Thanks for watching, we hope you enjoyed it. Do you think there's a file like this hiding in modern networks today, or have we finally caught up? Join our weekly newsletter for the latest in tech and infosec: cnews.link/cybernews-newsletter/uVPoq1Svz7g/
Worth pointing out that using unclassified USBs or privately-sourced USBs on SIPRNET was always against the rules, and connecting a SIPRNET system to the regular Internet is basically ultra-illegal, so the only way this little guy could get on or off SIPRNET was if people were ignoring the rules. Make all the new rules and regs you want: the weak point is always the meat.
Computers can't make mistakes. They do exactly what was asked of them. Any time a computer system gets compromised, the source of the error was a human somewhere along the line.
If the system relies on thousands of people all knowing every single rule and obey them no matter what, then that's not a very secure system to begin with. Take driving for instance, 40,000 Americans die every year on the roads and over a million is injured, all because of people not obeying the rules. Humans make mistakes, humans are unpredictable and stupid, computers ain't, they do exactly what they're programmed to do. The right solution is therefore to design a system that is idiot proof. Or the "least privilege principle" as a fundamental design philosophy when a system is created.
Bingo. I was saying the same thing... "and now he's broken a few hundred laws..." Just bringing a USB stick into a secured network is a violation. Depending on the age of the rule book, the systems shouldn't even have USB ports.
SIPR is it’s own network along with NIPR and JWICS. Three totally independent networks. While NIPR is unclassified and commonly used by govt officials and contractors alike SIPR and JWICS are highly regulated and strictly controlled as to who has access to those networks. Maybe back in the day you could have easily gotten away with plugging in a thumb drive with no one really batting an eye but now it is strictly controlled to who has access to those networks. Most of them are only in SCIF’s which has its limits on who can enter. With everything said nothing is 100% secure. Security is always layers ,but anyone with enough means, dedication, and time can get access.
@Ex1st4nt 90% of the most serious malware originates in Israel. I guess if that hurt your feelings, it's lucky i didn't mention Metzitzah B'Peh and Mishnah Niddah 5:4 👀
As an IT professional, I already know that people cannot be trusted. You have to assume at least 10% of them are going to do something stupid and not obey the rules or regulations.
At a computer software place I worked at a moron opened a zip file that was spam, and infected us. I figure this should be done in the interview. Maybe they send you a zip and see if you open it while you are settling up your interview process
Do you know how many IT professionals there are in this day and age? A hundred million, Youre not special. Stop declaring your not so special title on every video or forum thread
The drama with this whole saga isn't that Agent.BTZ is "The Most Mysterious File On The Internet", but that the Pentagon managed to turn a pretty run-of-the-mill USB worm for the era into a full-blown national security crisis. And honestly, that's even funnier and scarier than any spooky mystery stuff.
Yeah I was about to say this is a pretty typical trojan, but also the DoD retelling is a bit over dramatized considering the stager wasn't even able to reach the public internet, a function needed to actually execute malicious code
Information of these critical cybersecurity incidents and wars is becoming more important to us each passing day. Thank you and your team for making this information more accessible for all.
I said nothing about AI, @sad10promo. Respect should be paid to those who put in the time, learned the craft, and offer their work to others - especially when it's offered freely.
I actually installed these internet cafes out there for a couple years. We eventually ended up using an image server that would reboot the PCs to original image state after each use. Troops were completely clueless on cyber security. Troops plugging their personal USBs into military and secure devices was out of control.
One of the wildest things I have heard was how top secret training bases were found by kids on the Internet because the troops were using Apple fit bit and watches. Military moves slowly sometimes. Big ship to turn.
@maramclaine830 It was Strava and Fitbit that had some kind of sharing-by-default on, if I recall correctly (not that Apple hasn't had their own issues, too, just Strava was a problem in sizable numbers)
@maramclaine830 It was the Strava running heatmaps. Strava is an app that tracks walking and jogging, and they compiled all the information into a single heatmap that showed popular routes. Someone found unexpected lines in the middle of Syria, Afghanistan, heck there was even one at Groom Lake.
@OgamiClan cannot confirm. after deletion it also downloaded more ram for me. more space in the computer = more space to install things. that's logical man.
Once you realize a lot of people even in cyber security even at high levels, don’t really understand how a computer works and are there to collect a paycheck and follow a trouble shooting checklist. It becomes clear just how easy it is for a well seasoned hacker to just go wild.
So much cybersecurity is pointless shit someone made up years ago to sound relevant. Like why do we call it a type 1 and type 2 biometric failure? Why not say false positive and false negative? I dunno but I'll bet it was some some academic or NSA guy fluffing up a paper, finding ways to become 'experts'.
