Meta spots largest influence network to date

source: axios.com  |  image: pixabay.com

 

Meta said it’s taken down what it believes is the biggest online influence operation of all time.

Why it matters: The wide-reaching, pro-Chinese operation targeted social media users in Taiwan, alongside users in a handful of the island’s allies like the U.S., the U.K. and Japan, as anxieties over a possible Chinese invasion of Taiwan grow.

Details: Meta estimated in its second-quarter threat report, released today, that the China-linked campaign involved 7,704 accounts, 954 pages, 15 groups on Facebook and 15 accounts on Instagram.

  • Researchers uncovered evidence of the campaign on more than 50 online platforms, including YouTube, TikTok, Reddit, Pinterest and X, formerly known as Twitter.
  • The campaign mostly spread pro-China messages, amplified criticisms of U.S. and other Western policies, and targeted journalists, human rights activists and other critics of the Chinese government.

What they’re saying: “This is one of the single-biggest takedowns of coordinated inauthentic behavior that we’ve ever run into,” Ben Nimmo, global threat intelligence lead at Meta, told reporters.

Yes, but: Campaign operators struggled to garner significant, authentic engagement or reach, much like most recent pro-Chinese influence campaigns.

Catch up quick: Meta believes the latest campaign is an extension of an ongoing effort known as “Spamouflage” that emerged in 2019.

The intrigue: Campaign operators started their scheme by posting content directly to Facebook and Instagram, but automated systems were quick to detect the posts, according to the report.

  • This prompted campaign operators to start posting on smaller platforms and later amplify those posts on Meta’s social media sites.

What’s next: Meta researchers expect the threat actors behind the campaign to rebuild and keep trying, despite consistently struggling to reach real people, Nimmo said.

Microsoft filed a patent for an AI backpack straight out of a sci-fi movie

source: ZDNET.com (contributed by Artemus Founder, Bob Wallace)  |  image: pixabay.com

 

Students and office workers who carry heavy laptops and a plethora of personal items with them every day rely on backpacks to hold their belongings. For those people, there’s good news: Microsoft may soon be infusing backpacks with artifical intelligence (AI) to take a backpack’s function to a new level.

patent filed by Microsoft that showcases the concept of the AI backpack was filed on May 2, 2023, and published on August 24, 2023, as spotted by MSPowerUser

AlsoOne in four workers fears being considered ‘lazy’ if they use AI tools

The wearable would be able to do much more than your average smartwatch, with advanced capabilities such as scanning an environment, understanding voice commands, and performing contextual tasks. 

What We’ve Been Reading About AI

source: CNN.com (contributed by FAN, Bill Amshey)  |  image: pixabay.com

Continue reading “What We’ve Been Reading About AI”

A New Attack Reveals Everything You Type With 95 Percent Accuracy

 

source: wired.com (contributed by Artemus Founder, Bob Wallace)  |  image: pixabay.com

A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%.

When Zoom was used for training the sound classification algorithm, the prediction accuracy dropped to 93%, which is still dangerously high, and a record for that medium.

Such an attack severely affects the target’s data security, as it could leak people’s passwords, discussions, messages, or other sensitive information to malicious third parties.

Continue reading “A New Attack Reveals Everything You Type With 95 Percent Accuracy”

The Myth of ‘Open Source’ AI

source: wired.com  |  image: pexels.com

 

A new analysis shows that “open source” AI tools like Llama 2 are still controlled by big tech companies in a number of ways.

CHATGPT MADE IT possible for anyone to play with powerful artificial intelligence, but the inner workings of the world-famous chatbot remain a closely guarded secret.

In recent months, however, efforts to make AI more “open” seem to have gained momentum. In May, someone leaked a model from Meta, called Llama, which gave outsiders access to its underlying code as well as the “weights” that determine how it behaves. Then, this July, Meta chose to make an even more powerful model, called Llama 2, available for anyone to download, modify, and reuse. Meta’s models have since become an extremely popular foundation for many companies, researchers, and hobbyists building tools and applications with ChatGPT-like capabilities.

