Monday, June 8, 2020

US authorities have informed the Netherlands of being unable to provide additional information about a missile fired at the Malaysian Airlines Boeing, МН17

US authorities have informed the Netherlands of being unable to provide additional information about a missile fired at the Malaysian Airlines Boeing, МН17, apart from a document sent in 2014, presiding judge Hendrik Steenhuis has stated at the resumed hearings in the MH17 case.
"The court asked whether classified satellite images of the missile launch, presented to Dutch special services, could be attached to the case ... The prosecution said that the request had been sent to the US back in 2014, and in response a memorandum was sent. The Dutch prosecutor in charge of the fight against terrorism was able to check the accuracy of the memorandum ... The prosecutor came to the conclusion that the memorandum was supported by other sources he had consultations with. He requested the conclusions be attached to the case. The US authorities said they could not provide any additional information regarding the missile launch in addition to the memorandum", Steenhuis said.
Hearings in the 2014 MH17 crash case resumed earlier on 8 June at the Schiphol Judicial Complex not far from Amsterdam.
Russian nationals Igor Girkin, Sergey Dubinsky, and Oleg Pulatov, as well as Ukrainian national Leonid Kharchenko, are defendants in the case.
Russia has repeatedly demanded to provide data from Ukrainian radars and US satellites as part of an investigation into the MH17 crash.

Pharmakina opens a labarotory for HCQ tablets as Covid19 case increase with North kivu and south Kivu having the second biggest number of Covid19 cases in DRC

Pharmakina opensed its laboratory for the production of HCQ tablets.The inaugurated its laboratory specialized in the manufacture of HCQ tablets as part of the fight against the COVID19. The ceremony took place in Bukavu in the presence of Theo Kasi, governor of South Kivu. The same lab will also produce injection quinine to treat Malaria.
" The DRC is becoming a producer who produces HCQ for its national needs. The procedure for licensing a medicine in the DRC wants to address the Ministry of Health. We followed this process by presenting to the ministry our product prototype, the product file and PHARMAKINA
has already been given permission to put these products on the market ", said Marshal Kanyonyo, a pharmacist responsible for the.
As a reminder, the World Health Organization
(WHO) has resumed its test on HCQ as a potential treatment against the coronavirus.
She had suspended this clinical trial after the publication of a study in the scientific journal "The Lancet".
Since the outbreak of the epidemic declared on March 2020, 10, cases have been 4.016,including 4.015 confirmed cases and 1 likely cases. In total, there were 85 deaths (84confirmed cases and 1 likely cases) and 537
people healed.
4000 positive cases of the
coronavirus pandemic was surpassed
Saturday, June 6th in the DRC.
Since the outbreak of the epidemic declared
on March 2020, 10, the newsletter of the
Technical Secretariat of the multisectoral
committee on the response to the of
pandemic, the combination of cases is
4016, including 4015 confirmed cases and
1 likely cases.
According to the same document, 138 new
confirmed cases were recorded, including
123 in Kinshasa, 14 in South Kivu and 1 at
Kongo Central.
In total, there were 85 deaths (84 confirmed
cases and 1 likely cases) and 537 people
healed.
According to the newsletter, 316 suspect
cases were detected after investigations,
492 samples tested.
For Saturday's day, no new person came out
healed, while 3 new deaths from confirmed
cases were below.
There are 2769 patients who are in good
evolution.
Now 11 provinces are affected:
• Kinshasa: 3625 cases;
• Kongo Central: 212 cases;
• South Kivu: 84 cases;
• North Kivu: 53 cases;
• Haut-Katanga: 33 cases;
• Ituri: 2 cases;
• Kwilu: 2 cases;
• Kwango: 1 cases;
• Haut-eule: 1 cases;
• Tshopo: 1 cases;
• Ecuador: 1 cases.

South sudanese army illegally entered DRC territory again

The civil society of the of chiefdom, in the
territory of Aru, reports a new illegal entry by the South Sudanese army, SPLA this Saturday, June 06,2020 in the village of Liku, Rumu group around 9 local.Nicolas Idroru, joined by a reporter froma local news paper in the region says that military visibly uncontrolled by the Juba government have engaged in looting the property of the people who were forced to find refuge in the nearby locations of Rumu 1 and Rumu 2.
" We call on both national and provincial
authorities to strengthen FARDC strength in the of chiefdom says the activist who calls for
securing the border between the DRC and this
neighbour country.
Let us remember that the latest foray into this
chiefdom was Friday, June 05, according to the same source who also reveals that the FARDC spokesperson  in this region has not yet talked about  Saturday's  incidence.(see this related article)

NRAHEROES COL. STANLEY MUHANGI (RIP) R0/00039

He was one of the fearless commanders. During the attack on Kampala, he and Gen Kyaligonza commanded 7th Battalion that captured Makindye Barracks. He did effective reconnaissance that led to the attack on Masindi led by Gen Saleh where thousands of guns were captured. He died in 1991.

