Clever Defiance

 

source: artoftheprank.com, contributed by Artemus FAN, Steve Jones  |  Image: Pixabay via pexels.com

 

An interesting footnote to the German occupation of France during WW II.
 
You might be aware that this year is the 100th anniversary of Citroën. Here’s a fascinating bit of wartime Citroën lore. It involves screwing with Nazis in a genuinely clever and subtle way that nevertheless had big repercussions. 
 
So, when France was occupied by the Germans in 1940, major French factories like Citroën were forced to produce equipment for the Nazis. Citroën president Pierre-Jules Boulanger knew he couldn’t just refuse to produce anything, but he also knew there’s no way in hell he’s going to just roll over and build trucks for a bunch of filthy Nazis. Pierre had a plan.  
 
John Reynold’s book Citroën 2CV describes Boulanger’s sabotage efforts. Of course, he instructed workers to set a nice, leisurely pace when building trucks (likely Citroën T45 trucks) for the Wehrmacht, but that’s fairly obvious. What was brilliant was Boulanger’s idea to move the little notch on the trucks’ oil dipsticks that indicated the proper level of oil down just a bit lower.
 
By moving the notch down, the trucks would not have enough oil, but German mechanics would have no idea, because the little notch on the dipstick says it’s just fine. 
 
Then, after the truck has been used for a while and is out deployed somewhere crucial, whammo, the engine seizes up and you’ve got a lot of angry, stranded, vulnerable Nazis, balling up their little fists and madly barking curses in German.
 
It’s such a fantastic act of sabotage: it’s extremely cheap to implement, it’s subtle, there’s no way to see something amiss is happening as the trucks are being built and it delivers its blow away from the site of the sabotage and when it will cause the most inconvenience and trouble.
 
That’s some mighty good sabotaging, Pierre.
 
Happy 100th Anniversary, Citroën!

Meet APT43, the newest North Korean threat

source: Axios, contributed by FAN Bill Amshey  |  image: pexels.com

 

Researchers have identified a new state-backed hacking group in North Korea: APT43.

Driving the news: Mandiant, a threat intelligence firm owned by Google, said in a report today that APT43 has been engaging in espionage campaigns to support the North Korean regime.

  • APT43 also appears to target cryptocurrency firms and services and uses the profits to fund its espionage operations, the report states.
  • The group typically targets organizations in South Korea and the United States, with a special focus on government, business services, manufacturing and education and research groups.

The big picture: Mandiant has “moderate confidence” that APT43 is specifically linked to North Korea’s foreign intelligence service.

  • Mandiant has been tracking this gang’s activities since 2018, and today’s report officially elevates the group to an official state-backed hacking group.

Of note: Other companies refer to the group as “Kimsuky” or “Thallium” in their reports. Each cyber research firm uses its own naming conventions for identifying hacking groups.

Details: APT43 engages in two types of cyber activity: Spear-phishing email campaigns to harvest specific targets’ credentials and high-value research, and cryptocurrency firm hacks to get funds for its own operations.

  • In the spear-phishing attacks, APT43 poses as reporters and researchers to trick employees at U.S. defense and research organizations, as well as South Korea-based think tanks, into clicking on a malicious email link or responding with key intel.
  • APT43 has been seen using cryptocurrency services to launder stolen currency, suggesting the group has been involved in the string of recent attacks.

Threat level: Unlike other state-backed hacking groups, APT43 has yet to be seen exploiting critical, unknown vulnerabilities in systems.

  • However, the group continues to maintain “a high tempo of activity” and has collaborated with several North Korea state-backed hacking groups.

Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

source: thehackernews.com  |  image: pexels.com

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast.

“What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware,” Check Point Research said in a new report. “In fact, Rorschach is one of the fastest ransomware strains ever observed, in terms of the speed of its encryption.”

The cybersecurity firm said it observed the ransomware deployed against an unnamed U.S.-based company, adding it found no branding or overlaps that connect it to any previously known ransomware actors.

