Daily Drop (510): Drugs: Targeting Kurds, Russia Sanctions Fangless Tiger, Rise of Zero Days, DPRK: Gangsters & Ghost Ships, Voicing Against Disinfo, Australia Rickrolls ISIL, Anti-Disinformation
06-05-23
Monday, Jun 05, 2023 // (IG): BB // Intro Exploit Dev // Coffee for Bob
Uncovering the Covert Use of Drugs by Governments in Targeting the Kurds
Analyst Comments: The information presented in this analysis contains allegations regarding the involvement of various countries and actors in the drug trade in the Kurdish regions. However, it is important to note that the information provided lacks specific evidence or verifiable sources. The analysis primarily reflects the views and perspectives of the source rather than providing a comprehensive and objective analysis of the drug-related issues in the region. While drug trafficking is known to exist in various parts of the world, further research and substantiated evidence would be necessary to confirm the specific claims made in this analysis.
FROM THE MEDIA: The usage of drugs as a tool to corrupt and control society in the Kurdish regions, particularly by countries that pursue denial and obliteration policies in Kurdistan (Turkey, Iran, Syria, and Iraq), is highlighted in this analysis. These countries are allegedly involved in the production, trade, and transportation of drugs for financial gains and to exert control over their respective societies. The distribution of drugs is said to be facilitated through civil society institutions, associations, and endowments. It is claimed that minor actors are often arrested while major actors evade punishment due to certain laws and legal processes. The report suggests that drugs are employed as a means of waging war against the Kurds and opposition forces, diverting their attention from the fight for freedom. The specific drug-related challenges and activities in different parts of Kurdistan are discussed.
READ THE STORY: ANHA
Sanctions against Russia like a “tiger without fangs”
Analyst Comments: The sanctions imposed by the Western nations on Russian oil, with the intention to curtail Russia's economic capacity in light of the conflict with Ukraine, seem to be falling short of their intended impact. This is due to the interplay of global market dynamics, particularly the role of countries like India, which are buying Russian oil, refining it, and re-exporting it to European markets. The sanctions are currently not fully effective in curbing Russia's oil industry. Expanding these sanctions to cover countries like India and China presents its own challenges. Such a move could potentially result in skyrocketing oil prices, making this a delicate geopolitical balancing act.
FROM THE MEDIA: Western sanctions on Russian oil, imposed after the start of Russia's conflict with Ukraine, have been less effective than intended due to India's imports and re-exports of the commodity, according to a report by Al-Jazeera. The Kpler data analysis center suggests that India's imports of Russian oil, which currently satisfy around 40-45% of India's needs, are refined and then exported, notably to the European Union. The Finnish Center for Energy Research CREA supports this, confirming that Western countries have imported €42 billion worth of Russian oil products through countries like India over the past year. Oil tracker Victor Katona argues that without including Asian countries like India and China in these sanctions, they will remain a "tiger without fangs". However, trying to prevent India or China from buying Russian oil could lead to a significant increase in oil prices.
READ THE STORY: Modern Diplomacy
Killnet hacktivists say they’re disbanding
Analyst Comments: Killnet's alleged disbandment reflects a shift in their activities or a strategic move to maintain a lower profile. It is noteworthy that the resignation of a member triggered the announcement. However, it is important to remain cautious as hacktivist groups often reemerge or rebrand under different names. The actions of Killnet highlight the nexus between cyber attacks and geopolitical conflicts, particularly in the context of the Ukraine crisis. The existence of other pro-Russian groups conducting similar attacks indicates that the threat of politically motivated cyber attacks remains significant.
FROM THE MEDIA: Killnet, a pro-Russian hacktivist group, has reportedly announced its disbandment following the resignation of one of its members. The group made headlines during Russia's invasion of Ukraine in 2022, carrying out cyber attacks in support of the Kremlin's political agenda. Killnet targeted US hospitals and healthcare organizations as well as a German automotive and arms manufacturer. In late April, they rebranded themselves as a "private military hacker company." While Killnet claims to have disbanded, other similar pro-Russian groups continue to conduct coordinated DDoS attacks via Telegram.
READ THE STORY: Cybernews
The Rise of Zero Days
Analyst Comments: The increase in zero-day threats represents a significant risk to organizations. However, this analysis provides valuable insights into the nature of zero-day threats and the markets for such exploits, clarifying the reasons behind their rise and their potential impact. Understanding these threats and their dynamics is crucial for organizations to establish effective preventative measures. The emphasis on not over-focusing on zero-day threats, despite their danger, is an important perspective. It highlights the need to address all forms of vulnerabilities, including those that already have available fixes.