@ZuckEnabler While it doesn't negate the overall point, the terminology for type 1 and type 2 errors comes from the field of statistics and was established in the early 30s. Basically, a paper said "here are the two types of errors that can happen when testing a null hypothesis," and the terms came from the order they were listed in.
thats exactly what i was thinking haha ! Cause the nsa has access to every cpu out there but can't find the og server ? bffr it's not like russia is the only country that could benefit from a worm infecting 90% of all computers on earth and feeding info milliseconds after finding an internet connection
I mean, it's nothing new. The British used to fund pirates in China so they could send more naval ships in as defense. All in the name of defending their economy and totally not to subvert the Chinese government and slowly rip away their coastal access.
Government, having a rare good idea: "we are allocating funds towards defense against malware" NSA: "okay, we will use this for offense and developing methods of mass surveillance" That pretty much sums up all three letter agencies.
What,you think they’re bad/evil and need defunded? They give no fu@ks about what you or I are doing bro. Trust me. They aren’t watching us do absolutely nothing. Literally nothing. Let it go man. The US is on the right side. Not perfect but it’s a complex world out there and takes complex decisions to navigate
Right? I'd turned that shit off pretty much SOP on any of my personal devices. I remember burning those little mini cd's and having my girlfriend write "Spring Break Pics
@stop7556That's what happens when they use AI to generate their content. They never think to proofread the script before they upload. I had wondered if this was AI generated, and that about seals the deal. If they can botch Kabul, who knows what else is.
Hey, you're absolutely right. Believe it or not, that's exactly what happens when you have a team of meat-based humans (and no AI) staring at a script for too long. Absolute brain-fart on our end. We're aware that Kabul is in Afghanistan as the entire video premise is built on that, and it's not going to happen again. Thanks for calling us out!
1 word. TikTok. The Chinese spyware got millions and millions of soldiers GPS location every 15 seconds for a decade. They got their photos (and metadata). Lifelong metadata tracking their locations throughout a lot of their lives. Their biometric face data. The Chinese said that all the data was destroyed or given to the new american owners of tiktok. If you believe they did not backup that data I got a castle to sell you
And open Claw on the Internet I’m having a panic attack right now. Do these people not realize what’s going on? I feel like if they’re like 200 years behind and they’re thinking like caveman.
In reality on screen you would probably not see anything at all. the firmware probably just exploits a memory execution vulnerability in the kernel, embedding it's processing bits into the kernels running memory as a low level process with system level access. After that it just continues mounting normally like any normal flash drive would, user unbeknownst.
Love the tone of this video. It’s slow-paced enough that the viewer can absorb the information and not feel overwhelmed and the concepts are explained in a clear and didactic manner without making one feel like an idiot. A very delicate balance to strike, especially when it comes to such technical topics that tend to make people want to run in the other direction. Well done!
The first thing I would have done is to set up a sandbox system with the worm and determine what server it was trying to connect to. If you can't identify where the payload is going, you haven't done much. I would think the NSA would have better resources than I do. What they did doesn't make sense.
These are the specific things that made me drop many conspiracy theories over time. I'm sure there are some "hidden" groups steering society in some ways, but most of the time even governments relying on single skilled individuals on certain topics... They are as riddled with problems as any other workplace.
No because there are things that need to use USB’s . Example keyboards and mice . A decent antivirus will know the difference between a storage device and other but that is not 100% accurate
@nicholasbridge829it’s not just keyboards and mice . Think about how many peripherals run on USB. Just because you log out USB storage devices via group policy or AV , it’s not 100%
@nicholasbridge829 they're slowly coming around to this line of thinking. Militaries are big places, parts of them are more secure than others. I imagine there are already military facilities that have removed access to USB ports and started to move towards more restricted hardware.
Linux and Unix are not immune to this type of thing. The only reason windows is targeted so heavily is that it has the biggest market share so the chance of compromise is much higher .
Intelligence failures like this and 9/11 teach us that as smart or as well resourced as the US government is, it still manages to repeatedly fumble the ball due to small minded bureaucrats.
The Israeli E-Team posed as art students to gain access to sensitive facilities (including unlabeled FBI offices lol). What kind of art project needs BB18 detonation cord? The one at the Twin Towers, apparently 🤭🤭
Even 17 years ago (2010) USB-use in a restricted area was prohibited, except for select personnel. Proper security protocol disallowed use of external drives for office use, both physically, OS and network.
@dvsur either it is known in the hacker circles, very likely. every job has their ins and outs. or the author of the comment suggests to know more than most ppl, is he the author of that worm? maybe, very unlikely. :) still, a fun thing to consider.
There is one country, who in their paranoia and megalomania, continuesly infiltrate their own allies. They are in the absolute forefront of cyber warfare, surveillance and hacking. They are never mentioned by these allied leaders, as they are often put in a position of gratitude or threat of exposure. This singular country has one of the worlds most sophisticated apparatuses. They know everything, but mysteriously they miss giant preparations of attacks, they are suddenly surprised by new terrorist cells appearing. They have been caught with their fingers in false flag operations so many times it is extremely hard to keep track of it. And yet far more more of their operations have been successful. They are still allowed to keep doing their nefarious deeds, killing literal millions of people.
