● 07.29.23
Gemini version available ♊︎
●● Microsoft Windows Kills, Staff in Ambulances Cannot Function Due to Apparent Microsoft/Windows Breach (Ortivus)
Posted in Deception, Microsoft, Security, Windows at 11:23 am by Dr. Roy Schestowitz
Video download link | md5sum f61ec70272c7d04fdf6f006ec21bc29aThe NHS and Microsoft TCO Creative Commons Attribution-No Derivative Works 4.0
http://techrights.org/videos/ambulances-and-microsoft.webm
Summary: What the media calls “cyber attack” may in fact be a complete system breach and what it conveniently blames on some obscure supplier is likely a serious incident implicating Microsoft, resulting in deaths of people
THIS article is well overdue. We planned to write about the topic as soon as the media had broken the story, but we still needed definitive proof of ambulances or ambulance services being impacted by a Windows/Microsoft shop. Now we have what we needed.
As a little bit of background, consider reading our 2020 series about how Windows in hospitals kills a lot of people, probably more people than COVID-19 killed.
“As a little bit of background, consider reading our 2020 series about how Windows in hospitals kills a lot of people, probably more people than COVID-19 killed.”
The first report we saw about the ambulances was in a British tabloid, the Daily Fail (notorious and controversial domestically and abroad). My wife saw a similar story (saying “cyber attack”) in the Microsoft-friendly and Bill Gates-bribed BBC (or BillBC). Calling it a “cyber attack” is misrepresenting the problem, shifting blame to another party. The Daily Fail used the same term (the headline was “Cyber attack hits two ambulance trusts leaving hospitals without access to electronic patient records”).
But what really happened? As we showed recently, in the case of London’s municipality, they tend to downplay if not lie about security incidents. They belittle the severity and impact.
As one associate explained early in the past week, “if it can be confirmed by a legitimate paper or authentic source, then it goes in the Windows Total Cost of Ownership (TCO) section. Too bad no news sites are onto the TCO aspect any more. It was discussed for a while about 20 or so years ago. The extra electricity used by Windows and Microsoft software in general is an environmental problem at-scale.”
“But what really happened?”
Not too long later we saw more reports with no substance in them, except Microsoft spin (offloading the blame).
This Microsoft Windows TCO story was published with “cyber-attack” (or “cyberattack”) in the headline just 3 days ago:
>
>
Several UK NHS ambulance organizations have been struggling to record patient data and pass it to other providers following a cyber-attack aimed at health software company Ortivus.
>
In a statement, the Sweden-headquartered software vendor said it was subject to a cyber-attack on July 18 which hit UK customer systems within its hosted datacenter environment.
>
The brand “Ortivus” says nothing about which technologies were to blame. Where’s the technical journalism?
Microsoft shills are in high gear spinning the situations to deflect from proper attribution.
So what does Ortivus use? Let’s examine their site:
Image: Outlook at OrtivusOrtivus uses Microsoft for mail. No proficient (at technology) company would do that.
Image: Ortivus hiding behind a CDNSo it’s a Windows shop with Clownflare as a CDN (dangerous outsourcing to another continent, to a flailing and failing company). Hiding behind a CDN is a sign of weakness. They could use something like Varnish instead. If they had skilled staff that can follow a simple manual. Microsoft drones are not skilled staff.
Well, no one except a Microsoft shop or Microsoft partner would even consider running IIS.
Why is nobody in the media blaming the technology? Why are they blaming a mere brand of some firm? They blame a “third party supplier” for that breach but that is not mutually exclusive with Windows being at fault. Here is some shallow coverage that came later:
●●●● Cyber attack on IT supplier hits two major ambulance trusts | Computer Weekly
●●●● Cyberattack Investigation Shuts Down Ambulance Patient Records System
●●●● Software Vendor Attack Slows Down 2 UK Ambulance Services
So they blame “Software Vendor” or “IT supplier”. One that runs on a Windows server no less… in 2023. “They are also conflating an attack with a breach,” one reader noted, and “that is another small clue [plus] the Netcraft report also implicates them with an SPF of outlook.com.”
“The video above is taking on all the “supply chain attack” FUD which has been directed at FOSS and redirecting it back at Microsoft because this was the quintessential supply chain attack.”
So what we have here is no ‘smoking gun’ but a lot of circumstantial evidence and clue they’re probably “throwing the subcontractor under the bus” to distract from Windows involvement. Since some past incidents they have been careful not to announce Windows deployments and especially not Sharepoint or other shambolic monstrosities.
The video above is taking on all the "supply chain attack" FUD which has been directed at FOSS and redirecting it back at Microsoft because this was the quintessential supply chain attack. The FOSS susceptibility is theoretical, this one was a real-life exploit using existing Microsoft deployments.
“We’re meant to think that something being defective by intention will “create jobs”.”
One can hope this latest incidents leads to increased awareness of not just the TCO of Windows but the importance of upgrading to other systems, specifically GNU/Linux. The recent Norwegian Windows breach was a quintessential example of a supply chain compromise, one with which they’ve tried repeatedly to smear FOSS with. Yet in real life the first big state level one turns out to be Microsoft.
If security were part of the design, this Windows-contrived ‘shortage’ would not exist at all. The parable of security as an after-market add-on is conveniently named “Broken Window”. We’re meant to think that something being defective by intention will “create jobs”. █
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink > Image: Mail
Send this to a friend
----------
➮ Sharing is caring. Content is available under CC-BY-SA.