Categories
agenda Colonial pipleline Commodities control cyber attack dark secret destroy the middle class diesel Economy Emergency Declaration Emergency Preparedness food supply gasoline Government government is slavery Greg Mannarino Headline News hyperinflation inflation Intelwars liars no fuel own it all PayDro V power Prepare ruling class scapegoat economic States The Federal Reserve Truckers wake up

Colonial Pipeline Back Up, But It Will Take SEVERAL DAYS To Resupply

The Colonial Pipeline is back up and running. It’ll take several days to resupply those empty gas stations. But what’s here to stay are the higher prices in fuel.

The Federal Reserve has been hiding the inflation in the energy sector and this was either a planned event or very convenient for the ruling class. This agenda is in full force, and Greg Mannarino calls it “scapegoat economics” because we are not allowed to know that this is by design and done by the government to grab control and exhibit power over people.

Greg Mannarino: “Scapegoat Economics” & The Dark Secret We Are NOT Supposed To Know

The gasoline shortages, due to this convenient cyber attack on the pipeline, have hit the American south the hardest. States such as North Carolina, Virginia, and Florida have each issued emergency declarations this week as more than 1,000 gas stations in several states ran dry. As of Wednesday afternoon, 65% of gas stations in North Carolina were without fuel, as well as a staggering 78% in the state’s Greenville/Spartanburg/Asheville/Anderson metro area, according to GasBuddy, an app that helps motorists find good deals at the pump. The same was true for 44% of stations in Virginia, and 43% in South Carolina, while the national average for a gallon of gasoline exceeded $3 for the first time since 2014, according to a report by RT. 

Many people are figuring out that all of this is part of the overall agenda. As PayDro V, a YouTube creator says, “there are no coincidences.” Unless you take the vaccine and die, of course…

This pipeline shutdown could be just the beginning.  We warned that this was convenient and ticked off several boxes for the agenda.  Is it a false flag? That’s up to you to decide, because we know the rulers and their puppets in the media will not be telling us.  We have to figure this stuff out for ourselves.

Who’s To Blame For The Pipeline Being Down? Russia, Of Course

On that note, it does look like some people are figuring it out, but still, many more are fast asleep to what their future entails.

As always, stay alert and remain prepared. It is difficult to say what will happen next and just how bad things will get. Those who desire ultimate control and the permanent enslavement of humanity have not given up and we should not expect them to. It seems like it has only just begun.

The post Colonial Pipeline Back Up, But It Will Take SEVERAL DAYS To Resupply first appeared on SHTF Plan – When It Hits The Fan, Don’t Say We Didn’t Warn You.

Share
Categories
agenda Colonial pipleline Commodities control cyber attack dark secret destroy the middle class diesel Economy Emergency Declaration Emergency Preparedness food supply gasoline Government government is slavery Greg Mannarino Headline News hyperinflation inflation Intelwars liars no fuel own it all PayDro V power Prepare ruling class scapegoat economic States The Federal Reserve Truckers wake up

Colonial Pipeline Back Up, But It Will Take SEVERAL DAYS To Resupply

The Colonial Pipeline is back up and running. It’ll take several days to resupply those empty gas stations. But what’s here to stay are the higher prices in fuel.

The Federal Reserve has been hiding the inflation in the energy sector and this was either a planned event or very convenient for the ruling class. This agenda is in full force, and Greg Mannarino calls it “scapegoat economics” because we are not allowed to know that this is by design and done by the government to grab control and exhibit power over people.

Greg Mannarino: “Scapegoat Economics” & The Dark Secret We Are NOT Supposed To Know

The gasoline shortages, due to this convenient cyber attack on the pipeline, have hit the American south the hardest. States such as North Carolina, Virginia, and Florida have each issued emergency declarations this week as more than 1,000 gas stations in several states ran dry. As of Wednesday afternoon, 65% of gas stations in North Carolina were without fuel, as well as a staggering 78% in the state’s Greenville/Spartanburg/Asheville/Anderson metro area, according to GasBuddy, an app that helps motorists find good deals at the pump. The same was true for 44% of stations in Virginia, and 43% in South Carolina, while the national average for a gallon of gasoline exceeded $3 for the first time since 2014, according to a report by RT. 

Many people are figuring out that all of this is part of the overall agenda. As PayDro V, a YouTube creator says, “there are no coincidences.” Unless you take the vaccine and die, of course…

This pipeline shutdown could be just the beginning.  We warned that this was convenient and ticked off several boxes for the agenda.  Is it a false flag? That’s up to you to decide, because we know the rulers and their puppets in the media will not be telling us.  We have to figure this stuff out for ourselves.

Who’s To Blame For The Pipeline Being Down? Russia, Of Course

On that note, it does look like some people are figuring it out, but still, many more are fast asleep to what their future entails.

As always, stay alert and remain prepared. It is difficult to say what will happen next and just how bad things will get. Those who desire ultimate control and the permanent enslavement of humanity have not given up and we should not expect them to. It seems like it has only just begun.