I can totally see how the theory that perhaps a soldier purchased a USB thumbstick from a vendor in Iraq could be an entry vector. Back in 2005, I was deployed to Camp Fallujah, Iraq as a logistics analyst. I purchased a USB thumbdrive, but I purchased it from the actual Camp Fallujah PX.. how secure is that logistics chain? I'd be that it isn't so secure that a bad actor couldn't insert infected usb thumbdrives into the chain. Another thing I just though of was that bootleg DVD vendors were VERY common around and even on military bases in Iraq (and probably Afghanistan?) back then. You could buy a bootleg set of The Wire or whatever for a few bucks from the vendor outside the DFAC (dining facility). DVDs can also have autorun features, so all it might take is someone putting the wrong DVD into a SIPRNET connected computer and bam, infected.
@lumikarhu Narrator mentioned they needed to stop the virus from calling HOME. Unless it used an IP to call home, it likely used a domain. And they needed to route it to their IPs... So, edit the internal DNS server to point to a "fake" c2c server
@irmofs i wouldnt doubt it using an ip, which is why i love the idea of creating a specific way to fake ip addresses in a lan to emulate the home server.
as long as you have physical access to a machine or its drives, you can do whatever your creative mind is capable of and fake being anything you want to fake.
Considering I was in Afghanistan in the early 2000s in digital forensics for the military I’ll check some of my old equipment to see if anything is still infected 😵💫
A soldier in Kabul rings a doorbell at a place where there's a line to use a computer. He sits down at the computer and enters his password and login on an unknown computer in Kabul, in an unknown apartment, among unknown people. After working with his email, the soldier takes the flash drive and turns off the computer. Either the soldier was last in line at this computer. Or the soldier decided that after him, no one else needed the computer. This introduction alone suggests that the story is complete nonsense, the narrator of which didn't bother to make it plausible.
It was right around the time that this happened that Verizon Wireless told all of its employees to stop using personal USB devices and if we needed a drive that they had an encrypted one they’d send. Now I’m wondering if the timing is because of what happened in this story.
you'd think these morons in government, especially national security and military, wouldn't use standard public devices/ports.. rather custom proprietary things.. like "USB" drives but with a different sized connector and different pin layout, then moronic employees can't go sticking it in their civilian device, or worse, public computers. Sure it could still be hacked or whatever if someone got their hands on it the same as any usb device, but this is more just to prevent moronic employees/contractors or military personel from casually breaking isolation/security protocols, forcing them to only use government/military devices as their propreity usb device only fits in those secured devices, rather than risk them being able to use on unsecured public devices. Also the protection goes both ways, as the government/military computer only has those custom ports, so a standard civilian usb key or whatever device can't plug in.
Pretty expensive solution for the basic SIPRNet computers. SIPR is one step above a basic computer with internet access. Everyone in the military has access to it. It's not a super secret network or anything. It's much easier to log anything that's not whitelisted that's plugged in. Trust me, they know who you are and when you plug something in. 2008 was just a different time also, still using win xp since 7 wasn't out yet.
I don’t think we can Come To any conclusions based off similar code after 6 years. It could be that the Russians who made the snake malware learned from this 2008’incident
I believe that among thieves, that might be a sort of transgression because the whole thing of becoming a honored hacker is writing your own code. the piggy backers are the script kiddies, the real hackers, and what they pat themselves on the back for is the fact that they can write their own pieces of Malware. That’s how you earn badges in that world
Honestly I don't get how the early 2000s wasn't just virus-filled to the brim, so many more security vulnerabilities existed then lol. Edit: turns out I was wrong my bad everyone
They were definitely around. It wasnt reported on AS much before it became openly used by nation state actors. Additionally the older malware tended to be more in your face and destructive. Now a days a lot of malware has a huge focus on stealth.
It was, we just didn’t put all our personal information online so it didn’t really matter, and there was not really much to be gained other than doing it for the love of the game
If you had a thumb drive that went onto the sipr or anything work related, it was covered with red stickers saying “secret”. If that idiot was plugging thumb drives in anywhere all Willy nilly, he was an absolute moron who shouldn’t have a clearance.
Thanks for watching, we hope you enjoyed it. Do you think there's a file like this hiding in modern networks today, or have we finally caught up?
Join our weekly newsletter for the latest in tech and infosec: cnews.link/cybernews-newsletter/uVPoq1Svz7g/
How did you comment 3h ago if the video was made 30 mins ago
@DonutSMPThomas24Laine time travel?
@a_a_a_a_a_a_a_aaaaaaaaunlisted video that he listed public, that's how.
Kabul is in Iraq?
@DonutSMPThomas24Laine when videos are edited in post then re-uploaded it displays the new upload date but keeps the comments and likes
Don't push your stick into public holes without protection, dudes!
I absolutley love the sprites representing the viruses.
They are supercool :)
Worth pointing out that using unclassified USBs or privately-sourced USBs on SIPRNET was always against the rules, and connecting a SIPRNET system to the regular Internet is basically ultra-illegal, so the only way this little guy could get on or off SIPRNET was if people were ignoring the rules. Make all the new rules and regs you want: the weak point is always the meat.