NRA HEROES:Colonel Ahmed Kashillingi RO 040

While almost the entire NRA was away on a
mission to attack Masindi, rebel leader Yoweri
Museveni was attacked by the UNLA
commanded by the feared Lt. Col. John Ogole.
With only 70 fighters, Ahmed Kashilingi mounted
a formidable resistance that enabled the rebel
leader to escape.
Col. Ahmed Kashilingi, RO 040, joined the NRA
bush-war in 1981. In his book Sowing the
Mustard Seed, Museveni says Kyaligonza
commanded Mwanga, one of the six zonal units
NRA formed about six months into its five-year
guerrilla war. Kashilingi joined Kyaligonza’s zonal group around April 1981. The main task of this group was to divert the attention of the government soldiers from the main NRA group of about 50, including Yoweri Museveni, which had moved towards Kiboga after the futile attack on Kabamba barracks in February 1981.
Kyaligonza and Kashilingi, according to veterans who worked under them, had only two guns at the start, an SMG and a pistol. Theirs was mainly urban terrorism. These are the commanders who, using commando tactics, raided Kisoga Police post which they hit with stones and managed to take off with its rifles.
Kashilingi, who joined the army in the late 1960s,
is reported to have received commando training
in Iraq during Idi Amin’s rule. These skills came in handy for the NRA, especially in raiding Police posts. The Kyaligonza/Kashilingi group also used to grab Police uniforms which they would later use in their jungle and urban operations.
Towards the end of 1981, the UNLA hit Kyaligonza’s group hard and threw it in disarray.
Kyaligonza reportedly took off to Kasangati.
Kashilingi, who took a different direction,gathered some of the fighters and headed towards the main force in Matuga. This was shortly before Museveni returned from Kenya and Europe where he had gone in June 1981.
Kashilingi’s first known major operation happened around 1982. Veterans tell us that the
Chairman High Command (CHC), Yoweri Museveni, sent him on a mission to look for medicine and medical personnel shortly after his
return from London. Kashilingi then commanded fighters who raided Nakaseke Hospital. At this
time he had been separated from Kyaligonza who took command of the Black Bombers and operated in the areas of Matuga. Kashilingi
operated in the areas of Makulubita, Katiti,Kalasa and Bombo.
In the forest of one Maama Nsobya at a place called Kanyanda is where Museveni dispatched
Kashilingi to go and raid Nakaseke. The operation was successful and Kashilingi got
medicine and abducted most of the medical personnel of the hospital, including the Medical
Superintendant, Dr. Ronald Bata. Ondoga Ori Amaza, who was also working at Nakaseke, was
captured during this raid. Because the nurses could not walk for a long distance, Kashilingi got
another captive, Kizito Kyamufumba,to drive them in a lorry with their medicines. Kashilingi reported his loot to Museveni at the guerrillas’
headquarters.
When the NRA opened the Western Axis in 1985,Kashilingi remained in Luwero Triangle with themain force under Salim Saleh. At this time Museveni had again traveled abroad where he spent six months.
The 5th battalion which Kashaka and Kashilingi commanded was part of the force that raided Mubende. From Mubende, they captured Mityana
and moved through Mpigi towards Masaka.They moved through Kalungu, Kifampa, Kituntu and
Nkozi. At around Kayabwe on Masaka Road, the 5th battalion got orders to block Katonga Bridge.
The intention was to stop the UNLA soldiers from re-enforcing the besieged Masaka and
Mbarara barracks. It is at Katonga that Kashaka left his 5th battalion and went to Nyabushozi.
Col. Kashilingi took over the command until the capture of Kampala.
Katonga is described by the NRA veterans as the fiercest of all battles. Kashilingi lost 14 fighters
and two of his field commanders around Kayabwe area. Another 16 fighters were injured.
Almost a whole platoon (35 soldiers) under Kashilingi was wiped out by UNLA soldiers using
an anti aircraft gun. Soldiers who fought alongside Kashilingi say that they were saved by the re-enforcement of 180 fighters who had just been trained by Tadeo Kanyankore in Ibanda. It
was only then that Kashilingi managed to overpower the UNLA.
When the Obote soldiers (UNLA) were defeated at Katonga, they ran up to around Nabusanke. At
this time, General Tito Okello Lutwa had successfully staged a coup and declared himself
head of state.
Lutwa called for peace talks, which in effect slowed down the advance of the rebels.
The UNLA under Lutwa established their base at
a place called Kwaba on Kampala-Masaka Road.
Kashilingi’s forces camped on Kamengo Hill,
overlooking the UNLA. When the peace talks
collapsed, the Kashilingi battalion and that of
Pecos Kuteesa were ordered to attack. They
chased government troops almost up to Kampala
suburbs.
When the rest of the battalions pounced on Kampala, Kashilingi was ordered to take Entebbe
Road and capture the airport.It is reported that Lutwa had reached some understanding with
Moses Ali to airlift hundreds of his soldiers from his bases in West-Nile to Entebbe to help Lutwa.
They were reportedly being airdropped at Entebbe as Kashilingi and his troops advanced
towards the airport. In his book, Kuteesa writes that Kashilingi’s forces got encircled and needed
re-enforcement.
Kashilingi, it is reported, wanted to hit the planes that were dropping Moses Ali’s fighters at
Entebbe but he was restrained by Museveni.
Eventually, these fighters from West Nile—about
1,000 of them, surrendered and Entebbe fell to
the rebels.

