Lada Ray’s Ukraine Update: Russian Duma Bans Money Transfers to Ukraine

“One of the problems is that millions of Ukrainians will flood uncontrollably into Russia (and EU) as a result.”

Perhaps President Putin should follow Trump’s lead and BUILD THAT WALL, also make Soros pay for it!
Seriously Ukraine is finished, it’s a matter of time, but who will pick up the pieces besides Russia (familial duty)?

Futurist Trendcast

Today Russian Duma banned money transfers from Russia to Ukraine through any banks other than Russian banks. This comes as an anticipated mirror response to 2016 ban of Russian payment systems on Ukraine territory. More details about the new law from NovorossiaVision.

Further, this move is a logical reaction to the escalating terrorism against Russian banks by Ukrainian Nazis, while the Kiev government either supports them or looks the other way.

In the past couple of weeks various ‘Ukraine patriots’ from fascist battalions, radical and ukro-nazi parties walled in, vandalized and/or looted several branches of Sberbank and four other Russian bank subsidiaries in Ukraine. Most of these attacks took place in Kiev.

ukro-nazis kiev fascists

Ukro-nazis marching in Ukraine

Kiev government added oil to the fire by ‘forbidding Russian banks in Ukraine from transferring assets out of the country.’

Attacks against Russian banks were openly supported by the majority of Ukraine Rada…

View original post 699 more words

Nine years later, Greece is still in a debt crisis…

Sometimes you have to marvel at the absurdity of the financial universe in which we live.

On one side of the Atlantic, we have the United States of America, which triggered yet another debt ceiling disaster last Thursday when the US government’s maximum allowable debt reset to just over $20 trillion.

Of course, the US national debt is pretty much already at $20 trillion.

(That’s roughly $166,000 per taxpayer in the Land of the Free.)

This means that Uncle Sam is legally prohibited from ‘officially’ borrowing any more money.

But far be it from the US government to start living within its means. Sacrilege!

These guys have zero chance of making ends meet without going into debt.

Just last year, according to the government’s own financial report, their annual net loss totaled $1 TRILLION, and the national debt increased by $1.4 trillion.

And that was in a relatively stable year. There was no major war or financial crisis to fight. It was just business as usual.

This year isn’t going to be any different.

So, cut off from their normal debt supply (the bond market), the Treasury Department is resorting to what they call “extraordinary measures.”

They’re basically pillaging government employee retirement funds, and will continue to do so until Congress raises the debt ceiling.

It’s a repeat of what happened in 2015. And 2013. And 2011.

Pretty amazing to consider that the “richest” country in the world has to plunder retirement funds in order to keep the lights on.

Former US Treasury Secretary Larry Summers said it perfectly when he quipped “How long can the world’s biggest borrower remain the world’s biggest power?”

Then, of course, on the other side of the Atlantic, we have Greece, which is now in its NINTH YEAR of a major debt crisis.

Incredible.

Greece has had nine different governments since 2009. At least thirteen austerity measures. Multiple bailouts. Severe capital controls. And a full-out debt restructuring in which creditors accepted a 50% loss.

Yet despite all these measures GREECE IS STILL IN A DEBT CRISIS.

Right now, in fact, Greece is careening towards another major chapter in its never-ending debt drama.

Just like the United States, the Greek government is set to run out of money (yet again) in a few months and is in need of a fresh bailout from the IMF and EU.

(The EU is code for “Germany”…)

Without another bailout, Greece will go bust in July– this is basic arithmetic, not some wild theory.

And this matters.

If Greece defaults, everyone dumb enough to have loaned them money will take a BIG hit.

This includes a multitude of banks across Germany, Austria, France, and the rest of Europe.

Many of those banks already have extremely low levels of capital and simply cannot afford a major loss.

(Last year, for example, the IMF specifically singled out Germany’s Deutsche Bank as being the top contributor to systemic risk in the global financial system.)

So a Greek default poses as major risk to a number of those banks.

More importantly, due to the interconnectedness of the financial system, a Greek default poses a major risk to anyone with exposure to those banks.

Think about it like this: if Greece defaults and Bank A goes down, then Bank A will no longer be able to meet its obligations to Bank B. Bank B will suffer a loss as well.

A single event can set off a chain reaction, what’s called ‘contagion’ in finance.

And it’s possible that Greece could be that event.

This is what European officials have been so desperate to prevent for the last nine years, and why they’ve always come to the rescue with a bailout.

It has nothing to do with community or generosity. They’re hopelessly trying to prevent another 2008-style meltdown of the financial system.

But their measures have limits.

How much longer do Greek citizens accept being vassals of Germany, suffering through debilitating capital controls and austerity measures?