Always
Computers can't make mistakes. They do exactly what was asked of them. Any time a computer system gets compromised, the source of the error was a human somewhere along the line.
If the system relies on thousands of people all knowing every single rule and obey them no matter what, then that's not a very secure system to begin with. Take driving for instance, 40,000 Americans die every year on the roads and over a million is injured, all because of people not obeying the rules. Humans make mistakes, humans are unpredictable and stupid, computers ain't, they do exactly what they're programmed to do. The right solution is therefore to design a system that is idiot proof. Or the "least privilege principle" as a fundamental design philosophy when a system is created.
Bingo. I was saying the same thing... "and now he's broken a few hundred laws..." Just bringing a USB stick into a secured network is a violation. Depending on the age of the rule book, the systems shouldn't even have USB ports.
SIPR is it’s own network along with NIPR and JWICS. Three totally independent networks. While NIPR is unclassified and commonly used by govt officials and contractors alike SIPR and JWICS are highly regulated and strictly controlled as to who has access to those networks. Maybe back in the day you could have easily gotten away with plugging in a thumb drive with no one really batting an eye but now it is strictly controlled to who has access to those networks. Most of them are only in SCIF’s which has its limits on who can enter. With everything said nothing is 100% secure. Security is always layers ,but anyone with enough means, dedication, and time can get access.
Undoubtedly the worm had a tiny hat on it's head.
u mean he had a WORMHAT?
🙄
@Ex1st4nt 90% of the most serious malware originates in Israel.
I guess if that hurt your feelings, it's lucky i didn't mention Metzitzah B'Peh and Mishnah Niddah 5:4 👀
*its. No apostrophe.
Probably
As an IT professional, I already know that people cannot be trusted. You have to assume at least 10% of them are going to do something stupid and not obey the rules or regulations.
Meatware
At a computer software place I worked at a moron opened a zip file that was spam, and infected us. I figure this should be done in the interview. Maybe they send you a zip and see if you open it while you are settling up your interview process
Do you know how many IT professionals there are in this day and age? A hundred million, Youre not special. Stop declaring your not so special title on every video or forum thread
Only 10%? I thought it would be to assume atleast 50%!
More like 60% bc at least 50 are fake people made by adversaries. Tech support isnt it professional and more than 10% are socially engineering you
00:30 they forgot to add the part where he quickly opened osrs and started AFKing as soon as he sat down 😂
The soldier should have selected eject drive safely before removing the usb 😂
Recall the "soldier" story is only an proposed idea.
@rabokarabekian409 it was a joke
Coulda stopped a big mess😂
Haha my first thought too. He just... _unplugged_ it!?! 😮
@rabokarabekian409 have you ever heard of a joke
The drama with this whole saga isn't that Agent.BTZ is "The Most Mysterious File On The Internet", but that the Pentagon managed to turn a pretty run-of-the-mill USB worm for the era into a full-blown national security crisis.
And honestly, that's even funnier and scarier than any spooky mystery stuff.
This ... And hardly any one knows
Yeah I was about to say this is a pretty typical trojan, but also the DoD retelling is a bit over dramatized considering the stager wasn't even able to reach the public internet, a function needed to actually execute malicious code
People will always be more scary than ghosts or beasts.
Information of these critical cybersecurity incidents and wars is becoming more important to us each passing day.
Thank you and your team for making this information more accessible for all.
Literally just need a 4090 or a 5090, a decent LLM. Then have the LLM watch the video, and it could make something awfully similar.
I said nothing about AI, @sad10promo. Respect should be paid to those who put in the time, learned the craft, and offer their work to others - especially when it's offered freely.
@sad10promowhat’s a 4090
@sad10promo ok?
👍
I actually installed these internet cafes out there for a couple years. We eventually ended up using an image server that would reboot the PCs to original image state after each use. Troops were completely clueless on cyber security. Troops plugging their personal USBs into military and secure devices was out of control.
One of the wildest things I have heard was how top secret training bases were found by kids on the Internet because the troops were using Apple fit bit and watches. Military moves slowly sometimes. Big ship to turn.
@maramclaine830
It was Strava and Fitbit that had some kind of sharing-by-default on, if I recall correctly (not that Apple hasn't had their own issues, too, just Strava was a problem in sizable numbers)
Awesome 😎
@maramclaine830 No no no, those are totally african locals running laps in the middle of nowhere, don't worry about it!
@maramclaine830 It was the Strava running heatmaps. Strava is an app that tracks walking and jogging, and they compiled all the information into a single heatmap that showed popular routes. Someone found unexpected lines in the middle of Syria, Afghanistan, heck there was even one at Groom Lake.
Ah system32 you wanna make sure to delete that file it slows performance down way to much
he never said system32. it was InProcServer32, a com hijacking technique for gaining persistence, works to this day
😄
Can confirm. Can cause the system to crash randomly too.