However, further analysis of Rorschach’s source code reveals similarities to Babuk ransomware, which suffered a leak in September 2021, and LockBit 2.0. On top of that, the ransom notes sent out to the victims appear to be inspired by that of Yanluowang and DarkSide.

Continue reading “Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies”

A Tiny Blog Took on Big Surveillance in China—and Won

 

source: wired.com  |  image: pexels.com

 

Digging through manuals for security cameras, a group of gearheads found sinister details and ignited a new battle in the US-China tech war.

 

AT A LOCATION he keeps secret, John Honovich was on his laptop, methodically scouring every link on a website for a conference half a world away. Hikvision, the world’s largest security camera manufacturer, was hosting the event—the 2018 AI Cloud World Summit—in its hometown of Hangzhou, a city of about 10 million people not far from Shanghai. Honovich, the founder of a small trade publication that covered video surveillance technology, wanted to find out what the latest Hikvision gear could do.

He zeroed in on one section of the conference agenda titled “Eco-Friendly, Peaceful, Relaxed” and found a description of an AI-powered system installed around Mount Tai, a historically sacred mountain in Shandong. A video showed Hikvision cameras pointed at tourists climbing the thousands of stone steps leading to the famous peak. Piano music played as a narrator explained, in Mandarin with English subtitles, that the cameras were there “to identify all visitors to ensure the safety of all.” The video cut to a shot of a computer screen, and Honovich hit pause. He saw a zoomed-in view of one visitor’s face. Below it was data that the camera’s AI had inferred. Honovich downloaded the video and took screenshots of the computer screen, for safekeeping. 

Later, with the help of a translator, he scrutinized every bit of text on that screen. One set of characters, the translator explained, suggested each visitor was automatically sorted into categories: age, sex, wearing glasses, smiling. When Honovich pointed at the fifth category and asked, “What’s this?” the translator replied, “minority.” Honovich pressed: “Are you sure?” The translator confirmed there was no other way to read it.

Continue reading “A Tiny Blog Took on Big Surveillance in China—and Won”

Britain uses cyber capabilities to counter enemies online – GCHQ

 

source: reuters.com  |  image: pexels.com

 

LONDON, April 4 (Reuters) – British government hackers have launched operations against militants, state-backed disinformation campaigns and attempts to interfere in elections, the GCHQ spy agency said on Tuesday, in a rare statement on its offensive cyber work.

The attacks were carried out over the last three years by the secretive National Cyber Force (NCF), a hacking unit operational since 2020 made up of spies and defence officials from Britain’s armed forces and Government Communications Headquarters (GCHQ), the eavesdropping agency said in a statement.

“In an increasingly volatile and interconnected world, to be a truly responsible cyber power, nations must be able to contest and compete with adversaries in cyberspace,” GCHQ director Jeremy Fleming said.

The statement was published alongside a 28-page paper designed “to illustrate aspects of how the UK is being a responsible cyber power”. It did not elaborate on the specifics of those operations.

Britain’s position as a leading hacking power competing alongside the United States with countries including Russia, China and Iran has been long known but rarely acknowledged.

Continue reading “Britain uses cyber capabilities to counter enemies online – GCHQ”

Michigan Tech Researchers Develop ‘Smart’ Deep Brain Stimulation Systems for Parkinson’s Patients

source: mfu.edu  |  image: pixabay.com

Researchers at Michigan Technological University are applying neuromorphic computing to improve the effectiveness and energy efficiency of deep brain stimulation systems used to treat Parkinson’s disease.

 

Currently incurable, Parkinson’s disease is a neurodegenerative disorder that affects millions worldwide. Deep brain stimulation (DBS) is an alternative to medications that are effective but lose effectiveness as patients develop drug resistance. Over time, larger doses of medication become necessary to control the condition and with them come potentially serious side effects. DBS is one alternative.

Making Deep Brain Stimulation Systems Better for Patients

DBS systems function like a pacemaker for the brain. They suppress the motor symptoms of Parkinson’s disease, including slowed or delayed movements (called bradykinesia), tremors and stiffness. An electrode, implanted into a specific target in the brain, emits electrical impulses using a battery-powered device in the chest. 

