Sunday, February 12, 2023 // (IG): BB // BSidesCharm// Coffee for Bob
It is time to cut Russia out of the global financial system
Analyst Comments: Ukrainian Minister of Finance, argues by blacklisting Russia, it would increase the cost of doing business with Russia, restrict access to the global economy for terrorists, and create a stronger and more resilient financial system. The author argues that the EU, G7, and other nations must act to put Russia on their own "high-risk jurisdiction" lists and issue relevant market guidance to ensure the integrity of the global financial system.
FROM THE MEDIA: Ukraine’s Minister of Finance writes an op-ed article in the Financial Times, in which he argues that Russia’s violent invasion of Ukraine and support of corruption and terrorism make a complete mockery of the rules-based international order that was put in place after the Cold War. He says Russia is not just undermining the global economic system, but holding the world to ransom. The minister calls for the Financial Action Task Force (FATF), an international body that sets standards for combating money laundering, terrorism financing, and proliferation of weapons of mass destruction, to expel Russia and blacklist it. He believes this would be the most effective tool for restricting terrorists’ access to the global economy, and force all states to apply enhanced due diligence to any transactions involving Russia’s financial system. The minister calls on the EU, G7, and other nations to recognize the risks posed by Russia to the integrity of the global financial system, and act to put Russia on their own “high-risk jurisdiction” lists and issue relevant market guidance.
READ THE STORY: FT
Experts say green laser beams spotted off Hawaii came from Chinese satellite
Analyst Comments: The Chinese Daqi-1/AEMS satellite is used to track atmospheric gases such as nitrogen dioxide, sulfur dioxide, ozone, and carbon dioxide. It is equipped with several instruments, including a topographical mapping instrument, which can be used to measure pollutants among other things.
FROM THE MEDIA: The National Astronomical Observatory of Japan (NAOJ) has corrected its initial statement that the green laser lights spotted over Hawaii last month were from the NASA craft ICESat-2. After running a simulation of satellite trajectories, the ICESat-2 team determined that the most likely candidate for the lights was the Chinese Daqi-1/AEMS satellite. The AEMS satellite, which was launched in 2021, is used to track nitrogen dioxide, sulfur dioxide, ozone, and carbon dioxide, according to the China Aerospace Science and Technology Corporation. The green laser lights were captured by NAOJ's Subaru-Asahi Star Camera on Mauna Kea and are thought to have been beamed down by the Chinese satellite.
READ THE STORY: NYPOST
Hackers interrupt online broadcast of Iran president’s address
Analyst Comments: This marks the second time the group has hacked state television in support of the ongoing protests, which were sparked by the death of a young person in September 2022. The government has responded to the protests with a deadly crackdown, resulting in hundreds of deaths and thousands of arrests. Despite the crackdown, antigovernmental sentiment remains strong, with recent rallies being met with chants of "Death to the Islamic Republic."
FROM THE MEDIA: In Iran, digital activists supporting the antigovernmental demonstrations reportedly hacked an online broadcast by state television of a speech given by President Ebrahim Raisi on February 11, 2023, which marked the 44th anniversary of the Islamic Revolution in 1979. The Edalat-e Ali group shared a video of the interruption on Twitter, calling for Iranians to take their money out of government banks and to protest on February 16. This marks the second time the group has reportedly hacked state television in support of the antigovernmental demonstrations. In October 2022, the group interrupted a live broadcast of Iran's Supreme Leader, Ayatollah Ali Khamenei, and in August 2020, hackers disrupted an online broadcast of Iranian President Hassan Rouhani's address to the nation. The protests in Iran have been met with a deadly crackdown by security forces, with hundreds of protesters being killed and thousands arrested. Despite the crackdown, antigovernmental sentiment remains strong and recent government-sponsored rallies have been met with chants of "Death to the Islamic Republic."
READ THE STORY: MENAFN // Reuters
China to Open Blockchain Innovation Research Center
Analyst Comments: Despite banning bitcoin transactions, China has been a leader in blockchain development and is pushing for adoption of its Central Bank Digital Currency, the e-yuan. The government has also distributed subsidies and coupons to encourage its use. The opening of the innovation center is expected to boost China's prospects for further blockchain development and success.