The post Colonial Pipeline Back Up, But It Will Take SEVERAL DAYS To Resupply first appeared on SHTF Plan – When It Hits The Fan, Don’t Say We Didn’t Warn You.

Share
Categories
cyber attack Cyber Security Department of Justice Intelligence Community Intelwars Russia Russian hackers Solarwinds orion cyber attack

DOJ email accounts compromised in SolarWinds hack attributed to Russians

The Department of Justice on Wednesday disclosed that its computer systems were among those compromised by a massive cybersecurity breach of government networks that U.S. officials attribute to Russia.

According to the Associated Press, the DOJ said that 3% of its Microsoft Office 365 email accounts were potentially hacked. The DOJ does not believe that classified systems were breached but would not say to whom the email accounts belonged.

“On Dec. 24, 2020, the Department of Justice’s Office of the Chief Information Officer (OCIO) learned of previously unknown malicious activity linked to the global SolarWinds incident that has affected multiple federal agencies and technology contractors, among others. This activity involved access to the Department’s Microsoft O365 email environment,” the DOJ said in a statement.

“After learning of the malicious activity, the OCIO eliminated the identified method by which the actor was accessing the O365 email environment. At this point, the number of potentially accessed O365 mailboxes appears limited to around 3-percent and we have no indication that any classified systems were impacted,” the statement continued.

“As part of the ongoing technical analysis, the Department has determined that the activity constitutes a major incident under the Federal Information Security Modernization Act, and is taking the steps consistent with that determination. The Department will continue to notify the appropriate federal agencies, Congress, and the public as warranted,” the DOJ said.

On Tuesday, United States intelligence agencies formally accused the Russian government of orchestrating the cyberattack on software manufactured by IT company SolarWinds. The massive breach of government networks was discovered by the company last month and is estimated to have affected some 18,000 SolarWinds customers and an as yet unknown number of federal government agencies, including the DOJ, U.S. Treasury, and the Department of Commerce. Other agencies including the Department of Homeland Security, the Department of Defense, and the Energy Department’s National Nuclear Security Administration have also confirmed they were affected by the attack.

A joint statement from the FBI, the Office of the Director of National Intelligence (ODNI), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) blamed Russia for the attack. The Hill reported these agencies had set up a cyber unified coordination group in December to investigate the extent of the SolarWinds hack.

“This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks,” the agencies said.

Share
Categories
cyber attack dominion voting systems Intelwars Michigan election SolarWinds Solarwinds orion cyber attack Voter fraud allegations

Michigan says elections department does not use compromised SolarWinds Orion software

As multiple U.S. federal agencies report breaches by hackers who used a compromised software manufactured by IT company SolarWinds to infiltrate government computer networks, the state of Michigan says that so far there is “no indication” that the state network was affected.

Michigan, a key battleground state in the 2020 presidential election, has been the focus of multiple allegations of voter fraud and election irregularities made by lawyers for President Donald Trump’s campaign and others. When reports emerged earlier this week that a “highly-sophisticated, targeted and manual supply chain attack by a nation state” compromised SolarWinds’ Orion suite of network management software, rampant speculation immediately began as to whether the cyberattack somehow influenced the 2020 U.S. presidential election in Michigan and elsewhere.

SolarWinds services multiple government clients in addition to private sector customers with its software. Rumors initially swirled that Dominion Voting Systems, the voting machine manufacturer at the center of allegations of election tampering made by President Donald Trump and his allies, used SolarWinds products and questions were raised about whether voting machines were hacked before the election.

Reporting by the Wall Street Journal’s Alexa Corse and others clarified that while Dominion does in fact use SolarWinds Serv-U product, the company does not use the compromised Orion product line. Following these reports, independent journalist Kyle Becker obtained a copy of a document from the state of Michigan’s Department of Technology, Management, and Budget (DTMB) that said the state of Michigan used SolarWinds Orion products.

Caleb Buhs, a spokesman for the DTMB confirmed to TheBlaze that Michigan uses SolarWinds Orion IT tools and that the state is investigating whether its networks were compromised in the cyberattack, as the Cybersecurity and Infrastructure Agency (CISA) recommended.

“Upon notification of the SolarWinds – Orion compromise, the state of Michigan started a forensic investigation of the state network in accordance with the recommended steps outlined by the U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA),” Buhs told TheBlaze.

“To date, there is no indication that the SolarWinds – Orion compromise was activated within the state network,” he said.

“To protect the state environment, DTMB continues to monitor the environment and will follow any additional steps that may be recommended by CISA as more information is released,” Buhs added.

The spokesman also said that the Michigan Department of State, Bureau of Elections systems do not use the SolarWinds Orion software.

Multiple federal agencies, including the U.S. Treasury and Commerce Departments and the Department of Energy and National Nuclear Security Administration have reported breaches in what officials say was a widespread cyberattack suspected to be conducted by foreign actors.

Cybersecurity firm FireEye in a blog post stated that hackers gained access to numerous public and private organizations through trojanized updates to SolarWinds’ Orion software. According to cybersecurity reporter Brian Krebs, the cyberattack could have affected as many as 18,000 SolarWinds customers.

