MELBOURNE, AUSTRALIA – 24 May, 2017 –
“EYES SHOULD BE POINTING CLOSER TO SPAIN & INDIA”
“Potential ‘WannaCry’ Exploiters early trails may show evidence to researchers that is useful in referencing back to the ‘chain’ of events”, Mr. Smith said at a press conference today.
Simon Smith, Cyber Security Forensic Investigator, Master Software and Social Engineer of eVestigator expert will now submit to the public all IP traffic raw from Thundercrypt – engineered from primarily this conversation at 11pm 24/05/2017 AEST.
Smith used proprietary counter intelligence techniques to hunt down the potential originator of said exploitation and exposed an interesting origin which may match well with the BitCoin trail.
Smith says that, “As a programmer, it is so very easy to open up the binary of an EXE and read the text string of a ZIP/UNZIP DLL and compare it with the same DLL in millions of places. I know TOR is involved but this also shows real IP’s and those behind VPN’s who should cooperate with law enforcement to provide true login credentials (as they do hold)”. Smith says “this is a human method that may show insights to real locations, and real people, and well, has worked on hundreds of Cyberscammers and Cyberstalkers, and Cyberhackers – but this is a little different, but let’s wait and see, it may be useful when matched to real TOR monitoring and real VPN statistics, and of course, real IP’s.”
Smith says on the 24/05/2017 he will show the world what data was received. It shows original IP’s coming from India and Spain but mostly Spain. It could be also seen to have a US link. He gives this to others to add to their research.
Mr. Smith does not contend that this is going to find the Cybercriminals, but says, “at least he did something about it, instead of just talking.”
VPN PROVIDERS ARE STRONGLY ENCOURAGED TO CONTACT LAW ENFORCEMENT MATCHING THE DATE AND TIME WHICH WILL BE SHOWN IN AEST – UTC-10, SYDNEY AUSTRALIA TIME.
Company Name: EVestigator Cyber IT & Forensic Expert IT Services
Contact Person: Simon Smith