FROM THE MEDIA: China is investing in blockchain technology and has opened a National Blockchain Innovation Center in Beijing. The center will collaborate with academic institutions, industry leaders, and blockchain experts to research and develop blockchain's fundamental technologies. The center will be managed by the Beijing Academy of Blockchain and Edge Computing (BABEC), whose ChainMaker blockchain is well-known in the industry and already processes 240 million transactions per second. Despite banning bitcoin transactions in 2021, China has been a leader in blockchain development, claiming to be a "blockchain country" and responsible for 84% of all blockchain applications submitted worldwide. The government is also pushing for adoption of its Central Bank Digital Currency (CBDC), the e-yuan, and has made several efforts to increase usage, including distributing subsidies and coupons. With the opening of the innovation center, China's prospects for further blockchain development and success are expected to improve.
READ THE STORY: Coinnounce
NASA Uses AI to Design Mission Hardware
FROM THE MEDIA: NASA is using artificial intelligence (AI) to design spacecraft and mission hardware, which will improve the functionality and manufacturing benefits of these parts. According to NASA, the AI-designed parts are lighter, can handle higher structural loads and can be produced in less time than parts designed by humans. The process starts with a computer-assisted design specialist who outlines the mission requirements, including any restrictions for the AI to consider. The AI then produces the design in a matter of hours, and the parts are analyzed using NASA's validation software and processes to identify possible failure points. NASA has adopted these AI-designed components for various missions, including space telescopes and the Mars Sample Return mission. The combination of AI and 3D printing with resins and metals is expected to enhance in-space servicing, assembly, and manufacturing capabilities, which is important for the nation's space infrastructure development. NASA's Space Technology Mission Directorate's Center Innovation Fund and Goddard's Internal Research and Development program are supporting this work.
READ THE STORY: Nextgov
Sanctions placed on gang behind HSE hack
FROM THE MEDIA: The US and Britain have imposed sanctions on seven Russian nationals linked to the Conti group, responsible for the 2021 ransomware attack on the Irish Health Service Executive (HSE). The cyberattack caused widespread damage to the HSE's IT systems, leading to the cancellation of thousands of hospital appointments, and cost €100 million. The sanctions prohibit any US entity from engaging in financial activities with the hackers, who are now subject to travel bans, asset freezes, and restrictions on financial transactions with US firms. This is the first time the authorities have linked the various strains of ransomware to a single criminal organization. However, experts believe the sanctions will only slow down the group, not deter it. The government is preparing for a potential flood of compensation claims, which could result in a collective payout of €150 million.
READ THE STORY: The Sunday Times
South African Hacker Group Cheats Microsoft and Salesforce of Millions of Dollars in Resources to Mine Crypto
FROM THE MEDIA: Automated Libra, a South African group, has been accused of defrauding cloud computing providers such as Microsoft, Salesforce, Heroku, GitHub, Buddy, and ToggleBox of millions of dollars in a scheme to mine cryptocurrency. According to cyber security firm, Palo Alto Networks Unit 42, the group used the free resources offered by cloud computing providers to perform crypto mining operations. The group created accounts using either falsified or stolen credit cards or took advantage of free resources offered to new accounts, and then used these resources for crypto mining until the allotted time or dollar balance was reached. At that point, the group would cease using the resources and not pay the outstanding balance. Unit 42 found evidence of many unpaid accounts and assessed that the group stole cloud resources through a tactic called ‘Play and Run’. The group was able to create many accounts on some platforms by using software or software techniques to automate the process, taking advantage of vulnerabilities in cyber-security systems such as Captcha.
READ THE STORY: BitKE
Hackers create ChatGPT-driven Telegram bots that can write malware
FROM THE MEDIA: However, it is important to note that OpenAI, the creators of ChatGPT, have strict policies in place to prevent the use of their technology for malicious purposes. OpenAI takes the responsible use of its technology seriously and has implemented measures to prevent its models from being used for malicious purposes. Additionally, it is crucial for individuals to be vigilant and cautious when using chatbots or AI-powered systems, and to take necessary precautions to protect their personal information and data. It is recommended to only use trusted sources and to be cautious of phishing attempts or suspicious activities.
