Skip to main content

Vastaamo's hacking incident is still under investigation.



The Vastaamo's hacking incident is still under investigation. That case where hackers attacked a psychotherapy company and stole a client's information remains dark. The sources are outside Europe. But the person or persons who made that attack can be Finnish. Those persons can travel to another country. Or they can have cooperatives that opened remote access to computers. 

And that means those people can sit in the living room somewhere in Finland. officially, the purpose of that hacking incident was simply to blackmail money. But there is the possibility. That some "hostile actors" might want to search the names of the members of the Parliament. The fact is that also regular criminals can be interesting in powerful people's psychotherapy. 

Or they can try to sell that information to the FSB or Mafia. The fact is that. Also, regular criminals can operate under the control of the FSB. And that kind of security service can blackmail people to cooperate with them. If the person refuses to cooperate that causes trouble.  But the fact is that psychotherapy information is always confidential. And there are a lot of people who want that kind of information for blackmailing purposes. 


The next part is pure speculation. 


Sometimes I have thought could that stolen information was meant for targeting people in the dirty games of politics. Or was that data crime meant to make people keep their mouths shut about things, that somebody wants to hide, like selling depression medicals for narcotics addicts? Only people who are behind that case knows the answer. 

Sometimes this kind of hacker attack is made by covering the cooperative who is working with this kind of information. If some people the psychiatric institutes are selling patients' information. 

In that case, there is enough that one person makes this kind of thing. That person can be some drug addict who sits in the groups. But it can be somebody in the nursery staff or micro support. Who knows the truth? 

There is enough that the person who makes the data break has access to usernames and passwords. Maybe, somebody wrote that passphrase that gave access to the server on the paper. And then that person forgot that paper in some bar. That kind of hacker action can cover the action where some worker or patient steals things like medicine packages where is the patient's name. 

The fact is that narcotics users are sometimes selling some psychiatric data for their mates. They can also try to steal medicines where is the patient's information. Those medicines are very sensitive things. And some people would want to use that kind of information as a blackmailing tool. 


https://valtioneuvosto.fi/en/-/25235045/progress-made-in-investigation-of-vastaamo-hacking-incident-police-to-start-to-interview-victims-online


https://en.wikipedia.org/wiki/Vastaamo_data_breach

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

Facebook and dominance of the media.

The position of Facebook is dominating and that causes concern. Facebook is a well-known and commonly used service. And that thing causes that the information is starting to pile up in that service. That information contains data that we might want to hide. Facebook is a network-based service that can use for many purposes from marketing to intelligence.  Facebook was down and the thing cost about half a million dollars per hour to that service. That shutdown has shown how dominating that service has been growing. Facebook is a powerful tool. It can use to track the networks of people.  Artificial intelligence can show the network map of the people who are using that service. The data that travels between certain members of the network can show how often those people are contacting each other. There is a lot of criticism against Facebook but the fact is that everybody is using that thing.  The attitudes toward Facebook are conflicting. People are criticizing that service ...