DBS systems can be life-changing for people diagnosed with Parkinson’s disease. But battery life is a challenge. Current devices use an implantable pulse generator (IPG), surgically inserted in the chest or abdomen, to send stimulation signals to the brain at a constant frequency, regardless of the clinical state of the patient. Nonchargeable batteries last approximately two to five years. Battery replacement can be disruptive for patients; it requires a surgical procedure. And there can be unwanted side effects caused by the IPG’s continuous stimulation.

Continue reading “Michigan Tech Researchers Develop: Systems for Parkinson’s Patients”

The DEA is using Apple’s AirTags for surveillance

source: imore.com  |  image: pixabay.com

It’s the first time a federal agency has used the tracker for surveillance.

A new report says that the DEA used an AirTag for surveillance in anti-drug operations last year, in what is believed to be the first instance of a federal agency using the tracker in such a manner.

According to Forbes(opens in new tab), border agents intercepted two packages from Shanghai, China, in May of 2022, which were found to contain a pill press that is used to turn powders into tablets. “Believing that they were destined for an illegal narcotics manufacturer”, the DEA stepped in, and rather than swipe the goods, instead placed an AirTag inside the device so they could track its whereabouts. 

A warrant seen by the outlet reveals what “appears to be the first known case of a federal agency turning Apple’s location-tracking device into a surveillance technology.”

Continue reading “The DEA is using Apple’s AirTags for surveillance”

US cyber officials make urgent push to warn businesses about vulnerabilities to hackers

source: cnn.com  |  image: pixabay.com

WashingtonCNN — 

US cybersecurity officials are unveiling a new program to warn critical American companies that their systems are vulnerable to ransomware attacks before the hackers can successfully strike.

The new federal program – details of which were shared exclusively with CNN – is needed because “the pace and the impact of (ransomware) intrusions are still unacceptable,” said Eric Goldstein, a senior official at the US Cybersecurity and Infrastructure Security Agency.

Ransomware attacks, like the 2021 incident that temporarily shut down one of America’s largest fuel pipelines, have disrupted key services important to American life and made the issue a national and economic security concern for the Biden administration.

But federal officials and private researchers have sometimes struggled in recent years to get in touch with key organizations like hospitals or universities in the crucial window between when a hacker gains access to a network and when they lock up the network and demand a multimillion-dollar ransom.

Continue reading “US cyber officials make urgent push to warn businesses about vulnerabilities to hackers”

Ring Is in a Standoff With Hackers

source: wired.com  |  image: pixabay.com

WHAT’S MORE CONTROVERSIAL than a popular surveillance camera maker that has an uncomfortably cozy relationship with American police? When ransomware hackers claim to have breached that company—Amazon-owned camera maker Ring—stolen its data, and Ring responds by denying the breach.

But we’ll get to that.

Five years ago, police in the Netherlands caught members of Russia’s GRU military intelligence red-handed as they tried to hack the Organization for the Prohibition of Chemical Weapons in The Hague. The team had parked a rental car outside the organization’s building and hid a Wi-Fi snooping antenna in its trunk. Within the GRU group was Evgenii Serebriakov, who was caught with further Wi-Fi hacking tools in his backpack.

 

Ring Is in a Standoff With a Ransomware Gang

ALPHV, a prolific group of hackers who extort companies with ransomware and leak their stolen data, said earlier this week that it had breached security camera maker Ring and threatened to dump the company’s data online if it doesn’t pay. “There’s always an option to let us leak your data …” the hackers wrote in a message to Ring on their leak site. Ring has so far responded with a denial, telling Vice’s Motherboard, “We currently have no indications of a ransomware event,” but it says it’s aware of a third-party vendor that has experienced one. That vendor, Ring says, doesn’t have access to any customer records. 

Meanwhile, ALPHV, which has previously used its BlackCat ransomware to target companies like Bandai Namco, Swissport, and hospital firm Lehigh Valley Health Network, stands by its claim to have breached Ring itself, not a third-party vendor. A member of the malware research group VX-Underground shared with WIRED screenshots of a conversation with an ALPHV representative who says that it’s still in “negotiations” with Ring.