Daily Drop (473): 04-28-2023
TOP 5: 2024 Deepfake Election, Wagner Group's Expansion, Ukraine Dismisses Pro-Russian Hacktivism, DNA Samples from US-Mexico Border, China Pressures Foreign Companies to Conform
Friday, April 28, 2023 // (IG): BB // Financial Enabler // Coffee for Bob
Brace Yourself for the 2024 Deepfake Election
Analyst Comments: The use of generative AI tools like DALL-E and ChatGPT is becoming more widespread, leading to the creation of large amounts of AI-generated content. This democratization of AI may lead to exciting new applications but also poses a significant threat to democracy. The risk of AI-generated audio, images, and videos of political candidates proliferating during the 2024 presidential election is high. The line between real and fake content could blur even more than it has in the age of rampant disinformation, leading to potential political division and chaos.
FROM THE MEDIA: AI-generated content is becoming more accessible and democratized, leading to concerns that it could distort reality and pose a significant threat to the 2024 presidential election. AI-generated images and videos featuring politicians have already started circulating on the internet, and experts predict that convincing deepfake videos could be produced in a year or so. The spread of deep fakes during the election could blur the line between what’s real and what’s fake and make people distrust legitimate material. However, some solutions are being proposed, such as C2PA technology, fingerprinting and watermarking images and videos, and developing an instant fact-checker for social media users.
READ THE STORY: Wired
The Wagner Group’s Expanding Global Footprint
Analyst Comments: The West must continue to consider proactive tools to counter Russian and other PMCs, including expanding sanctions to include actors in third-party countries that support the Wagner Group. NATO must work to amplify efforts to push the adoption of the 2008 Montreux Document and to block contact with the Wagner Group through their international activities. The group and other Russian PMCs require consideration within a larger great power discussion, particularly as Russia's invasion of Ukraine has firmly aligned Europe and the US against Russia. US senior leaders should demonstrate a greater diplomatic commitment to African allies and put pressure on other African leaders considering, or currently contracting, the Wagner Group and other Russian PMC operations. International bodies such as the African Union, ECOWAS, and the East African Community should also reevaluate their approaches to peacekeeping and instability.
FROM THE MEDIA: The Wagner Group is a Russian private military company (PMC) that has become a leading force in the Kremlin's campaign to wage war in Ukraine while simultaneously cutting deals with African junta leaders. The group offers counterterrorism assistance and personal protection in exchange for lucrative resource extraction deals, which undermines Western political-military relationships with African states. The West must consider the context in which Wagner has become a viable policy choice for governments. The growth of Islamist insurgencies in the Sahel region of Africa has crippled already fragile security forces. The group is constantly evolving, eschewing classifications, evading sanctions, and frustrating Western generals and politicians alike. It is involved in diamond and gold mining, the forestry and alcohol industries, and possibly the coffee industry in the Central African Republic (CAR). Recent intelligence reports suggest that the group may be trying to destabilize Chad's current government and support a potential rebellion in northern Chad.
READ THE STORY: FPRI
Pro-Russian hacktivism isn’t real, top Ukrainian cyber official says
Analyst Comments: The Ukrainian head of the Department of Cyber Information Security has claimed that over 90% of cyber attacks targeting Ukraine are carried out by state-sponsored groups or special services, rather than genuine "hacktivist" groups. He suggests that "hacktivist" groups in Russia are largely fronts for government agencies, or are coerced into performing attacks. These groups are typically financially motivated and are targeted toward Ukraine's energy, logistics, defense industry, media outlets, internet providers, and telecom companies. The more serious attacks are attributed to Russian government-backed hacking units such as Sandworm and Gamaredon. In contrast, Ukrainian hackers have united to launch attacks against Russian targets, with some even approaching the Ukrainian security service to provide information.
FROM THE MEDIA: According to Illia Vitiuk, head of the Department of Cyber Information Security in the Security Service of Ukraine, most of the pro-Russian “hacktivist” groups that claimed to carry out attacks on Russian enemies are fronts for various Russian government agencies, and in other cases, they are coerced by the Russian government into performing attacks or publishing hacked materials obtained by more established Russian government hacking units. Vitiuk said that many of the cybercriminals who participate in this kind of activity are usually “young, but talented people searching for easy money.” The message from the Russian government is “You attack and we won’t put you into prison,” he said.
