phone

    • chevron_right

      Massive China-state IoT botnet went undetected for four years—until now

      news.movim.eu / ArsTechnica • 18 September, 2024 • 1 minute

    Massive China-state IoT botnet went undetected for four years—until now

    Enlarge (credit: Getty Images)

    The FBI has dismantled a massive network of compromised devices that Chinese state-sponsored hackers have used for four years to mount attacks on government agencies, telecoms, defense contractors, and other targets in the US and Taiwan.

    The botnet was made up primarily of small office and home office routers, surveillance cameras, network-attached storage, and other Internet-connected devices located all over the world. Over the past four years, US officials said, 260,000 such devices have cycled through the sophisticated network, which is organized in three tiers that allow the botnet to operate with efficiency and precision. At its peak in June 2023, Raptor Train, as the botnet is named, consisted of more than 60,000 commandeered devices, according to researchers from Black Lotus Labs, making it the largest China state botnet discovered to date.

    Burning down the house

    Raptor Train is the second China state-operated botnet US authorities have taken down this year. In January, law enforcement officials covertly issued commands to disinfect Internet of Things devices that hackers backed by the Chinese government had taken over without the device owners’ knowledge. The Chinese hackers, part of a group tracked as Volt Typhoon, used the botnet for more than a year as a platform to deliver exploits that burrowed deep into the networks of targets of interest. Because the attacks appear to originate from IP addresses with good reputations, they are subjected to less scrutiny from network security defenses, making the bots an ideal delivery proxy. Russia-state hackers have also been caught assembling large IoT botnets for the same purposes .

    Read 13 remaining paragraphs | Comments

    • chevron_right

      Man vs. machine: DeepMind’s new robot serves up a table tennis triumph

      news.movim.eu / ArsTechnica • 8 August, 2024

    A blue illustration of a robotic arm playing table tennis.

    Enlarge (credit: Benj Edwards / Google DeepMind)

    On Wednesday, researchers at Google DeepMind revealed the first AI-powered robotic table tennis player capable of competing at an amateur human level. The system combines an industrial robot arm called the ABB IRB 1100 and custom AI software from DeepMind. While an expert human player can still defeat the bot, the system demonstrates the potential for machines to master complex physical tasks that require split-second decision-making and adaptability.

    "This is the first robot agent capable of playing a sport with humans at human level," the researchers wrote in a preprint paper listed on arXiv. "It represents a milestone in robot learning and control."

    The unnamed robot agent (we suggest "AlphaPong"), developed by a team that includes David B. D'Ambrosio, Saminda Abeyruwan, and Laura Graesser, showed notable performance in a series of matches against human players of varying skill levels. In a study involving 29 participants, the AI-powered robot won 45 percent of its matches, demonstrating solid amateur-level play. Most notably, it achieved a 100 percent win rate against beginners and a 55 percent win rate against intermediate players, though it struggled against advanced opponents.

    Read 10 remaining paragraphs | Comments

    • chevron_right

      Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating

      news.movim.eu / ArsTechnica • 14 June, 2024 • 1 minute

    Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word "exploit"

    Enlarge (credit: Getty Images)

    Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability in the PHP programming language that executes malicious code on web servers, security researchers said.

    As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, down from 1,800 detected on Monday. The servers, primarily located in China, no longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 in exchange for the decryption key.

    When opportunity knocks

    The vulnerability , tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors in the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied input into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched in PHP in 2012.

    Read 11 remaining paragraphs | Comments

    • chevron_right

      Retired engineer discovers 55-year-old bug in Lunar Lander computer game code

      news.movim.eu / ArsTechnica • 14 June, 2024 • 1 minute

    Illustration of the Apollo lunar lander Eagle over the Moon.

    Enlarge / Illustration of the Apollo lunar lander Eagle over the Moon. (credit: Getty Images )

    On Friday, a retired software engineer named Martin C. Martin announced that he recently discovered a bug in the original Lunar Lander computer game's physics code while tinkering with the software. Created by a 17-year-old high school student named Jim Storer in 1969, this primordial game rendered the action only as text status updates on a teletype , but it set the stage for future versions to come.

    The legendary game—which Storer developed on a PDP-8 minicomputer in a programming language called FOCAL just months after Neil Armstrong and Buzz Aldrin made their historic moonwalks—allows players to control a lunar module's descent onto the Moon's surface. Players must carefully manage their fuel usage to achieve a gentle landing, making critical decisions every ten seconds to burn the right amount of fuel.

    In 2009, just short of the 40th anniversary of the first Moon landing, I set out to find the author of the original Lunar Lander game, which was then primarily known as a graphical game, thanks to the graphical version from 1974 and a 1979 Atari arcade title . When I discovered that Storer created the oldest known version as a teletype game, I interviewed him and wrote up a history of the game . Storer later released the source code to the original game, written in FOCAL, on his website.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      “Simulation of keyboard activity” leads to firing of Wells Fargo employees

      news.movim.eu / ArsTechnica • 13 June, 2024

    Signage with logo at headquarters of Wells Fargo Capital Finance, the commercial banking division of Wells Fargo Bank, in the Financial District neighborhood of San Francisco, California, September 26, 2016.

    Enlarge (credit: Getty Images )

    Last month, Wells Fargo terminated over a dozen bank employees following an investigation into claims of faking work activity on their computers, according to a Bloomberg report .

    A Financial Industry Regulatory Authority (FINRA) search conducted by Ars confirmed that the fired members of the firm's wealth and investment management division were "discharged after review of allegations involving simulation of keyboard activity creating impression of active work."