The full extent of the cybersecurity compromise could remain unknown for some time as federal and state authorities conduct their investigations.

Share
Categories
cyber attack Department Of Commerce Department of the Treasury dominion voting systems Intelwars Russian hackers Solarwinds orion platform

Dominion Voting Systems denies using SolarWinds Orion software, which was compromised by foreign hackers

On Sunday, IT company SolarWinds
reported that one of its network managing products was compromised in a “highly-sophisticated, targeted and manual supply chain attack by a nation state.” Further reporting from Reuters revealed that hackers believed to be working for Russia have been monitoring communications at the U.S. Treasury and Commerce Departments, two government agencies that use SolarWinds’ Orion suite of network managing software.

Also, the Cybersecurity and Infrastructure Agency (CISA) issued an emergency directive calling on all federal civilian agencies to review their networks for indicators of compromise and shut down all SolarWinds Orion products immediately.

As this story developed, rumors began spreading that Dominion Voting Systems, the voting machine manufacturer assailed by
allegations of election tampering made by President Donald Trump and his allies, uses SolarWinds software and may have been compromised in the same cyberattack that targeted federal agencies.

Those rumors are unproven and Dominion Voting Systems has made a public statement claiming it has never used the compromised SolarWinds Orion Platform.

What happened?

SolarWinds is a software developer that helps businesses manage their networks, systems, and technology infrastructure. The company also serves government agencies in the executive branch, the military, and intelligence services, according to Reuters.

On Sunday, the company issued a
security advisory announcing that March and June 2020 updates to its Orion Platform software had been compromised by a targeted attack from a foreign government.

“We are aware of a potential vulnerability which if present is currently believed to be related to updates which were released between March and June 2020 to our Orion monitoring products,” SolarWinds President and CEO Kevin Thompson said in an email statement. “We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state.”

U.S. government officials reportedly believe Russia is behind the hacking attack, which according to Reuters was so serious that the National Security Council met at the White House to discuss the matter. Publicly, the government has only confirmed that the Treasury and Commerce Departments were breached and has not yet officially blamed Russia.

Sources that spoke to Reuters said Russian hackers infiltrated SolarWinds’ Orion platform and through it were able to monitor internal email traffic at the compromised federal agencies.

The Russian foreign ministry
on social media accused the U.S. media of making unfounded allegations blaming Russia for cyberattacks on U.S. agencies.

Following reports of the compromised systems, CISA issued an
emergency directive ordering federal agencies that use SolarWinds Orion products to immediately disconnect or power down computers with that software installed.

“Treat all hosts monitored by the SolarWinds Orion monitoring software as compromised by threat actors and assume that further persistence mechanisms have been deployed,” CISA advised.

CISA Acting Director Brandon Wales also encouraged businesses in the private sector that use the Orion platform to asses their network security.

“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” explained Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners — in the public and private sectors — to assess their exposure to this compromise and to secure their networks against any exploitation.”

SolarWinds’ website proudly proclaims that the company services most of America’s Fortune 500 companies, the top 10 U.S. telecommunications providers, all five branches of the U.S. military, the State Department, the National Security Agency, and the Office of President of the United States, Reuters reports.

The discovery of the attack on SolarWinds’ Orion products came just days after the
cybersecurity firm FireEye announced it had been the target of a cyberattack. In fact, FireEye stumbled across the compromised SolarWinds while investigating the attack on its own firm.

“There will unfortunately be more victims that have to come forward in the coming weeks and months,” said Charles Carmakal, senior vice president and chief technical officer at Mandiant, FireEye’s incident response arm.

U.S. officials speaking to Reuters anonymously also indicated that cyberattack may be much bigger than currently known.

“This is a much bigger story than one single agency,” said one of Reuters’ sources. “This is a huge cyber espionage campaign targeting the U.S. government and its interests.”

The Dominion Voting Systems rumors

Shortly after the news of the hacking attack on SolarWinds’ Orion Platform broke, claims that Dominion Voting Systems used SolarWinds products and had not yet powered down those products began circulating on social media.

Ron Watkins, a former administrator on the message board website 8chan, shared a screenshot of a mobile login portal purportedly belonging to Dominion Voting Systems that appears to run on SolarWinds software.

While the screenshot, which shows a still active page, indicates that Dominion did use some SolarWinds product, it was not clear whether Dominion used the Orion product, which was the specific SolarWinds software that was compromised.

Journalist Kim Zetter highlighted a threat on Twitter that explains Dominion does in fact use a SolarWinds product, but it’s a different product from the compromised Orion software.

In a statement
made to the Daily Dot, Dominion said that it has never used the Orion software that hackers maliciously tampered with to gain access to federal agencies.

“Dominion Voting Systems does not now — nor has it ever — used the SolarWinds Orion Platform, which was subject of the DHS emergency directive dated December 12, 2020,” a spokesperson for Dominion said.

TheBlaze reached out to Dominion Voting Systems for additional comment but the company did not respond.

Share