FROM THE MEDIA: The rapid increase in zero-day threats is a growing concern for organizations and government agencies. SonicWall observed 35 such threats being actively exploited in 2022. This increase is largely due to the high potential rewards associated with zero-day exploits. A zero-day threat, as defined by the National Institute of Standards and Technology (NIST), is an attack that exploits a previously unknown hardware, firmware, or software vulnerability. With 75% of zero-day exploits targeting widely adopted software like Microsoft, Apple, and Google products, these vulnerabilities offer cybercriminals lucrative opportunities for malicious activities. Zero-day exploits are a hot commodity, with white-market, gray-market, and black-market brokers, as well as nation-states, involved in the buying and selling of these threats.
READ THE STORY: SME Street
North Korea and the triads: gangsters, ghost ships, and spies
Analyst Comments: The FT Film provides a detailed and alarming account of how organized criminal networks, particularly the triads, facilitate North Korea's sanctions evasion and support its weapons program. The investigation reveals the complex web of connections between North Korea, criminal organizations, and business partners, shedding light on the mechanisms used to procure illicit oil and launder money. The film highlights the vulnerabilities in the global financial system that are exploited by these networks and calls for greater international cooperation to strengthen sanctions enforcement. The implications of China's role and potential shortcomings in enforcing sanctions raise concerns about the effectiveness of the current approach.
FROM THE MEDIA: The FT Film titled "North Korea and the Triads: gangsters, ghost ships, and Spies" is a joint investigation with the Royal United Services Institute that uncovers the organized criminal networks involved in North Korean sanctions evasion. The film reveals the use of triads and other criminal organizations by North Korea to illegally procure oil, fueling its weapons program. It focuses on the Unica ship, which operates as a ghost vessel, evading detection while delivering fuel to North Korea. Connections to the Suncity Group and its involvement in gambling and money laundering are also uncovered. The film emphasizes the critical role of money laundering in supporting North Korea's weapons program and highlights the connections between North Korea's intelligence apparatus, business partners, and organized crime figures. It questions China's role in enforcing sanctions, as some tankers involved in illicit trade find safe haven in Chinese waters.
READ THE STORY: FT
Kaspersky discovers GoldenJackal APT spies on gov’t organizations
Analyst Comments: The discovery of the GoldenJackal APT group serves as a stark reminder of the evolving threats faced by governments and diplomatic bodies worldwide. It underscores the stealthy and sophisticated nature of such threats, highlighting the importance of advanced detection and response capabilities to combat them. Kaspersky's recommendations provide actionable steps for organizations to improve their cybersecurity posture. Access to timely threat intelligence, continuous team upskilling, the use of EDR solutions, implementation of advanced network-level security, and comprehensive security awareness training form a robust defense strategy against these evolving cyber threats. The detection of GoldenJackal underscores the importance of consistent vigilance, proactive threat hunting, and a multi-layered cybersecurity strategy to mitigate the risk posed by APT groups.
FROM THE MEDIA: Kaspersky, a leading cybersecurity firm, has unearthed an advanced persistent threat (APT) group named GoldenJackal, which has been active since 2019 and has primarily targeted government and diplomatic organizations in the Middle East and South Asia. Notably, this APT group has managed to avoid detection due to its low-profile operations. GoldenJackal deploys Trojans using Word documents and Skype installers. The APT group is unique in its use of a specific toolset to deploy malicious software, enabling remote control of victims' devices through predefined and supported commands. This toolset has been used against high-profile targets, including the government of Pakistan. Among the deceptive tactics used by GoldenJackal, a document named “Gallery of Officers Who Have Received National and Foreign Awards.docx,” which appears to be a legitimate circular, contains the JackalControl Trojan. The group has distributed several variants of this malware, some of which maintain persistence, while others run without infecting the system. Other Trojans deployed by the group include JackalSteal, JackalWorm, JackalPerInfo, and JackalScreenWatcher.
READ THE STORY: Backend News
Voicing Against Disinformation
Analyst Comments: The issue of disinformation has indeed become a significant challenge in our digital age. It poses a severe threat to various aspects of society, from political stability and economic health to individual rights and the very fabric of democracy. The rise of state-sponsored disinformation campaigns adds an extra layer of complexity to this issue, as it turns misinformation into a tool for international conflict and manipulation. The measures to combat disinformation vary widely and their effectiveness can be difficult to assess. While cyber commands and fact-checking initiatives are steps in the right direction, the speed and scale of disinformation spread on digital platforms often outpace these mitigation efforts. The concept of "whistleblowing" on disinformation is an interesting one, as it leverages the power of the crowd to flag suspicious or false content. This can be an effective tool in mitigating the spread of disinformation, as it does not solely rely on governmental or institutional action but encourages active participation from the public.
