Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

source: thehackernews.com  |  image: pexels.com

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast.

“What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware,” Check Point Research said in a new report. “In fact, Rorschach is one of the fastest ransomware strains ever observed, in terms of the speed of its encryption.”

The cybersecurity firm said it observed the ransomware deployed against an unnamed U.S.-based company, adding it found no branding or overlaps that connect it to any previously known ransomware actors.

However, further analysis of Rorschach’s source code reveals similarities to Babuk ransomware, which suffered a leak in September 2021, and LockBit 2.0. On top of that, the ransom notes sent out to the victims appear to be inspired by that of Yanluowang and DarkSide.

Continue reading “Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies”

A Tiny Blog Took on Big Surveillance in China—and Won

 

source: wired.com  |  image: pexels.com

 

Digging through manuals for security cameras, a group of gearheads found sinister details and ignited a new battle in the US-China tech war.

 

AT A LOCATION he keeps secret, John Honovich was on his laptop, methodically scouring every link on a website for a conference half a world away. Hikvision, the world’s largest security camera manufacturer, was hosting the event—the 2018 AI Cloud World Summit—in its hometown of Hangzhou, a city of about 10 million people not far from Shanghai. Honovich, the founder of a small trade publication that covered video surveillance technology, wanted to find out what the latest Hikvision gear could do.

He zeroed in on one section of the conference agenda titled “Eco-Friendly, Peaceful, Relaxed” and found a description of an AI-powered system installed around Mount Tai, a historically sacred mountain in Shandong. A video showed Hikvision cameras pointed at tourists climbing the thousands of stone steps leading to the famous peak. Piano music played as a narrator explained, in Mandarin with English subtitles, that the cameras were there “to identify all visitors to ensure the safety of all.” The video cut to a shot of a computer screen, and Honovich hit pause. He saw a zoomed-in view of one visitor’s face. Below it was data that the camera’s AI had inferred. Honovich downloaded the video and took screenshots of the computer screen, for safekeeping. 

Later, with the help of a translator, he scrutinized every bit of text on that screen. One set of characters, the translator explained, suggested each visitor was automatically sorted into categories: age, sex, wearing glasses, smiling. When Honovich pointed at the fifth category and asked, “What’s this?” the translator replied, “minority.” Honovich pressed: “Are you sure?” The translator confirmed there was no other way to read it.

Continue reading “A Tiny Blog Took on Big Surveillance in China—and Won”

Britain uses cyber capabilities to counter enemies online – GCHQ

 

source: reuters.com  |  image: pexels.com

 

LONDON, April 4 (Reuters) – British government hackers have launched operations against militants, state-backed disinformation campaigns and attempts to interfere in elections, the GCHQ spy agency said on Tuesday, in a rare statement on its offensive cyber work.

The attacks were carried out over the last three years by the secretive National Cyber Force (NCF), a hacking unit operational since 2020 made up of spies and defence officials from Britain’s armed forces and Government Communications Headquarters (GCHQ), the eavesdropping agency said in a statement.

“In an increasingly volatile and interconnected world, to be a truly responsible cyber power, nations must be able to contest and compete with adversaries in cyberspace,” GCHQ director Jeremy Fleming said.

The statement was published alongside a 28-page paper designed “to illustrate aspects of how the UK is being a responsible cyber power”. It did not elaborate on the specifics of those operations.

Britain’s position as a leading hacking power competing alongside the United States with countries including Russia, China and Iran has been long known but rarely acknowledged.

Continue reading “Britain uses cyber capabilities to counter enemies online – GCHQ”

Michigan Tech Researchers Develop ‘Smart’ Deep Brain Stimulation Systems for Parkinson’s Patients

source: mfu.edu  |  image: pixabay.com

Researchers at Michigan Technological University are applying neuromorphic computing to improve the effectiveness and energy efficiency of deep brain stimulation systems used to treat Parkinson’s disease.

 

Currently incurable, Parkinson’s disease is a neurodegenerative disorder that affects millions worldwide. Deep brain stimulation (DBS) is an alternative to medications that are effective but lose effectiveness as patients develop drug resistance. Over time, larger doses of medication become necessary to control the condition and with them come potentially serious side effects. DBS is one alternative.

