Tuesday, June 23, 2020

Four CODECO militia surrender to DRC army

Four CODECO militiamen active in Djugu territory decided to lay down their arms and surrender to the loyalist armed forces, the fact happened this Monday, June 22, 2020 in the locality of Jiba.
In their game bag, these former rebels also handed over an AK47 weapon and some ammunition.
Lieutenant Jules Ngongo, FARDC spokesperson in Ituri who confirms the news and attributes this act to the military pressure exerted on the militia and the awareness of the local population since the launch of deep operations for the return of peace .
"Today we have received 4 compatriots from the CODECO movement who went with an AK47 weapon to Djugu territory in Jiba", he said.
He took the opportunity to call on the other attackers to follow in their footsteps to contribute to the pacification and reconstruction of the territories of Djugu and Mahagi.
Jules Ngongo also reassured that the CODECO men who surrendered "will be treated with dignity, in accordance with international humanitarian law".

DRC provincial Minister of the Interior Adjio Gidi and his colleague from ITPR Ucircan Bule set this Tuesday, June 23, 2020 visited the chiefdom of Wagongo located at 54km from Mahagi center to meet local people.


Continuing their mission in the territory of Mahagi where they lead a strong delegation, the provincial Minister of the Interior Adjio Gidi and his colleague from ITPR Ucircan Bule set course this Tuesday, June 23, 2020 on the chiefdom of Wagongo located at 54km to the is from Mahagi center to meet local people.
Confiding with their hosts, the inhabitants of the area have not hidden the two main questions that concern them, namely infrastructure and road and lake harassment.
Ucircan Bule, head of ITPR in Ituri province, reassured the people of Wagongo, saying that the contracts are being signed by Governor Jean Bamanisa for the rehabilitation of highways in this area.
"Several contracts are already prepared so that the provincial governor can sign and if these contracts will not be executed by our partners within a short time, we will be forced to replace them with other companies" he indicated in his words to local news outlets
Regarding fishing regulations at Lake Albert, the same minister called for the payment of state duties, taxes and fees to avoid fraud.
"The question here is, are you asking for proof of payment with sincerity?" Or are you asking one thing and its opposite? You are looking for proof of payment, at the same time you are chatting with state agents. But the agents also need to live. When you pay by dropper, but they will always bother you, and from there you will all be considered fraudsters, "said Ibrahim Ucircan in his address.
And concerning road harassment, the provincial Minister of the Interior Adjio Gidi has promised a solution in the coming days.
It is since last Saturday that the two members of the provincial executive have been staying in this Mahagi territory in order to comfort the population and assess the security situation after several attacks recorded last month by CODECO militiamen based in the neighboring territory of Djugu.

7 probable new cases of EBola in ituri and North kivu


The Ebola virus disease technical secretariat claims to have validated 7 new probable cases in the provinces of North Kivu and Ituri.
For North Kivu, there are 6 probable cases including 3 at Kalunguta, 2 at Mangurejipa and for Ituri the probable case is reported at Mambasa.
However the response team does not provide clear information on these alleged probable cases.
The Congolese government is preparing to declare an end to the Ebola epidemic in the two aforementioned provinces on June 24. 55 days have passed without a new positive case confirmed in this region of the country.

who is Molendo Masamba Marechal?!! Really Uganda is and cannot be interested in him!

In early June 2020, staged fight was picked up in front of the various security service offices in Aru territory located north of Ituri on the border between the DRC, Uganda and South Sudan.
A source close confidant to this allegation who affirms that this data was allotted to the militia called "Army of the Congolese People, ARDPC" in acronym, led by a certain Marshal.Some indications in the file/documents read: "The ARDPC demands the immediate, immediate and unconditional arrest of Mr. Joseph Kabila, as well as his transfer to the ICC for 12,000 cases of Congolese deaths, including Tchebeya, General Mbuza Mabe , General Mamadu Ndala… ”.
What must be remembered, according to our source, who requested anonymity, is that this group is led by a certain Molendo Masamba Marechal, a FARDC deserter.
As its main objective, it claims to "free the Congolese from the yoke of the Rwandan subjects who allegedly infiltrated the FARDC with the help of the Kabila regime and the arrest of former Head of State Kabila Kabange and his transportation to The Hague to Netherlands to be tried by the ICC.
What do we know about the identity of this rebel leader?

- His name is Molendo Masamba Marechal.
- He is from the Madimba Territory, Kongo Central Province.
- He is a former "Kadogo", recruited by the AFDL in Bas-Congo (Kongo-Central) in the years 1996.
- He evolved in the army between North Kivu and South Kivu where he allegedly committed many blunders against the population.
- He was transferred to Ituri following charges brought against him by the people of Uvira / South Kivu.
- In Ituri, he joined the 1st battalion as Second Commander OPS-RENS, based in Marabo / Irumu Territory.
- During the establishment of the Regiments, he was promoted to Second OPS-RENS Commander, from Colonel Bakavu of the 904th Regiment based in Djugu.
- He was arrested in November 2012 and imprisoned on December 03 of the same year in the Military Auditorate / Ituri.
-They allege that he escaped in 2013 after having faked an epilepsy crisis for which he was sent to the Police hospital from where, he succeeded in deceiving the vigilance of two guards committed to his surveillance, to join Kampala via Mahagi.
- They allege that he maintains contacts with Ugandans to finance his militia.

Monday, June 22, 2020

It doesn't matter which OS running on your computer,you should be careful of websites you visit

Now macmalware like macOS Shlayer and macOS Bundlore are being spread by hackers.
Most users when surfing the web realize that there are malicious sites they need to be wary of. But, seeing that the search engines havethey normally use such as Google and Bing come from reputable companies, many assume all is safe there. This couldn’t be further from the truth.
Turns out that you can encounter harmful search results in all of these engines. This shouldn’t come as surprise since Hacker have done it for quiet long.
Such an incident was recently uncovered by cybersecurity firm Intego who has discovered a new MAC malware that not only evades Apple’s own security but also has been completely undetected on VirusTotal. It consists of “unique new variants” of the previously known OSX/Shlayer and OSX/Bundlore malware.
See: Smart home devices can be hacked within minutes through Google search
For your information, in January 2019, VeryMal, a group of cybercriminals was identified using
Shlayer malware to infect Mac devices. The group employed steganography techniques to prevent detection and embedded malicious code in advertisements and popup images.
The same malware was also identified earlier this year in January installing the “Any Search” bar on the targeted Mac device via Adobe Flash updates to deploy adware so that illegal ads could be displayed. Apart from adware, the malware was also intercepting and collecting browser data from the target device and alter search results to deliver a large number of ads.
On the other hand, macOS Bundlore is adware, a type of malware known for displays unwanted advertisements on infected Mac devices since 2015 . It not only uses different techniques to bypass Mac’s security mechanism but also collects personal data from the device and redirect users to malicious sites.
In the ongoing campaign, hackers are using Google searchers to spread these malware. Spread in the form of a trojan horse by posing as a disk image that can be used to install
Adobe Flash player ; users are redirected to the installation page through malicious google searches.
For example, a user may search for the exact title of a YouTube video and then be greeted warmly with search results that would lead them to a page telling them that their Flash Player needs to be updated. Certain warnings are also given alongside to make it seem more serious and lure the user in.
A screenshot shared by researchers show how the popup looks like:
Once the user proceeds to finally download and mount the disk image file, instructions are displayed detailing how the flash player can be installed.
By following these, the installer app opens where eventually a bash shell script runs in a terminal extracting a “self-embedded, password-protected .zip archive file, which contains a traditional (though malicious) Mac .app bundle.
The researchers further explain in their blog post the subsequent steps that follow to successfully complete the attack:

"After installing the Mac app into a hidden temporary folder, it launches the Mac app and quits the Terminal. All this takes place within a split second.
Once the Mac app launches, it downloads a legitimate, Adobe-signed Flash Player installer, so that it can appear to be genuine—but the hidden Mac app is designed to also have the capability to download any other Mac malware or adware package, at the discretion of those controlling the servers to which the hidden Mac app phones home. "


In this way, the user’s machine is compromised.
To conclude, search engines like Google always try their best to keep away such search results but as with everything in security, success isn’t guaranteed all the time. Hence, users can lead from the forefront and try to only download files from reputable websites.
For those of you who may have been infected, you can try removing the malware by using Intego’s VirusBarrier if your anti-virus solution hasn’t started to detect it yet.
Abusing Google Service is common
This is not the first time when cybercriminals have abused Google to spread malware. Last year, 
Moreover, in 2017, hackers were also found exploiting Google Search results to distribute Zeus Panda Banking trojan using SEO-malvertising and SERP Poisoning.
In October last year, researchers identified a strange and infrequent behavior at Googlebot servers where malicious requests were originating from them. After digging further, it was discovered that hackers were using Googlebots in cryptomining malware attacks.

Huawei 5G still highly suspected of espionage by the western powers who opts for competitors like Nokia and Erickson

The Trump administration has repeatedly accused Chinese tech giant Huawei of engaging in illegal surveillance on behalf of Beijing, effectively banning the company from working with American businesses. However, a recent ruling by the US Commerce Department has now permitted US companies to work with Huawei on developing 5G standards.
Swedish company Ericsson and Finnish company Nokia are “best positioned to compete” with Huawei, but the West has to “pick a horse or horses” to challenge the Chinese tech giant, US Attorney General William Barr told the host of the television programme ‘Sunday Morning Futures’, Maria Bartiromo.
“In the last decade or so China has been putting on a great push to supplant us, explicitly, they wanna be the leader in all the future technologies and they want to dominate the economy,” Barr said. “So what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be a technological leader of the world.”
According to Barr, Ericsson and Nokia have thus been “the strongest Western competitors” in the technological sector, effectively pushing American allies to “rally around” these actors, either through “private ownership” or “state involvement”.
“Huawei has the backing of the Chinese government and all the Chinese government money,” the attorney general explained. “So just giving an example for 5G, the network facilities, then the total global addressable market is probably around $90 billion and the Chinese government has set up a fund of over one hundred billion, to subsidise it so they can go to some countries and say, hey, we'll put this in cash free, you know, very cheap money.”
— 
The comment came following reports that the US government could be considering the option of acquiring a stake in one of the European companies. However, Barr said that it was not up to the Justice Department to decide on whether to invest in Swedish or Finish tech giants.
The attorney general still reiterated the earlier comments of the Trump administration that the Chinese company was “not competing fairly” on the international market by “stealing” American intellectual property and “cheating” in order to overtake the United States as the technological leader.
“If they start leading in some of these fundamental, foundational technologies like 5G, which will be the platform of much of our future manufacturing in the United States, they will have a tremendous leverage of the United States,” Barr argued, adding that this will eventually create an “ultimate leverage over the West”.
The Trump administration has long accused Huawei of conducting espionage on behalf of the Chinese government, allegations which have been expressly denied by the company management and Beijing. In May 2019, Huawei was restricted from working with US businesses and prohibited from obtaining American goods and technologies. However, following a recent ruling by the US Commerce Department, American firms have now been permitted to work with the Chinese tech company on the development of standards for the fifth-generation superfast networks.

The World Health Organization (WHO) and Congolese authorities are continuing the vaccination campaign to stop the spread of Ebola virus in Ecuador province

Democratic Republic of the Congo (DRC).
Building on lessons learned from previous epidemic outbreaks, the United Nations Agency supports health authorities to carry out 'ring' immunization with people at high risk of Ebola.
" Nearly 9200 dose of vaccine arrived in Kinshasa from Geneva on 17 June. It is hoped that 4600 of these dose of vaccine will arrive in Mbandaka at the end of this week next Saturday ", said Fadela Chaib, WHO speaker adding that this type of vaccination effort has been effective in monitoring Ebola epidemic in eastern DRC.
Since the start of the vaccination efforts on June 5, 3648 people have already been vaccinated. This includes over 600 front-line health agents. Vaccination activities in Bolomba also started this weekend. In addition to vaccines, essential supplies including vaccines, test kits and personal protective equipment were shipped from Goma and arrived on Monday in Ecuador.
The Ebola epidemic in Ecuador province in western DRC, which began on June 1, affects five health areas. The last two affected health areas, Bolomba and Iboko, are about 200 kilometres from where the first case was identified in Mbandaka.
No new cases for 7 weeks in eastern DRC
A new confirmed case has been reported for the day of June 17
"He is a 35-year-old man who died in the community, of Moke health area, in the of health area", tweeted Thursday night the WHO office in the DRC. As of June 17, 18 cases (15 confirmed and 3 likely) of which 12 deaths have been recorded since the beginning of this epidemic, a death rate of more than 65 %. Two health agents are among the cases contaminated with the virus.
On the ground, WHO is strengthening its teams in Bolomba and Iboko. "Teams are expected to arrive at Bolomba and Iboko today on Friday", said Ms. Chaib. WHO has some fifty already experts in the field, supporting the Congolese Ministry of Health and its partners. She is responding to the epidemic in the province of Ecuador.
Twelve more people were deployed from North Kivu to Ecuador and arrived this week.
With regard to the Ebola epidemic in North Kivu, the United Nations Agency reports that it had " a lot of difficulties in Butembo where there was a lot of community resistance ". " The problem was less important in Mangina, for example, which find an hour drive ", notes WHO in its note distributed to the media.
In this eastern region of the DRC, WHO notes that no new confirmed cases have been reported, for the 51th consecutive day.
"There are no confirmed cases in the 3 functional community centres", said WHO's spokesperson.
The accumulation, as of June 2020, 17, is 3463 cases (3317 confirmed and 146 likely) including 2280 deaths since the outbreak of the epidemic in eastern DRC. All 29 affected health areas have not reported cases in at least 42 days.