Jun 12, 2022
Conti’s Attack Against Costa Rica Sparks a New Ransomware Era
Posted by Shubham Ghosh Roy in category: cybercrime/malcode
A pair of ransomware attacks crippled parts of the country—and rewrote the rules of cybercrime.
A pair of ransomware attacks crippled parts of the country—and rewrote the rules of cybercrime.
Chinese government-backed hackers have breached “major telecommunications companies,” among a range of targets worldwide, by exploiting known software flaws in routers and other popular network networking gear, US security agencies warned Tuesday.
“[T]hese devices are often overlooked by cyber defenders, who struggle to maintain and keep pace with routine software patching of Internet-facing services and endpoint devices,” says the advisory from the FBI, the National Security Agency and US Cybersecurity and Infrastructure Security Agency.
The agencies’ statement did not identify the victims of the hacking; the advisory was aimed at defensive measures to help organizations running the devices made by Cisco, Fortinet and other vendors, shore up their networks.
Researchers have taken the wraps off “Symbiote,” what they call a “nearly-impossible-to-detect” Linux malware that’s targeting the financial sector.
Cybersecurity researchers have taken the wraps off what they call a “nearly-impossible-to-detect” Linux malware that could be weaponized to backdoor infected systems.
Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim’s resources like a parasite.
The operators behind Symbiote are believed to have commenced development on the malware in November 2021, with the threat actor predominantly using it to target the financial sector in Latin America, including banks like Banco do Brasil and Caixa, based on the domain names used.
Ethereum, the world’s most used cryptocurrency blockchain network, passed a milestone test ahead of a highly anticipated technical upgrade without any major glitches.
Developers ran the latest software for the upgrade known as the Merge on Ropsten, which is one of the oldest so-called testnets of the network. The testnets are used by developers to find potential bugs and glitches before moving their applications to the blockchain. While the Merge has been carried out on other testnets earlier this year, Ropsten was seen as providing the most realistic technical environment and the best estimate for the outcome of the final process.
Žilvinas DeveikaIt’s much sooner than that. My prediction (that is almost 10 years old now) of an “early” appearance of a strong AGI is 2029. I am completely sure that it will either emerge or will already be there in 2030s.
24 Replies.
Marc O MonfilsAnd what strategies do we have in place to guarantee humanity’s continued relevance in the era of super intelligent machines?
Continue reading “Chinese hacking group Aoqin Dragon quietly spied orgs for a decade” »
You may want to think twice before giving the parking attendant your Tesla-issued NFC card.
According to multiple news reports, Twitter plans to give Elon Musk access to its “firehose” of raw data on hundreds of millions of daily tweets in an effort to speed up the Tesla billionaire’s $44 billion acquisition of the social media platform. The data-sharing agreement was not confirmed by the lawyers involved in the deal. Musk was silent on Twitter, despite having previously expressed his displeasure with various aspects of the deal.
Twitter declined to comment on the reports, pointing to a statement released on Monday in which the company stated that it is continuing to “cooperate” and share information with Musk, who in April entered into a legally binding agreement to purchase Twitter, claims that the transaction cannot go forward until the firm discloses more information on the frequency of bogus accounts on its network. He claims, without providing evidence, that Twitter has grossly underestimated the number of “spam bots” on its platform, which are automated accounts that typically promote scams and misinformation.
On Monday, the Attorney General of the State of Texas, Ken Paxton, said that his office will be investigating “possible false reporting” of bot activity on Twitter as part of an inquiry against Twitter for allegedly failing to disclose the scale of its spam bot and fake account activity. According to a source familiar with the situation, Twitter’s plan to give Musk full access to the firehose was first reported by the Washington Post. According to other reports, the billionaire may only have limited access.
As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers in Bochum have developed a new method to detect such manipulations. They monitor the systems with radio waves that react to the slightest changes in the ambient conditions. Unlike conventional methods, they can thus protect entire systems, not just individual components—and they can do it at a lower cost. The RUB’s science magazine Rubin features a report by the team from Ruhr-Universität Bochum (RUB), the Max Planck Institute for Security and Privacy and the IT company PHYSEC.
Paul Staat and Johannes Tobisch presented their findings at the IEEE Symposium on Security and Privacy, which took place in the U.S. from 23 to 25 May 2022. Both researchers are doing their Ph.D.s at RUB and conducting research at the Max Planck Institute for Security and Privacy in Bochum in Professor Christof Paar’s team. For their research, they are cooperating with Dr. Christian Zenger from the RUB spin-off company PHYSEC.
In a new letter, Elon Musk threatens to walk away from $44 Billion Twitter deal if the management doesn’t provide more data on total bot counts.
According to a letter sent by Elon Musk’s legal team to Twitter, “Twitter refused to provide the information that Mr. Musk has repeatedly requested since May 9, 2022 to facilitate his evaluation of spam and fake accounts on the company’s platform” and “It’s effort to characterize it otherwise is merely an attempt to obfuscate and confuse the issue”.
The letter also reminded that Musk does not believe the company’s lax testing methodologies are adequate so he must conduct his own analysis and “The data he has requested is necessary to do so”. The letter also said “Mr. Musk is entitled to seek, and Twitter is obligated to provide information and data”.