yep, here will all the problems begin for the police and the justice department to do their work and to stay in the Belgian context
belgian critical infrastructure has its website in France ......
this is the googledork site:aznetwork.eu/
does this mean that charleroi airport doesn't have the money to host its own website on a real dedicated server maybe this is one of the causes of the problems and makes low hanging fruit or a backdoor into your own infrastructure
and this is one alert known to Google
and this is what virustotal says, of which only three sites are blocking this address
and here is even more information from
the script is that dangerous that various readers have told that their antivirus stopped access to this site
because of the script that was mailicious
now we didn't do anything
just took a screenshot
easy to find on the cloud
remember the heartbleed vulnerability that was discovered ?
so we will check that one, but just thinking the phpmyadmin so openly published ?
and the cerficate would have been good if one would have followed the standards and paid a bit more than 100 euro's
and if you go to phpadmin page itself, you get the following warning from Firefox
these are the versions of PHP that you should use today if you have a strategic website
this is the configuration of their website today
according to http://cybermap.kaspersky.com/
without the CERT we were the 4th most infected and so not to be trusted small country in the world
since that the CERT is there we have gone immediately to the 40th place and better only because they resolve several thousand cases each year and in a small country that makes quickly a difference
they are more made to be easy to guide and transmit information than to secure it
According to the relatives of a soldier, the other day he called them and said that he and his colleagues are forced to sign contracts. Parents banned Vilhovik do it, and he agreed, assuring that does not want to sign anything, as to serve him just two months - on November 7, soldiers would have to go home.
However, in the evening of the same day he called his older sister and said that he had signed a contract, without explaining why he was so quickly changed his mind. The next day, the soldiers got on the phone with a friend who spoke in detail about how forced to sign contracts. According to the soldier, he and his colleagues were threatened and vandalized tickets.
"The captain said the following sentence: I have you now on contract, and if you do not sign, I'll sign myself," - said the second soldier sister Nina Vilhovik. The same phrase repeated their relatives and other conscripts.
Later the family Vilhovika appealed to the Committee of Soldiers' Mothers and consulted a lawyer, who advised them to make a list of complaints and forward them to the legal authorities, and after receiving complaints call the soldier and tell him that he and his colleagues were going to write a report on the termination of the contract."
this is just a picture click the link and download the player
this is what De Standaard is writing today based on several sources
interesting to read that even in a critical infrastructure like an airport it is possible that there in infected infrastructure connected or in it or that infected infrastructure can be inserted in your infrastructure
we are talking about an airport in which there are 4 million users
and there was a heartbleed problem on the form in which people could personalise their services and that was mentioned in may while the alert was going out in april, which means that it was one month active
did they ask the users to change their password because nobody wants to say that there was a problem
and that is probably the reason why this problem has come to the attention
internally nobody wanted to know, the direction said that they weren't informed that there was a problem
they maybe didn't even know that you need a full comprehensive ITsecurity policy or that you need some level or urgency and that it is something that needs always ever more resources
well it can all be a scam
but what if it is true
well it can be a honeypot
and even if not it can be that there are a lot of coppers between them or not
but even than it is time for TOR to clean up its act and to bring such sites down
and for each you will find his particulars and his preferrences in a pop up
one is even more strange or disgusting than the other
strange because there are enough things that you could use to check
some thought that this botnet wasn't active anymore on the Belgian network but it seems as active as ever and has infected an imported number of computers
they aren't active for the moment but that doesn't mean that DNS.be has blackholed them and blocked them so that they can't be used again
and even this domain is not the trademark of this firm, opendns.com is a critical part of the internet and one shouldn't sell those names locally without being sure that you sold it to the real owners
even if you said that the botnetactivity was stopped in 2011 even if it was one of the most intense collectors
the active list of control and command centers is here https://palevotracker.abuse.ch/blocklists.php?download=combinedblocklist