Daily Drop (576): Russia: Moon Mission, China: Crude Supplier, US-China: Tech Competition, Resilience, Huge Scam: Roblox & Fortnite, Italian Rail Group, DPRK: Targets South, Data Fabric, India: Chips
08-20-23
Sunday, Aug 20, 2023 // (IG): BB // Financial Enabler PODCAST // Coffee for Bob
Russia’s first post-Soviet Moon mission ends in space crash
Analyst Comments: The failure of the Luna-25 mission is a significant setback for Russia's space ambitions and underscores the challenges the country faces in reviving its once-dominant space program. The incident not only reflects technical and operational challenges but also the broader geopolitical and economic pressures that Russia is currently grappling with. The crash serves as a reminder of the complexities and risks associated with space exploration and the need for continued investment, innovation, and international collaboration in this domain. The global space race is intensifying, with various nations vying for dominance, and such setbacks can have long-term implications for a country's position in this competitive landscape.
FROM THE MEDIA: Russia's first Moon mission since the Soviet era in 1976 has ended in a crash. The unmanned spacecraft, Luna-25, lost control and collided with the Moon's surface. The mission was intended to land on the Moon's South Pole and spend a year studying its surface, exosphere, and conducting other research. However, during its transition from a circular orbit to a pre-landing orbit, communication was lost, and the spacecraft deviated from its planned trajectory, leading to the crash. This incident highlights the decline of Russia's space program since its cold war zenith. The Luna-25 mission was particularly significant as Russia aimed to be the first country to land on the Moon's South Pole. The crash has raised concerns about the future of Russia's space endeavors, especially given the country's current geopolitical and economic challenges, including its involvement in Ukraine and the resulting international sanctions.
READ THE STORY: FT
Russia remains China's top crude supplier in July despite narrower discounts
Analyst Comments: Andrew Hayley's report offers a comprehensive, data-driven view on the crude oil trade dynamics between significant global entities, emphasizing the interplay of geopolitical decisions, market demands, and economic tactics. Russia's enduring role as a primary supplier to China, despite economic and political challenges, underlines the complexities of international trade in the energy domain. The piece is meticulously researched, equipping readers with a thorough understanding of the current state of crude oil trade and its influencing factors. It stands as an essential resource for industry stakeholders, policymakers, and those intrigued by global energy trade dynamics. The evolving ties between China, Russia, and other major oil suppliers, especially against the backdrop of global sanctions and geopolitical tensions, is a pivotal area deserving ongoing scrutiny and interpretation.
FROM THE MEDIA: On August 19, 2023, Andrew Hayley reported for Reuters that Russia retained its status as China's primary crude oil supplier in July. According to Chinese government data, Russian shipments to China rose by 13% from the previous year, amounting to 8.06 million metric tons. This increase persisted even with a dip from peak shipments due to diminished discounts and a boost in Russia's domestic demand. Conversely, Saudi Arabia experienced a 14% drop in shipments to China in July, influenced by Riyadh's decision to elevate the selling price of its Arab Light crude and curtail output. The effects of Western sanctions on Russian crude are also highlighted, with the Russian ESPO grade crude trading closer to benchmark grades due to robust demand from Indian and Chinese buyers. Shifts in crude shipments to China from other nations, like Angola and the U.S., have been influenced by geopolitical tensions and market intricacies.
READ THE STORY: Reuters
The US-China Tech Competition Takes Center Stage
Analyst Comments: The escalating tech competition between the U.S. and China underscores the strategic importance of the semiconductor industry and other high-tech sectors in the global geopolitical landscape. The U.S.'s efforts to reclaim its leadership in semiconductor manufacturing and curb investments in China highlight the intertwined nature of economic and national security concerns. The Biden administration's measures, while aimed at safeguarding national interests, also reflect the complexities of global supply chains and the challenges of disentangling economic interdependencies. The tech rivalry between the two superpowers is set to shape the contours of global tech governance, with potential ripple effects across various sectors and regions.