    A rise in remote work during the COVID-19 pandemic accelerated the adoption of remote worker surveillance techniques, especially those using software installed on machines that keeps track of activity and reports back to corporate management. It's worth noting that the Bloomberg report says the FINRA filing does not specify whether the fired Wells Fargo employees were simulating activity at home or in an office.

    Read 6 remaining paragraphs | Comments

    • chevron_right

      Report: Apple isn’t paying OpenAI for ChatGPT integration into OSes

      news.movim.eu / ArsTechnica • 13 June, 2024 • 1 minute

    The OpenAI and Apple logos together.

    Enlarge (credit: OpenAI / Apple / Benj Edwards)

    On Monday, Apple announced it would be integrating OpenAI's ChatGPT AI assistant into upcoming versions of its iPhone, iPad, and Mac operating systems. It paves the way for future third-party AI model integrations, but given Google's multi-billion-dollar deal with Apple for preferential web search, the OpenAI announcement inspired speculation about who is paying whom. According to a Bloomberg report published Wednesday, Apple considers ChatGPT's placement on its devices as compensation enough.

    "Apple isn’t paying OpenAI as part of the partnership," writes Bloomberg reporter Mark Gurman, citing people familiar with the matter who wish to remain anonymous. "Instead, Apple believes pushing OpenAI’s brand and technology to hundreds of millions of its devices is of equal or greater value than monetary payments."

    The Bloomberg report states that neither company expects the agreement to generate meaningful revenue in the short term, and in fact, the partnership could burn extra money for OpenAI, because it pays Microsoft to host ChatGPT's capabilities on its Azure cloud. However, OpenAI could benefit by converting free users to paid subscriptions, and Apple potentially benefits by providing easy, built-in access to ChatGPT during a time when its own in-house LLMs are still catching up.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Turkish student creates custom AI device for cheating university exam, gets arrested

      news.movim.eu / ArsTechnica • 12 June, 2024

    A photo illustration of what a shirt-button camera <em>could</em> look like.

    Enlarge / A photo illustration of what a shirt-button camera could look like. (credit: Aurich Lawson | Getty Images)

    On Saturday, Turkish police arrested and detained a prospective university student who is accused of developing an elaborate scheme to use AI and hidden devices to help him cheat on an important entrance exam, reports Reuters and The Daily Mail .

    The unnamed student is reportedly jailed pending trial after the incident, which took place in the southwestern province of Isparta , where the student was caught behaving suspiciously during the TYT . The TYT is a nationally held university aptitude exam that determines a person's eligibility to attend a university in Turkey—and cheating on the high-stakes exam is a serious offense.

    According to police reports, the student used a camera disguised as a shirt button, connected to AI software via a "router" (possibly a mistranslation of a cellular modem) hidden in the sole of their shoe. The system worked by scanning the exam questions using the button camera, which then relayed the information to an unnamed AI model. The software generated the correct answers and recited them to the student through an earpiece.

    Read 5 remaining paragraphs | Comments

    • chevron_right

      New Stable Diffusion 3 release excels at AI-generated body horror

      news.movim.eu / ArsTechnica • 12 June, 2024 • 1 minute

    An AI-generated image created using Stable Diffusion 3 of a girl lying in the grass.

    Enlarge / An AI-generated image created using Stable Diffusion 3 of a girl lying in the grass. (credit: HorneyMetalBeing )

    On Wednesday, Stability AI released weights for Stable Diffusion 3 Medium , an AI image-synthesis model that turns text prompts into AI-generated images. Its arrival has been ridiculed online, however, because it generates images of humans in a way that seems like a step backward from other state-of-the-art image-synthesis models like Midjourney or DALL-E 3 . As a result, it can churn out wild anatomically incorrect visual abominations with ease.

    A thread on Reddit, titled, " Is this release supposed to be a joke? [SD3-2B], " details the spectacular failures of SD3 Medium at rendering humans, especially human limbs like hands and feet. Another thread, titled, " Why is SD3 so bad at generating girls lying on the grass? " shows similar issues, but for entire human bodies.

    Hands have traditionally been a challenge for AI image generators due to lack of good examples in early training data sets, but more recently, several image-synthesis models seemed to have overcome the issue . In that sense, SD3 appears to be a huge step backward for the image-synthesis enthusiasts that gather on Reddit—especially compared to recent Stability releases like SD XL Turbo in November.

    Read 10 remaining paragraphs | Comments

    • chevron_right

      One of the major sellers of detailed driver behavioral data is shutting down

      news.movim.eu / ArsTechnica • 12 June, 2024

    Interior of car with different aspects of it highlighted, as if by a camera or AI

    Enlarge (credit: Getty Images)

    One of the major data brokers engaged in the deeply alienating practice of selling detailed driver behavior data to insurers has shut down that business.

    Verisk , which had collected data from cars made by General Motors, Honda, and Hyundai, has stopped receiving that data, according to The Record , a news site run by security firm Recorded Future. According to a statement provided to Privacy4Cars , and reported by The Record, Verisk will no longer provide a "Driving Behavior Data History Report" to insurers.

    Skeptics have long assumed that car companies had at least some plan to monetize the rich data regularly sent from cars back to their manufacturers, or telematics. But a concrete example of this was reported by The New York Times' Kashmir Hill , in which drivers of GM vehicles were finding insurance more expensive, or impossible to acquire, because of the kinds of reports sent along the chain from GM to data brokers to insurers. Those who requested their collected data from the brokers found details of every trip they took: times, distances, and every "hard acceleration" or "hard braking event," among other data points.

    Read 4 remaining paragraphs | Comments