READ THE STORY: ET
Hackers target Israel’s Technion demanding huge sum in Bitcoin
FROM THE MEDIA: The Israel Institute of Technology (Technion) in Haifa was targeted by a cyberattack on Sunday. The group behind the attack, Darkbit, demanded 80 bitcoins (equivalent to $1,747,971) in exchange for freeing the computer servers from the ransomware that infected them. Technion, which is the leading research institute in Israel and trains thousands of engineers every year, apologized for the incident and temporarily stopped its human resources procedures. The group claimed to have attacked Technion for "nationalistic reasons." Cyber intelligence researcher Tom Malka suggested that a cyber incident response team would likely investigate the event and determine the number of infected computers and the date the attackers first gained access. He also advised against paying the ransom.
READ THE STORY: i24News
From Huawei to TikTok, Chinese tech giants face scrutiny amid spying concerns
FROM THE MEDIA: China's tech companies like Huawei and TikTok have been facing national security concerns from the US and other countries. The US and its allies have accused China of cyber espionage, violating international sanctions, and stealing intellectual property, among other things. Huawei is also accused of being beholden to the Chinese government and using its 5G infrastructure for espionage. The US has banned the sale and import of new communications equipment from Chinese companies including Huawei and ZTE, and is also planning to ban TikTok nationwide. The Biden administration has stopped providing licenses for US companies to export goods to Huawei. The US and the Five Eyes intelligence alliance have banned or are planning to ban Huawei. However, Huawei and TikTok have denied all accusations and the latter has criticized the US for taking a "piecemeal approach to national security". TikTok is currently negotiating with the US Justice Department to resolve national security concerns.
READ THE STORY: ET
Has Iran Armed Moscow With ‘Drone Boats’ That Russia Allegedly Used To Strike Critical Ukrainian Bridge
FROM THE MEDIA: A video that has been circulating on social media appears to show a Russian unmanned vessel striking a bridge in Zatoka, near Odesa in Ukraine. The 18-second video shows the swift-moving vessel exploding after passing under the bridge. Although various sources and experts have claimed that the vessel is a Russian unmanned surface vessel (USV), no official statement has been made by either Russia or Ukraine. If the object in the video is indeed a Russian USV, it would mark the first known use of this type of weapon by the Russian military in its ongoing conflict with Ukraine. Only Ukraine has demonstrated the capability to use USVs in attacks on Russian positions and naval vessels. The use of kamikaze USVs by Russia is a new development that presents a considerable threat to Ukraine, according to experts. The origin of Russia's USVs is unclear, but Iran has been known to have pioneered this technology and could have supplied it to Russia. Reports suggest that Russian forces could use USVs in other areas around the Black Sea and the Dnipro River, targeting Ukrainian positions and potentially merchant shipping.
READ THE STORY: EurAsian
German coalition wrestles with national security reform
FROM THE MEDIA: Disagreements in Chancellor Olaf Scholz’s government have put plans on hold for Germany to unveil its long-awaited national security strategy on the one-year anniversary of Vladimir Putin’s invasion of Ukraine. The main disagreement centers on whether Berlin should set up a US-style National Security Council, which some German ministries fear could give too much power to Scholz’s office. German diplomats and some allies have argued for years that Germany needs a coherent approach to national security to match its political and economic standing. The task of creating a national security strategy was given to the Green foreign minister, Annalena Baerbock, who has called for it to encompass more than just military and diplomacy, including the response to climate change and cyber attacks. However, disputes over the plan include the question of meeting NATO’s 2% of GDP defense spending requirement and the idea of establishing an NSC. Berlin has sought to play down the disagreements and says the strategy will be finalized by the end of March.
