 |
On June the 3d, 2011,
The Northeastern region of the United States was hit by an unusual type of cyber
attack, that is called “The Virus Rain”. The attack caught the region by
surprise and hundreds of incident response teams scrambled to catch up with the
attack.
Systematically and with a progression of 10 minute interval, the attack spread
out very fast and hit the whole region like a hurricane bringing down the power
grid, followed by the metro rail grid, Metro North, the banking cash outlets the
ATMS, and the Telecom networks Verizon, Sprint, and AT&T.
The Computer Emergency Response Team (CERT), estimate over
200,000 different types of viruses have been unleashed to paralyze the region.
Later, it was referred to as “The Virus rain”
! The Virus Rain® is a
fictitious massive cyber attack, but it may become reality soon. All the
technologies of the attack are present today; but more importantly, it will be
fueled with anti-American sentiment. The Virus Rain® was designed, and launched
from several remote stealth cyber launch pads. It hit the heart of New England
with its payload of Remote-control viruses, mutating stealth-smart bombs,
backdoor hemorrhoid zombies, and autonomic heart-attack, and kamikaze agents. It
was like the four horsemen of Apocalypse, or the final battle of Armageddon. All
this will be done on Internet!
The global malware market is maturing and is
phenomenally open-ended, globalized, and virtually real. It is a sleeping giant
ready to wake up anytime. There are 1500 virus supermarkets in the
world, selling underground custom-made packaged attacks for different purposes.
In fact, some governments have already built their cyber war labs to fabricate
their own cyber weapons. The US is aware of such labs and has the capability to
neutralize most attacks. The Pentagon plans to build several "cyber bunkers" to
counter attack such invasion. Most westernized nations have started to build
defensive cyber bunkers, while other South East Asian countries
have already built offensive cyber "launch pads" that will be used for cyber
invasions. The rest of the world, including the rich nations of the Gulf
region, is way behind the curve, and has to count its blessings and pray hard.
They have not been paying much attention to this new phenomenon. Eventually they
will become victim of the modern information
warfare.
|