FROM THE MEDIA: The widespread and rapid dissemination of information in the digital age has led to an increase in disinformation, which is the intentional spread of false information. This can have various motives such as monetary gain, political manipulation, and promoting extremism or terrorism. Disinformation can be both state-sponsored and from the private sector, and it has diverse impacts including military and economic aspects, violation of rights, and undermining democracy. While many countries have initiated measures such as cyber commands to combat disinformation, the number of nations criminalizing it, particularly online, remains low. One suggested solution is the reporting or "whistleblowing" of disinformation.
READ THE STORY: Modern Diplomacy
Brazilian Cybercriminals Using LOLBaS and CMD Scripts to Drain Bank Accounts
Analyst Comments: This attack highlights the ever-increasing sophistication of cybercriminal activities. The use of LOLBaS and CMD-based scripts, which exploit built-in Windows tools and commands, allows these threat actors to evade traditional security measures and bypass endpoint protection solutions. This case underscores the importance of staying vigilant to evolving cyber threats and implementing robust, multi-layered cybersecurity strategies. The reliance on social engineering techniques, particularly through seemingly innocuous emails, also stresses the need for educating users on the dangers of phishing and other email-based scams. This incident shows that cybercrime rings are becoming more adept at exploiting human vulnerabilities to gain unauthorized access to sensitive systems and data.
FROM THE MEDIA: An unknown cybercriminal group has been targeting online banking accounts in Mexico, Peru, and Portugal, with a focus on Spanish- and Portuguese-speaking victims. The group, dubbed Operation CMDStealer, uses tactics like Living-off-the-land Binaries and Scripts (LOLBas) and CMD-based scripts to carry out its activities. The attack method primarily uses social engineering through emails containing tax- or traffic violation-themed lures. The emails include an HTML attachment with obfuscated code, which fetches the next-stage payload from a remote server. The files contain an AutoIt script that's engineered to steal Microsoft Outlook and browser password data. The stolen information is sent back to the attacker's server through an HTTP POST request method.
READ THE STORY: THN
Australian cyber-op attacked ISIL with the terrifying power of Rickrolling
Analyst Comments: The ASD’s innovative use of zero-click attacks showcases a new frontier in cyber warfare and counter-terrorism. Zero-click attacks are particularly potent forms of cyberattack that do not require any user interaction, such as clicking a link or downloading a file. Instead, they exploit vulnerabilities in software to execute malicious code, making them hard to detect and avoid. This adds a layer of complexity and sophistication to cybersecurity operations. The successful use of such advanced techniques by the ASD against ISIL illustrates the role of technology in modern conflicts and emphasizes the continual arms race in the field of cybersecurity. The range of ASD's operations, from domestic prevention of radicalization to international counter-terrorism efforts, underscores the broad spectrum of their work and their crucial part in maintaining national and international security.
FROM THE MEDIA: Australia's Signals Directorate (ASD) used zero-click attacks on devices used by fighters of the Islamic State of Iraq and the Levant (ISIL), according to a documentary called BREAKING the CODE: Cyber Secrets Revealed. Three payloads developed by ASD, known as "Light Bolt," "Care Bear," and "Dark Wall," were deployed to ISIL fighters' smartphones and PCs. The payloads could be used to disable devices, force fighters to seek tech support or give away their location. In some instances, the airstrikes followed. The campaign took place during 2016's Operation Valley Wolf, during which Iraqi forces reclaimed the city of Mosul from ISIL. The documentary also detailed other instances of ASD's interventions, including preventing a young Australian from joining the Taliban, assisting in the investigation of the 2002 Bali Bombing, and disabling malware used by Eastern European cybercriminals who impersonated Australia's government during COVID-19 lockdowns.
READ THE STORY: The Register
Large Spanish bank confirms ransomware attack
Analyst Comments: The attack on Globalcaja highlights the continuing trend of cybercriminals targeting financial institutions, which often hold substantial amounts of sensitive data. Although Globalcaja asserts that customer transactions and data were not affected, the theft of internal and potentially sensitive data could still have significant repercussions. Spain's increasing ransomware incidents signify the rising global cyber threat level. Organizations, especially in the financial sector, need to strengthen their cybersecurity measures, establish robust incident response plans, and consider cyber insurance to mitigate potential damage from such attacks.
