Is Your Computer Part of ‘The Largest Botnet Ever?’

source: krebsonsecurity.com  |  image: pixabay.com

 

he U.S. Department of Justice (DOJ) today said they arrested the alleged operator of 911 S5, a ten-year-old online anonymity service that was powered by what the director of the FBI called “likely the world’s largest botnet ever.” The arrest coincided with the seizure of the 911 S5 website and supporting infrastructure, which the government says turned computers running various “free VPN” products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime.

On May 24, authorities in Singapore arrested the alleged creator and operator of 911 S5, a 35-year-old Chinese national named YunHe Wang. In a statement on his arrest today, the DOJ said 911 S5 enabled cybercriminals to bypass financial fraud detection systems and steal billions of dollars from financial institutions, credit card issuers, and federal lending programs. Continue reading “Is Your Computer Part of ‘The Largest Botnet Ever?’”

Nigeria is emerging as a critical mineral hub. The government is cracking down on illegal operations

source: apnews.com (contributed by FAN, Steve Page)  | image: pixabay.com

 

ABUJA, Nigeria (AP) — Nigeria’s government is cracking down on illegal mining, making dozens of arrests of unlicensed miners since April for allegedly stealing the country’s lithium, a critical mineral used in batteries for electric vehicles, smartphones and power systems.

The recent arrests come as Nigeria seeks to regulate its mining operations of critical minerals, curb illegal activity and better benefit from its mineral resources. The clean energy transition, a shift away from coal, oil and gas and toward renewable energy and batteries has spiked global demand for lithium, tin and other minerals. Illegal mines are rife in the country’s fledging industry as corruption among regulatory officials is common and the mineral deposits are located in remote areas with minimal government presence. Officials say profits from illicit mining practices has helped arm militia groups in the north of the county. Continue reading “Nigeria is emerging as a critical mineral hub”

Mysterious Hack Destroyed 600,000 Internet Routers

source: wired.com  |  image: pixabay.com

 

If you have a crypto wallet containing a fortune but forgot the password, all may not be lost. This week, a pair of researchers revealed how they cracked an 11-year-old password to a crypto wallet containing roughly $3 million in bitcoins. With a lot of skill and a bit of luck, the researchers uncovered a flaw in how a previous version of the RoboForm password manager generates passwords that allowed them to accurately figure out the missing login and access the buried treasure.

Police in Western countries are using a new tactic to go after cybercriminals who remain physically out of reach of US law enforcement: trolling. The recent takedowns of ransomware groups like LockBit go beyond the traditional disruption of online infrastructure to include messages on seized websites meant to mess with the minds of criminal hackers. Experts say these trollish tactics help sow distrust between cybercriminals—who already have ample reason to distrust one another.

Continue reading “Mysterious Hack Destroyed 600,000 Internet Routers”

NSA Warns iPhone And Android Users To Turn It Off And On Again

source: Forbes.com (contributed by FAN, Steve Page)  |  image: pixabay.com

 

Updated Saturday, June 1: This article has been updated to include clarifcation around the safety of using public Wi-Fi networks and additional advice from the NCSC and FCC.

Although some people might worry about the National Security Agency itself spying on their phones, the NSA has some sage advice for iPhone and android users concerned about zero-click exploits and the like: turn it off and on again once per week.

How often do you turn off your iPhone or android device? Completely turn it off and then reboot it, rather than just going into standby mode, that is. I suspect that the answer for many people is only when a security or operating system update requires it. That, according to the NSA, could be a big mistake.

Users can mitigate the threat of spear-phishing, which can lead to the installation of yet more malware and spyware, by the same simple action. However, the NSA document does warn that the turn it off and on again advice will only sometimes prevent these attacks from being successful. Continue reading “NSA Warns iPhone And Android Users To Turn It Off And On Again”

3 North Koreans infiltrated US companies in ‘staggering’ alleged telework fraud: DOJ

 

source: yahoo.com (contributed by FAN, Steve Page)  |  image: pixabay.com

 

The Justice Department on Thursday unsealed an indictment charging three North Korean workers and a United States citizen with allegedly engaging in “staggering fraud” through a complex scheme where they secured illicit work with a number of U.S. companies and government agencies.

The indictment against the North Korean IT workers — using the aliases Jiho Han, Chunji Jin and Haoran Xu — alleges the group used fraudulent identities belonging to 60 real Americans to secure telework positions between October 2020 and 2023 that ultimately generated nearly $7 million in profits for the Democratic People’s Republic of Korea.

