Video & Audio: Loving Life: Jans personal discussions with President PW Botha
In 2006 as a result of my book, Government by Deception and my website AfricanCrisis, I made contact with former President PW Botha. He was very nice to me and he began phoning me. I published articles of things he told me about. He was so impressed with my accuracy when I wrote on my website what he told me, that he later invited me to stay at his house for 5 days. In this interview, I discuss some of the things that PW Botha and I discussed, and what he told me.
[Israel is operating in Iranian territory and Israel is killing people inside Iran. So it's nice to see the Iranians finding ways of hitting back at Israel. Jan]
According to Israeli cyber security company Check Point, the ransom payments were traced to an Iranian bitcoin site available only to Iranian citizens.
(November 15, 2020 / Israel Hayom) Iranian hackers were behind the Pay2Key ransomware attack on dozens of Israeli companies last week, according to the Israeli cyber security firm Check Point, which worked with the Israeli blockchain intelligence firm Whitestream to discover the source of the attack.
From each of the companies that fell prey to the attack, the hackers demanded payment of seven to nine bitcoins, worth some NIS 375,000-NIS 475,000 shekels ($111,000-$141,000).
Check Point reported that after four of the firms decided to pay the ransom to release their data, it tracked the bitcoin transactions carried out by the hackers and identified them as Iranian.
The tracing process began with the addresses of the bitcoin wallets to which the victims were instructed to send their ransom payments. Eventually, the transactions wound up in wallets belonging to Excoino, an Iranian entity that supplies secure business services in cryptocurrency.
Excoino only works with Iranian citizens. To sign up for the service, a potential user must have a valid Iranian phone number as well as an Iranian identity number. The service also demands a copy of the account holder’s ID, as well, all of which led Check Point to the conclusion that the hackers were Iranians.
Check Point explained that this latest attack used the “double extortion” method on its victims, a new development in ransomware attacks. In the double extortion model, hackers not only encode a company’s data, blocking access to it, they also threaten to steal data and leak it if their demands for payment are not met.
To show what can happen when companies do not comply with their demands, the operators of the Pay2Key scam created a dedicated website on which they post content stolen from companies who refused to pay them. These include three Israeli companies.
This article first appeared in Israel Hayom.
AfricanCrisis Archive - 110,000 Articles from 2001 to 2012
This is my archive of my oldest articles, writings and news from my original website which ran from 2001 to 2012. In total, I managed to recover 110,000 articles. You can read them, search them and view them at this link. Just click SEARCH on the top right.