Continue reading “The Myth of ‘Open Source’ AI”

Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

 

source: infosecurity-magazine.com  |  image: pixabay.com

 

Data from 2.6 million users of Duolingo, a language learning platform with over 74 million monthly users, has been leaked on a hacking forum.

The compromised data, which includes real names, login names, email addresses and internal service-related details, was initially offered for sale on the now defunct Breached hacking forum in January 2023 for $1500. 

Despite Duolingo’s confirmation to The Record that the data was sourced from publicly available profiles, the leaked email addresses are particularly alarming as they are not public information and can facilitate targeted phishing attempts.

“We’re aware of this report. These records were obtained by data scraping public profile information. We have no indication that our systems were compromised. We take data privacy and security seriously and are continuing to investigate this matter to determine if any further action is needed to protect our learners,” a spokesperson from the company confirmed to Infosecurity in an email. 

Continue reading “Data of 2.6 Million Duolingo Users Leaked on Hacking Forum”

Ransomware Attacks are on the Rise

source:  threatpost.com  |  image: pixabay.com

 

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

After a recent dip, ransomware attacks are back on the rise. According to data released by NCC Group, the resurgence is being led by old ransomware-as-a-service (RaaS) groups.

With data gathered by “actively monitoring the leak sites used by each ransomware group and scraping victim details as they are released,” researchers have determined that Lockbit was by far the most prolific ransomware gang in July, behind 62 attacks. That’s ten more than the month prior, and more than twice as many as the second and third most prolific groups combined. “Lockbit 3.0 maintain their foothold as the most threatening ransomware group,” the authors wrote, “and one with which all organizations should aim to be aware of.”

Continue reading “Ransomware Attacks are on the Rise”

US issues threat warning after hackers break into a satellite

source: defenseone.com  |  image: pexels.com

Three teams at the DEF CON 23 convention met a government challenge to hack satellite in orbit.

It seems like nothing is off limits for threat actors to target these days. Hospitals, schools, charity organizations and even municipalities have all been successfully targeted by malicious cyberattacks in recent years. And now, it seems like attackers are even looking into space for new systems to try and compromise.

Last week, the Office of the Director of National Intelligence, in coordination with the FBI, the National Counterintelligence and Security Center, and the Air Force Office of Special Investigations, issued a warning about increased attempts to attack both satellites in orbit and the intellectual property of companies developing space technologies.

The warning comes just about a month after three teams at the DEF CON 23 convention in Las Vegas managed to hack a government satellite in orbit. Those attacks were conducted with the full permission of the government as part of the U.S. Space Force’s Hack-A-Sat competition. Three of the teams that successfully breached the security of the orbiting satellite were awarded up to $50,000 in prize money for demonstrating how such an attack could be conducted. This was the first time that hacker groups were able to prove that it was now possible to circumvent the cybersecurity protections of satellites in orbit.

Continue reading “US issues threat warning after hackers break into a satellite”

Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities

source: securityweek.com  |  image: pexels.com

 

Five Eyes government agencies have published a list of the software vulnerabilities that were most frequently exploited in malicious attacks in 2022.

Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities that were most frequently exploited in malicious attacks in 2022.

Last year, the Five Eyes agencies say, threat actors mainly targeted internet-facing systems that were not patched against older, known vulnerabilities, including flaws for which proof-of-concept (PoC) exploit code exists publicly.

Continue reading “Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities”

Officials found suspected Chinese malware hidden in various US military systems. Its intended use is disruption rather than surveillance, a ‘disturbing’ change in intent, experts say.

 

source: businessinsider.com  |  image: pexels.com

 

  • Suspected Chinese malware has been identified in several US military systems. 
  • Unlike other surveillance malware from China, this malware seems intended to disrupt operations.
  • The malware could also have the ability to disrupt normal civilian life and businesses.

US officials found suspected Chinese malware across several military systems — and unlike previous attacks, experts say the intent is more likely to disrupt rather than to surveil, The New York Times reports.

The attacks first came into the public eye in May after Microsoft identified malicious code in telecommunications software in Guam, where the US houses the Andersen Air Force Base.

Continue reading “Officials found suspected Chinese malware hidden…”