Daily Drop (474): Russian 'inspector' satellite, Iran's Supreme Leader, China’s hackers outnumber FBI, Error of Economic Thinking, China is Trying to Mediate Ukraine Conflict
Saturday, April 29, 2023 // (IG): BB // Financial Enabler // Coffee for Bob
A Russian 'inspector' satellite appears to be chasing a secret US military satellite in a game of cat and mouse
Analyst Comments: The article discusses a worrying development in space, where a Russian satellite named Kosmos-2558 is seemingly stalking a classified US military satellite in a game of cat-and-mouse. The Russian spacecraft has been making regular close passes to the American satellite, leading space observers to believe that it is an "inspector" spacecraft specifically designed to gather detailed information on other satellites. The US satellite is part of a spy satellite program that collects intelligence through Earth observation. This situation raises concerns about Russia's intentions in space and the potential risk it poses to US national security. It highlights the growing competition between the two countries in space and emphasizes the importance of responsible behavior from both sides to avoid accidental collisions or other incidents.
FROM THE MEDIA: A Russian satellite named Kosmos-2558 appears to be stalking a classified US military satellite in a game of orbital hide-and-seek. Kosmos-2558 is regularly passing close to the American spacecraft, and the lack of a formal explanation from Russia has led space observers to believe that the probe is stalking the US satellite. Kosmos-2558 appears to be an "inspector," a spacecraft that gathers up-close data on another satellite. The US military satellite is meant to support "overhead reconnaissance," a spy satellite program for gathering intelligence by observing Earth.
READ THE STORY: Insider
Iran’s Leading Sunni Cleric Calls Out Supreme Leader
Analyst Comments: The Friday sermon by Molavi Abdul Hamid highlights the growing discontent within Iran's population regarding the country's political and economic situation. The cleric's call for a referendum and criticism of the government's handling of the protests and the country's economic crisis is a direct challenge to the authority of the supreme leader. Hamid's sermon also reflects the ongoing tensions within Iran between the Sunni and Shia Muslim communities, particularly in the province of Sistan-Baluchistan, which is predominantly Sunni. It remains to be seen whether the Iranian government will respond to the demands of the public and address the country's political and economic issues.
FROM THE MEDIA: In a Friday sermon, Iranian Sunni Muslim cleric Molavi Abdul Hamid criticized Iran’s supreme leader and urged the government to listen to the voice of the people instead of rejecting their demands for a referendum. He stated that a referendum would not be needed if the authorities respected the wishes of the public. The cleric also addressed the ongoing political crisis in Iran and the country's economic difficulties, particularly the severe financial problems faced by workers. Hamid also touched upon the issue of Bloody Friday, during which security forces opened fire on protesters in Zahedan. The incident occurred after demonstrations broke out across Iran over the death of a young Kurdish woman in the custody of the morality police.
READ THE STORY: VOA
China’s hackers outnumber FBI cyber staff at least 50 to 1,’ Wray tells Congress
Analyst Comments: The FBI's request for additional funding to counter cyber threats and protect its internal network is crucial due to the growing threat landscape and the importance of the agency's work. Cyber attacks on the US government and businesses are increasing, and the FBI needs the necessary resources to keep up with the complex techniques used by cybercriminals and nation-state actors. However, the request may face resistance from Congress, which has been closely examining the FBI's performance in recent years, particularly regarding its handling of the Russia investigation. Despite these challenges, it is imperative for lawmakers to prioritize funding for the FBI's cybersecurity efforts to safeguard US national security and interests in the digital realm.
FROM THE MEDIA: FBI Director Christopher Wray has requested additional funding from lawmakers to combat cyber threats in next year's budget. Wray noted that the FBI is facing a significant imbalance, particularly in comparison to China, as the number of Chinese hackers still outnumber the FBI's cyber personnel by at least 50 to 1 even if every FBI cyber agent and intel analyst were focused on the China threat. In its 2024 budget request, the FBI has sought to add 192 positions, including 31 special agents, eight intelligence analysts, and 153 professional staff, along with a $63.4 million boost to enhance cyber information-sharing capabilities and increase cyber tools and capacities. The bureau has also requested an additional $27.2 million, including four new positions, to protect internal FBI networks.