READ THE STORY: CyberScoop
FBI Braces for Flood of DNA Samples From US-Mexico Border
Analyst Comments: The impending expiration of the Title 42 restriction on immigration into the US is a major concern for the FBI as it prepares for a potential influx of border crossings and the subsequent increase in DNA samples that will need to be processed. FBI Director Christopher Wray stated that his agency's personnel are already operating at a "blistering pace" to test all the samples and solve sexual assaults, homicides, and other serious crimes. While the Biden administration has announced measures to stem the expected surge in border crossings, Republicans claim they are inadequate. There are also concerns about new waves of asylum-seekers arriving at the border, including those from China and Russia who are increasingly using routes through Mexico to reach the US. The FBI's processing of DNA samples collected from migrants detained at the border will likely be crucial in identifying and preventing crimes committed by individuals who may pose a threat to national security.
FROM THE MEDIA: The FBI is preparing for a potential surge in DNA sample processing as the Title 42 restriction on immigration along the US-Mexico border is set to expire on May 11. Since 2020, the US Border Patrol has been collecting DNA samples from migrants and US citizens arrested at the border, which are then fed into the FBI's DNA database. FBI Director Christopher Wray told lawmakers that they have already processed more than 130,000 samples in the first three months of fiscal year 2023, and this number is expected to increase by 30,000 a month once Title 42 is lifted. Wray added that the FBI needs an additional $53 million to boost its DNA testing capacity to keep up with the expected surge in sample collections.
READ THE STORY: VOA
China Ratchets Up Pressure on Foreign Companies
Analyst Comments: The Chinese government’s campaign to tighten control over foreign businesses operating in the country may have negative consequences for China’s economic growth objectives. Some senior officials have reportedly grown worried that heightened geopolitical tensions are driving foreign investors and businesses away. Moreover, many multinational companies rely on the ability to sell and produce in China and cannot afford to lose access to the Chinese market. The recent moves are also causing concern among the Western business community, which relies on credible information and professional services to assess risks in China. If the campaign results in foreign businesses being unable to gather sufficient information for fear of being branded as espionage agents, this could have further negative consequences for the Chinese economy.
FROM THE MEDIA: Chinese authorities have reportedly launched a crackdown on foreign businesses in the country, including conducting surprise visits to the Shanghai office of consulting firm Bain & Co., detaining an employee of Japanese drugmaker Astellas Pharma, raiding the Beijing office of the US due-diligence firm Mintz Group, and launching a cybersecurity review of imports from chip maker Micron Technology. Experts believe that this campaign to tighten control over foreign businesses in China is driven by a deepening conviction within the country’s leadership that foreign capital isn’t to be fully trusted. The Chinese government is believed to want to more tightly control the narrative about China’s governance and development and limit the information collected by foreign companies such as auditors, management consultants, and law firms that could influence how the outside world views China. The recent moves are causing concern among Western businesses, which rely on credible information and professional services to assess risks in China.
READ THE STORY: WSJ
Google Gets Court Order to Take Down CryptBot That Infected Over 670,000 Computers
Analyst Comments: Google's efforts to disrupt the distribution of CryptBot through a temporary court order are a commendable step in protecting users from cyber threats. CryptBot is a dangerous malware that has infected a large number of computers, and its ability to steal sensitive data is a serious threat to users' privacy and security. By taking down the domains tied to its distribution, Google is reducing the risk of new infections and making it more difficult for threat actors to profit from this malware.
FROM THE MEDIA: Google has obtained a temporary court order in the US to disrupt the distribution of CryptBot, a Windows-based malware designed to steal sensitive data such as authentication credentials, social media account logins, and cryptocurrency wallets from users of Google Chrome. CryptBot was first discovered in the wild in December 2019 and is believed to have infected over 670,000 computers in 2022 alone. The malware is traditionally delivered via maliciously modified versions of legitimate and popular software packages such as Google Earth Pro and Google Chrome that are hosted on fake websites. CryptBot campaign discovered by Red Canary in December 2021 entailed the use of KMSPico as a delivery vector.
READ THE STORY: THN
Terrorism and Extremism: Implications for Pakistan’s Security
Analyst Comments: The passage provides a detailed overview of the challenges faced by Pakistan in the aftermath of the 9/11 attacks and the subsequent war on terrorism. The author provides a nuanced analysis of the impact of external factors, such as the US tilt towards India and the rising influence of China in the region, on Pakistan's security and geostrategic position. The author also highlights the impact of the war on terrorism on Pakistan's education system, economy, and social fabric. However, the passage lacks coherence and organization, and the language is sometimes unclear and difficult to follow. Additionally, the passage could benefit from more specific examples and evidence to support the arguments made.
FROM THE MEDIA: The passage highlights the security and geostrategic challenges faced by Pakistan in the aftermath of the 9/11 attacks and the subsequent global war on terrorism. It discusses the deteriorating security situation in the country and the external factors, including the US tilt toward India and the rising influence of China in the region. The author argues that globalization is both a challenge and an opportunity for Pakistan and stresses the need for Pakistan to adapt its political and economic systems to thrive in the new global order. The passage also touches upon the impact of the war on terrorism on Pakistan's education system, economy, and social fabric.
READ THE STORY: Modern Diplomacy
Vietnamese Hackers Linked to 'Malverposting' Campaign
Analyst Comments: The recent disclosure of this long-term campaign is concerning. The use of social media for cyber-attacks is not new; however, this campaign's scale is notable. The malicious actors are using various techniques to spread malware and successfully evade detection by security vendors. The ongoing abuse of Facebook’s Ads service as a first-stage delivery mechanism highlights the need for platforms to take a more proactive role in identifying and preventing these types of attacks. The campaign's focus on specific countries, namely the USA, Canada, England, and Australia, may indicate that the threat actors are looking to exploit vulnerabilities in critical infrastructure sectors in these countries.
FROM THE MEDIA: Guardio Labs, a cybersecurity firm, has disclosed that a Vietnamese threat actor is linked to a long-term campaign that involves “malverposting”. Malverposting is described as the use of promoted social media posts and tweets to propagate malicious software and other security threats. The team noted that the abuse of Facebook’s Ads service is the initial enabler for this mass propagation. The threat actor is creating new business profiles, as well as hijacking real, reputable profiles with millions of followers, and is believed to have infected over 500,000 devices worldwide in the past three months alone. The campaign uses malicious clickbait, promising adult-rated photo album downloads for free, to trick users into downloading a ZIP file containing masqueraded executable files, which when clicked initiate the infection process. The Guardio Labs advisory comes weeks after Group-IB, a security firm, disclosed a phishing scheme aimed at Facebook users relying on over 3,000 fake profiles.
READ THE STORY: InfoSecMag
Paperbug Attack: New Politically-Motivated Surveillance Campaign in Tajikistan
Analyst Comments: The discovery of Operation Paperbug is a clear indication that cyber-espionage activities continue to be a significant threat to national security in various regions of the world. The campaign's success in targeting a wide range of high-value entities such as government networks and OT devices highlights the need for increased vigilance and the adoption of more robust cybersecurity measures. The relatively unsophisticated toolsets used by Nomadic Octopus suggest that the group's activities are likely part of a larger state-sponsored operation. The fact that the group was able to gain access to a telecommunication network, however, underscores the vulnerability of critical infrastructure to cyber-attacks. The lack of concern shown by the group in covering their tracks on victim machines also suggests that they may have been recruited by a third-party entity and given specific commands to execute on each machine.
FROM THE MEDIA: Swiss cybersecurity firm PRODAFT has identified a new politically-motivated cyber-espionage campaign targeting high-ranking government officials, public service infrastructures, and telecom services in Tajikistan. The campaign, dubbed "Operation Paperbug," is attributed to a little-known Russian-speaking cyber-espionage group called Nomadic Octopus, also known as DustSquad. The group has been active since at least 2014 and was first identified by ESET and Kaspersky in October 2018. The group's attacks have involved the use of custom Android and Windows malware to strike at a mix of high-value targets such as local governments, diplomatic missions, and political bloggers. PRODAFT's findings suggest that the group managed to gain access to a telecommunication firm network and then laterally move to over a dozen targets focusing on government networks, executives, and operational technology (OT) devices with publicly known vulnerabilities.
