Turning the servers off and on again doesn’t break DDOS software. The attacker saw the network was down and assumed they took it down and stopped mapping. Something is fishy in this reporting.
Sorry, as a software engineer who’s dealt with DoS/DDoS attacks a number of times before, I counted at least a dozen things about this story that smell very fishy. Also, what type of attacker has a system so rudimentary that mere errors due to an unresponsive network would “overwhelm” it? That’s actually laughable.
this is bloomberg after all - they're preparing us for a false flat global cyber attack in 24 so they can shut down the internet from us - all part of their plan - will probably happen just as the stock market is about to crash! Whitney Webb documents with a lot of amazing evidence why this is very possibly going to be the case
remember the WHO had to change the definition of pandemic to be able to declare one - a lot of words and phrases were redefined around 2020 - this is totally Orwellian!!!!
They say "russia or china" had the capability. This is pointing fingers, but they are still assuming. As you well know there are a few ways to obfuscate IPs . Thor and vpn come to mind. I also don't think the Health care department has had the same capacaties themselves to judge if this was a botnet from some rogue criminal element or a state actor. Therefor all this now is just conveniently making someone the bad guys and manufactoring public concent. That doesn't mean russia or china weren't responsible either, i want to point that out, too. These two are no inocent underdogs being beaten on the sidewalk.
As a software engineer, I do not see any specific information about the incident here. Anyone familiar with ip communication will tell you that if someone is trying to get access to your network, there is an ip address of the server where the requests are coming from. It may be a server based in a US cloud, but it’s not a “ghost”. If someone was trying to enumerate internal servers, then they got access to the system somehow. Whose credentials they were using? This a very unprofessional report, like a report about a ghost in town.
It doesnt sound like a ddos at all. If they were port scanning then they were mapping the network, likely the reason why they didnt completely overwhelm the network is because if they did they would not get responses from the target host and would be unable to map. It was a massive network scan, they likely ramped it up a bit at a time to ensure that they didnt take down the network or they would have lost out on their objective.
LOL You thought you overwhelmed them by turning off your system for 10 min 😂 No, I think they stopped attacking you because they already got the info, or made you perform something that they wanted. Whatever their goal was, it's clear that they were a highly intelligent group, acting 20 steps ahead of you.
This type of attack could have been done by script kiddies with a simple botnet. You can rent botnets on the dark web. They might have been more intelligent than the old bones that work for the HHS, but they probably were not that smart.
@@neanda I know of some hacks that could be a danger to people's lives that aren't patched... Those should remain a secret or people will die from an attack of some script kiddy or during the panic while evacuating as a precaution... I'm talking large scale disasters with uninhabitable landmasses as a result
This incident underscores the growing threats posed by cyberattacks to national security and public health. It is imperative for government agencies and institutions to strengthen their cybersecurity defenses and remain vigilant against evolving threats.
It's wild how the US even let this happen in the first place. The US should be on the forefront of cyber defense/offense. The US should have the ability to counter within the second and send the attacked back to the stone ages. It's ridiculous.
When work from home started, most likely many thousands (or millions) of ports were opened. The DDOS port scanning attack, most likely, wanted to see which were open, closed, and filtered. Not mentioned: are the servers of HHS connected to other government departments? That is, if you can enter an HHS server as a root user, does this give you either access or a map of other government agencies?
Considering the end result was like 10 minutes of server downtime and the pressure never increased to fully overwhelm the system, I wonder if they got a briefing or weirdly detailed review of their security measures by some agency in the US government lol.
What are the odds that among the Classified Documents filling a bathroom, were the keys to this arena of information? With cybersecurity hackers being informed and able to sidestep attempts to thwart their efforts? Is this one more reason that so many have supported the “would be dictator”, in ways that are absolutely mystifying?
How do you know that Demented Joe didn't give them to someone and doesn't have a clue he did? YOUR OWN ADMINISTRATION likely has it's fingerprints all over this if the truth were to be known. Which, trust me, main stream media will not EVER tell you.
Bad actor would have taken down the whole system. Inside job would have just deleted R&D and the earliest cases of covid from summer 2019 off the system.
This reporting is very odd. The number of technical inaccuracies here, as well as the presented theories, make this very questionable. Is something else going on here?