Sunday, June 7, 2020

Scammers are taking advantage of COVID-19 pandemic to spread a voicemail email phishing scam

Scammers are taking advantage of COVID-19 pandemic to spread a voicemail email phishing scam when most users across the globe are working from home.
The COVID-19 pandemic has changed the way we live, communicate, and work. Workforces across the world are currently relying on digital communication platforms like Zoom ,
Microsoft Teams , Slack, and Private Branch Exchange (PBX) to perform their day-to-day official duties and work remotely.
However, malicious threat actors are also aware of this fact and are trying their level best to benefit from the current situation.
According to email security firm IronScales, companies using PBX telephone systems to enable communication and information sharing between their employees are the prime targets of sophisticated phishing attacks that can evade email security quite convincingly.
IronScales identified around 100,000 new phishing campaigns in May 2020 delivering fake PBX notifications to steal login credentials. These campaigns are targeting “hundreds of enterprises” from almost every sector including engineering, real estate, IT, oil & gas, health care, financial services, and IT, etc.
PBX is a handy tool that sends voice message recordings directly to an employee’s email account and eliminates the need to access official landlines. Employees can retrieve important voicemails by integrating PBX with their company’s email client.
Exploiting this mechanism, attackers are
sending malicious emails under the guise of PBX voice notifications featuring custom subject lines containing the name of the company or employee name to pass the authenticity test.
Here are two screenshots shared by
IronScales showing how the email looks like:


Through such subject lines, attackers are trying to bypass email defenses like SEGs, Reporting and Conformance system, and the Domain-based Message Authentication (DMARC ). Since there is no attachment in the email, the messages do not raise an alarm and are freely allowed through.

The main objective behind this campaign is to obtain PII (personally identifiable information), login credentials, and critically important business data. It is very important that employees are trained to identify a phishing email, and companies should implement such security systems that can recognize phishing scams .

If your organization automatically sends voicemails to workers inboxes, then your company is at risk of falling victim to this scam. As we know, if an email looks real then someone will fall for it, the company warned in its blog post .

Maze hackers at it again,leak important data about USA army nuclear/missile arsenal contractor

MAZE hackers have leaked the data on their website which is accessible to the public on the normal web as well as the dark web.
The US is perhaps undergoing the most difficult phase in its recent history with riots taking place all over the country . Seems like the government’s woes are far from over since critical US nuclear data got stolen after the US military’s nuclear missile contractor became the target of a cyberattack.
Apparently, the Albuquerque-based Westech International was established in 1995 and works with commercial enterprises and federal agencies.
Reportedly, confidential documents belonging to Westech have been stolen by Maze hackers after they managed to breach the security of its computer networks.
For your information, Westech is a sub-contractor of Northrup Grumman and provides maintenance and engineering-related support for the Minuteman III nuclear deterrent ballistic missiles.
Besides accessing Westech’s networks, the hackers also encrypted the devices and started leaking sensitive documents online to pressurize the company to pay the ransom.

Therefore, currently, it is whether the stolen documents contained confidential military data or not. However, we can confirm that the files have been leaked online, suggesting that the hackers were able to access sensitive data like emails and payroll.
List of Westech International’s clients
Previously, MAZE hackers were in news for attacking the Sonatrach oil giant and leaking its data online. The same group also stole a trove of data from Banco de Costa Rica and leaked it online a few days ago.
As for the sub-contractor, a representative
confirmed to Sky News that Westech has become a victim of a hack attack and its computers have been encrypted. Investigations are underway to determine the perpetrators of the crime and extent of data exposure.