FROM THE MEDIA: Globalcaja, a major lender in Spain, has been targeted in a ransomware attack, with the Play ransomware group claiming responsibility. The group claims to have stolen private and confidential data, including client and employee documents, passports, contracts, and more. Globalcaja confirmed that some of their computers were affected by the ransomware but maintained that customer transactions, accounts, and agreements were not impacted. Spanish institutions have seen an increase in ransomware incidents in 2023. The Play ransomware group, first emerging in July 2022, has targeted government entities in Latin America and has also attacked several companies across Europe.
READ THE STORY: The Record
Magento, WooCommerce, WordPress, and Shopify Exploited in Web Skimmer Attack
Analyst Comments: This campaign underscores the increasing sophistication and evasiveness of cybercriminals, as they exploit the established trust of legitimate websites and use them as both targets for data theft and platforms for malware distribution. The ability of the attackers to camouflage their activities by mimicking third-party services and the usage of JavaScript code snippets as loaders to fetch the full attack code, points to advanced evasion techniques. This, coupled with the campaign's potential to affect a vast number of e-commerce customers globally, makes it a considerable cybersecurity threat. Businesses and organizations should prioritize the identification and patching of vulnerabilities and invest in advanced security measures to protect against such attacks.
FROM THE MEDIA: A new web skimming campaign, operating in a style similar to Magecart is actively stealing personally identifiable information (PII) and credit card data from e-commerce websites. The unique aspect of this operation is the use of hijacked websites as "makeshift" command-and-control servers to distribute malicious code. Cybersecurity researchers at Akamai have identified victims across North America, Latin America, and Europe. The attackers use evasion techniques such as Base64 obfuscation and mimicking popular third-party services like Google Analytics. The compromised websites have been exploited to act as malware distribution centers, affecting vulnerable e-commerce platforms like Magento, WooCommerce, WordPress, and Shopify.
READ THE STORY: THN
Dark web threats against the energy industry
Analyst Comments: The Searchlight Cyber report underscores the significant threat that dark web activity poses to the energy industry, challenging the perception that such activities are irrelevant to some CISOs in the sector. The trading of initial access to energy companies' networks on dark web forums highlights the necessity for increased vigilance and proactive cyber defense measures. This intelligence provides valuable insights for security professionals, potentially allowing them to detect if their organizations are targets and prompting them to take appropriate preventative measures.
FROM THE MEDIA: In a recent threat intelligence report by Searchlight Cyber, it was revealed that cybercriminals are selling initial access to energy industry companies on dark web forums. The data, gathered over 12 months (February 2022-2023), demonstrated that dark web forums frequently host auctions for initial access to corporate networks within the energy sector. The report debunks the belief held by 27% of energy industry CISOs that dark web activity has no impact on their companies. The "auctions" follow a standard format, often specifying the starting price, bid increments, and a buy-it-now price, alongside details about the access type, the targeted organization's country, industry, and revenue, and sometimes even the organization's name. While this cybercriminal activity is concerning, it also provides an opportunity for security professionals to identify if their organization is being targeted and to take appropriate mitigative actions. Knowing that such tactics are being used against the energy industry can influence threat modeling processes.
READ THE STORY: Energy Voice
CTF in space: hackable satellite set to launch
Analyst Comments: The launch of Moonlighter signifies an innovative approach to enhancing cybersecurity for satellite systems. By creating a secure environment for professional hackers to test and identify potential vulnerabilities, the project can facilitate the development of more robust security architectures for future space missions. Integrating Moonlighter into the Hack-A-Sat challenge is an effective way to engage the broader cybersecurity community in improving the resilience of satellite systems. The collaboration between the ISS National Laboratory, Aerospace, SpaceX, and the US Air Force and Space Force also showcases the importance of cross-sector cooperation in tackling cybersecurity challenges in the space domain.
FROM THE MEDIA: A delayed SpaceX mission is set to launch a unique payload – a satellite named Moonlighter that will serve as a "hacking test bed". Moonlighter is a project of the International Space Station (ISS) National Laboratory, and its purpose is to enable cybersecurity professionals and hackers to conduct repeatable, realistic, and secure space-based cyber experiments. The initiative comes in light of potential disruptions that a cyber-attack on space communications can cause, as evidenced by the Viasat compromise in February 2022. This sandbox satellite aims to strengthen cybersecurity in space, a domain where vehicles for cybersecurity testing have been largely absent until now. Aaron Myrick, the project leader for Aerospace, explains that Moonlighter is a "playground" for professional hackers to test out new technologies and perform cyber exercises. The goal is to build more cyber-resilient architectures for future space missions.
