Daily Drop (877): DoJ: Cryptex & PM2BTC | CN: Stimulus | IRGC: US Election | CVE-2024-0132 | UA: UAS | DCRat | ICBC | Gamaredon | Linux CUPS | TSA: Railways | Storm-0501 | DragonForce |
09-28-24
Saturday, Sept 28 2024 // (IG): BB // ScraperDaddy // Cloud Email Harvester
U.S. and Dutch Authorities Disrupt Russian Crypto Exchanges Linked to Cybercrime
Bottom Line Up Front (BLUF): A U.S.-led operation in coordination with Dutch authorities has targeted Russian cryptocurrency exchanges, seizing web domains and infrastructure connected to cybercrime. The U.S. Treasury sanctioned the exchanges Cryptex and PM2BTC, as well as Russian national Sergey Sergeevich Ivanov, who has allegedly laundered millions for ransomware and dark web actors over the past 20 years. The operation aims to curb money laundering activities linked to Russian cybercriminals.
Analyst Comments: This operation demonstrates the growing coordination between international law enforcement and regulatory bodies in cracking down on cybercrime financial networks. Russian actors, benefiting from Kremlin tolerance, have increasingly used cryptocurrency exchanges to launder proceeds from ransomware and darknet activities. Seizing domains and sanctioning key figures like Ivanov reflects an escalating effort to restrict these illicit financial flows. However, the long-term impact of cutting Russian cybercriminals off from the Western financial system remains to be seen, given their ability to adapt to new methods of evasion.
FROM THE MEDIA: On September 26, U.S. and Dutch authorities took coordinated action against Russian cryptocurrency exchanges involved in laundering funds linked to ransomware and other cybercrimes. The operation led to the seizure of domains associated with exchanges like Cryptex and PM2BTC. Russian national Sergey Sergeevich Ivanov, alleged to be a key player in laundering virtual currency for ransomware groups and darknet markets, was also sanctioned and charged with money laundering. Over $720 million in illicit transactions have been linked to these exchanges, according to U.S. Treasury data. Ivanov faces a $10 million reward for information leading to his arrest.
READ THE STORY: Fast Company // The Record
China’s Politburo Pledges Stronger Economic Stimulus Amid Real-Estate Crisis
Bottom Line Up Front (BLUF): China’s Politburo has pledged to ramp up fiscal and monetary measures to stabilize its faltering economy, with a particular focus on addressing the prolonged real estate crisis. This marks a shift toward more assertive economic intervention as Beijing seeks to reverse slowing growth, declining consumer confidence, and a weakening property market. Further details on fiscal support are expected soon.
Analyst Comments: China's move to intensify economic support signals a critical pivot after months of restrained action. By targeting the real estate sector and consumer spending, the government aims to restore confidence and drive short-term recovery. However, China faces deeper structural issues, including an aging population and industrial overcapacity, which complicate long-term growth prospects. The latest measures may provide temporary relief, but the underlying economic headwinds suggest a challenging path ahead for sustained recovery.
FROM THE MEDIA: Amid a slowing economy and persistent real estate woes, China’s Politburo, led by Xi Jinping, has committed to stronger fiscal and monetary intervention. Following months of economic decline, including weak consumer spending and low industrial output, Beijing is stepping up efforts to stabilize the property market and revive growth. Recent central bank actions, including rate cuts and market support, have sparked gains in Chinese stock markets. However, the road to recovery remains difficult, with long-standing structural issues, such as overcapacity and an aging workforce, continuing to weigh on China’s economic future.
Iranian Cyber Actors Indicted for Targeting U.S. Presidential Campaigns in “Hack-and-Leak” Scheme
Bottom Line Up Front (BLUF): Three Iranian nationals linked to the Islamic Revolutionary Guard Corps (IRGC) have been charged by the U.S. Department of Justice for their roles in a cyber campaign aimed at influencing the 2024 U.S. Presidential election. The accused allegedly hacked into the Trump campaign and attempted to leak sensitive materials to undermine its chances.
Analyst Comments: This indictment highlights the sustained threat posed by state-sponsored cyber actors, particularly from Iran, targeting U.S. electoral processes. The accused hackers leveraged tactics like spear-phishing and credential harvesting to access sensitive information, mirroring past Russian interference efforts in U.S. elections. The alignment of these actions with Iran’s broader geopolitical goals, including avenging the death of Qassem Soleimani, underscores how cyber warfare has become an integral tool of foreign policy for adversarial nations. Such operations aim to create instability within democratic systems, reinforcing the importance of robust cyber defenses.
FROM THE MEDIA: U.S. federal prosecutors unsealed charges against three Iranian hackers allegedly working for the IRGC, accusing them of participating in a sophisticated hacking operation to undermine the 2024 U.S. Presidential election. The indictment claims they targeted officials connected to the Trump campaign, stealing non-public campaign materials and leaking them to media outlets and individuals associated with the Biden campaign. The cyber actors are also said to have used spear-phishing attacks and spoofed email accounts to steal sensitive data from various U.S. officials. Sanctions and a $10 million reward have been announced for information leading to their capture.