READ THE STORY: The Record
The Greatest Global Error of Economic Thinking
Analyst Comments: The report discusses a concerning situation regarding a Russian satellite, Kosmos-2558, which appears to be stalking a classified US military satellite in a game of orbital hide-and-seek. The Russian probe has been passing close to the American spacecraft regularly, and its behavior suggests that it is an "inspector" spacecraft designed to gather close-up data on other satellites. The US satellite is part of a spy satellite program aimed at gathering intelligence through observing the Earth. This situation raises serious concerns about Russia's behavior in space and the potential threat it poses to US national security. It highlights the growing competition between the US and Russia in space and the need for responsible behavior from both countries to avoid accidental collisions or other incidents.
FROM THE MEDIA: The article emphasizes the importance of understanding the entrepreneurial metamorphosis, mindset, intellectualism, and national mobilization of entrepreneurialism for SME economic development. The author argues that the absence of these skills has wiped out nations' entrepreneurial developments and scattered their SME sectors in disorder and neglect. In addition, the article discusses the importance of understanding the entrepreneurial mindset and the need to create a job-creator mentality rather than a job-seeker mentality. Furthermore, the article explores how nations can lead an internal economic revolution, mobilizing and digitizing SMEs to ride digital platforms of exportability and quadruple exportability as a national agenda.
READ THE STORY: Modern Diplomacy
Pakistan’s Army Chief Visits China to Deepen Ties
Analyst Comments: General Munir's visit to China highlights the deepening ties between the two countries and their growing military cooperation. This visit is crucial for Pakistan's defense affairs, as they seek to expand their military capabilities with the help of their strategic partner. China's growing influence in the region, including its efforts to resolve major issues, presents Pakistan with opportunities to take advantage of their good relations. The visit comes at a time when relations between China and India are tense, which can benefit Pakistan in its rocky relationship with India.
FROM THE MEDIA: Pakistan's Chief of the Army, General Asim Munir, is visiting China to discuss military cooperation between the two countries. During his visit, Munir met with Zhang Youxia, vice chairman of China's Central Military Commission, where they discussed the relationship between the two countries and regional peace and stability. Munir also visited the headquarters of the People's Liberation Army and had a detailed meeting with the PLA commander, where bilateral security and military cooperation issues were discussed. The visit is important for both militaries, and discussions regarding the security of Chinese nationals working in Pakistan, the China-Pakistan Economic Corridor project, and weapons purchases are expected.
READ THE STORY: VOA
Role of the IT Sector in Revolutionizing Pakistan’s Economy
Analyst Comments: One aspect not covered in the article is the China-Pakistan Economic Corridor (CPEC), a multi-billion dollar infrastructure project aimed at connecting China's western region to Pakistan's Gwadar Port through a network of highways, railways, and pipelines. The project has the potential to boost economic growth in Pakistan and create opportunities for the IT industry, particularly in the development of digital infrastructure and the provision of IT services. This connection with China, a global leader in the IT industry, could offer significant benefits for Pakistan's IT sector and overall economic development. Additionally, CPEC's digital infrastructure projects will be essential for enabling the use of advanced technologies such as AI, machine learning, and big data in various sectors of Pakistan's economy.
FROM THE MEDIA: Pakistan's IT industry is growing rapidly and has the potential to become the country's largest export business. The industry includes software development, BPO, and freelancing. Pakistan was ranked fourth globally in freelancing development, and its IT exports surged by 70% in the last three years. The sector's growth is expected to reach $20 billion by 2025. The industry is cost-effective due to a skilled workforce and is supported by favorable government policies. Despite this, the industry faces challenges such as inadequate funding, low-quality internet, political instability, education gaps, and lack of legal framework for e-commerce.
READ THE STORY: Modern Diplomacy
The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed
Analyst Comments: The earlier discovery of the SolarWinds breach highlights the importance of information-sharing among agencies and industries. It also raises concerns about the US government's failure to prevent and detect the campaign in its early stages, prompting calls for an investigation into how the US government responded to the attacks and missed opportunities to halt it. The incident underscores the need for organizations to remain vigilant and take all necessary measures to protect their networks and systems against cyber threats.