How much longer do German taxpayers continue forking over their hard-earned wages to bail out Greek retirees?

After all, they’ve spent nine years trying to ‘fix’ Greece, and the situation has only become worse.

For a continent that has been at war with itself for 10 centuries and only managed to play nice for the last 30 or so years, it’s foolish to expect these bailouts to last forever.

And whether it’s this July or some date in the future, Greece could end up being the catalyst which sets off a chain reaction on both sides of the Atlantic.

Will Russiagate Backfire on the Left?

sentinelblog

From Antiwar.com, by Patrick J. Buchanan

The big losers of the Russian hacking scandal may yet be those who invested all their capital in a script that turned out to based on a fairy tale.

In Monday’s Intelligence Committee hearings, James Comey did confirm that his FBI has found nothing to support President Trump’s tweet that President Obama ordered him wiretapped. Not unexpected, but undeniably an embarrassment for the tweeter-in-chief.

Yet longer-term damage may have been done to the left. For Monday’s hearing showed that its rendering of the campaign of 2016 may be a product of fiction and a fevered imagination.

After eight months investigating the hacking and leaking of the emails of Clinton campaign chief John Podesta and the DNC, there is apparently no evidence yet of Trump collusion with Russia.

Former Director of National Intelligence Gen. James Clapper has said that, as of his departure day, Jan…

View original post 725 more words

Dear America: Better Read the Fine Print on Your Credit Card Statement

sentinelblog

Source: OfTwoMinds blog, by Charles Hugh-Smith

What will replace the current system after it self-destructs? That’s the question.
You know those disclosures on your credit card statements? That it will take 27 years to pay off your balance if you only make the minimum payment each month, and so on?
You might not be aware of it, but America’s “credit card”–our national debt–comes with its own disclosure statement:

Here’s a chart of America’s credit card: clearly, any credit line expanding this fast will bankrupt the borrower, regardless of their income.

I often refer to debt serfdom, the servitude debt enforces on borrowers. The mechanism of this servitude is interest, and today I turn to two knowledgeable correspondents for explanations of the consequences of interest.
Correspondent D.L.J. explains how debt/interest is the underlying engine of rising income/wealth disparity:
If…

View original post 268 more words

Hacker News: Hackers Threaten to Remotely Wipe 300 Million iPhones Unless Apple Pays Ransom

hacking-apple-icloud-account

If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th.

It has been found that a mischievous group of hackers claiming to have access to over 300 million iCloud accounts is threatening Apple to remotely wipe data from those millions of Apple devices unless Apple pays it $75,000 in crypto-currency or $100,000 worth of iTunes gift cards.

The hacking group, who identified themselves as ‘Turkish Crime Family,’ has demanded a ransom to be paid in Bitcoin or Ethereum, another popular crypto-currency.

Motherboard broke this story on Tuesday after a hacker claiming to represent the alleged hacking group shared screenshots of alleged emails between the group and Apple’s security team with the publication.

“I just want my money and thought this would be an interesting report that a lot of Apple customers would be interested in reading and hearing,” the hacker told Motherboard.

The screenshots of email exchange indicate that when Apple security team asked for a sample list of hacked account to verify the claims, the group only provided a YouTube video demonstrating access to one of the allegedly hacked accounts and remotely wiping all content from the device.

However, the story seems inconsistent, as on its Twitter account, the group claims to have access to 200 million iCloud accounts, while in one of the emails, it says to access 300 million Apple email accounts and in another, the number gets almost double to 559 million.

At this time, it is very difficult for even Apple to verify the claims. However, the company has warned the group saying that it does not reward cyber criminals for breaking the law and asking them to remove the video as it was “seeking unwanted attention.”

The hacking group has given Apple a deadline until April 7 to pay up the ransom. Unless its demands are met, the group are going to start remotely wiping victim’s Apple devices and reset iCloud accounts.

How to Protect Your iCloud Account From Hackers

Whether the claims and threat are real or not, but if hackers gain access to your iCloud account, they could easily download all your photos and other private data.

In order to keep your iCloud account safe from hackers, Apple users are advised to change their iCloud passwords immediately and enable two-step authentication to add an extra layer of security to your account.

Also Read: Searching for Leaked Celebrity Photos? Don’t Blindly Click Any Fappening Link!

We have already aware of the consequences iCloud accounts can make if they get hacked by malicious attackers. In 2014, iCloud hack led to The Fappening, wherein hackers flooded the Internet with nude photos of hundreds of female celebrities, which were stored in their iCloud accounts.

Some people are also linking the Turkish Crime Family to the recent The Fappening 2.0 incident that leaked private photographs of many celebrities, including Emma Watson and Mc Rose, last week.