READ THE STORY: FT
What technologies and tactics are countries using to spy on each other
FROM THE MEDIA: Countries are using various techniques and technologies to spy on each other in the world of rising tensions. These techniques range from traditional spies on the ground, signals, imagery, and cyber intelligence to open source information. Open source information, which can often be directly published, is where countries like the UK, US and Australia are focusing their efforts as it accounts for 70-90% of usable intelligence. However, collecting open source information becomes difficult when it comes to countries like China, which tries to restrict and police social media usage. The Five Eyes intelligence alliance is working on countering China's intelligence activities. AI is becoming a game changer in the field of espionage as it can preload an autonomous system with analysis to interpret information at the same level of human intelligence.
READ THE STORY: ABC (AU)
Cyberattacks and modern warfare
FROM THE MEDIA: Cyberattacks have had a significant impact on modern warfare and can be launched from a distance, allowing the attacker to remain anonymous. These attacks can target critical infrastructure, such as power grids, which can disrupt the daily lives of civilians and professionals alike. The ability to launch a digital attack on critical systems from a distance and with the potential for anonymity has made cyberattacks a significant factor in modern warfare. For example, cyberattacks on power grids can result in widespread power outages, similar to the "cyber event" attacks that occurred in the US in 2022. These attacks can have far-reaching consequences, and it is essential for governments and organizations to be prepared and to protect their critical systems from potential digital attacks.
READ THE STORY: Mint Message
‘Mystery’ Alaska object entered US airspace without being detected
FROM THE MEDIA: The U.S. Department of Defense has shot down a mysterious "object" that was spotted over Alaska on Thursday night. The size of the object was described as being "the size of a small car" and was shot down at an altitude of 40,000 feet. However, the Biden administration has been tight-lipped about the appearance, capabilities, and ownership of the object. National Security Council spokesman John Kirby said that they "don't know who owns it – whether it’s state-owned or corporate-owned or privately-owned". The incident follows a similar event where the U.S. military shot down a massive Chinese spy balloon that had traveled over the entire North American continent. The Biden administration has slapped sanctions on six Chinese companies in retaliation for the spy balloon's intrusion. The Commerce Department blacklisted five aerospace corporations and one research institute, accusing them of supporting Beijing’s military modernization efforts.
READ THE STORY: NYPOST
Elon Musk’s Neuralink is under investigation for possible unsafe transport of contaminated hardware
FROM THE MEDIA: Elon Musk's brain-computer interface company, Neuralink, is being investigated by the US Department of Transportation (DOT) for allegedly packaging and transporting contaminated hardware in an unsafe manner. The investigation was triggered by a letter from the Physicians Committee for Responsible Medicine (PCRM), which claimed it obtained public records suggesting Neuralink may have mishandled devices carrying infectious pathogens that posed risks to human health in 2019. The DOT is conducting a standard investigation to ensure compliance and public safety based on information from PCRM. The devices in question were removed from the brains of nonhuman primates and may have been contaminated with viruses like Herpes B and antibiotic-resistant bacteria. Neuralink has not responded to requests for comment.
READ THE STORY: CNBC
Case of Russian accused of hacking US companies sent to jury
FROM THE MEDIA: Vladislav Klyushin, a Russian tech businessman and director of Moscow-based M-13, is on trial in federal court in Boston for his alleged role in a $82 million hacking scheme. The prosecution argues that Klyushin directed the hacking of major US companies' non-public reports and traded off this information for profit, while the defense claims the case is politically motivated. Klyushin was arrested in Switzerland in 2021 and extradited to the US to face charges of conspiracy and wire and securities fraud. The trial of Klyushin and his alleged co-conspirators Ivan Ermakov, Nikolai Rumiantcev, Mikhail Irzak, and Igor Sladkov has been held in Massachusetts as the hacking was largely done through a Virtual Private Network based in a Boston server. The jury is expected to convene on Monday.