READ THE STORY: THN
Ukrainian man arrested for selling data on 300 million people to Russians
Analyst Comments: The arrest highlights the flawed security of Telegram, which has become a popular platform for cybercriminals to sell stolen data. The app's large chat groups with up to 200,000 members make it easier for cybercriminals to sell data to a large audience. Cybersecurity firm Positive Technologies reported a significant increase in hacker-related posts on Telegram during the second quarter of 2022. This trend suggests that cybercriminals are shifting from traditional cybercrime forums to messaging platforms.
FROM THE MEDIA: A Ukrainian citizen was arrested for selling the personal data of over 300 million people to Russia. The 36-year-old suspect used the messaging app Telegram to sell stolen information such as passport data, taxpayer numbers, birth certificates, driver's licenses, and bank account data belonging to citizens of Ukraine and various European countries. The suspect sold the data to Russian citizens for rubles - a banned currency in Ukraine. The suspect faces charges of creating software with malicious intent, unlawfully accessing information stored in computer networks, and using violence against a law enforcement officer.
READ THE STORY: The Record
Uruguay Foundation Utilizes 3D Printing to Produce Free Prosthetic Hands and Arms
Analyst Comments: The Manos de Heroes Foundation is an inspiring example of using technology for social good. By providing free prosthetic hands and arms to those in vulnerable situations, the foundation is helping people who might not have access to such technology due to financial constraints. The foundation's use of 3D technology to create prostheses is innovative and cost-effective. Additionally, the foundation's efforts to ensure that each prosthesis is personalized with colors and designs chosen by the recipient help to make those receiving the prosthetics feel less alone.
FROM THE MEDIA: Uruguayan non-profit organization, Manos de Heroes, has provided over 100 free prosthetic hands and arms with 3D technology to children and adults across Uruguay. The foundation provides these prosthetics to those in vulnerable situations, most of whom have mild to severe disabilities. The prostheses are made with threads that are taut from the motion of the wrist and can be mechanical or electronic. They can be placed on the hands, forearm, elbow, or shoulder, depending on the need of each person. The foundation is financed through contributions from private companies and donations.
READ THE STORY: VOA
Hackers Take Control of Government-Owned Satellite in an Alarming Experiment
Analyst Comments: Satellite systems have proven to be vulnerable to hacking, as demonstrated by recent incidents involving laypeople successfully hacking into satellite systems by going through ground-based systems. In 2021, a Belgian researcher demonstrated how he could hack a SpaceX Starlink terminal, while an academic team from the University of Texas took control of a Starlink signal without even performing any real intrusion. Commercial satellite systems have also been hacked, with Russia hacking several mainstream satellite internet systems from companies like Viasat, despite US intelligence agencies warning companies about their cybersecurity vulnerabilities. Policymakers have taken action to address these vulnerabilities, with a bipartisan group of senators introducing a bill to provide more resources for hack-proofing US satellites, and the Space Force launching Hack-A-Sat challenges to identify vulnerabilities.
FROM THE MEDIA: Researchers from multinational tech company Thales successfully hacked into a European Space Agency-owned satellite called OPS-SAT as part of the ESA’s ongoing CYSAT conference. During the controlled hack, the team gained full control of the satellite’s communication, imaging, and maneuverability systems. The hackers accessed the satellite’s global positioning system, attitude control system, and onboard camera, and introduced new, malicious code into the system. The team presented their hack at the conference on Thursday, warning that a hacker could potentially mask parts of the satellite’s imaging system to conceal themselves from the orbiting eye in the sky. This intrusion highlights the vulnerability of government-operated satellites and the need for the space industry to consider cybersecurity at every stage in the satellite’s lifecycle.
READ THE STORY: Yahoo News
Google’s DeepMind-Brain merger: tech giant regroups for AI battle
Analyst Comments: Google's reorganization highlights the intense competition in the AI industry and the need for companies to consolidate their resources to catch up with their rivals. The move also shows the increasing importance of large language models, such as OpenAI's ChatGPT, which threaten Google's search business by providing users with comprehensive written answers, bypassing online advertising.