So they rebooted the system and it was no longer an issue. Sounds like a typical support ticket issue to me. They have no evidence what so ever and try to blame it on a third party when in fact it could just be a bug in one of the many processes running on the server(s) (CPU usage for instance) 😆
Servers cache webpages and other servers automatically. There are many servers doing that. You threw unknown IP addresses into the system and got cached individually from personnel exterior browsing and automatic searching of the gov IP's. Figures the server company contracted didn't disable or couldn't disable track and cache.
Much ado about nothing. Given nothing is really private in the USA I doubt anything of substance was achieved. The biggest problem with US healthcare is not cyberattacks from North Korea or some such but rather it's too expensive and sub-par for what you pay.
That's the problem with modern day networks and their load. Despite the million dollar infrastructures and fancy net sniffing consultants, nobody has a precise idea anymore of where, how and what kind of data is flowing through it.
Bloomberg really needed to reach out to an actual security expert for this report. haha. These guys are so wrong about what happened. If you work in tech long enough, you meet guys like the dude in the blue blazer. He has no idea what he is talking about and he's just regurgitating information from someone below him that also has no idea what they are talking about. Not a DDoS attack at all. Poor load balancing/bad router configs more likely. Oh don't forget to blame Ukraine at the end. 🤣
So a 10 minute black start fixes it? Well that sounds like their own IDPS and countermeasures were thwarting their own systems. Like friendly fire in an echo chamber.
Lol the only time turning off a network would cause errors would on the ddos ssoftware side is if who ever wrote it was a idiot and dint put in a basic error catch
So we didn't use a VPN with RSA tokens? Even private business isn't that stupid. Also how can you misidentify DDOS when the get requests are easy to see
When you have malware or viruses in your system and you reboot , those virus take control of the system. He’s like we rebooted and everything turned on fine. Smh
Or it was Google/Baidu trying to figure out what was going on. Suddenly having thousands of new external connections all being made via Chrome. NSA does have specific contracts with Google and Facebook. I feel like this can be just as easily explained by incompetence overcome with a phone call saying "STOP IT!." Congrats, we attacked ourselves.
FYI the entire Russian economy is smaller than a NYC block and keep in mind that Russia is over 17 million square miles while a nyc block is 300feet 😅😅😅
It's important to approach such comparisons with nuance and consider various factors to gain a more comprehensive understanding of the economic landscape of different regions.
Turning the servers off and on again doesn’t break DDOS software. The attacker saw the network was down and assumed they took it down and stopped mapping. Something is fishy in this reporting.
look up WEF and cyberattack
Who would want to map the HSS network just as their cov hit?
@@Sulayman.786 - who would benefit - is a better question - follow the money ...
NSA, Silicon Valley, CIA, North Korea, CCP?
A: All The Above@@drx1xym154
Yes, it was Klaus who personally hacked it. @@selvamani1973-p7b
Sorry, as a software engineer who’s dealt with DoS/DDoS attacks a number of times before, I counted at least a dozen things about this story that smell very fishy. Also, what type of attacker has a system so rudimentary that mere errors due to an unresponsive network would “overwhelm” it? That’s actually laughable.
this is bloomberg after all - they're preparing us for a false flat global cyber attack in 24 so they can shut down the internet from us - all part of their plan - will probably happen just as the stock market is about to crash! Whitney Webb documents with a lot of amazing evidence why this is very possibly going to be the case
remember the WHO had to change the definition of pandemic to be able to declare one - a lot of words and phrases were redefined around 2020 - this is totally Orwellian!!!!
They say "russia or china" had the capability. This is pointing fingers, but they are still assuming. As you well know there are a few ways to obfuscate IPs . Thor and vpn come to mind. I also don't think the Health care department has had the same capacaties themselves to judge if this was a botnet from some rogue criminal element or a state actor. Therefor all this now is just conveniently making someone the bad guys and manufactoring public concent.
That doesn't mean russia or china weren't responsible either, i want to point that out, too. These two are no inocent underdogs being beaten on the sidewalk.
@@mikewood8695irrelevant
@@mikewood8695 The Who, best band ever 😂
As a software engineer, I do not see any specific information about the incident here. Anyone familiar with ip communication will tell you that if someone is trying to get access to your network, there is an ip address of the server where the requests are coming from. It may be a server based in a US cloud, but it’s not a “ghost”. If someone was trying to enumerate internal servers, then they got access to the system somehow. Whose credentials they were using? This a very unprofessional report, like a report about a ghost in town.
