Friday, September 21, 2012

US banks compromised this week by Iran, prevented customer access online. Since Obama attacked Iran with Stuxnet, was only a matter of time before Iran retaliated against ordinary Americans

.
"Websites of Bank of America and JPMorgan Chase's experienced unexplained service disruptions."...Obama ordered the Stuxnet computer attack  that crippled Iran's computer operations, NY Times reported. "It will be a shock, SHOCK when the world retaliates against America" for Obama's act of war against Iran.

9/21/12, "Exclusive: Iranian hackers target Bank of America, JPMorgan, Citi," Reuters, Jim Finkle and Rick Rothacker

"A U.S. financial services industry group this week warned banks, brokerages and insurers to be on heightened alert for cyber attacks after the websites of Bank of America and JPMorgan Chase's experienced unexplained service disruptions....

Iranian hackers have repeatedly attacked Bank of America Corp (BA.N), JPMorgan Chase & Co (JPM.N) and Citigroup Inc (C.N) over the past year, as part of a broad cyber campaign targeting the United States, according to people familiar with the situation.

The attacks, which began in late 2011 and escalated this year, have primarily been "denial of service" campaigns that disrupted the banks' websites and corporate networks by overwhelming them with incoming web traffic, said the sources.

Whether the hackers have been able to inflict more serious damage on computer networks or steal critical data is not yet known. The sources said there was evidence suggesting the hackers targeted the banks in retaliation for their enforcement of Western economic sanctions against Iran.

Iran has beefed up its cyber capabilities after its nuclear program was damaged in 2010 by the Stuxnet virus, widely believed to have been developed by the United States. Tehran has publicly advertised its intentions to build a cyber army and encouraged private citizens to hack against Western countries.


The attacks on the three largest U.S. banks originated in Iran, but it is not clear if they were launched by the state, groups working on behalf of the government, or "patriotic" citizens, according to the sources, who requested anonymity as they were not authorized to discuss the matter.

They said the attacks shed new light on the potential for Iran to lash out at Western nations' information networks.
  
"Most people didn't take Iran seriously. Now most people are taking them very seriously," said one of the sources, referring to Iran's cyber capabilities.

Iranian officials were not available for comment. Bank of America, JPMorgan and Citigroup declined to comment, as did officials with the Pentagon, U.S. Department of Homeland Security, Federal Bureau of Investigation, National Security Agency and Secret Service....

NBC reported late on Thursday that the Iranian government was behind these attacks, citing U.S. national security sources. Reuters could not verify that independently....

Denial-of-service campaigns are among the oldest types of cyber attacks and do not require highly skilled computer programmers or advanced expertise, compared with sophisticated and destructive weapons like Stuxnet.

But denial-of-service attacks can still be very disruptive: If a bank's website is repeatedly shut down, the attacks can hurt its reputation, affect customer retention and cause revenue losses as customers cannot open accounts or conduct other business.

Bank of America, Citigroup and JPMorgan Chase have consulted the FBI, Department of Homeland Security and National Security Agency on how to strengthen their networks in the face of the Iranian attacks, the sources said. It was not clear whether law enforcement agencies are formally investigating the attacks.

The Iranian attackers may have used denial-of-service to distract the victims from other, more destructive assaults that have yet to be uncovered, the sources said."...via Michael Savage show

----------------------------------------------------------------------------

"BofA officials when reached Friday declined to comment on the Reuters report or the alleged attacks. U.S. government officials and others have also declined to comment."

9/21/12, "Reuters: Bank of America website attacked by Iranian hackers," Charlotte Business Journal, Adam O'Daniel

"News agency Reuters is reporting Bank of America is among several U.S. banks to be targeted by computer hackers in Iran.


The report cites unnamed sources and claims Charlotte-based BofA, JPMorgan Chase and Citigroup all have been targeted with "denial of service" attacks at different times over the past year. The computer attacks burden the bank websites with heavy traffic volume that causes slow service or for the sites to become unavailable. Reuters says the attacks are in retaliation for U.S. economic sanctions.

It's unclear how successful the attacks have been or if they're a result of something the Iranian government is going or attributed to individual citizens.

Earlier this week, BofA's website experienced problems such as slow load times or intermittent outages, according to some users.

However, BofA says the website was never shut down. "The vast majority of our customers did not experience any issues," BofA spokesman Mark Pipitone said in an email earlier this week...

BofA officials when reached Friday declined to comment on the Reuters report or the alleged attacks. U.S. government officials and others have also declined to comment."

---------------------------------------------------------

6/1/12, "Obama Ordered The "Code Stux"," Zero Hedge

"When Iran's nuclear facilities were publicly crippled in 2011 by what then was considered a revolutionary computer virus which destroys physical equipment, many immediately assumed the virus originated in Israel for obvious reasons. They were wrong. In what can be described as the first presidentially-mandated and condoned act of cyberwarfare, one circumventing the War Powers Act of course, the NYT informs us that the order to physically impair Iranian sovereignty came from none other than the Nobel Peace prize winning president: Barack Obama.

From the NYT:

"From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks - begun in the Bush administration and code-named Olympic Games - even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm's "escape," Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America's most ambitious attempt to slow the progress of Iran's nuclear efforts had been fatally compromised.

"Should we shut this thing down?" Mr. Obama asked, according to members of the president's national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day."
For those confused - yes: this is an act of war. A New Normal war.


(NYT): "It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country's infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible."
And still America continues to wage war, subverting the constitution, without any Congressional approval, and without even telling the population what is really happening. Because it is "for its own good."


(NYT): "A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack."

The "New Normal Gulf of Tonkin":


(NYT): "Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons - even under the most careful and limited circumstances - could enable other countries, terrorists or hackers to justify their own attacks.

"We discussed the irony, more than once," one of his aides said. Another said that the administration was resistant to developing a "grand theory for a weapon whose possibilities they were still discovering." Yet Mr. Obama concluded that when it came to stopping Iran, the United States had no other choice.

If Olympic Games failed, he told aides, there would be no time for sanctions and diplomacy with Iran to work. Israel could carry out a conventional military attack, prompting a conflict that could spread throughout the region."

Some call it irony, others collateral damage where people lose everything, including their lives. Semantics.

Remember though: they hate America for its freedoms.

(NYT): "Mr. Obama has repeatedly told his aides that there are risks to using - and particularly to overusing - the weapon. In fact, no country's infrastructure is more dependent on computer systems, and thus more vulnerable to attack, than that of the United States. It is only a matter of time, most experts believe, before it becomes the target of the same kind of weapon that the Americans have used, secretly, against Iran."
  • And it will be a shock, SHOCK
 ----------------------------------------------------------------

Ed. note: I was interested in this story because my bank was shut down online this week for a period of time. 


.

No comments: