Tuesday, June 23, 2020

who is Molendo Masamba Marechal?!! Really Uganda is and cannot be interested in him!

In early June 2020, staged fight was picked up in front of the various security service offices in Aru territory located north of Ituri on the border between the DRC, Uganda and South Sudan.
A source close confidant to this allegation who affirms that this data was allotted to the militia called "Army of the Congolese People, ARDPC" in acronym, led by a certain Marshal.Some indications in the file/documents read: "The ARDPC demands the immediate, immediate and unconditional arrest of Mr. Joseph Kabila, as well as his transfer to the ICC for 12,000 cases of Congolese deaths, including Tchebeya, General Mbuza Mabe , General Mamadu Ndala… ”.
What must be remembered, according to our source, who requested anonymity, is that this group is led by a certain Molendo Masamba Marechal, a FARDC deserter.
As its main objective, it claims to "free the Congolese from the yoke of the Rwandan subjects who allegedly infiltrated the FARDC with the help of the Kabila regime and the arrest of former Head of State Kabila Kabange and his transportation to The Hague to Netherlands to be tried by the ICC.
What do we know about the identity of this rebel leader?

- His name is Molendo Masamba Marechal.
- He is from the Madimba Territory, Kongo Central Province.
- He is a former "Kadogo", recruited by the AFDL in Bas-Congo (Kongo-Central) in the years 1996.
- He evolved in the army between North Kivu and South Kivu where he allegedly committed many blunders against the population.
- He was transferred to Ituri following charges brought against him by the people of Uvira / South Kivu.
- In Ituri, he joined the 1st battalion as Second Commander OPS-RENS, based in Marabo / Irumu Territory.
- During the establishment of the Regiments, he was promoted to Second OPS-RENS Commander, from Colonel Bakavu of the 904th Regiment based in Djugu.
- He was arrested in November 2012 and imprisoned on December 03 of the same year in the Military Auditorate / Ituri.
-They allege that he escaped in 2013 after having faked an epilepsy crisis for which he was sent to the Police hospital from where, he succeeded in deceiving the vigilance of two guards committed to his surveillance, to join Kampala via Mahagi.
- They allege that he maintains contacts with Ugandans to finance his militia.

Monday, June 22, 2020

It doesn't matter which OS running on your computer,you should be careful of websites you visit

Now macmalware like macOS Shlayer and macOS Bundlore are being spread by hackers.
Most users when surfing the web realize that there are malicious sites they need to be wary of. But, seeing that the search engines havethey normally use such as Google and Bing come from reputable companies, many assume all is safe there. This couldn’t be further from the truth.
Turns out that you can encounter harmful search results in all of these engines. This shouldn’t come as surprise since Hacker have done it for quiet long.
Such an incident was recently uncovered by cybersecurity firm Intego who has discovered a new MAC malware that not only evades Apple’s own security but also has been completely undetected on VirusTotal. It consists of “unique new variants” of the previously known OSX/Shlayer and OSX/Bundlore malware.
See: Smart home devices can be hacked within minutes through Google search
For your information, in January 2019, VeryMal, a group of cybercriminals was identified using
Shlayer malware to infect Mac devices. The group employed steganography techniques to prevent detection and embedded malicious code in advertisements and popup images.
The same malware was also identified earlier this year in January installing the “Any Search” bar on the targeted Mac device via Adobe Flash updates to deploy adware so that illegal ads could be displayed. Apart from adware, the malware was also intercepting and collecting browser data from the target device and alter search results to deliver a large number of ads.
On the other hand, macOS Bundlore is adware, a type of malware known for displays unwanted advertisements on infected Mac devices since 2015 . It not only uses different techniques to bypass Mac’s security mechanism but also collects personal data from the device and redirect users to malicious sites.
In the ongoing campaign, hackers are using Google searchers to spread these malware. Spread in the form of a trojan horse by posing as a disk image that can be used to install
Adobe Flash player ; users are redirected to the installation page through malicious google searches.
For example, a user may search for the exact title of a YouTube video and then be greeted warmly with search results that would lead them to a page telling them that their Flash Player needs to be updated. Certain warnings are also given alongside to make it seem more serious and lure the user in.
A screenshot shared by researchers show how the popup looks like:
Once the user proceeds to finally download and mount the disk image file, instructions are displayed detailing how the flash player can be installed.
By following these, the installer app opens where eventually a bash shell script runs in a terminal extracting a “self-embedded, password-protected .zip archive file, which contains a traditional (though malicious) Mac .app bundle.
The researchers further explain in their blog post the subsequent steps that follow to successfully complete the attack:

"After installing the Mac app into a hidden temporary folder, it launches the Mac app and quits the Terminal. All this takes place within a split second.
Once the Mac app launches, it downloads a legitimate, Adobe-signed Flash Player installer, so that it can appear to be genuine—but the hidden Mac app is designed to also have the capability to download any other Mac malware or adware package, at the discretion of those controlling the servers to which the hidden Mac app phones home. "


In this way, the user’s machine is compromised.
To conclude, search engines like Google always try their best to keep away such search results but as with everything in security, success isn’t guaranteed all the time. Hence, users can lead from the forefront and try to only download files from reputable websites.
For those of you who may have been infected, you can try removing the malware by using Intego’s VirusBarrier if your anti-virus solution hasn’t started to detect it yet.
Abusing Google Service is common
This is not the first time when cybercriminals have abused Google to spread malware. Last year, 
Moreover, in 2017, hackers were also found exploiting Google Search results to distribute Zeus Panda Banking trojan using SEO-malvertising and SERP Poisoning.
In October last year, researchers identified a strange and infrequent behavior at Googlebot servers where malicious requests were originating from them. After digging further, it was discovered that hackers were using Googlebots in cryptomining malware attacks.

Huawei 5G still highly suspected of espionage by the western powers who opts for competitors like Nokia and Erickson

The Trump administration has repeatedly accused Chinese tech giant Huawei of engaging in illegal surveillance on behalf of Beijing, effectively banning the company from working with American businesses. However, a recent ruling by the US Commerce Department has now permitted US companies to work with Huawei on developing 5G standards.
Swedish company Ericsson and Finnish company Nokia are “best positioned to compete” with Huawei, but the West has to “pick a horse or horses” to challenge the Chinese tech giant, US Attorney General William Barr told the host of the television programme ‘Sunday Morning Futures’, Maria Bartiromo.
“In the last decade or so China has been putting on a great push to supplant us, explicitly, they wanna be the leader in all the future technologies and they want to dominate the economy,” Barr said. “So what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be a technological leader of the world.”
According to Barr, Ericsson and Nokia have thus been “the strongest Western competitors” in the technological sector, effectively pushing American allies to “rally around” these actors, either through “private ownership” or “state involvement”.
“Huawei has the backing of the Chinese government and all the Chinese government money,” the attorney general explained. “So just giving an example for 5G, the network facilities, then the total global addressable market is probably around $90 billion and the Chinese government has set up a fund of over one hundred billion, to subsidise it so they can go to some countries and say, hey, we'll put this in cash free, you know, very cheap money.”
— 
The comment came following reports that the US government could be considering the option of acquiring a stake in one of the European companies. However, Barr said that it was not up to the Justice Department to decide on whether to invest in Swedish or Finish tech giants.
The attorney general still reiterated the earlier comments of the Trump administration that the Chinese company was “not competing fairly” on the international market by “stealing” American intellectual property and “cheating” in order to overtake the United States as the technological leader.
“If they start leading in some of these fundamental, foundational technologies like 5G, which will be the platform of much of our future manufacturing in the United States, they will have a tremendous leverage of the United States,” Barr argued, adding that this will eventually create an “ultimate leverage over the West”.
The Trump administration has long accused Huawei of conducting espionage on behalf of the Chinese government, allegations which have been expressly denied by the company management and Beijing. In May 2019, Huawei was restricted from working with US businesses and prohibited from obtaining American goods and technologies. However, following a recent ruling by the US Commerce Department, American firms have now been permitted to work with the Chinese tech company on the development of standards for the fifth-generation superfast networks.

The World Health Organization (WHO) and Congolese authorities are continuing the vaccination campaign to stop the spread of Ebola virus in Ecuador province

Democratic Republic of the Congo (DRC).
Building on lessons learned from previous epidemic outbreaks, the United Nations Agency supports health authorities to carry out 'ring' immunization with people at high risk of Ebola.
" Nearly 9200 dose of vaccine arrived in Kinshasa from Geneva on 17 June. It is hoped that 4600 of these dose of vaccine will arrive in Mbandaka at the end of this week next Saturday ", said Fadela Chaib, WHO speaker adding that this type of vaccination effort has been effective in monitoring Ebola epidemic in eastern DRC.
Since the start of the vaccination efforts on June 5, 3648 people have already been vaccinated. This includes over 600 front-line health agents. Vaccination activities in Bolomba also started this weekend. In addition to vaccines, essential supplies including vaccines, test kits and personal protective equipment were shipped from Goma and arrived on Monday in Ecuador.
The Ebola epidemic in Ecuador province in western DRC, which began on June 1, affects five health areas. The last two affected health areas, Bolomba and Iboko, are about 200 kilometres from where the first case was identified in Mbandaka.
No new cases for 7 weeks in eastern DRC
A new confirmed case has been reported for the day of June 17
"He is a 35-year-old man who died in the community, of Moke health area, in the of health area", tweeted Thursday night the WHO office in the DRC. As of June 17, 18 cases (15 confirmed and 3 likely) of which 12 deaths have been recorded since the beginning of this epidemic, a death rate of more than 65 %. Two health agents are among the cases contaminated with the virus.
On the ground, WHO is strengthening its teams in Bolomba and Iboko. "Teams are expected to arrive at Bolomba and Iboko today on Friday", said Ms. Chaib. WHO has some fifty already experts in the field, supporting the Congolese Ministry of Health and its partners. She is responding to the epidemic in the province of Ecuador.
Twelve more people were deployed from North Kivu to Ecuador and arrived this week.
With regard to the Ebola epidemic in North Kivu, the United Nations Agency reports that it had " a lot of difficulties in Butembo where there was a lot of community resistance ". " The problem was less important in Mangina, for example, which find an hour drive ", notes WHO in its note distributed to the media.
In this eastern region of the DRC, WHO notes that no new confirmed cases have been reported, for the 51th consecutive day.
"There are no confirmed cases in the 3 functional community centres", said WHO's spokesperson.
The accumulation, as of June 2020, 17, is 3463 cases (3317 confirmed and 146 likely) including 2280 deaths since the outbreak of the epidemic in eastern DRC. All 29 affected health areas have not reported cases in at least 42 days.

ADF in afternoon of Saturday June 20, 2020 invaded the locality of Vukaka located in chiefdom of Banyali-Tchabi, territory of Irumu in Ituri.

ADF in afternoon of Saturday June 20, 2020 invaded the locality of Vukaka located in chiefdom of Banyali-Tchabi, territory of Irumu in Ituri.
Richard Balengilyao, one of the important members of region who delivered the information through a press release sent to media outlets puts forward a report of at least 10 civilians killed with the machetes, burned houses and several goods taken away, which caused the vacating of the population to neighboring villages.
While condemning the insufficiency of the FARDC soldiers in the country, Mr. Balengilyao asked the authorities to provide assistance to the displaced persons and to the national army to accompany the families to the scene of the tragedy for a dignified and secure burial of the victims .
In May 2019, more than 20 civilian residents of the same entity were killed and 60 others kidnapped in a series of attacks attributed to these ADF Islamists based in the neighboring region of Beni in North Kivu where they are fleeing operations. carried out against their positions by loyalist forces.

DRC army in Ituri captures Pkaki Bura Dieudonné, a former lieutenant colonel FARDC who is a ringleader of all the attricities that CODECO has committed in this province

His name is Pkaki Bura Dieudonné, a former lieutenant colonel FARDC who was captured by the 312th army battalion in Ituri.
Lieutenant Jules Ngongo, spokesman for the armed forces who confirms the information, indicates that the man is part of the gang of these “little thugs” who kill and burn houses belonging to the peaceful population in the territories by Mahagi and Djugu.
"According to the information we have, he is one of the gang of thugs who are behind the killings and the burning of houses in the territories of Djugu and Mahagi. For security reasons we cannot reveal his position by the fact that this man who is wanted by his own after he was arrested by the Armed Forces "he affirms.
Mr. Pkaki Bura's arrest took place near the mining town of Mungwalu to the west of Djugu territory.
In addition, the army spokesman in Ituri added that there are many such soldiers in the wild and that efforts are being made to track them down.
Several other leaders of the CODECO militia have already been arrested in the past. Two of them, Tseni and Kesta were even transferred to Kinshasa where they are detained, while Justin Ngudjolo, commander-in-chief and founder of this rebel group, was shot dead on March 26.

DRC looses two soldiers in a rebel attack in FIZI


2 military forces of the Democratic Republic of the Congo (FARDC) were killed on Saturday, June 2020, 20 in a rebel attack against their position in Kamombo in the territory of Fizi in South Kivu.
 Captain Dieudonné Kasereka, spokesperson for the operating sector Sukola 2 South Kivu said that it was the coalition of armed groups Ngumino, makanika's group and other armed groups that attacked this FARDC position, located in the North Balala group, in the area of Tanganyika.
" During the attack, the military made a strategic tactical plan to limit the security damage as this location that is occupied by several civilians. 2 FARDC soldiers lost their lives in this militiamen attack ", he explains.
Captain Dieudonné Kasereka pointed out that Operation Sector command 2 South Kivu condemns the acts of violence committed by these local armed groups under the command of Colonel deserter Michel makanika Rukundo.
He says that these armed groups still do not want to join the peace process promoted by the head of state.
It should be remembered that clashes between Loyalists and armed groups have been repeated since last May in the territory of Fizi. On 13 June, another military was in an ambush by the Mai-Mai still in this part of South Kivu
You can also read this!
You also read this!