FROM THE MEDIA: The U.S. and China are at the forefront of a technological competition, with the semiconductor industry being a primary battleground. The CHIPS and Science Act 2022, introduced by the Biden administration, marked an effort to reclaim the U.S.'s diminishing dominance in the semiconductor manufacturing sector, where it saw its global market share drop from 40% to just over 10% in three decades, largely ceded to China. The Act allocated $53 billion to enhance U.S. semiconductor manufacturing, R&D, and workforce development. On its first anniversary, the Biden administration introduced a new executive order on August 9, targeting U.S. investments in "countries of concern" with a focus on China, Hong Kong, and Macau. This order aims to oversee and potentially restrict U.S. investments in specific technologies, including semiconductors, quantum information technologies, and artificial intelligence, due to national security concerns. Despite previous efforts, there were still avenues through which Chinese technologies could penetrate the U.S. market.
READ THE STORY: EurasiaReview
Resilience is overrated when it's not advertised
Analyst Comments: This piece offers a deep dive into the complexities and nuances of IT support, particularly concerning server management and failover mechanisms. Through a real-life scenario, it highlights the critical nature of comprehensive testing and effective team communication to avert unplanned complications. Presented in a narrative style, the content resonates with its audience, showcasing the unpredictable nature of technological environments. It stands as a cautionary tale for IT experts, emphasizing the potential hazards of untried systems and the value of readiness for unforeseen challenges.
FROM THE MEDIA: The story revolves around an individual named “Brad,” who worked for a firm that supplied criminal justice applications to police departments. Brad was responsible for supporting a Data General server system, which comprised two servers designed to fail over to each other. However, the wire that would enable this failover had never been connected, rendering the system incapable of actual failover. One night, Brad received a call about slow server performance. After investigating, he found the server was overburdened but couldn't identify the root cause. He spent hours trying to resolve the issue, only to discover later that a senior engineer had connected the failover wire the previous day. The failover had worked, but the backup server, which had lesser resources, couldn't handle the load. The issue was resolved by forcing the IP back to the primary server. Brad and his team later disconnected the failover wire to prevent a recurrence.
READ THE STORY: The Register
A Huge Scam Targeting Kids With Roblox and Fortnite ‘Offers’ Has Been Hiding in Plain Sight
Analyst Comments: The report from WIRED underscores the intricate and evolving nature of online scams, highlighting the need for heightened vigilance, particularly for younger internet users. The detailed investigation into the operations of CPABuild and its affiliates reveals the lengths to which scammers will venture to exploit digital vulnerabilities and deceive unsuspecting individuals. This revelation serves as a stark reminder of the digital threats lurking in the online realm and the importance of safeguarding against them.
FROM THE MEDIA: WIRED reports on a pervasive scam targeting children, especially players of popular games like Roblox and Fortnite. Over the past five years, numerous websites, encompassing US government agencies, universities, and professional organizations, have been compromised to push deceptive offers. These offers often entice children with the allure of in-game rewards, leading them to download harmful apps or share personal details. Zach Edwards, a security researcher, has been monitoring these deceptions for more than three years, linking them to a single US-registered advertising company. This company funnels web traffic to various online advertisers. Edwards has identified a multitude of compromised .gov, .org, and .edu domains. Attackers exploit website vulnerabilities to upload malicious PDF files, termed "poison PDFs" by Edwards. These PDFs, optimized for search engine visibility, promote enticing offers like "free Fortnite skins" or Roblox currency generators. Users who click on these links navigate through a series of websites, eventually landing on scam-centric pages, many of which are tailored to appeal to children.
READ THE STORY: Wired
Italian rail group aims to launch high-speed links between European cities
Analyst Comments: The move by FS to capitalize on the liberalization of Europe's rail network is a strategic one, aiming to provide more efficient and interconnected rail services across major European cities. The emphasis on high-speed rail connections not only promotes sustainable travel but also offers a competitive alternative to short-haul flights. The potential expansion of services by Trenitalia into other parts of Europe signifies the growing ambition of rail operators to tap into new markets and cater to a broader audience. The focus on enhancing service standards further underscores the commitment to improving passenger experience and making rail travel more appealing.
