• chevron_right

      Here’s what we know about a mysterious launch from Florida this week

      news.movim.eu / ArsTechnica · Tuesday, 5 September, 2023 - 22:32 · 1 minute

    A US Army soldier lifts the hydraulic launching system on the new Long-Range Hypersonic Weapon (LRHW) during Operation Thunderbolt Strike at Cape Canaveral Space Force Station, Florida, on March 3.

    Enlarge / A US Army soldier lifts the hydraulic launching system on the new Long-Range Hypersonic Weapon (LRHW) during Operation Thunderbolt Strike at Cape Canaveral Space Force Station, Florida, on March 3. (credit: Spc. Chandler Coats, US Army )

    Airspace and maritime navigation warnings released to pilots and mariners suggest the US military might launch a hypersonic missile this week on a test flight from Cape Canaveral, Florida.

    This test could be one of the final milestones before the US Army fields the nation's first ground-based hypersonic weapon, which is more maneuverable and more difficult for an enemy to track and destroy than a conventional ballistic missile. Russia has used hypersonic in combat against Ukraine , and US defense officials have labeled China as the world's leader in emerging hypersonic missile technology.

    That has left the US military playing catch-up, and the Army is on the cusp of having its first ground-based hypersonic missiles ready for active duty. If informed speculation is correct, the test launch from Cape Canaveral Space Force Station this week—performed in partnership between the Army and the Navy—could be a full-scale test of the new solid-fueled hypersonic missile to propel a hypersonic glide vehicle to high speeds over the Atlantic Ocean.

    Read 12 remaining paragraphs | Comments

    • chevron_right

      4 Okta customers hit by campaign that gave attackers super admin control

      news.movim.eu / ArsTechnica · Tuesday, 5 September, 2023 - 20:28

    4 Okta customers hit by campaign that gave attackers super admin control

    Enlarge (credit: Getty Images)

    Authentication service Okta said four of its customers have been hit in a recent social-engineering campaign that allowed hackers to gain control of super administrator accounts and from there weaken or entirely remove two-factor authentication protecting accounts from unauthorized access.

    The Okta super administrator accounts are assigned to users with the highest permissions inside an organization using Okta’s service. In recent weeks, Okta customers’ IT desk personnel have received calls that follow a consistent pattern of social engineering, in which attackers pose as a company insider in an attempt to trick workers into divulging passwords or doing other dangerous things. The attackers in this case call service desk personnel and attempt to convince them to reset all multi-factor authentication factors assigned to super administrators or other highly privileged users, Okta said recently .

    Two-factor authentication and multi-factor authentication, usually abbreviated as 2FA and MFA, require a biometric, possession of a physical security key, or knowledge of a one-time password in addition to a normally used password to access an account.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Crypto botnet on X is powered by ChatGPT

      news.movim.eu / ArsTechnica · Tuesday, 22 August, 2023 - 13:21

    An illustration of a robot and word balloons

    Enlarge (credit: sakchai vongsasiripat/Getty Image)

    ChatGPT may well revolutionize web search , streamline office chores , and remake education , but the smooth-talking chatbot has also found work as a social media crypto huckster.

    Researchers at Indiana University Bloomington discovered a botnet powered by ChatGPT operating on X—the social network formerly known as Twitter—in May of this year.

    The botnet, which the researchers dub Fox8 because of its connection to cryptocurrency websites bearing some variation of the same name, consisted of 1,140 accounts. Many of them seemed to use ChatGPT to craft social media posts and to reply to each other’s posts. The auto-generated content was apparently designed to lure unsuspecting humans into clicking links through to the crypto-hyping sites.