Making Deep Brain Stimulation Systems Better for Patients

DBS systems function like a pacemaker for the brain. They suppress the motor symptoms of Parkinson’s disease, including slowed or delayed movements (called bradykinesia), tremors and stiffness. An electrode, implanted into a specific target in the brain, emits electrical impulses using a battery-powered device in the chest. 

DBS systems can be life-changing for people diagnosed with Parkinson’s disease. But battery life is a challenge. Current devices use an implantable pulse generator (IPG), surgically inserted in the chest or abdomen, to send stimulation signals to the brain at a constant frequency, regardless of the clinical state of the patient. Nonchargeable batteries last approximately two to five years. Battery replacement can be disruptive for patients; it requires a surgical procedure. And there can be unwanted side effects caused by the IPG’s continuous stimulation.

Continue reading “Michigan Tech Researchers Develop: Systems for Parkinson’s Patients”

The DEA is using Apple’s AirTags for surveillance

source: imore.com  |  image: pixabay.com

It’s the first time a federal agency has used the tracker for surveillance.

A new report says that the DEA used an AirTag for surveillance in anti-drug operations last year, in what is believed to be the first instance of a federal agency using the tracker in such a manner.

According to Forbes(opens in new tab), border agents intercepted two packages from Shanghai, China, in May of 2022, which were found to contain a pill press that is used to turn powders into tablets. “Believing that they were destined for an illegal narcotics manufacturer”, the DEA stepped in, and rather than swipe the goods, instead placed an AirTag inside the device so they could track its whereabouts. 

A warrant seen by the outlet reveals what “appears to be the first known case of a federal agency turning Apple’s location-tracking device into a surveillance technology.”

Continue reading “The DEA is using Apple’s AirTags for surveillance”

US cyber officials make urgent push to warn businesses about vulnerabilities to hackers

source: cnn.com  |  image: pixabay.com

WashingtonCNN — 

US cybersecurity officials are unveiling a new program to warn critical American companies that their systems are vulnerable to ransomware attacks before the hackers can successfully strike.

The new federal program – details of which were shared exclusively with CNN – is needed because “the pace and the impact of (ransomware) intrusions are still unacceptable,” said Eric Goldstein, a senior official at the US Cybersecurity and Infrastructure Security Agency.

Ransomware attacks, like the 2021 incident that temporarily shut down one of America’s largest fuel pipelines, have disrupted key services important to American life and made the issue a national and economic security concern for the Biden administration.

But federal officials and private researchers have sometimes struggled in recent years to get in touch with key organizations like hospitals or universities in the crucial window between when a hacker gains access to a network and when they lock up the network and demand a multimillion-dollar ransom.

Continue reading “US cyber officials make urgent push to warn businesses about vulnerabilities to hackers”

Ring Is in a Standoff With Hackers

source: wired.com  |  image: pixabay.com

WHAT’S MORE CONTROVERSIAL than a popular surveillance camera maker that has an uncomfortably cozy relationship with American police? When ransomware hackers claim to have breached that company—Amazon-owned camera maker Ring—stolen its data, and Ring responds by denying the breach.

But we’ll get to that.

Five years ago, police in the Netherlands caught members of Russia’s GRU military intelligence red-handed as they tried to hack the Organization for the Prohibition of Chemical Weapons in The Hague. The team had parked a rental car outside the organization’s building and hid a Wi-Fi snooping antenna in its trunk. Within the GRU group was Evgenii Serebriakov, who was caught with further Wi-Fi hacking tools in his backpack.

 

Ring Is in a Standoff With a Ransomware Gang

ALPHV, a prolific group of hackers who extort companies with ransomware and leak their stolen data, said earlier this week that it had breached security camera maker Ring and threatened to dump the company’s data online if it doesn’t pay. “There’s always an option to let us leak your data …” the hackers wrote in a message to Ring on their leak site. Ring has so far responded with a denial, telling Vice’s Motherboard, “We currently have no indications of a ransomware event,” but it says it’s aware of a third-party vendor that has experienced one. That vendor, Ring says, doesn’t have access to any customer records. 