FROM THE MEDIA: Google's DeepMind, the London-based AI company acquired by Google in 2014, has merged with Google Brain, the tech giant's own AI lab in California. The move comes as Google faces increasing competition from the Microsoft-backed group OpenAI, which launched ChatGPT, a popular chatbot that rivals Google's own AI. DeepMind's founder, Demis Hassabis, fought to maintain the company's independence and for an independent legal status akin to a non-profit, but the merger with Google Brain means DeepMind will lose some of its autonomy. Hassabis will lead the newly formed "Google DeepMind" unit, which aims to develop "general AI systems" that can be integrated into new products and services.
READ THE STORY: FT
Git Project Security Vulnerabilities Let Attackers Execute Arbitrary Code
Analyst Comments: The security flaws identified in Git versions and Git for Windows can potentially allow attackers to execute arbitrary code, which can cause significant damage to the affected systems. As such, it is highly recommended that all users upgrade to Git 2.40.1 to mitigate the risks associated with these vulnerabilities. GitHub has taken steps to protect its users, including scheduled updates to GitHub Desktop, GitHub Codespaces, and GitHub Actions. Users who are unable to update immediately should take precautions, such as avoiding the use of git apply –reject when working with patches from untrusted sources and avoiding running certain Git commands on untrusted repositories. Overall, this highlights the importance of promptly addressing security flaws and regularly updating software to ensure the security and stability of systems.
FROM THE MEDIA: The Git project has released new versions to address several security flaws that can allow attackers to execute arbitrary code. These vulnerabilities affect Git versions 2.40.0 and earlier, as well as Git for Windows. The security flaws include CVE-2023-25652, CVE-2023-29007, CVE-2023-25815, CVE-2023-29011, and CVE-2023-29012. GitHub has recommended upgrading to Git 2.40.1 as the best defense against these vulnerabilities.
READ THE STORY: GBHackers
LimeRAT Malware Analysis: Extracting the Config
Analyst Comments: The report by ANY.RUN emphasizes the increasing prevalence of RATs and the growing threat they pose to organizations. The discovery of LimeRAT's capability to target Linux machines is concerning, given that Linux servers are widely used in enterprise environments. Additionally, LimeRAT's ability to evade detection systems further highlights the need for effective cybersecurity measures that can detect and prevent RAT attacks. Organizations should remain vigilant and implement proactive security measures to protect against RAT attacks.
FROM THE MEDIA: According to a report by ANY.RUN, Remote Access Trojans (RATs) have become the third most prevalent malware type, making it a significant threat to organizations. The report highlights that LimeRAT, a RAT family that is not as well-known as other RAT families, has recently been found capable of infecting Linux, NAS, and ESXi hosts. It is also capable of creating DDoS botnets, facilitating crypto mining, and data exfiltration. LimeRAT shares similarities with njRAT, which is the third most popular malware family in terms of uploads during Q1 2023.
READ THE STORY: THN
DHS pushes Congress to formally establish Cyber Safety Review Board
Analyst Comments: The proposed legislation to formally authorize the CSRB and grant it subpoena power is a positive development that will help the board in its important work of evaluating and remedying significant cybersecurity incidents. The board's approach of evaluating major cyber incidents and making recommendations to remediate them will help organizations address vulnerabilities and prevent future attacks. The CSRB's success in engaging with the cybersecurity community is noteworthy, and the proposed legislation to codify the board is likely to receive broad support from Congress. The CSRB's focus on Lapsus$ and its plans to examine the next generation of cybersecurity problems demonstrate its commitment to staying ahead of emerging threats.
FROM THE MEDIA: The Department of Homeland Security (DHS) is working with Congress and the White House on a bill to codify the Cyber Safety Review Board (CSRB) and formally authorize the board's funding. The CSRB was established by executive order last year to evaluate major cyber incidents and make recommendations to remediate them. The proposed legislation would grant the board subpoena power to compel victims to speak honestly, but DHS believes this would be necessary only in rare instances. The board's first investigation centered on the Log4j bug, and its current project focuses on the notorious hacking group Lapsus$. The board's co-chair and Google's vice president of security engineering, Heather Adkins, said members are already making changes to how the board operates after the first investigation and are mulling several others.