Continue reading “3 North Koreans infiltrated US companies in ‘staggering’ alleged telework fraud: DOJ”

Defense contractors face a long road on cybersecurity

source: axios.com (contributed by FAN, Steve Page)  |  image: pexels.com

 

Most defense contractors believe they’re too small and inconsequential for nation-state hackers to target them, a National Security Agency official told Axios.

Why it matters: China, in particular, has been laser-focused on targeting key American critical infrastructure, officials have warned. Continue reading “Defense contractors face a long road on cybersecurity”

Report calls for U.S. biodefense buildup

source: axios.com (contributed by FAN, Bill Amshey)  |  image: pixabay.com

 

A new report calls on all levels of government to strengthen U.S. biodefense measures and urges policymakers to codify parts of a national strategy to address an array of biological threats.

Why it matters: Threats in the form of infectious disease outbreaks, lab accidents and biology-based weapons are expected to increase in the coming years, according to the report’s authors and other experts.

  • But biodefense investments get caught in a cycle of “panic and neglect” — an intense focus for a short period, after which policymakers, funders and the public move on, the report notes.
  • “Every future administration must ensure that the National Biodefense Strategy keeps pace with the rapidly evolving and increasing biological threat,” the authors of the 2024 National Blueprint for Biodefense write. Continue reading “Report calls for U.S. biodefense buildup”

The rise of Perplexity AI, the buzzy new web search engine

source: zapier.com  |  image: wikipedia.com

 

Perplexity’s answer engine is altering the way we interact with the internet and might even one day challenge Google’s search dominance.

Perplexity calls itself a “Swiss Army Knife for information discovery and curiosity,” but it’s essentially an AI-powered search engine. Think of it as a mashup of ChatGPT and Google Search—though it’s not a direct replacement for either. Really, it’s the direction Google is trying to go with Gemini—but less chaotically implemented. 

It works like a chatbot: you ask questions, and it answers them. But it’s also able to seamlessly pull in information from recent articles. It indexes the web every day, so you can ask it about recent news, game scores, and other typical search queries. 

But Perplexity is also a kind of search engine. Instead of presenting you with a list of websites that match your query, Perplexity gives you a short summary answer along with the references it used to create it. In some cases, the summary will be all you need. In others, you’ll want to dive into the different sources.

While Perplexity can’t yet replace a traditional search engine, it’s surprisingly functional and effective if you work within its limits. Here’s what you need to know about it. Continue reading “The rise of Perplexity AI”

‘The Next Mass Extinction?’

source: cnn.com (contributed by FAN, Bill Amshey |  image: pexels.com

 

Bird flu is back. With a large outbreak still unfolding, a New York Review of Books essay by Oliver Wang asks if this particular strain, H5N1, could cause “the next mass extinction.”
 
Word of the outbreak in animals spread last summer, Wang writes, recounting eerie mass deaths of seals, sea lions, and birds on South American coasts. “By the time I spoke to [Argentine veterinarian Marcela] Uhart, the breeding season in Patagonia had ended. Over 17,000 baby elephant seals—96 percent or more of the juveniles in the region—were estimated to have died, as well as more than 500,000 birds. In some areas there were no longer any organisms to infect. Still, Uhart told me, she saw sick and dead animals on each visit to the beach: a sea lion, a duck, a tern. ‘My suspicion is that the virus will linger on,’ she said. ‘We just don’t know whether it will continue to cause epidemic outbreaks, or whether it will just trickle in like it is now.’”
Continue reading “The Next Mass Extinction?”

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

source: wired.com | image: pexels.com

 

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.

 

In April, Apple sent notifications to iPhone users in 92 countries, warning them they’d been targeted with spyware. “Apple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID,” the notification reads.

Users quickly took to social media sites including X, trying to work out what the notification meant. Many of those targeted were based in India, but others in Europe also reported receiving Apple’s warning.

Weeks later, little is still known about the latest iPhone attacks. Former smartphone giant Blackberry, now a security firm, has released research indicating they are linked to a Chinese spyware campaign dubbed “LightSpy,” but Apple spokesperson Shane Bauer says this is inaccurate, and researchers at security firm Huntress say the variant Blackberry analyzed was a macOS version, not iOS. Continue reading “Apple’s iPhone Spyware Problem Is Getting Worse”