<html dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style id="owaParaStyle" type="text/css">P {margin-top:0;margin-bottom:0;}</style>
</head>
<body ocsi="0" fpstyle="1">
<div style="direction: ltr;font-family: Tahoma;color: #000000;font-size: 10pt;">I'm, if possible, more cynical than all of you:
<font color="black" face="Tahoma" size="2"><span style="font-size:10pt;" dir="ltr">banks and their customers are under cyberattack 24/7. I don't see anything substantially new here.
<br>
<br>
To me it looks like the 'proprietary' trojan bad guys and proprietary info security firms that use things like this to scare corporate clients into buying their solutions...are just working in closer, of course coincidental, cooperation than usual.
<br>
<br>
Seriously, US banks are supposed to be majorly afraid of some group that managed to steal $5m over several years; and which is now advertising its forthcoming attack on Youtube?
<br>
<br>
Doubt it.</span></font>
<div style="font-family: Times New Roman; color: #000000; font-size: 16px">
<hr tabindex="-1">
<div style="direction: ltr;" id="divRpF707771"><font color="#000000" face="Tahoma" size="2"><b>From:</b> pouzin@gmail.com [pouzin@gmail.com] on behalf of Louis Pouzin (well) [pouzin@well.com]<br>
<b>Sent:</b> Saturday, October 20, 2012 12:42 PM<br>
<b>To:</b> governance@lists.igcaucus.org; David Conrad<br>
<b>Subject:</b> [governance] US Banks under cyber attack<br>
</font><br>
</div>
<div></div>
<div>Another poison option. When leaks are unavoidable, as in such a grand operation, a tried tactic is to create bogus leaks.<br>
E.g. in WW2 the British organized bogus radio traffic, press clips, troop concentrations, along the (english) Channel. Then the Allies landed in Normandy. Hitler, so convinced that it was a diversion, kept a tank army in standstill in the north of France for
3 days. Then it was too late, the landing had grown roots.<br>
<br>
Louis<br>
- - -<br>
<br>
<div class="gmail_quote">On Sat, Oct 20, 2012 at 5:27 PM, David Conrad <span dir="ltr">
<<a href="mailto:drc@virtualized.org" target="_blank">drc@virtualized.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex; border-left:1px #ccc solid; padding-left:1ex">
<div style="word-wrap:break-word">Hi,
<div><br>
<div>
<div class="im">
<div>On Oct 19, 2012, at 11:49 AM, Devon Blake <<a href="mailto:devonrb@gmail.com" target="_blank">devonrb@gmail.com</a>> wrote:</div>
<blockquote type="cite"><a href="http://finance.yahoo.com/blogs/daily-ticker/u-banks-under-cyber-attack-iran-money-safe-151123675.html" target="_blank">http://finance.yahoo.com/blogs/daily-ticker/u-banks-under-cyber-attack-iran-money-safe-151123675.html</a><br>
Is this a response to Stuxnet? or is this the beginning of a cyberwar?<br clear="all">
</blockquote>
<div><br>
</div>
</div>
<div>It is (perhaps not surprisingly) quite difficult to determine what is actually going on from the level of information available to the general public. However, within some security circles, there have been rumors of this sort of thing happening in this
timeframe for some time now, e.g.:</div>
<div><br>
</div>
<div><a href="http://www.threatmetrix.com/fraudsandends/tag/russian-cyber-attacks/" target="_blank">http://www.threatmetrix.com/fraudsandends/tag/russian-cyber-attacks/</a></div>
<div><a href="http://blogs.rsa.com/rsafarl/cyber-gang-seeks-botmasters-to-wage-massive-wave-of-trojan-attacks-against-u-s-banks/" target="_blank">http://blogs.rsa.com/rsafarl/cyber-gang-seeks-botmasters-to-wage-massive-wave-of-trojan-attacks-against-u-s-banks/</a></div>
<div><br>
</div>
<div>Other interpretations has been this is part of an ongoing campaign to protest the "Innocence of Muslims" 'movie', Iranian retribution for Stuxnet, or a false flag operation by US/Israelis in preparation for an attack against Iran.</div>
<div><br>
</div>
<div>Pick your poison...</div>
<div><br>
</div>
<div>Regards,</div>
<div>-drc</div>
<br>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</body>
</html>