FROM THE MEDIA: The Italian state-owned train operator, Ferrovie dello Stato Italiane (FS), is planning to introduce high-speed rail services connecting major European cities, capitalizing on the recent liberalization of Europe's rail network. FS envisions a high-speed rail service linking Brussels, Amsterdam, Paris, and potentially extending to Berlin. This move is in response to EU regulations that mandate countries to open their high-speed networks to competition. Detailed plans are already in progress for a rail link between Paris and Barcelona. Carlo Palasciano Villamagna, FS's chief international officer, expressed interest in cross-border services, especially since new liberalization measures were implemented in June 2019. This liberalization is intended to make train travel a more viable alternative to short-haul flights, marking a significant shift in the European rail industry.
READ THE STORY: FT
North Korean Hackers Targets US-South Korea Millitary Excercise
Analyst Comments: The attempted cyberattack on the joint US-South Korea military exercise underscores the evolving nature of threats in the digital age. While traditional military exercises focus on physical preparedness, the cyber dimension adds a layer of complexity to defense strategies. North Korea's alleged involvement in such cyberattacks highlights its reliance on asymmetric warfare tactics to counterbalance its adversaries' conventional military superiority. Spear-phishing campaigns, like the one employed by Kimsuky, are particularly concerning due to their targeted nature and potential to extract critical information. As cyber threats continue to evolve, it's imperative for nations to invest in robust cybersecurity measures, not just to protect sensitive data but also to ensure the integrity of critical infrastructure and military operations.
FROM THE MEDIA: Suspected hackers from North Korea have attempted to target a joint military exercise conducted by the US and South Korea, aiming to steal classified data from the South Korean police agency. Although the cyberattack was thwarted and no data was compromised, the South Korean police have associated this hacking attempt to Kimsuky, a North Korean hacking group known for its spear-phishing campaigns. The primary objective of these hackers was to disrupt the military drill, which is designed to enhance South Korea's capabilities in responding to North Korea's nuclear and missile threats. The joint investigation by South Korean police and the U.S. military revealed that the IP address used in this cyberattack was the same as the one used in a 2014 hack against South Korea’s nuclear reactor operator. Spear-phishing, a technique employed by Kimsuky, targets specific individuals to extract sensitive information by persuading them to reveal passwords or click on malicious attachments or links.
READ THE STORY: TechDator
Data Fabric: The Intricate Shield Against Evolving Cyber Threats
Analyst Comments: The targeting of the joint US-South Korea military exercise by North Korean hackers underscores the increasing cyber threat posed by state-sponsored actors. The use of spear-phishing campaigns, a specialty of the Kimsuky group, highlights the need for heightened awareness and training among military personnel and associated staff. The introduction and explanation of data fabric in the cybersecurity domain indicate a shift towards more integrated and data-centric security solutions. This approach seems promising in addressing the evolving cyber threat landscape, especially when traditional standalone security tools might fall short.
FROM THE MEDIA: Suspected North Korean hackers targeted a joint military exercise between the US and South Korea with the intention of stealing classified data. The South Korean police linked this attempt to Kimsuky, a North Korean hacking group known for spear-phishing campaigns. The main objective of this cyberattack was to disrupt the joint military exercise, which is designed to enhance South Korea's response capabilities to North Korea's nuclear and missile threats. Data fabric, also known as cybersecurity fabric, is a novel approach in cybersecurity that integrates various security components to provide comprehensive protection against a wide range of cyber threats. It emphasizes the use of data, including threat intelligence, security alerts, and logs, to identify regular activities and detect any anomalous or malicious behavior. Key components of data fabric include rapid threat intelligence and security data integration, real-time data exchange, unified cybersecurity management, automation and orchestration, and the use of artificial intelligence (AI).