It doesnt sound like a ddos at all. If they were port scanning then they were mapping the network, likely the reason why they didnt completely overwhelm the network is because if they did they would not get responses from the target host and would be unable to map. It was a massive network scan, they likely ramped it up a bit at a time to ensure that they didnt take down the network or they would have lost out on their objective.
That's what the video says.
It is vital that more whistleblowers go public with solid evidence of corporate and governmental wrongdoing.
Yes, well Snowden, Assange and others did that.
@@drx1xym154 Many more must come forward.
Scanning using ddos? overwhelming attackers by switching off targets? bs
Remember kids, if something is wrong with it: try switching in off and on again
TRUTH! The IT guy at a job I used to work at was the hero for a day for rebooting the candy machine when it stopped working
Restarting the router really helps - old Indian tech support
This video is a perfect example of how middle-managers with a CISSP cert perceive cyber attacks 😂
LOL You thought you overwhelmed them by turning off your system for 10 min 😂
No, I think they stopped attacking you because they already got the info, or made you perform something that they wanted.
Whatever their goal was, it's clear that they were a highly intelligent group, acting 20 steps ahead of you.
This type of attack could have been done by script kiddies with a simple botnet. You can rent botnets on the dark web. They might have been more intelligent than the old bones that work for the HHS, but they probably were not that smart.
There are more you haven't heard about, people would panic 😅
people wouldn't panic because they'd be stories of attacks thwarted. people feel more secure when they hear about successful operations
@@neanda I know of some hacks that could be a danger to people's lives that aren't patched... Those should remain a secret or people will die from an attack of some script kiddy or during the panic while evacuating as a precaution... I'm talking large scale disasters with uninhabitable landmasses as a result
This incident underscores the growing threats posed by cyberattacks to national security and public health. It is imperative for government agencies and institutions to strengthen their cybersecurity defenses and remain vigilant against evolving threats.
Those that fundamentally want to change our way of life are here in Washington DC.
It's wild how the US even let this happen in the first place. The US should be on the forefront of cyber defense/offense. The US should have the ability to counter within the second and send the attacked back to the stone ages. It's ridiculous.
😢the US is losing power. Has been for a very long time.
Employees using VPNs would have addressed the issue.
If you don't know where the cyberattack came from, how do you know where it came from?
When work from home started, most likely many thousands (or millions) of ports were opened. The DDOS port scanning attack, most likely, wanted to see which were open, closed, and filtered. Not mentioned: are the servers of HHS connected to other government departments? That is, if you can enter an HHS server as a root user, does this give you either access or a map of other government agencies?
On the last question, i highly doubt it.
"Re-routing" in a British accent sounds strange.
Route is a French word originally. And that’s how they pronounce it. “Rowt” à la mode américaine means something very different…
Ain’t no cyber attack I can get on UA-cam just fine
Considering the end result was like 10 minutes of server downtime and the pressure never increased to fully overwhelm the system, I wonder if they got a briefing or weirdly detailed review of their security measures by some agency in the US government lol.
So, they just switched it off and on again?
As usual..
Lol what a joke. Budget as big as entire Russian GDP but still fail to provide affordable health services to ur own people. 😅😅😅
Sounds like their computer infrastructure is terribly insecure as well.
i dont think you need to shut down everything just plug it off😂
Indeed,, 😂😂😂
What are the odds that among the Classified Documents filling a bathroom, were the keys to this arena of information? With cybersecurity hackers being informed and able to sidestep attempts to thwart their efforts?
Is this one more reason that so many have supported the “would be dictator”, in ways that are absolutely mystifying?
How do you know that Demented Joe didn't give them to someone and doesn't have a clue he did? YOUR OWN ADMINISTRATION likely has it's fingerprints all over this if the truth were to be known. Which, trust me, main stream media will not EVER tell you.
Bad actor would have taken down the whole system.
Inside job would have just deleted R&D and the earliest cases of covid from summer 2019 off the system.
This reporting is very odd. The number of technical inaccuracies here, as well as the presented theories, make this very questionable. Is something else going on here?
Well we have heard about it now
So they rebooted the system and it was no longer an issue. Sounds like a typical support ticket issue to me.
They have no evidence what so ever and try to blame it on a third party when in fact it could just be a bug in one of the many processes running on the server(s) (CPU usage for instance) 😆
How convenient that he thought Russia or China but not Israel.
Servers cache webpages and other servers automatically. There are many servers doing that. You threw unknown IP addresses into the system and got cached individually from personnel exterior browsing and automatic searching of the gov IP's. Figures the server company contracted didn't disable or couldn't disable track and cache.
Much ado about nothing. Given nothing is really private in the USA I doubt anything of substance was achieved. The biggest problem with US healthcare is not cyberattacks from North Korea or some such but rather it's too expensive and sub-par for what you pay.
nice to know turning it off and back on again is effective in so many levels of technology
That's the problem with modern day networks and their load. Despite the million dollar infrastructures and fancy net sniffing consultants, nobody has a precise idea anymore of where, how and what kind of data is flowing through it.
Add to that AI and what systems control is being automated... and who controls the AI.
Wait ... so they didn't think of using a passcode handshake type authentication while maintaining the firewall???
If the goal was to find out what the US knows about the virus and about a potential vaccine this doesn't sound particularly evil.
Bloomberg really needed to reach out to an actual security expert for this report. haha. These guys are so wrong about what happened. If you work in tech long enough, you meet guys like the dude in the blue blazer. He has no idea what he is talking about and he's just regurgitating information from someone below him that also has no idea what they are talking about. Not a DDoS attack at all. Poor load balancing/bad router configs more likely. Oh don't forget to blame Ukraine at the end. 🤣
Think about what US does to other nation states !
So a 10 minute black start fixes it? Well that sounds like their own IDPS and countermeasures were thwarting their own systems. Like friendly fire in an echo chamber.
If they can do it once why will they not do it once more?
prolly the time isnt ripe yet..
they always do it
@@neanda so what will you say the future will bring?
Because now we know how to react.
Reboot
proof of work fixes this
Lol the only time turning off a network would cause errors would on the ddos ssoftware side is if who ever wrote it was a idiot and dint put in a basic error catch
Could it have been by the people we are not allowed to name ?
And Dan bonagino tells us it will happen again
I never believe anything from Bloomberg. Especially with a CDC Covid ad. Comical 😂😂
Yea bloomberg pushes lies and propaganda for the globalists
you have no place to hide so your choice is hide like an ostrich
Who made this attack!
So we didn't use a VPN with RSA tokens? Even private business isn't that stupid. Also how can you misidentify DDOS when the get requests are easy to see
so they turned if off and on again, smh, like duh
When you have malware or viruses in your system and you reboot , those virus take control of the system. He’s like we rebooted and everything turned on fine. Smh
The people who created SARS-II wanted to find and destroy evidence of their wrongdoing.
Kozmiaka!
this is bad news
hit list
Well who has the fastest internet in the world
Bring Hindi dubbed
what if the attackers are local people?
What do you mean?
Interesting that they dont mention North Korea as well 🤔🤨
Or it was Google/Baidu trying to figure out what was going on. Suddenly having thousands of new external connections all being made via Chrome. NSA does have specific contracts with Google and Facebook. I feel like this can be just as easily explained by incompetence overcome with a phone call saying "STOP IT!." Congrats, we attacked ourselves.
Who was started Corona Game
I believe this has been de-listed.
I saw it in my feed and when I refreshed it was gone.
Interesting
Ch-I-iy-na
Wow.
Flakes minivorinki. Dis businky? Ja finisky
Just say it: "CHINA"
Well look on the bright side of it, not only is China is recession, they're on deflation. 🤣🤣
Hello Trumpanzee
FYI the entire Russian economy is smaller than a NYC block and keep in mind that Russia is over 17 million square miles while a nyc block is 300feet 😅😅😅
Wow maybe that explains why NYC internationalist bankers financed the Bolshevik revolution in Russia.
It's important to approach such comparisons with nuance and consider various factors to gain a more comprehensive understanding of the economic landscape of different regions.
1st world problems. 👨🏿💻🍿
the people will surely go down thats 100% sure especally the bogus muslims
We are in end times
NCSWIC
Q
😢😮