FROM THE MEDIA: The US Department of Justice, Microsoft, and Mandiant discovered the SolarWinds breach six months earlier than previously reported, according to sources. Suspicions were raised in May 2020 when the DOJ detected unusual traffic emanating from one of its servers running a trial version of the Orion software suite made by SolarWinds. The DOJ asked for help from Mandiant to determine whether the server had been hacked, and also engaged Microsoft. Although the scale and significance of the breach were not immediately apparent, the DOJ notified the US Cybersecurity and Infrastructure Agency (CISA) about the breach at the time it occurred. However, the public was not informed until December 2020 when the breach was announced, and the DOJ said its chief information officer had discovered the breach on December 24.
READ THE STORY: Wired
ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection
Analyst Comments: The spread of ViperSoftX malware poses a significant risk to victims' personal and financial data, particularly in the cryptocurrency sector. The malware's adoption of more sophisticated encryption and anti-analysis techniques makes it difficult for security solutions to detect and prevent. The use of non-malicious apps as carriers further complicate the identification of the malware. Users are advised to download software only from official platforms and sources and avoid downloading illegal software. The changing of primary command-and-control (C&C) servers on a monthly basis suggests that the actors behind the malware are attempting to evade detection.
FROM THE MEDIA: The ViperSoftX malware is affecting victims across several countries, including the U.S., Australia, Japan, and India. This information-stealing malware is designed to distribute a malicious Google Chrome extension capable of siphoning cryptocurrencies from wallet applications. Recently, cybersecurity company Trend Micro analyzed the malware and found that it has adopted sophisticated encryption and basic anti-analysis techniques such as byte remapping and web browser communication blocking. The malware's arrival vector is usually through software cracks or key generators, with non-malicious apps like multimedia editors and system cleaner apps being used as "carriers". The malware conducts anti-virtual machine, anti-monitoring, and anti-malware checks before downloading the PowerShell loader, which then decrypts and executes a second-stage PowerShell script retrieved from a remote server. This script launches the main routine, which installs rogue browser extensions to exfiltrate passwords and crypto wallet data.
READ THE STORY: THN
Why China is Trying to Mediate in Russia's War With Ukraine
Analyst Comments: China's move to mediate between Ukraine and Russia could signal a more active role in global diplomacy, reflecting the country's growing ambition to become a superpower. Beijing has previously avoided involvement in conflicts between other countries, but it is now seeking to assert itself as a major diplomatic force. At the same time, China's move to send an envoy to Ukraine could also be seen as a challenge to Russia's dominance in the region, indicating that Beijing is taking at least a step away from Moscow. However, some experts have expressed doubts about China's ability to act as a peacemaker, given its close relationship with Russia. Overall, China's involvement in the Ukraine conflict could have significant implications for the global balance of power, particularly if it succeeds in playing a more active role in resolving the conflict.
FROM THE MEDIA: Chinese President Xi Jinping said that Beijing would send a former Chinese ambassador to Russia as an envoy to Ukraine and "other countries" to discuss a possible political settlement of Russia's war with Ukraine. This move marks a significant departure from China's traditional foreign policy of non-involvement in other countries' conflicts, demonstrating its growing interest in playing a larger role in global diplomacy. China has good relations with both Russia and Ukraine, and Beijing's efforts to mediate between the two countries would increase its presence in Eastern Europe, where it has tried to build ties with other governments. However, some experts have expressed skepticism about China's ability to act as a peacemaker, given its close ties to Russia.
READ THE STORY: VOA
New Atomic macOS Malware Steals Keychain Passwords and Crypto Wallets
Analyst Comments: The appearance of Atomic macOS Stealer demonstrates that macOS is increasingly becoming a target for attackers to deploy stealer malware, and users must remain vigilant to avoid falling victim to such attacks. They should only download and install software from trusted sources, enable two-factor authentication, review app permissions, and avoid opening suspicious links received via emails or SMS messages. It is also imperative that Apple enhances the security of its operating system and addresses any vulnerabilities to prevent future attacks.
