Microsoft and the Freak attack is nothing new. I spent over 19 hours with Microsoft tier 3 trying to explain how important this was over 2.5 years ago. That's how long this has been affecting the world. 92 billion passwords, Heart bleed, Target hack, and that's just the little things. I'll break down exactly what is happening and how. Then you tell me if what were being fed is just a little bit of *%$# and the tip of the iceberg.
And here's how the story really goes:
I made a video on my personal facebook page that covers the full scope and path that the remote takeover undergoes as it infects and reconfigures your system. It looks something like this: Click infected site link/web mail/hover mouse to peak address->Initiates java script, xml script, Powershell script->Windows prompts local user that updates are ready to install->forces a reboot or installs "updates" upon hard or soft boot->Windows PE Enviornment is installed during shutdown->reboot invokes "Windows is now configuring updates" while the PE environment with x new images are installed->New image includes FreeDos Bios with Fedora OS->Fedora Image contains udevil and fstab config that allows all ips/network types/File Systems/users/VPN/All Ports to be exposed->machine continues boot with new bios and OS as PXE Boot->Local Box connects with Remote Server->Remote Server uses aa syspreped VHD file acts as the platform for your UAC->Remote server is configured and reflects locally with a check to your bootcfg or bootini as it will yield GUIDs where it would normally have default ->In realtime this is where your Bios now Starts to load->You boot your PC and enter credentials as normal-> issues begin to arise with web page address being abnormally long, system clock may be inaccurate, Software yielding "trusted Installer" errors, system permissions are off, and most importantly, security/authentication on all https:// pages are now all spoofed->ALL file History is recorded on remote server that is hosting your system->ISP Connection is hacked at the WAN port using a VPN software based out of Ireland. The DNS you will be forced to use is:
216.1.94.142
209.85.243.99
I'll add the data specifics and screen shots shortly. Welcome to my nightmare of 3+ years.