@OgamiClan cannot confirm. after deletion it also downloaded more ram for me. more space in the computer = more space to install things. that's logical man.
Y'all gonna confuse the AI reading this. 😂
Bluring the reflection of the glasses on the guy. Smart.
Also his achievements on the wall, and even a subtle blur of the portrait on his desk I think.
The glasses are not blurred at the end of the video haha
@sylphus i never understand something like this.
Timestamp? What are you talking about
"If you can read this reflected post it note, I'd like to talk to you"
Once you realize a lot of people even in cyber security even at high levels, don’t really understand how a computer works and are there to collect a paycheck and follow a trouble shooting checklist. It becomes clear just how easy it is for a well seasoned hacker to just go wild.
This 💯
or how 10 year old kids easily stumble into hacking Nasa or the Pentagon.
So much cybersecurity is pointless shit someone made up years ago to sound relevant. Like why do we call it a type 1 and type 2 biometric failure? Why not say false positive and false negative?
I dunno but I'll bet it was some some academic or NSA guy fluffing up a paper, finding ways to become 'experts'.
@ZuckEnabler While it doesn't negate the overall point, the terminology for type 1 and type 2 errors comes from the field of statistics and was established in the early 30s. Basically, a paper said "here are the two types of errors that can happen when testing a null hypothesis," and the terms came from the order they were listed in.
@SaslJr I didn't know that, makes sense... and doesn't make sense.
So what you’re saying is, the NSA created BTZ, just to secure more funding. Interesting
🤫
thats exactly what i was thinking haha ! Cause the nsa has access to every cpu out there but can't find the og server ? bffr it's not like russia is the only country that could benefit from a worm infecting 90% of all computers on earth and feeding info milliseconds after finding an internet connection
I mean, it's nothing new. The British used to fund pirates in China so they could send more naval ships in as defense. All in the name of defending their economy and totally not to subvert the Chinese government and slowly rip away their coastal access.
This isnt an uncommon thing. Gotta love our taxes not going where we think its going.
Mikko's an absolute legend.
22:31 TIL: the US military discovered the concept of "antivirus software" in 2008.
2026 US military discovers the concept of FPV drones. This is what we pay 1 trillion dollars for.
Government, having a rare good idea: "we are allocating funds towards defense against malware"
NSA: "okay, we will use this for offense and developing methods of mass surveillance"
That pretty much sums up all three letter agencies.
What,you think they’re bad/evil and need defunded? They give no fu@ks about what you or I are doing bro. Trust me. They aren’t watching us do absolutely nothing. Literally nothing. Let it go man. The US is on the right side. Not perfect but it’s a complex world out there and takes complex decisions to navigate
@Swellington_you're either braindead or a bot. not sure which
@Swellington_Not this year. Read the global news, not US sources.
most. But you would still have malicious folks in every agency.
@Swellington_ saying this based on the current world situation...are you a bot? or just delusional?
Good old autorun
Right? I'd turned that shit off pretty much SOP on any of my personal devices.
I remember burning those little mini cd's and having my girlfriend write "Spring Break Pics
14:54 Kabul is in Afghanistan, not Iraq
Funny enough, within the first minute they identify kabul being in Afghanistan
Its not on the one great nation map
@stop7556That's what happens when they use AI to generate their content. They never think to proofread the script before they upload. I had wondered if this was AI generated, and that about seals the deal. If they can botch Kabul, who knows what else is.
@bufordhighwater9872quality doesnt imply AI. Could have easily had split the video into 3 parts and used fiver to fill out those parts etc.
Hey, you're absolutely right. Believe it or not, that's exactly what happens when you have a team of meat-based humans (and no AI) staring at a script for too long. Absolute brain-fart on our end. We're aware that Kabul is in Afghanistan as the entire video premise is built on that, and it's not going to happen again. Thanks for calling us out!
Imagine the vulnerabilities today with every service member having all their personal devices all over the place that are internet connected.
1 word. TikTok. The Chinese spyware got millions and millions of soldiers GPS location every 15 seconds for a decade. They got their photos (and metadata). Lifelong metadata tracking their locations throughout a lot of their lives. Their biometric face data.
The Chinese said that all the data was destroyed or given to the new american owners of tiktok. If you believe they did not backup that data I got a castle to sell you
And open Claw on the Internet I’m having a panic attack right now. Do these people not realize what’s going on? I feel like if they’re like 200 years behind and they’re thinking like caveman.
@Speedster189 Safer to assume TT was tracking GPS at all times.
@abandonedmuse "A person is smart. People are dumb, panicky, dangerous animals, and you know it!"
GNC a Chinese owned company on US military bases everywhere collecting data on soldiers.
But did they try turning off the computers and turning them back on?
I love that the WIndows Wallpaper color changes from XP Home to XP Pro when he goes to work. Top notch
1:14 I appreciate that you showed a command prompt window to indicate code being executed
I like the little skull with white lighting to show the thieving
@jamescollier3 that's elite as well
In reality on screen you would probably not see anything at all. the firmware probably just exploits a memory execution vulnerability in the kernel, embedding it's processing bits into the kernels running memory as a low level process with system level access. After that it just continues mounting normally like any normal flash drive would, user unbeknownst.