Meanwhile, ALPHV, which has previously used its BlackCat ransomware to target companies like Bandai Namco, Swissport, and hospital firm Lehigh Valley Health Network, stands by its claim to have breached Ring itself, not a third-party vendor. A member of the malware research group VX-Underground shared with WIRED screenshots of a conversation with an ALPHV representative who says that it’s still in “negotiations” with Ring.

Chinese surveillance from above may make stealth planes obsolete | Opinion

source: sun-sentinel.com  |  image: pixabay.com

 

When Pentagon brass rolled out the bat-shaped B-21 Raider late last year amid self-congratulatory speeches and glowing news reports, they touted it as the ideal deterrent against Beijing’s military ambitions. Projected to cost some $720 million apiece, the airplane was called the ultimate in radar-evading technology, able to carry out conventional and nuclear strikes virtually undetected in China and elsewhere.

As a journalist who covered previous stealth aircraft, the praise evoked disturbing echoes of glaring design flaws. Such missteps initially made the B-21′s predecessor, the Air Force’s B-2 Spirit, less stealthy and more difficult to operate than advertised. Northrop Grumman Corp. built both bombers.

Now, former senior officials involved in the classified B-21′s early development worry the Pentagon is repeating a version of those mistakes, this time by underestimating Beijing’s ability to closely track the latest bomber from space.

Continue reading “Chinese surveillance from above may make stealth planes obsolete | Opinion”

 

What is a QR Code + How Does It Work?

Everything Marketers Should Know

 

source: blog.hubspot.com, contributed by FAN, Steve Jones. |  image: pixabay.com

 

I’ll never forget the first time dining at a restaurant after my pandemic-induced hibernation. Before I could ask for a menu, the waitress nodded towards a piece of paper with a barcode on it. “Open your phone camera and scan it. The menu should pop up.”

QR codes have become a common sight almost overnight — from cereal boxes and billboards to even employee uniforms. With a 94% increase in interactions from 2018 to 2020, there’s no denying QR codes are seeing an epic revival in a new touch-free world.

Let’s explore the origins of the QR code, learn how it works, and discuss ways it can refresh your marketing strategy.

What is a QR code?

Short for quick response, QR codes are scannable barcodes that store data. In the marketing sphere, they’re commonly used to redirect users to landing pages, websites, social media profiles, or store coupons.

For instance, someone can place a QR code on the back of their business card to direct you to their LinkedIn profile. A QR code on a billboard may send you to a landing page.

QR codes vary in design and function, and primarily fall into one of the following categories — static or dynamic.

Static vs. Dynamic QR Codes

A static QR code contains information that cannot be modified once it’s live. This means any typo or misstep will require you to create a brand new one. The good news is that static codes don’t expire — so once the content is set, your work is done.

Static QR codes are ideal for storing fixed or sensitive info — think Wi-Fi passwords, employee ID numbers, or access codes. But they’re not so helpful if you need to update your data regularly.

Dynamic QR codes allow you to change your info as many times as you want. This is because the information isn’t ingrained into the code itself. Instead, it redirects users to a specific URL that can be changed at any time. For example, a restaurant can redirect users to a menu on their website.

A major benefit of dynamic QR codes is the ability to gather scanning metrics. While you can’t access personal information from users, you can see the time, location, and device used for each scan. And as marketers, we know these metrics are crucial to gauging campaign effectiveness.

How do QR codes work?

A QR code works similarly to barcodes at the supermarket. Each QR code consists black squares and dots which represent different pieces of information. When scanned, the unique pattern on the barcode translates into human-readable data. This transaction happens in seconds.

Users must scan the code with a QR reader or scanner, although nowadays most people scan QR codes with smartphones. On the off chance your phone doesn’t have the capability, there are plenty of free apps for QR scanning like NeoReader and QuickMark Barcode Scanner.

Continue reading “What is a QR Code + How Does It Work?”