READ THE STORY: Boston Herald
Fortinet helps launch Cybercrime Atlas global knowledgebase
FROM THE MEDIA: Fortinet, Microsoft, PayPal and Banco Santander have launched the Cybercrime Atlas, a joint initiative aimed at fighting cybercrime on a global scale. The Atlas is aimed at mapping and disrupting the cybercrime landscape, by providing a comprehensive picture of criminal operations, structures and networks. The Atlas will serve as a platform for leading cybercrime investigators, law enforcement agencies and businesses to share knowledge, generate policy recommendations, and identify opportunities for coordinated action against cyber threats. The Atlas has benefited from a year of analysis into 13 criminal groups, using only publicly available information, and its findings will ultimately help identify and disrupt the cybercrime ecosystem. The initiative was launched at the World Economic Forum’s Annual Meeting and has received support from law enforcement agencies, as well as praise from Microsoft and the World Economic Forum.
READ THE STORY: ITwire
Twitter Founder Jack Dorsey Reacts To Major Outage At Elon Musk's Company: Here's What He Said
FROM THE MEDIA: Jack Dorsey, the co-founder and former CEO of Twitter, recently criticized the current CEO, Elon Musk, for his handling of a recent outage on the social media platform. Dorsey expressed his thoughts on his new social media network, Snort, saying that people used to go to Twitter to talk about outages, but now things have changed. Dorsey has criticized Musk in the past, but in the past has also endorsed him, saying that he trusted Musk's mission to "extend the light of consciousness." The recent outage on Twitter was caused by an employee accidentally deleting data, and was acknowledged by the company, with a statement saying they were "working to get this fixed." Musk responded to the outage, assuring users that it would be back in operation soon. He also told employees to pause new feature development to focus on maximizing system stability. Despite the outage, some Twitter users were still able to use the platform, but others faced trouble logging in and using TweetDeck.
READ THE STORY: Benzinga
Embrace the World of Diffusion Models in AI Universe : An All-Inclusive Introduction
FROM THE MEDIA: Diffusion models are a type of generative model that can produce a wide array of images from text descriptions. They work by altering training data and then learning to reverse the process to recreate the original data. Popular diffusion models include Dall-E 2 from OpenAI, Imagen from Google, Stable Diffusion from stability AI, and Midjourney. These models can generate images, videos, and other interactive experiences, and have potential applications in industries such as Retail and eCommerce, Entertainment, Social Media, AR/VR, Marketing, and more. Diffusion models have limitations, such as face distortion and difficulty in generating text within images. Despite this, they have the potential to revolutionize various industries with their ability to generate high-quality images and videos from textual descriptions.
READ THE STORY: Medium
Items of interest
Pokemon Go players exploit AR Scan policy change to stop getting “annoying” research tasks
FROM THE MEDIA: Niantic, the developer of Pokemon Go, recently announced that players with a history of submitting low-quality AR scans will no longer receive AR Scanning Tasks. This was meant to be a warning for players to improve the quality of their scans, however, many players have taken it as an opportunity to exploit the change. Twitter and Reddit comments are filled with players who plan to intentionally submit low-quality scans in order to escape the AR Scanning Tasks. This change in policy has backfired on Niantic and has led to players taking advantage of the situation to avoid the tasks they found tedious.
READ THE STORY: Dexerto
GPT-3, Prompt Engineering, Trading, AI Alignment, Intelligence (Video)
FROM THE MEDIA: The video discusses the use of GPT-3, a machine learning algorithm, in software development. It introduces the idea of "Prompt Engineering" as a potential revolution in the field. The video also mentions the need for prompt engineers to be able to formulate effective prompts and the importance of static code analysis tools to ensure code is not malicious. The video also highlights the benefits of GPT-3, such as its ability to translate code written in different languages, but also acknowledges its limitations and the importance of human engineering in certain situations.
Any Prompt from Copy.AI Reverse Engineered. (Video)
FROM THE MEDIA: In this video, Stuart shows how to use Copy.AI and reverse engineering to create a more customized and effective social media post. He explains how Copy.AI provides a list of prompts for content creation in various industries and demonstrates how to adjust the settings to create content that is more likely to be successful. The video also covers the benefits of using Copy.AI, including the lower price and higher quality of outputs. It compares Copy.AI to Riku and shows that Copy.AI is more creative and based on facts.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.