FROM THE MEDIA: Threat actors are advertising a new information stealer for the Apple macOS operating system called Atomic macOS Stealer (AMOS) on Telegram for $1,000 per month. It can steal various types of information, including Keychain passwords, complete system information, files from the desktop and documents folder, and the macOS password. It can also extract data from web browsers and cryptocurrency wallets like Atomic, Binance, Coinomi, Electrum, and Exodus. The malware takes the form of an unsigned disk image file (Setup.dmg), and the initial intrusion vector used to deliver the malware is not clear.
READ THE STORY: THN
U.S. Asks Brazil to Hand Over Russian Accused of Spying
Analyst Comments: The US extradition request for Cherkasov comes amid increasing tensions between the US and Russia, and shortly after the arrest of Wall Street Journal reporter Evan Gershkovich in Russia on charges of espionage. Brazil has the power to extradite Cherkasov, but the process could be complicated, given that he is still under investigation in Brazil, and Russia has already requested his extradition. Brazil's new President, Luiz Inácio Lula da Silva, is attempting to position himself as a neutral peacemaker in Russia's war in Ukraine, proposing a "peace club" of nations in the global south to mediate an end to the conflict.
FROM THE MEDIA: The United States has requested the extradition of Sergey Cherkasov, an alleged Russian spy arrested in Brazil in 2020 for espionage activities against the West, following accusations by US and Brazilian authorities that he posed as a Brazilian student in Washington. Russia has demanded Cherkasov's extradition for drug trafficking. The Brazilian Supreme Court will evaluate the US request, and the federal government will have the final signoff. Cherkasov has been sentenced to 15 years in prison in Brazil for forging identity documents.
READ THE STORY: WSJ
ChatGPT is Back in Italy After Addressing Data Privacy Concerns
Analyst Comments: The return of OpenAI's ChatGPT service to Italy is a positive development for the company and its users. OpenAI has responded positively to the demands of the data protection authority and has taken additional steps to address concerns over data privacy. Its commitment to filtering and removing inappropriate content, as well as not actively seeking personal information to train its models, should provide users with a level of confidence in the service. However, the fact that ChatGPT responses may include personal information about public figures and other individuals whose details are accessible on the public internet may be a concern for some users. It is important that OpenAI continues to take steps to protect user data and privacy as it expands its services in different regions.
FROM THE MEDIA: OpenAI has returned to Italy after meeting the data protection authority's demands ahead of the deadline of April 30, 2023. OpenAI's popular chatbot service, ChatGPT, was temporarily blocked in Italy on March 31, 2023, over concerns that its practices violated data protection laws. OpenAI has published a new FAQ emphasizing that it filters and removes information such as hate speech, adult content, sites that primarily aggregate personal information, and spam. It also does not actively seek out personal information to train its models and will not use personal information in training information to build profiles about people, to contact them, to advertise to them, to sell anything, or to sell the information itself. However, it acknowledges that ChatGPT responses may include personal information about public figures and other individuals whose details are accessible on the public internet.
READ THE STORY: THN
China's Secretive Quest for Heavier Artillery
Analyst Comments: The PLA's renewed interest in larger-caliber artillery may reflect the war in Ukraine, where both sides have used field guns to create openings for advance and blunting the enemy's thrusts. In a Taiwan conflict, the PLA may be taking notes about the continued value in modern wars of powerful, long-range guns to clear large swathes of territory, strike strategic targets, flatten urban centers of resistance, and terrorize enemy populations. However, any new large artillery systems will likely come with the same drawbacks that led most militaries to abandon them decades ago: a lower rate of fire, bulky, hard-to-move firing platforms, and difficult logistics. The PLA's research into 203mm artillery does not ensure its eventual fielding.
FROM THE MEDIA: The People's Liberation Army (PLA) is set to test a new 203mm (8-inch) cannon that is bigger and more powerful than any in the current Chinese or American arsenal, according to a contract recently awarded by the PLA Strategic Support Force. The testing contract provides little detail about the PLA's intentions but suggests that it wants to arm its future force with tubed artillery of longer range and much greater firepower. The contract was awarded to China's leading institution for developing advanced artillery, the Nanjing University of Science and Technology. The cannon contract was awarded not by the PLA Army but by the PLA Strategic Support Force, which oversees numerous R&D facilities. Several open-source clues suggest that the Northwest Institute of Nuclear Technology (NINT) in Xi'an is working on the project. It is notable that NINT is primarily responsible for nuclear weapons research, raising the possibility that this research could involve the development of tactical nuclear artillery.