READ THE STORY: The Record
The first draft of the controversial UN Cybercrime Treaty slated for June
Analyst Comments: The new UN Cybercrime Treaty is an important development for global cybersecurity as cybercrime has been on the rise, and international cooperation is essential to tackle it effectively. The treaty aims to improve the investigation and prosecution of cybercrime, and it will be grounded in human rights, fundamental freedoms, and the rule of law. However, there are concerns about potential conflicts of law, and Microsoft and Google representatives have highlighted concerns that governments may use the treaty to violate human rights, arrest critics, and even target cybersecurity researchers. The success of the treaty depends on the consensus among nations and the widespread accession of the treaty.
FROM THE MEDIA: The United Nations General Assembly has been working on a new treaty that will be centered around cybercrime. The first draft of the treaty will be released in June 2022, and discussions between nations will take place before a final draft is put together in January 2024. The treaty is scheduled to go to a final vote at the UN General Assembly in August 2024. The focus of the treaty is aimed at improving the investigation and prosecution of cybercrime while being grounded in human rights, fundamental freedoms, and the rule of law.
READ THE STORY: The Record
Tonto Team Uses Anti-Malware File to Launch Attacks on South Korean Institutions
Analyst Comments: The report highlights the ongoing threat of cyber attacks by nation-state actors, particularly those aligned with China, targeting sensitive institutions and industries in South Korea. The use of CHM files as a distribution vector for malware is not limited to Chinese threat actors alone, as North Korean groups have also adopted similar attack chains in the past. The constant evolution of threat actors and their techniques highlights the need for continued vigilance and proactive security measures by organizations to mitigate the risk of cyber attacks.
FROM THE MEDIA: South Korean institutions in education, construction, diplomatic, and political sectors have been targeted in a new wave of cyber attacks by the China-aligned Tonto Team, according to a report by AhnLab Security Emergency Response Center. The group has a record of targeting various sectors in Asia and Eastern Europe since at least 2009. The attack sequence discovered by ASEC starts with a Microsoft Compiled HTML Help (.CHM) file that executes a binary file to side-load a malicious DLL file (slc.dll) and launch ReVBShell, an open-source VBScript backdoor also put to use by another Chinese threat actor called Tick. The Tonto Team is constantly evolving through various means, including using normal software for more elaborate attacks.
READ THE STORY: THN
RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts
Analyst Comments: The emergence of RTM Locker's first Linux ransomware marks the latest threat to the open-source operating system. While Linux systems are generally considered to be more secure than Windows, they are not invulnerable to cyberattacks. As more organizations adopt Linux-based systems, the risk of ransomware attacks targeting the OS is likely to increase. Organizations are advised to maintain regular backups and patch systems to prevent such attacks. It's worth noting that the RTM Locker ransomware group is known for using affiliates to ransom victims and for leaking stolen data should the victims refuse to pay up.
FROM THE MEDIA: The RTM Locker ransomware group has developed its first-ever malware that targets Linux machines, according to a report by cybersecurity firm Uptycs. The ransomware is capable of infecting Linux, NAS, and ESXi hosts and uses a combination of ECDH on Curve25519 and Chacha20 to encrypt files. The report noted that the group typically avoids high-profile targets such as critical infrastructure, law enforcement, and hospitals to avoid drawing attention. The Linux flavor targets ESXi hosts by terminating all virtual machines running on the compromised host before commencing the encryption process. The attackers urge victims to contact them within 48 hours via Tox, or their data will be published, and decryption of the locked file requires the public and private keys.
READ THE STORY: THN
Hackers use PaperCut printer vulnerability to spread Clop ransomware
Analyst Comments: The exploitation of the two PaperCut vulnerabilities is another example of how ransomware attackers are increasingly targeting third-party software vulnerabilities to gain access to networks. The Clop ransomware group is known for its aggressive tactics, and this recent activity highlights the group's continued targeting of organizations worldwide. With the rise in remote working and the increasing reliance on third-party software, it is crucial that organizations keep their systems updated and patched to prevent such attacks. The use of PowerShell commands to deliver the TrueBot malware downloader is a further indication that ransomware groups are becoming more sophisticated in their attack methods, and organizations need to stay vigilant to ensure they are protected against such threats.