Makes me think of Sos Sosowski using Hacker Typer to fake coding on the news to fuck with people.
This might have been intentional. Just recruit someone and tell him to stick this in your office computer.
Love the tone of this video. It’s slow-paced enough that the viewer can absorb the information and not feel overwhelmed and the concepts are explained in a clear and didactic manner without making one feel like an idiot. A very delicate balance to strike, especially when it comes to such technical topics that tend to make people want to run in the other direction. Well done!
The first thing I would have done is to set up a sandbox system with the worm and determine what server it was trying to connect to. If you can't identify where the payload is going, you haven't done much. I would think the NSA would have better resources than I do. What they did doesn't make sense.
These are the specific things that made me drop many conspiracy theories over time. I'm sure there are some "hidden" groups steering society in some ways, but most of the time even governments relying on single skilled individuals on certain topics... They are as riddled with problems as any other workplace.
You're engaging Normal Human Thinking.
Try using Government Goon Thinking.
You'll be able to process the information more completely.
This is 2026 brother. This is just not what they did back then. You’re underestimating how long ago this was.
Dude people would break into government systems for fun and bump into other hackers already on the same systems. It was an absolute clusterfuck.
Would it not be easier to completely remove the usb ports on computers that are connected to vulnerable networks? Like wtfk???
No because there are things that need to use USB’s .
Example keyboards and mice .
A decent antivirus will know the difference between a storage device and other but that is not 100% accurate
@nicholasbridge829it’s not just keyboards and mice . Think about how many peripherals run on USB.
Just because you log out USB storage devices via group policy or AV , it’s not 100%
@nicholasbridge829 they're slowly coming around to this line of thinking. Militaries are big places, parts of them are more secure than others. I imagine there are already military facilities that have removed access to USB ports and started to move towards more restricted hardware.
So wait, you’re telling me it turn Internet Explorer into Chrome?
No use open browser 😊
The mistake was to use Windows in the first place.
Awww c'mon, Windows was fun! I've played with them all, but the abundance of software and ease of use with Win 95/98 was astounding!
Avoiding windows won't save you. If you aren't being targeted it's because you don't matter, not because of your platform.
Linux and Unix are not immune to this type of thing.
The only reason windows is targeted so heavily is that it has the biggest market share so the chance of compromise is much higher .
How embarrassing for the government to get hacked by an activex control, just hilariously incompetent.
19:45 well that's not Orwellian at all
The reflection of the monitors on the guys glasses is comically distracting 😂
Intelligence failures like this and 9/11 teach us that as smart or as well resourced as the US government is, it still manages to repeatedly fumble the ball due to small minded bureaucrats.
You should look into 9/11 a bit more. Architects and Engineers for 9/11 Truth would be a good start. “Explosive Evidence”.
@ccsaunas As a mechanical engineer in the building trades, I knew something was fishy that night when bldg 7 fell.
@ccsaunastiny hats posing as “art students” rigged the explosives to take down the towers and get their wars! Damn 🧃🧃.
The Israeli E-Team posed as art students to gain access to sensitive facilities (including unlabeled FBI offices lol). What kind of art project needs BB18 detonation cord? The one at the Twin Towers, apparently 🤭🤭
The visuals of this video are incredible! As always I appreciate your level of detail and the quality of this documentaries.
yeah, the level of detail and quality is so incredible that (at 0:40) they show an RTF on the computer screen while describing a PDF. 😆
@arciphera2757 Apologies for the mis-match, will pass it on to our editing team! 🙇
Even 17 years ago (2010) USB-use in a restricted area was prohibited, except for select personnel. Proper security protocol disallowed use of external drives for office use, both physically, OS and network.
Imagine being the mastermind and coming across a whole documentary about some shit you did ages ago and forgot about 😂😂😂
Once again, amazing work, mates! High quality, excellent animations, informative content, impressive and clear storytelling. Keep it up!
Mikko looking like Christian Bale and he are about to Prestige
Let's see Paul Allen's eworm
@peterhall4216 😂
There is no such thing as a secure network
1:35 *Publicly* little is known.
these are relative adjectives, to desctibe, not to state solid facts
Yes, and internally?
@dvsur either it is known in the hacker circles, very likely. every job has their ins and outs. or the author of the comment suggests to know more than most ppl, is he the author of that worm? maybe, very unlikely. :) still, a fun thing to consider.
16:17 once the screen reflected on his glasses becomes cartoon eyes you cannot unsee
The way that I was genuinely sitting here watching this with “beer, pizza, an internet connection, and nothing better to do” and was like
👁️👄👁️
Don't worry, I'm here now.
Beer and pizza is a win
love how he does not mention the name of the air force cyber core
why is it so?
"Kabul, Iraq" never heard of that place
Americans. Enthusiastic, but clueless.