READ THE STORY: Defense One
South Carolina county gov’t hit with a ransomware attack
Analyst Comments: The ransomware attack on Spartanburg County's IT and phone systems is another example of the growing threat of ransomware attacks on local governments in the US. While essential services continue to operate, the incident highlights the potential impact of such attacks on public services and the need for robust cybersecurity measures to prevent them. It is positive that the county's IT department and cybersecurity and forensic team are working to recover impacted systems and that law enforcement is involved in the investigation. However, the fact that no ransomware group has claimed responsibility for the attack suggests that the county may have been targeted opportunistically rather than as part of a specific campaign. It remains to be seen what the full impact of the incident will be and how effectively the county can respond and recover from the attack.
FROM THE MEDIA: The South Carolina county of Spartanburg is currently dealing with a ransomware attack that has limited its IT and phone systems. A cybersecurity firm has been hired, and law enforcement is involved in the investigation and recovery efforts. While no ransomware group has publicly claimed the attack, ransomware groups have been targeting poorly-resourced local governments across the United States over the past year. The Spartanburg County officials have assured the public that all essential services, including 9-1-1 operations and emergency communications, are still operational.
READ THE STORY: The Record
US Army to tailor long-range jammer for Europe, Indo-Pacific theaters
Analyst Comments: The US Army's move to adapt its TLS-EAB system reflects the need for greater flexibility in long-range electronic warfare, signals intelligence, and cyber systems. The adoption of tailored solutions rather than cookie-cutter approaches is an important step in this regard. The Army's engagement with industry partners such as Lockheed Martin and General Dynamics Mission Systems is essential to achieving its goals. It remains to be seen whether the TLS-EAB will remain in its current form or require significant changes to better reflect the different environments in which it may be used.
FROM THE MEDIA: The US Army is adapting its Terrestrial Layer System-Echelons Above Brigade (TLS-EAB) electronic warfare, signals intelligence, and cyber system for greater flexibility. This is to reflect the need for different approaches across the Indo-Pacific and Europe, where the US could face conflict with China and Russia respectively. Army Program Executive Office for Intelligence, Electronic Warfare, and Sensors leader Mark Kitz stated that tailored solutions would be built for each combatant command. It is unclear if the TLS-EAB will remain in its current form. Lockheed Martin and General Dynamics Mission Systems are among the firms developing concepts and demonstrations of the system.
READ THE STORY: Yahoo News
CISA Warns of Critical Flaws in Illumina's DNA Sequencing Instruments
Analyst Comments: The vulnerabilities discovered in Illumina medical devices highlight the growing risks associated with the use of medical devices. The exploitation of these vulnerabilities can cause significant harm to patients by manipulating their medical data, leading to incorrect diagnoses or treatments. Moreover, the Illumina case underscores the importance of device manufacturers incorporating security measures into their products and providing timely updates and patches to mitigate potential threats. Healthcare organizations and medical device manufacturers should be vigilant in identifying and addressing security vulnerabilities in medical devices to prevent cybersecurity incidents that could impact patient safety.
FROM THE MEDIA: The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning of critical vulnerabilities in Illumina medical devices, which are used for DNA sequencing. The vulnerabilities affect Universal Copy Service (UCS) software, which is used in several Illumina devices, including MiSeqDx, NextSeq 550Dx, and iSeq 100. The most severe vulnerability, CVE-2023-1968, can allow remote attackers to bind to exposed IP addresses, giving them the ability to eavesdrop on network traffic and remotely execute arbitrary commands. The second flaw, CVE-2023-1966, is related to privilege misconfiguration that can enable an unauthenticated attacker to upload and execute code with elevated permissions. The FDA has stated that an unauthorized user could exploit these vulnerabilities to manipulate the genomic data results of the affected instruments, leading to incorrect results or a potential data breach.