FROM THE MEDIA: Hackers linked to the Clop ransomware group have been exploiting two recently disclosed vulnerabilities in print management software PaperCut to steal corporate data from victims. Microsoft has attributed the attacks to a hacking group they track as Lace Tempest, a financially-motivated group that operates as a Clop affiliate. Since at least April 13th, Lace Tempest has been exploiting two PaperCut vulnerabilities (CVE-2023-27350 and CVE-2023-27351) to deliver Clop ransomware. The vulnerabilities allowed the hackers to remotely access victim systems, extract information about users stored within a customer’s servers, and steal payment card numbers associated with the accounts.
READ THE STORY: The Record
Meet ChatGPT’s Right-Wing Alter Ego
Analyst Comments: The development of politically-aligned AI bots has the potential to exacerbate political polarization, and Musk's comments suggest a problematic perspective on the role of AI in shaping political discourse. The risk of models spreading false or misleading information is also a concern. However, Rozado’s approach of creating models with a more integrative political perspective may offer some promise in reducing polarization. The challenge of building models that are capable of understanding objective facts and producing output that is not politically skewed remains a significant obstacle. Ultimately, the development of AI language models that can promote rational and informed political discourse will require careful consideration and a focus on promoting a diversity of perspectives.
FROM THE MEDIA: Tesla CEO Elon Musk has announced plans to build a “maximum truth-seeking AI” called TruthGPT, which he claims will compete with OpenAI’s ChatGPT, saying the latter has “woke” bias. However, David Rozado, a data scientist, has raised concerns over political bias in ChatGPT and created a rival model called RightWingGPT, which reflects more conservative viewpoints. Rozado also plans to create a liberal language model called LeftWingGPT, and a depolarizing model, aimed at demonstrating a “depolarizing political position”. However, concerns have been raised that such models may exacerbate political divisions. OpenAI has previously warned that AI models can reinforce ideologies and untruths.
READ THE STORY: Wired
Items of interest
If not Dollars, then what
Analyst Comments: The US dollar has been the dominant reserve currency for many years, but with the rise of new economic powers and changes in the world order, there have been discussions on a possible replacement. Some potential candidates include the euro and the Chinese yuan, but both face significant challenges. It is likely that a more diverse and multipolar system of reserve currencies will emerge, requiring policymakers and economists to explore alternatives to the current system. Any changes will require significant cooperation and coordination between countries and a comprehensive approach to addressing the challenges and opportunities presented by the changing global order.
FROM THE MEDIA: The dominance of the US dollar as the world's primary reserve currency is being questioned as the global order changes and new economic powers rise. The euro and the Chinese Yuan are potential contenders for the next reserve currency, but both have significant challenges. A more diverse and multipolar system of reserve currencies is likely to emerge rather than a single currency to replace the dollar. Other potential solutions include the use of a global reserve currency issued by a multilateral institution or the development of regional reserve currencies. However, any changes to the current reserve currency system require significant cooperation and coordination between countries, and there are political and economic obstacles that need to be overcome.
READ THE STORY: Modern Diplomacy
3D printed, mind-controlled prosthetics are here | Challengers by Freethink (Video)
FROM THE MEDIA: Unlimited Tomorrow, a company founded by Easton LaChappelle, has developed the world's most advanced and affordable 3D-printed prosthetic device called TrueLimb. Typical prosthetics can cost up to $80,000 and are difficult to access for many people, especially growing children who outgrow them every 12-14 months. Unlimited Tomorrow's program for children ensures that they can grow with their device, and their in-house, distributive model enables remote care and democratizes the system. TrueLimb is customizable to each individual, with a variety of features, and costs $7,995, a fraction of the cost of traditional prosthetic devices. The company hopes to bring systemic change to the prosthetics industry and improve the lives of amputees worldwide.
Introduction to 3D Printing for Prosthetics and Orthotics (Video)
FROM THE MEDIA: The transcript is an introduction to 3D printing for prosthetics and orthotics. It explains the history of 3D printing and the different types of 3D printing, including resin-based, powder-based, and filament-based systems. The benefits and drawbacks of each type of printing are discussed, as well as the economic factors involved in choosing the appropriate system. The transcript also emphasizes the need to adapt to new technology and increase skill sets in a changing work environment. The next video in the series will cover the details of filament printers, including design styles, price points, and materials.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.