You’re welcome to read as much as you like in any of the open forums. To post your own thoughts, questions and comments, register here to join the BAFB Community — it’s free. 🙂
If you’ve already registered, log in using that button in the top right corner of the forum area below. [And if you’re a Client Hunting Masterclass student looking for the private forum, email me if you can’t see it — I’ll make sure you get access.]
Please consider registering
March 14, 2017
Well, their back! The newest threat to our intellectual property is the malware Mirai Botnet. With assistance from Centurylink the Mirai Botnet forces disaster and recovery. The trick was an error message to activate Windows. Windows was activated in January after the last cyber intrusion.
Within the registry, the hard drive uses a “clonetag ” to guarantee compromises to all intellectual property connected to the Remote Access Trojan Horse that boots everyone to the infected Unix or Linux server .
The original operating system installed Windows 8.1. In the rescue disk indicates that the intruder compromised the pc desktop system using Vista. Also found in Windows 7, 8, 8.1 and 10.
Compromised hard drive
The primary NTFS hard drive is cloned to a compromised Windows Vista Operating System. Current operating system installed Windows 8.1.
The hidden drive installed is connected to the Remote Access Trojan Horse (RAT) as the primary drive hidden using the BIOS setup.
First Cyber Attack today
The IP address found in the host belonged to a ” peer network group ” belongings to the NSA using Amazon servers to aid in the attack. IP Address 188.8.131.52 location. The IP address might be “spoofed” to conceal the identity of the intruder.
IP Address 184.108.40.206 location
OrgAbuseName: Peer 1 Network AUP Enforcement
Second Cyber Attack
Location: port used for established connection from 220.127.116.11 port 5228
Neverwinter Nights 2
4 records found
security scan: port 5228
Related ports: 443 5222
HP Virtual Room Service
The current cyber attack caused
Man in the Middle Attack
Distributed Denial of Service attacks to Quota
Eventually Denial of Service
Currently in Disaster and Recovery mode.
see the photos encluded in this artical at https://www.bebee.com/producer/@michelle-jackson-nevada/chain-of-custody-mirai-botnet-l
Most Users Ever Online: 106
Currently Online: Haley Tiffany
Currently Browsing this Page:
Jennifer Mattern: 363
Daryl George: 188
Joy Collado: 159
Mark W. Kuglin: 102
Cherese Cobb: 96
Heiddi Zalamar: 87
Pinar Tarhan: 79
Luana Spinetti: 53
Jessie Kwak: 49
Jodi Humes: 46
Guest Posters: 17
Newest Members:Haley Tiffany, Pspquest28, michael smith, Luke Holdaway, justine bate, michael titmus, Adison Alex, alvinaash, Jacqueline Shandley, KENNETH DAVIS
Moderators: Bree Brouwer: 839, Lauren Tharp, BAFB Managing Editor: 735, Lynn Silva: 7, Alicia Rades, BAFB Moderator: 719, Ashley Gainer: 494
Administrators: Sophie Lizard: 342