@TillmanVatter Is that where the Iahtolla lived?
@TillmanVattereuropoors...poor and seething
@TillmanVatterSorry we don't know every location on earth by heart. 🙄
Does it really matter. Iran, Iraq, Afghanistan. Just another place US troops should never have been in the first place.
Incredible production quality. Please keep making these!
Only one country is allowed to be anywhere near physical computers in the United States. The blue and white
The ((()))
Now imagine this administration… defunding our cybersecurity team smh
The fact we'd ever have sensitive information on thumb drives is mind boggling.
As opposed to what?
Wait, they couldn't debug a thread? I would suspect they know what it did.
There is one country, who in their paranoia and megalomania, continuesly infiltrate their own allies. They are in the absolute forefront of cyber warfare, surveillance and hacking. They are never mentioned by these allied leaders, as they are often put in a position of gratitude or threat of exposure. This singular country has one of the worlds most sophisticated apparatuses. They know everything, but mysteriously they miss giant preparations of attacks, they are suddenly surprised by new terrorist cells appearing. They have been caught with their fingers in false flag operations so many times it is extremely hard to keep track of it. And yet far more more of their operations have been successful. They are still allowed to keep doing their nefarious deeds, killing literal millions of people.
Yep, Israel
I hate apple juice with a passion.
Nice, a new documentary to watch! Love y'all contents
Build it so it's bulletproof.
I can totally see how the theory that perhaps a soldier purchased a USB thumbstick from a vendor in Iraq could be an entry vector. Back in 2005, I was deployed to Camp Fallujah, Iraq as a logistics analyst. I purchased a USB thumbdrive, but I purchased it from the actual Camp Fallujah PX.. how secure is that logistics chain? I'd be that it isn't so secure that a bad actor couldn't insert infected usb thumbdrives into the chain. Another thing I just though of was that bootleg DVD vendors were VERY common around and even on military bases in Iraq (and probably Afghanistan?) back then. You could buy a bootleg set of The Wire or whatever for a few bucks from the vendor outside the DFAC (dining facility). DVDs can also have autorun features, so all it might take is someone putting the wrong DVD into a SIPRNET connected computer and bam, infected.
Or John McAfee donated a bunch of computers to the government😂
Because they quit using his antivirus shitt they found out it was him and they got pissed that's why he took off and ended up dead in Spain
Great content! Thanks for your work.
SO, the NSA just edited the DNS server to point to its own servers? I am still struggling on how the heck it got into the NSA network.
😂 it's a USB worm my mans... So it came from a USB! 😅
how did you come to that conclusion?
@lumikarhu Narrator mentioned they needed to stop the virus from calling HOME. Unless it used an IP to call home, it likely used a domain. And they needed to route it to their IPs... So, edit the internal DNS server to point to a "fake" c2c server
@irmofs i wouldnt doubt it using an ip, which is why i love the idea of creating a specific way to fake ip addresses in a lan to emulate the home server.
as long as you have physical access to a machine or its drives, you can do whatever your creative mind is capable of and fake being anything you want to fake.
Classic red team move like the drones over us bases
Kabul is in Afganistan not Iraq. 14:50
absolutely insane error
this video seems poorly researched, I guess anyone can make high budget looking animations nowadays
Amuricans and geography
Enjoyed this. Thank you team.
guess what you guys this is a self hack the call is coming from inside the house p a l a n t i r
Excellent Video. Great work!!
Considering I was in Afghanistan in the early 2000s in digital forensics for the military I’ll check some of my old equipment to see if anything is still infected 😵💫
Let me know how ya go haha
@crf80fdarkdaysthat’s never going to happen and I doubt they will even bother
The Cyber Security companies make billions.
The reflections on his glasses was blurred for the whole video up until the last 30 seconds :D
😳
Refreshing to see such a quality video, kudos to you guys! Keep up the great work!
I have a strong feeling we know who patient zero was.
who? osama?
@Jiwa-Money-Sdn-Bhd😂😂😂
another great video. really enjoy the documentaries
18:43 oh no! A house infected with computers! 😅😅
Not as bad as a house infected with people.
Man, I absolutely adore watching your masterpiece vids!! Such a pleasure... Keep up THE BEST work! Looking forward for upcoming videos of the series!
14:56 Kabul, Iraq.... ? Isn't that Afghanistan's capital?
A soldier in Kabul rings a doorbell at a place where there's a line to use a computer. He sits down at the computer and enters his password and login on an unknown computer in Kabul, in an unknown apartment, among unknown people. After working with his email, the soldier takes the flash drive and turns off the computer. Either the soldier was last in line at this computer. Or the soldier decided that after him, no one else needed the computer. This introduction alone suggests that the story is complete nonsense, the narrator of which didn't bother to make it plausible.
I cannot imagine what is cooking now that AI has entered the arena.
It’s been here and has been here for at least a decade.
checkout cyber polygon 2021 and ull see whats cooking
Apparently it blew up 3 schools killing hundreds in lran
It worked perfectly according to Satanyahoo
What are you even talking about? Were discussing viruses not AI. Dude.