READ THE STORY: ITNews
Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors
Analyst Comments: The recent upsurge in TrueBot activity underscores the ever-present and evolving dangers to network security. The intricate nature of the TrueBot malware's attack strategies necessitates that cybersecurity teams remain on high alert, especially considering the malware's ability to rapidly expand and create widespread network infections reminiscent of ransomware scenarios. Further complications arise from the continual emergence of new malware variants, as evidenced by the recent report on GuLoader. This clearly illustrates the fluid and rapidly evolving landscape of cybersecurity threats. In response to these risks, businesses must ensure their software and systems are always updated, back up critical data routinely, educate staff about the risks associated with downloading questionable files or clicking on unfamiliar links, and deploy robust cybersecurity tools such as intrusion detection and prevention systems.
FROM THE MEDIA: Researchers have reported a significant surge in activity related to the TrueBot downloader trojan botnet in May 2023. TrueBot, active since at least 2017, is a dangerous botnet associated with the Silence group, which is believed to have ties with the infamous Russian cybercrime entity known as Evil Corp. The trojan uses command and control servers to gather information from compromised systems and uses those systems as platforms for further attacks. Recent TrueBot infections have exploited a critical flaw in Netwrix auditor, CVE-2022-31199 with a CVSS score of 9.8, and used Raspberry Robin as delivery vectors. Fae Carlisle from VMware explained that the documented attack chain commences with a drive-by-download of an executable named "update.exe" from Google Chrome. This suggests that users are tricked into downloading the malware under the guise of a software update. The downloaded executable establishes connections with a known TrueBot IP address located in Russia to retrieve a second-stage executable that's then initiated using Windows Command Prompt. This executable connects to a command-and-control (C2) domain and exfiltrates sensitive data from the host, and is also capable of process and system enumeration.
READ THE STORY: THN
Meet TeamT5, the Taiwanese infosec outfit taking on Beijing and defeating its smears
Analyst Comments: The targeting of TeamT5 highlights the risks faced by cybersecurity firms that actively identify and expose APTs sponsored by nation-states. The incidents underscore the persistent threats posed by Chinese threat actors and the need for increased collaboration within the industry to combat such attacks. The challenges in recruiting skilled professionals and concerns about compromised candidates demonstrate the complex landscape cybersecurity professionals navigate in regions facing geopolitical tensions. The support from Taiwanese President Tsai Ing-wen and the recognition of cybersecurity as national security signify the gravity of the threat landscape.
FROM THE MEDIA: TeamT5, a Taiwanese threat intelligence company specializing in identifying persistent cyber threats, has recently been targeted by malicious actors spreading fake news reports accusing the firm of conducting phishing attacks against the Japanese government and local tech companies. The timing of the attack, just before a major holiday, was intended to catch the company off guard. TeamT5 swiftly responded, denying the accusations and identifying signs that pointed to Chinese threat actors behind the attack. The company, known for its fearlessness in identifying Chinese-sponsored advanced persistent threats (APTs), has encountered resource challenges in recruiting talent due to competition from government agencies and tech companies in Taiwan. The geopolitical tensions and Chinese threat also create unique challenges for the team. Despite these difficulties, TeamT5 remains focused on its successes, such as recent discoveries of vulnerabilities and tracking attackers, which are celebrated within the team.
READ THE STORY: The Register
Toyota admits to yet another cloud leak
Analyst Comments: Toyota's repeated data breaches due to misconfigured cloud environments raise concerns about the company's data security practices and highlight the need for robust security measures in cloud infrastructure. The incidents indicate a pattern of inadequate data handling protocols and enforcement within the organization. The exposure of sensitive customer information poses a risk of potential misuse and underscores the importance of implementing proper data protection measures. Toyota's response, including the implementation of monitoring systems and employee education, shows a commitment to addressing the issue and preventing future breaches. However, the company should conduct a thorough review of its data security practices to ensure comprehensive protection of customer data and regain trust.