However, there is no evidence to suggest the blackmail attempt had anything to do with The Fappening 2.0 attack.

Mohit Kumar - Hacking News
Entrepreneur, Hacker, Speaker, Founder and CEO — The Hacker News and The Hackers Conference.

Hacker News: Unpatchable ‘DoubleAgent’ Attack Can Hijack All Windows Versions — Even Your Antivirus!

hack-antivirus-microsoft-application-verifier-dll-injection

A team of security researchers from Cybellum, an Israeli zero-day prevention firm, has discovered a new Windows vulnerability that could allow hackers to take full control of your computer.

Dubbed DoubleAgent, the new injecting code technique works on all versions of Microsoft Windows operating systems, starting from Windows XP to the latest release of Windows 10.

What’s worse? DoubleAgent exploits a 15-years-old undocumented legitimate feature of Windows called “Application Verifier,” which cannot be patched.

Application Verifier is a runtime verification tool that loads DLLs (dynamic link library) into processes for testing purpose, allowing developers quickly detect and fix programming errors in their applications.

Unpatchable Microsoft Application Verifier Exploit

The vulnerability resides in how this Application Verifier tool handles DLLs. According to the researchers, as part of the process, DLLs are bound to the target processes in a Windows Registry entry, but attackers can replace the real DLL with a malicious one.

Also Read: Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

Simply by creating a Windows Registry key with the name same as application he wants to hijack, an attacker can provide his own custom verifier DLL he would like to inject into a legitimate process of any application.

Once the custom DLL has been injected, the attacker can take full control of the system and perform malicious actions, such as installing backdoors and persistent malware, hijacking the permissions of any existing trusted process, or even hijacking other users’ sessions.

Here’s how the Cybellum researchers say this attack can work:

“DoubleAgent gives the attacker the ability to inject any DLL into any process. The code injection occurs extremely early during the victim’s process boot, giving the attacker full control over the process and no way for the process to protect itself.”

Using DoubleAgent Attack to Take Full Control of Anti-Virus

In order to demonstrate the DoubleAgent attack, the team hijacked anti-virus applications — which is the main defense on systems to prevent any malware from running — using their technique and turn them into malware.

The team was able to corrupt the anti-virus app using the DoubleAgent attack and get the security software to act as disk-encrypting ransomware.

Also Read: Microsoft Started Blocking Windows 7/8.1 Updates For PCs Running New Processors

The attack works on every version of Windows OS from Windows XP to Windows 10 and is hard to block because the malicious code can be re-injected into the targeted legitimate process after the system reboots – Thanks to the persistent registry key.

The researchers said most of the today’s security products on the market are susceptible to the DoubleAgent attacks. Here’s the list of affected security products:

  • Avast (CVE-2017-5567)
  • AVG (CVE-2017-5566)
  • Avira (CVE-2017-6417)
  • Bitdefender (CVE-2017-6186)
  • Trend Micro (CVE-2017-5565)
  • Comodo
  • ESET
  • F-Secure
  • Kaspersky
  • Malwarebytes
  • McAfee
  • Panda
  • Quick Heal
  • Norton

After hijacking the anti-virus software, attackers can also use the DoubleAgent attack to disable the security product, making it blind to malware and cyber attacks, using the security product as a proxy to launch attacks on the local computer or network, elevating the user privilege level of all malicious code, hiding malicious traffic or exfiltrate data, or damaging the OS or causing a denial of service.

Note: Cybellum researchers only focused on anti-virus programs, though the DoubleAgent attack could work with any application, even Windows operating system itself.

Many Antiviruses Still Unpatched Even After 90 Days Of Responsible Disclosure

Cybellum said the company had reported the DoubleAgent attack to all affected anti-virus vendors more than 90 days ago.

Cybellum researchers have been working with some anti-virus companies to patch the issue, but so far, only Malwarebytes and AVG have released a patch, while Trend-Micro has planned to release one soon, as well.

So, if you use any of the three apps mentioned above, you are strongly advised to update it as soon as possible.

As a mitigation, the researchers note that the simplest fix for antivirus vendors is to switch from Application Verifier to a newer architecture called Protected Processes.

Protected processes mechanism protects anti-malware services against such attacks by not allowing other apps from injecting unsigned code, but this mechanism has so far been implemented only in Windows Defender, which was introduced by Microsoft in Windows 8.1.

Cybellum has also provided a video demonstration of the DoubleAgent attack, showing how they turned an antivirus app into a ransomware that encrypts files until you pay up.

The company also posted proof-of-concept (PoC) code on GitHub, and two blog posts detailing the DoubleAgent attack.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.