Source: Are You All In?
Source: Having a security management process is a must for all Government of Canada clients. The GOVPAGES.ca network server [o/o by veteran GOC client NCM Software Development Inc] is found to have hosted MALICIOUS SOFTWARE on two of it’s business web sites over a 32 month period during 2012, 2013, 2014. The intent of the GOVPAGES.ca hosted malware during these 32 months was to hi-jack visiting web browsers, breach their network security, steal digital property and take OS control of visiting computer networks. Continuous warnings [screenshots provided] were issued by Google Chrome, Microsoft IE, and Mozilla Firefox during this prolonged period of time. Government of Canada “cross-agency priority” [CAP] goals have cyber security at the top of it’s agenda. This subsequent report follows Public Safety Canada interdiction Oct 2014 and concerns host server GOVPAGES.ca, two NCM Software Development Inc registered internet domains [governmentcontacts.com and governmentmailinglists.com], NCM’s weak IT security posture and NCM’s persistent attempts to redirect visiting network browsers to IP 184.108.40.206 [a known (Russian orig/Romanian admin) distributor of malicious software]. This illicit activity carried out during 2012, 2013 and 2014 is corroborated by court admissible evidence.
A View from the Front Lines “Recent media attention has highlighted the proliferation of security breaches affecting us all. These security failures have not only resulted in significant expe…
Source: Google Chrome blocking access to NCM’s ‘browser hi-jacking site’ governmentcontacts.com while depicting a cyber crime in progress, zeros and ones falling to the ground as digital forensic evidence. Screen shot captured May 2013.