FROM THE MEDIA: Japanese automaker Toyota has once again apologized for a data breach caused by a misconfigured cloud environment, following a similar incident a few weeks prior. The company stated that the breach was a result of insufficient dissemination and enforcement of data handling rules. While Toyota claims there is no evidence of data misuse, the misconfiguration exposed approximately 260,000 domestic Japanese service incident records and undisclosed customer data from other Asian and Oceanic countries. Toyota has implemented monitoring systems to detect future breaches and is working to educate employees on data security.
READ THE STORY: The Register
Saudi Arabia is slashing its oil supply. It could mean higher gas prices for US drivers
Analyst Comments: Saudi Arabia's decision to unilaterally cut oil supply reflects the challenges faced by OPEC+ in stabilizing crude prices amid uncertain global demand. The move indicates the kingdom's commitment to supporting oil prices and its willingness to take independent action when necessary. However, the effectiveness of the cut in sustaining higher prices will depend on factors such as global demand, economic conditions, and the actions of other major oil producers. The concerns about economic weakness in key markets and the slower-than-expected recovery in China highlight the fragile nature of the oil market. The decision also highlights the ongoing tension between the need for higher oil revenue and the potential negative impacts of higher prices on consuming countries. Additionally, Russia's ability to evade price caps and increase exports poses challenges to the effectiveness of OPEC+ agreements.
FROM THE MEDIA: Saudi Arabia has announced a unilateral cut in oil supply by 1 million barrels per day starting in July, aiming to prop up crude prices after previous cuts by OPEC+ failed to achieve the desired impact. The move comes as other OPEC+ producers agreed to extend existing production cuts through next year. The reduction is expected to temporarily increase oil prices, with the potential for extension depending on market conditions. The decision reflects concerns about uncertain fuel demand due to economic weakness in the US and Europe, as well as a slower-than-expected rebound in China. The previous production cuts did not sustainably boost oil prices, and the market has remained below pre-cut levels. The Saudi move aims to support the country's high oil revenue needed for ambitious development projects. However, higher oil prices also pose risks, such as fueling inflation and complicating trade. Russia, a major oil producer, has found ways to evade price caps imposed by the Group of Seven nations and has increased exports despite voluntary cuts.
READ THE STORY: ABC News
Items of interest
Space Junk: The Problem Growing Above Us
Analyst Comments: The space junk issue highlights the need for sustainable practices in space exploration and utilization. While technology plays a crucial role in addressing the problem, it must be coupled with international cooperation and adherence to space debris mitigation guidelines. As space is a shared resource, the responsibility to preserve it lies with all spacefaring entities. The current and emerging solutions show promise but require further development, larger-scale implementation, and comprehensive international agreement. Our increasing dependence on satellite technology necessitates urgent and thoughtful action to ensure the safety and sustainability of our space activities. The preservation of space is a collective challenge that demands a collective response, underscoring the importance of global cooperation in tackling this issue.
FROM THE MEDIA: The problem of space junk, consisting of defunct satellites, used rocket stages, and debris from equipment and collisions, poses significant risks to our satellite technology and space missions. These objects, which number in the millions and travel at high speeds, can cause substantial damage upon collision with operational satellites or the International Space Station. The Kessler Syndrome, a scenario of cascading collisions due to high object density, threatens to exacerbate the situation and potentially compromise satellite functionality. Mitigation efforts include regulations to minimize new debris creation, and experimental technologies aiming to actively remove space debris. However, these solutions involve technical and regulatory challenges.
READ THE STORY: The Mirage
Space Debris: The Unseen Consequences of the Space Exploration Surge (Video)
FROM THE MEDIA: More and more satellites are circling the Earth, as launching them becomes cheaper and cheaper. But out-of-service satellites can remain in orbit for decades. Now specialized companies want to help tidy up space. Telephone calls, satellite navigation, online banking: The services we depend on every day require satellites to work. But the risk of collision grows with each new object that is launched into orbit.
Comprehending and Addressing the Issue of Orbital Junk (Video)
FROM THE MEDIA: Since 1957, the near-earth population of trackable space objects has grown from 1 to over 18,000. These objects are typically softball size or larger. Of these 18,000+ trackable objects, only several hundred are operational spacecraft. In addition to the trackable objects, there are several hundred thousand objects the size of marbles and several million objects the size of sand grains. As a result, all spacecraft that operate in low-earth orbit (such as the International Space Station) are subject to high-speed impacts by space junk, which is also called ‘space debris’ or ‘orbital debris’. The threat of damage from high-speed orbital debris particle impacts has become a significant design consideration in the development and construction of long-duration earth-orbiting spacecraft.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.