READ THE STORY: THN
Google Bans Thousands of Play Store Developer Accounts to Block Malware
Analyst Comments: While Google’s efforts to enhance security in its Play application marketplace are commendable, malicious actors continue to find ways to breach Google Play's defenses. The deployment of Goldoson malware, discovered by McAfee researchers and downloaded 100 million times, and the banking Trojan Godfather, which masqueraded as a legitimate application on the Google Play store, are examples of the threat's continued persistence. Additionally, the recent update to Google's terms of service has raised concerns among privacy experts, who argue that the new language is too ambiguous and does not commit Google to notify users when it removes harmful applications from their devices.
FROM THE MEDIA: Google has reported that it prevented 1.43 million policy-violating apps from being published in its Play application marketplace in 2022. The company credits its success to its improved security features and policy enhancements, as well as the requirement for additional identity verification methods such as phone numbers and email addresses. Google has also invested heavily in machine learning systems and app review processes, banning 173,000 malicious accounts and preventing over $2 billion in fraudulent and abusive transactions.
READ THE STORY: DARKReading
China lawmakers broaden the scope of anti-espionage Laws
Analyst Comments: China's revised amendments to its anti-espionage laws represent a further expansion of the country's already expansive definition of espionage and national security. The amendments are part of the Chinese government's wider efforts to strengthen national security, and the expanded definition of spying to include cyberattacks reflects the increasing importance of digital technology in espionage and national security. The changes are likely to further restrict the activities of foreign individuals and organizations operating in China and increase the government's ability to monitor and control the flow of information within the country.
FROM THE MEDIA: China has introduced revised amendments to its anti-espionage laws under the Counter-Espionage Law of the People's Republic of China of 2023. The new provisions broaden the scope of foreign espionage to encompass any action, document, data, and material that may be considered a threat to national security by state authorities. They also expand the duties of law enforcement personnel and amend the definition of spying to include cyberattacks. The reforms follow Chinese President Xi Jinping's emphasis on strengthening national security.
READ THE STORY: Jurist
Items of interest
Ransomware is a forever problem now
Analyst Comments: Ransomware attacks are a major threat to organizations globally, and they show no signs of slowing down. These attacks have a devastating impact on the organizations they target, causing operational disruptions and financial losses. While government sanctions, internet server takedowns, and criminal arrests have reduced businesses' willingness to pay ransomware gangs, organizations still struggle with basic cyber hygiene to protect themselves. Ransomware operators are well-organized, making them adept at rebranding and reshuffling in the face of law enforcement heat, and many are based in countries where cybercriminals targeting Western countries are not pursued. It is crucial that organizations adopt robust cybersecurity measures to protect themselves against these attacks.
FROM THE MEDIA: Ransomware attacks have become endemic globally and are now a top threat in the minds of cyber defenders at the RSA Conference, the cybersecurity industry's highest-profile annual gathering. Cybersecurity firm Sophos has reported that 68% of cyberattacks last year involved ransomware. The National Security Agency's director of cybersecurity, Rob Joyce, recently told reporters that Russian hackers are now weaponizing ransomware in attempted attacks against Ukrainian logistics supply chain companies, as well as organizations in Western-allied countries. Ransomware attacks have exacted an escalating price on law enforcement, policymaking, and financial resources around the world, making it a persistent threat to organizations.
READ THE STORY: Axios
Adversarial Studies - Anti-satellite Weapons (Video)
FROM THE MEDIA: The development of such missiles by different countries and their impact on space conflict and military space policy are explored. The importance of understanding the bigger context of space security, including counter-space capabilities and international law and regulations, is highlighted. The role of space in military structures and the vulnerabilities that arise when space is lost during conflict is also discussed. The need for a balanced approach to military space power and for understanding the economic considerations of commercial space activities is emphasized. The transcript concludes that focusing solely on kinetic anti-satellite missiles as a means of weaponizing space is not helpful in understanding the broader picture of space conflict and security.
Tracking Illicit Finance and Corruption in Ukraine (Video)
FROM THE MEDIA: Keating and his team have been working with investigative journalists and anti-corruption activists from Ukraine to address the issue of financial flows stemming from reconstruction and ensure that they are not illicit. The event features two journalists from Ukraine discussing their experiences reporting on corruption and the challenges they face. The discussion also touches on the progress Ukraine has made in transparency and open data, as well as ongoing issues with judicial and police reform. The speakers emphasize the importance of engaging with civil society and media to support Ukraine's progress in combating corruption.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.