It was right around the time that this happened that Verizon Wireless told all of its employees to stop using personal USB devices and if we needed a drive that they had an encrypted one they’d send.
Now I’m wondering if the timing is because of what happened in this story.
If you pronounce "cafe" as "cuh-fay", there is, in fact , a special place in hell for you.
hahaha. I caught that too. Maybe it’s just not a word he says often
Bad AI voicr
how is it pronounced in american english then? i'm not a native obviously, just genuinely curious
cuh-feh?
@lumikarhu "Ca" pronounced the way it is in "Cat"
"Fe" pronounced like the first half of the word "fade"
If I wanted this many commercials I'd watch cable tv.
Massive respect to the strong men that loaded the servers on to the truck. Glad they got a mention.
Is this what causes the death blue screen? 🤣🤦♂️
14:55 "Kabul, Iraq"
Great video, silly mistake to get through the editing process. Baghdad is the capital of Iraq; Kabul is in Afghanistan
you'd think these morons in government, especially national security and military, wouldn't use standard public devices/ports.. rather custom proprietary things.. like "USB" drives but with a different sized connector and different pin layout, then moronic employees can't go sticking it in their civilian device, or worse, public computers. Sure it could still be hacked or whatever if someone got their hands on it the same as any usb device, but this is more just to prevent moronic employees/contractors or military personel from casually breaking isolation/security protocols, forcing them to only use government/military devices as their propreity usb device only fits in those secured devices, rather than risk them being able to use on unsecured public devices. Also the protection goes both ways, as the government/military computer only has those custom ports, so a standard civilian usb key or whatever device can't plug in.
Pretty expensive solution for the basic SIPRNet computers. SIPR is one step above a basic computer with internet access. Everyone in the military has access to it. It's not a super secret network or anything. It's much easier to log anything that's not whitelisted that's plugged in. Trust me, they know who you are and when you plug something in. 2008 was just a different time also, still using win xp since 7 wasn't out yet.
Kabul is in Afghanistan, not Iraq
THE WARFRAME TRADE NOISE IS TRIPPING ME OUT. I CANT BE THE ONLY ONE
33:05 - PUPPY!!!!!!!!!!!!!
Your Sight scares me....
@eadigi3057lmao I wear soda pop bottle tier glasses
Hearing Red October unlocked so many memories.
I don’t think we can Come To any conclusions based off similar code after 6 years. It could be that the Russians who made the snake malware learned from this 2008’incident
I believe that among thieves, that might be a sort of transgression because the whole thing of becoming a honored hacker is writing your own code. the piggy backers are the script kiddies, the real hackers, and what they pat themselves on the back for is the fact that they can write their own pieces of Malware. That’s how you earn badges in that world
@abandonedmusebut do you think a state agency like the FSB would care about that? Or about efficiency and results?
Terrorists watched that soldier go in and out, so they just waited.
more cool damn well produced documentaries!
This is great - more of those please
19:25 All the money bouncing into coffer, and then some of it bouncing out and disappearing is a perfect visual of government spending.
Happens in the private sector as well
You did all of this research and then said Kabul, Iraq…
love this channel :D
try darknet diaries podcasts, they're golden
“We have a problem.We’ll need a ton of pizza and coffe”
Hyppönen the goat.
absolutely!
this video could also be titled: how the military's incompetence let someone onto their own servers
Honestly I don't get how the early 2000s wasn't just virus-filled to the brim, so many more security vulnerabilities existed then lol.
Edit: turns out I was wrong my bad everyone
it was, you just didn't see them
they exixt nowadays too maybe less but still exist
problem is that no one knew about them and no one knows about them now
It absolutely was. That's how companies like McAfee and Symantec became successful in their day.
They were definitely around. It wasnt reported on AS much before it became openly used by nation state actors. Additionally the older malware tended to be more in your face and destructive. Now a days a lot of malware has a huge focus on stealth.
It was, we just didn’t put all our personal information online so it didn’t really matter, and there was not really much to be gained other than doing it for the love of the game
If you had a thumb drive that went onto the sipr or anything work related, it was covered with red stickers saying “secret”. If that idiot was plugging thumb drives in anywhere all Willy nilly, he was an absolute moron who shouldn’t have a clearance.
"A tale of two bureaucracies"
I was going to have this on in the background while playing some games, but the editing is so good I decided to watch it fully. Great work!
Cybercommand sounds hardcore as heck
"Where do you work?"
"CYBERCOMMAND"
You're basically the coolest dude in the room
Mike McConnell's 'worst fear' tells you everything you need to know about the US government's perspective on the citizen.
14:52 kabul?iraq? American educational system needs a bigger budget lol
Turkmenistan mentioned! Inshallah
Or AI slop needs some improvement
I just past that part. 😂
@n30gn0sis or just needs to have no recognition and get called out everytime.
As an american, I can confirm our education system needs to be overhauled badly.