Thread – Did the ChiComs Hack the Election?

1. Patrick Byrne (founder of overstock-dot-com) has been in the news lately (at least in independent media!), having been present in the White House meeting last weekend.
3. Byrne has been consistent in his exposure of foreign election meddling/hacking and support for President Trump. He is a thorn in the side of Wall Street, a de-centrist, and a Bitcoin/crypto advocate.
4. He joined a "white hat" cyber team that started more than a year ago and funded them since the summer, including adding more ethical hackers to understand all the issues, flaws, gaps, and design of Dominion.
5. "QSnatch" malware is the one backdoor for ChiCom hackers (or other states) to replace credentials of election officials at the voting stations remotely and far away.
7. Along the same lines, a cybersecurity expert and friend passed on the following commentary after watching an earlier Byrne interview here:
8B. The PBS NewsHour interview with Alex Halderman:
8C. And the OAN interview with Ron Watkins:
9. At 25:20-26:45 in the Patrick Byrne interview, he says foreign actors, particularly China, could have and did influence the election because of "QSnatch" that was infecting many Dominion servers.
11. Now, I haven't heard anyone else mention this "QSnatch" malware in relation to Dominion, but if their servers were indeed infected with this malware, the following details from the above Hacker News article are notable:
11A. The malware infects not just software, but firmware. This is no easy task for any random hacker to achieve.
11B. The malware targets devices manufactured by QNAP, a Taiwanese electronics company. China targets Taiwanese companies all the time.
11C. CISA and NCSC don't know how it's spreading. There are a few possibilities to explain this, but the most compelling to me is a supply chain attack, where devices get infected with the malware while they're on their way to the customer.
11C1. With QNAP being a Taiwanese company, again, China has the most opportunity to perform such an attack. CISA and NCSC even hinted that a supply chain attack might indeed be the infection vector.
11C2. In the Hacker News article, they said: "Verify that you purchased QNAP devices from reputable sources."
11D. The malware has only relatively recently been quickly spreading in North America and Western Europe, particularly in Germany. Funny how these places just happen to be where US election data got processed, and how this started just about a year before the election.
11E. The malware has five "modules". All five of them pertain to remote control over the infected device and any data it holds. This would have made it very easy for the malware authors and anyone they gave access to to tamper with the election.
11E1. I actually think all five of these modules together is overkill; some of these modules are redundant!
12. China is one of the few actors with the capability and opportunity to create and deploy such a malware.
13. The timing of the malware's rise, the locations of its spread, and the targeted nature of its functionality all imply that it was designed specifically to interfere with the US election. China is the most likely culprit behind this malware. [unquote]
14. This is some great analysis, as Communist China had the motivation, opportunity, access, and expertise to use this malware to influence the outcome of the election. ///The end.
You can follow @STUinSD.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.