    Read 15 remaining paragraphs | Comments

    • chevron_right

      Ongoing scam tricks kids playing Roblox and Fortnite

      news.movim.eu / ArsTechnica · Tuesday, 15 August, 2023 - 20:57 · 1 minute

    Ongoing scam tricks kids playing Roblox and Fortnite

    Enlarge (credit: Savusia Konstantin | Getty Images )

    Thousands of websites belonging to US government agencies, leading universities, and professional organizations have been hijacked over the last half decade and used to push scammy offers and promotions, new research has found. Many of these scams are aimed at children and attempt to trick them into downloading apps, malware, or submitting personal details in exchange for nonexistent rewards in Fortnite and Roblox .

    For more than three years, security researcher Zach Edwards has been tracking these website hijackings and scams. He says the activity can be linked back to the activities of affiliate users of one advertising company. The US-registered company acts as a service that sends web traffic to a range of online advertisers, allowing individuals to sign up and use its systems. However, on any given day, Edwards, a senior manager of threat insights at Human Security , uncovers scores of .gov, .org, and .edu domains being compromised.

    wired-logo.png

    “This group is what I would consider to be the number one group at bulk compromising infrastructure across the Internet and hosting scams on it and other types of exploits,” Edwards says. The scale of the website compromises—which are ongoing—and the public nature of the scams makes them stand out, the researcher says.

    Read 20 remaining paragraphs | Comments

    • chevron_right

      Real estate markets scramble following cyberattack on listings provider

      news.movim.eu / ArsTechnica · Monday, 14 August, 2023 - 21:59 · 1 minute

    MLS, Multiple Listing Service. Concept with keywords, people and icons. Flat vector illustration. Isolated on white.

    Enlarge / MLS (Multiple Listing Service). (credit: Getty Images)

    Home buyers, sellers, real estate agents, and listing websites throughout the US have been stymied for five days by a cyberattack on a California company that provides a crucial online service used to track home listings.

    The attack, which commenced last Wednesday, hit Rapottoni , a software and services provider that supplies Multiple Listing Services to regional real estate groups nationwide. Better known as MLS, it provides instant access to data on which homes are coming to the market, purchase offers, and sales of listed homes. MLS has become essential for connecting buyers to sellers and to the agents and listing websites serving them.

    “If you're an avid online refresher on any real estate website, you may have noticed a real nosedive in activity the last couple of days,” Peg King, a realty agent in California’s Sonoma County, wrote in an email newsletter she sent clients on Friday. “Real estate MLS systems across the country have been unusable since Wednesday after a massive cyberattack against major MLS provider, Rapattoni Corporation. This means that real estate markets (like ours!) can't list new homes, change prices, mark homes as pending/contingent/sold, or list open houses.”

    Read 7 remaining paragraphs | Comments

    • chevron_right

      An Apple malware-flagging tool is “trivially” easy to bypass

      news.movim.eu / ArsTechnica · Monday, 14 August, 2023 - 18:52 · 1 minute

    Close-up photograph of a Macintosh laptop keyboard.

    Enlarge (credit: Getty Images )

    One of your Mac's built-in malware detection tools may not be working quite as well as you think. At the Defcon hacker conference in Las Vegas, longtime Mac security researcher Patrick Wardle presented findings on Saturday about vulnerabilities in Apple's macOS Background Task Management mechanism, which could be exploited to bypass and, therefore, defeat the company's recently added monitoring tool.

    There's no foolproof method for catching malware on computers with perfect accuracy because, at their core, malicious programs are just software, like your web browser or chat app. It can be difficult to tell the legitimate programs from the transgressors. So operating system makers like Microsoft and Apple, as well as third-party security companies, are always working to develop new detection mechanisms and tools that can spot potentially malicious software behavior in new ways.

    wired-logo.png

    Apple's Background Task Management tool focuses on watching for software “persistence.” Malware can be designed to be ephemeral and operate only briefly on a device or until the computer restarts. But it can also be built to establish itself more deeply and “persist” on a target even when the computer is shut down and rebooted. Lots of legitimate software needs persistence so all of your apps and data and preferences will show up as you left them every time you turn on your device. But if software establishes persistence unexpectedly or out of the blue, it could be a sign of something malicious.

    Read 10 remaining paragraphs | Comments

    • chevron_right

      How an unpatched Microsoft Exchange 0-day likely caused one of the UK’s biggest hacks ever

      news.movim.eu / ArsTechnica · Wednesday, 9 August, 2023 - 21:58

    Building with Microsoft logo.

    Enlarge / Building with Microsoft logo. (credit: Getty Images)

    It’s looking more and more likely that a critical zero-day vulnerability that went unfixed for more than a month in Microsoft Exchange was the cause of one of the UK’s biggest hacks ever—the breach of the country’s Electoral Commission, which exposed data for as many as 40 million residents.

    Electoral Commission officials disclosed the breach on Tuesday. They said that they discovered the intrusion last October when they found “suspicious activity” on their networks and that “hostile actors had first accessed the systems in August 2021.” That means the attackers were in the network for 14 months before finally being driven out. The Commission waited nine months after that to notify the public.

    The compromise gave the attackers access to a host of personal information, including names and addresses of people registered to vote from 2014 to 2022. Spokespeople for the Commission said the number of affected voters could be as high as 40 million. The Commission has not yet said what the cause of the breach or the means of initial entry was.

    Read 9 remaining paragraphs | Comments

    • chevron_right

      “Downfall” bug affects years of Intel CPUs, can leak encryption keys and more

      news.movim.eu / ArsTechnica · Wednesday, 9 August, 2023 - 19:12

    An 8th-generation Intel Core desktop CPU, one of several CPU generations affected by the Downfall bug.

    Enlarge / An 8th-generation Intel Core desktop CPU, one of several CPU generations affected by the Downfall bug. (credit: Mark Walton)

    It's a big week for CPU security vulnerabilities. Yesterday, different security researchers published details on two different vulnerabilities, one affecting multiple generations of Intel processors and another affecting the newest AMD CPUs. " Downfall " and " Inception " (respectively) are different bugs, but both involve modern processors' extensive use of speculative execution (a la the original Meltdown and Spectre bugs ), both are described as being of "medium" severity, and both can be patched either with OS-level microcode updates or firmware updates with fixes incorporated.

    AMD and Intel have both already released OS-level microcode software updates to address both issues. Both companies have also said that they're not aware of any active in-the-wild exploits of either vulnerability. Consumer, workstation, and server CPUs are all affected, making patching particularly important for server administrators.

    It will be up to your PC, server, or motherboard manufacturer to release firmware updates with the fixes after Intel and AMD make them available.

    Read 13 remaining paragraphs | Comments

    • chevron_right

      Next-gen OSDP was supposed to make it harder to break in to secure facilities. It failed.

      news.movim.eu / ArsTechnica · Wednesday, 9 August, 2023 - 14:30 · 1 minute

    Next-gen OSDP was supposed to make it harder to break in to secure facilities. It failed.

    Enlarge (credit: Getty Images)

    Researchers have discovered a suite of vulnerabilities that largely break a next-generation protocol that was designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings belonging to federal, state, and local governments and private organizations.

    The next-generation mechanism, known as Secure Channel, was added about 10 years ago to an open standard known as OSDP, short for the Open Supervised Device Protocol . Like an earlier protocol, known as Wiegand , OSDP provides a framework for connecting card readers, fingerprint scanners, and other types of peripheral devices to control panels that check the collected credentials against a database of valid personnel. When credentials match, the control panel sends a message that opens a door, gate, or other entry system.

    Broken before getting out the gate

    OSDP came about in the aftermath of an attack demonstrated in 2008 at the BlackHat security conference. In a talk there, researcher Zac Franken demonstrated a device dubbed Gecko, which was no bigger than a US quarter. When surreptitiously inserted by a would-be intruder into the wiring behind a peripheral device, Gecko performed an adversary-in-the-middle attack that monitors all communications sent to and from the control panel.

    Read 33 remaining paragraphs | Comments