Thursday, March 13, 2014

The Cyberworms Multiply, Awaiting Instructions

Share this ARTICLE with your colleagues on LinkedIn .





The cyberworms (quiet, subtle creatures [remember Conficker?] which have infiltrated and infected more than an estimated 80% of the information and communications equipment in the industrialized world, and which continue to multiply through various spreading and contact vectors) are lying in wait for instructions from their programmer-masters, who will awaken them at some point within the near future and give them orders to act. We are, for the most part helpless to stop sophisticated, constantly evolving worms [they have very mutational and adaptive intelligence programmed into their code -- their DNA, so to speak], which act like remote-controlled robots which can be instructed to commandeer their hosts at any time.

A quick refresher from Wikipedia:

The first variant of Conficker, discovered in early November 2008, propagated through the Internet by exploiting a vulnerability in a network service (MS08-067) on Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 Beta.[14] While Windows 7 may have been affected by this vulnerability, the Windows 7 Beta was not publicly available until January 2009. Although Microsoft released an emergency out-of-band patch on October 23, 2008 to close the vulnerability,[15] a large number of Windows PCs (estimated at 30%) remained unpatched as late as January 2009.[16] A second variant of the virus, discovered in December 2008, added the ability to propagate over LANs through removable media and network shares.[17] Researchers believe that these were decisive factors in allowing the virus to propagate quickly.

The Global Futurist Blog (sometimes spoken of at http://DouglasECastle.com) has reason to believe (the prediction mechanism here is an amalgam of long wave theory, catastrophic event timing, and a bit of astrology and prophesy) believes that these worms will be instructed to rain mayhem over all of their host users. Further, I believe that Bill Gates and Microsoft are creeping rapidly out of supporting their invaded hardware and software due to their sharing this vision. I believe a massive attack of catastrophic proportions will be undertaken between either in 2015 or 2016.

Sadly, most virus and malware removal tools are not sophisticated enough to detect the infection, or to isolate and neutralize it, were it to be found. Many government, security and utilities systems are supposedly closed -- such that the mini-net is sealed off from outside communications. Again, I believe that there are insidious ways (employees bringing work home, or accessing closed systems from outside) that these safety measures can be easily compromised.

I cannot predict the nature of the event, but it is likely to be coordinated by giving either all or large caches of these cyberterrorbots instructions in coordinated fashion. Rest assured that it will be catastrophic, and will involve a vast show of power over established authority.

We'll keep you posted.

Douglas E. Castle 
THE GLOBAL FUTURIST BLOG

---------------
Click For Douglas E. Castle's Professional Site
Click For Douglas E. Castle's Other Sites
---------------






View DOUGLAS E. CASTLE's profile on LinkedIn


Share this page
Contact Douglas Castle
Follow Me on Pinterest



View DOUGLAS E. CASTLE's profile on LinkedIn

WebCrawler - Scrub The Entire Web For Everything About Future Prediction




 














Scoop.it

No comments:

Post a Comment

Blog Archive

Bookmark and Share