withdrawal limit alerts thereby allowing them to extract the most possible before funds can be missed in such a manner as to suspect a cyber attack has in fact or is in fact taking place.
VP Calhoun warned that protective measure must be employed immediately. She further stated that since they know about it in advance they, McAfee, will be able to employ protective measure against this Trojan. McAfee is also working closely with Law Enforcement and many of the potential banks that are targeted to educate them on how this will take place, and how to react, and protect themselves, and their depositors.
During the attacks the bank will have their phone lines overloaded, therefore they will be unable to alert the customers nor will the customers be able to alert the banks. Being that has been revealed, one can only surmise that these attacks will happen over a very short period and many accounts will have to be affected because they have already stated that measures were in place by the thieves to not set of max withdrawal alerts. How all that will or is suppose to play out has not been revealed.
There is another supposed false flag which involves banks being hit by DDoS attacks launched from PHP based web site like Joomla and WordPress whose owners have allowed certain plugins to expire, and have not updated them leaving well know vulnerabilities that thieves can easily exploit, and gain access. They then will leave malware that will aid in the DDoS attacks unknown to the actual website owner. Folks it is very important to stay on top of all updates.
It is a well known fact that unmaintained websites make an excellent place for online blackhat hackers to exploit.
It gets more interesting. Back in August a Russian Anti-Virus company, Kaspersky Lab, discovered a new cyber surveillance virus that supposedly has been spying on online banking activity. Most of this activity has been reported to be in the Middle East mainly Lebanon, but it was stated that CitiGroup Inc’s CitiBank and eBay’s PayPal online systems had been infected.
Researchers are still investigating trying to determine if this is just surveillance or a potential means to steal money.
This Malware or Trojan is being called Gauss by Kaspersky who also said it was related to the Stuxnet, Flame and Duqu.
It has been reported that the malware or Trojan Gauss would be devastating to the banking industry if employed and many banks were infected. It could be so catastrophic that overnight the attack could happen, and the following morning customers would wake up insolvent. Exactly what the U.S. and Global economy need right now, right? What next?
this were setting the stage, and if very easily could be, but what if this is setting the stage for the feared bank holiday we all have been hearing about for several years?
One scenario could be that mainstream media is used to pronounce to everyone that the Trojan Gauss has infected our banks, and in order to purge the systems all banks would need to shut down for a specific period to reconfigure their systems.
Maybe this takes place on a Friday afternoon. Major banks announce that they will shutdown, and customers will not be able to access their accounts online or offline over the weekend. Giving the banks sufficient time to reconfigure and purge their systems. They may also add that the banks will certainly reopen on Monday for normal business.
Customers will have no access to their accounts over the weekend, but with a promise to reopen for business on Monday, there would be no panic of a bank holiday.
This is only to appease the public to make sure there is no panic. During the weekend while the banks are suppose to be fixing the problem, they instead are wiring all the deposits to off-shore accounts that have been prearranged. Completely out of reach and no way to trace it, and with the cyber thieves to blame.
Come Monday morning the banks will announce that the problem was far greater than was expected. The systems had been infiltrated much further than had first been suspected. Department of Homeland Security (DHS) and the US Military would now be on alert for a declaration of martial law to be handed down from the president in order to control any domestic uprising caused by people realizing their money may be gone.
Every American would sit dead broke, and all the banking elite would have left the country. They will have finally finished what they started back in 2008. A complete and total ripoff of the American people. I will let you reason what will all take place after that.
The first part is a concern, as it is being discussed enough, and enough facts are given to warrant looking into, and also warrants concern. The latter scenario is merely fabricated by my imagination, but may not be so outlandish at all. Go figure.
Please comment on and share the article titled:
False Flag Plan Rumored Bank Cyber Attack Real Or Contrived?
Tags: Ameritrade, Anti-Virus Software Company McAfee, Bank customers accounts, Bank of America, Capital One, Charles Schwab, Citibank, cloning, cyber-attacks, cyber-mafia, digital information, eTrade, Fidelity, GOZI Prinimalka, GOZI Trojan, JPMorgan Chase & Co, login information, major U.S. Banks, McAfee Senior Vice President Pat Calhoun, Navy Federal Credit Union, New World Order, New World Order Conspiracy, New World Order Conspiracy Theory, NSD, NWO Conspiracy, nwoconspiracy.org, PayPal/eBay, planned cyber-attacks, planned cyber-attacks early in 2013, Project Blitzkrieg, Russian cyber-criminals, Senior Vice President Pat Calhoun, sniffing passwords, Suntrust, targeted U.S. computers, Wachovia, Wells Fargo
Leave a Reply. NWO Loves Feedback and your opinion.
You must be logged in to post a comment.