READ THE STORY: HackRead
Is India entering a semiconductor ‘red ocean’
Analyst Comments: India's decision to invest heavily in the semiconductor industry comes at a time of global oversupply, which could be seen as a risky move. However, with the increasing global demand for semiconductors, especially from sectors like automotive and communications, the long-term prospects remain promising. The challenge for India will be to ensure that these investments translate into operational factories without significant issues, and that they can compete effectively in a market dominated by established players.
FROM THE MEDIA: The global semiconductor industry is currently experiencing a period of oversupply. Despite this, India has announced a $10-billion incentive package to boost its semiconductor industry. This move prompts questions about India's decision to delve into the highly competitive chip manufacturing sector, rather than focusing on chip design. The oversupply in the semiconductor market is evident from Taiwan's TSMC, the world's leading chipmaker, which reported a 23% drop in sales for the June quarter and predicted a 10% decline for 2023. Gartner, a consultancy, projected an 11.2% decrease in global industry revenues for 2023.
READ THE STORY: LiveMint
How China is exporting authoritarianism to Africa
Analyst Comments: China's endeavors in Africa are not merely economic; they are deeply political and ideological. The establishment of a training institute to propagate the one-party state model indicates China's long-term vision of creating an authoritarian-friendly bloc globally. This strategy serves dual purposes: it offers a counter-narrative to Western democratic ideals and provides China with a shield against criticisms, especially concerning human rights. The West's relative neglect of Africa has given China a fertile ground to expand its influence, and unless there's a strategic recalibration, China might successfully reshape the geopolitical norms in the region to its advantage.
FROM THE MEDIA: China's increasing influence in Africa, particularly following the recent coup in Niger, underscores its strategic intent to shape the geopolitical landscape. While Western powers, including the U.S., grapple with maintaining an anti-terrorism presence in Niger, China has been deepening its economic ties, investing billions in the country's oil sector. However, the coup has temporarily halted China's $800 million hydroelectric dam project. In Tanzania, China's influence manifests differently, with the establishment of its first overseas training institute. This institute, a collaboration between the Chinese Communist Party and the ruling parties of six African nations, aims to impart Beijing's governance model, emphasizing the supremacy of a one-party state. Axios reporter Bethany Allen-Ebrahimian's investigation into the "China's Shadow Empire" series reveals the depth of China's ambitions in Africa.
READ THE STORY: Axios
Items of interest
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
Analyst Comments: The research is both timely and relevant, given the increasing reliance on VPNs for both professional and personal use. The authors' approach to uncovering vulnerabilities in real-world client configurations, rather than just focusing on cryptographic flaws, provides a fresh perspective on VPN security. The extensive experiments conducted across various platforms add credibility to their findings. However, the real value of this paper lies in its practical implications. By highlighting these vulnerabilities and offering countermeasures, the authors are pushing for a more secure implementation of VPNs in the future.
FROM THE MEDIA: The paper "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables" delves into the security of open tunneling and VPN protocols. Authored by a team from New York University and KU Leuven, the research uncovers two novel attacks that exploit design flaws in VPN client configurations. These attacks, termed "LocalNet" and "ServerIP," manipulate the IP routing tables to leak traffic outside the protected VPN tunnel. Through extensive experiments on multiple platforms, the authors found a significant number of VPN clients to be vulnerable.
READ THE STORY: TunnelCrack
How TunnelCrack breaks most VPNs (Video)
FROM THE MEDIA: This video is not a hacking tutorial. It only shows the impact of the "TunnelCrack" research, with as goal to motivate users that they need to update their VPN software. The video doesn't explain the actual steps to perform such attacks.
Linux Privilege Escalation for Beginners (Video)
FROM THE MEDIA: Nvidia, originally known for its dominance in the graphics card industry in the 1990s, transformed the graphics card into a powerhouse for Artificial Intelligence (AI). In 1999, they introduced the GeForce 256, the world's first Graphics Processing Unit (GPU). This GPU was capable of processing the entire graphics pipeline on a single chip, eliminating the need for data transfers with the CPU.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.