READ THE STORY: DoJ // AP // FBI
Ukraine's Drone Pilot "Darwin" Rewrites Warfare from the Front Lines
Bottom Line Up Front (BLUF): "Darwin," a 20-year-old Ukrainian drone pilot, has become a vital figure in Ukraine's defense against Russian forces, credited with over 300 successful strikes. His role exemplifies how modern drone warfare, driven by tech-savvy youth, is transforming the battlefield. Despite his proficiency, Darwin grapples with the emotional toll of taking lives as the war intensifies.
Analyst Comments: Drone warfare has become a critical tool in Ukraine's fight against Russia, and operators like Darwin are at the forefront of this technological shift. His ability to execute precise strikes showcases the evolving nature of military engagement, where inexpensive and versatile drones are reshaping traditional combat strategies. However, the psychological burden faced by young drone pilots, thrust into such significant roles, highlights a darker reality of modern warfare. As both sides in the conflict increase their reliance on these technologies, the human cost—both in terms of mental strain and casualties—remains a crucial aspect of the ongoing war.
FROM THE MEDIA: In a deeply personal and revealing look, "Darwin," a 20-year-old drone pilot for Ukraine, shares his experiences on the front lines. Operating with precision, Darwin has played a key role in Ukraine's defense, executing more than 300 confirmed strikes on Russian targets. His story underscores the growing importance of drone warfare, as young Ukrainians are using their tech skills to level the playing field against a stronger adversary. Yet, despite his tactical success, Darwin struggles with the moral and emotional weight of his actions, reflecting the broader human cost of this highly technological conflict.
READ THE STORY: WSJ
New HTML Smuggling Campaign Targets Russian Users with DCRat Malware
Bottom Line Up Front (BLUF): A new phishing campaign is targeting Russian-speaking users with the DCRat trojan, utilizing HTML smuggling to deliver malware through web browsers. The attack uses fake websites and malspam to download password-protected ZIP files, which eventually lead to the installation of the DCRat backdoor. This marks a shift from traditional phishing methods, highlighting the increasing sophistication of malware distribution tactics.
Analyst Comments: This campaign underscores the evolution of phishing strategies like HTML smuggling, allowing malware delivery that bypasses typical security defenses. DCRat’s modular nature, allowing additional plugins, makes it a versatile tool for cybercriminals. As phishing threats become more elaborate, especially with the use of generative AI (GenAI), organizations must stay vigilant, implementing advanced detection methods for payloads embedded in seemingly benign HTML files. The targeted use of social engineering in these campaigns emphasizes the need for enhanced user awareness and stringent cybersecurity protocols.
FROM THE MEDIA: Researchers revealed a campaign targeting Russian-speaking users with DCRat malware via HTML smuggling, marking a departure from previous phishing methods. The malware, deployed through fake sites and phishing emails, evades detection by delivering a ZIP archive containing a trojan payload. This versatile backdoor has been used in various campaigns, including attacks involving Cobalt Strike Beacons.
READ THE STORY: THN
Hunters International Ransomware Gang Targets ICBC London, Steals 6.6TB of Data
Bottom Line Up Front (BLUF): The ransomware group Hunters International claims to have breached the London branch of the Industrial and Commercial Bank of China (ICBC), stealing 6.6TB of data. They have threatened to release over 5.2 million files unless ICBC meets their ransom demands by September 13. ICBC has yet to verify the claims, but such a breach could result in a significant compromise of customer data and financial security.
Analyst Comments: This attack highlights the growing sophistication of ransomware groups like Hunters International, who target high-value organizations with sensitive data. The scale of the attack, if confirmed, demonstrates how even major financial institutions are vulnerable despite robust defenses. ICBC, being the world’s largest bank by assets, presents an attractive target due to the potential financial and reputational damage a breach could inflict. The bank must now evaluate both the legitimacy of the claims and the potential fallout, especially as customers' sensitive information might be at risk of public exposure.
FROM THE MEDIA: On September 11, 2024, ransomware gang Hunters International claimed responsibility for a cyberattack on the London branch of ICBC, China’s state-owned banking giant. The group allegedly extracted 6.6TB of data and demanded a ransom to prevent the release of over 5.2 million sensitive files. Although ICBC has not confirmed the authenticity of the breach, the potential fallout could include exposure of vast amounts of financial data, raising concerns about customer privacy and the bank's reputation. Hunters International, operating for under a year, has rapidly gained prominence, targeting over 130 organizations worldwide except Russian entities.
READ THE STORY: The Register
Cyberespionage the Gamaredon way
Bottom Line Up Front (BLUF): "Darwin," a 20-year-old Ukrainian drone pilot, has become a vital figure in Ukraine's defense against Russian forces, credited with over 300 successful strikes. His role exemplifies how modern drone warfare, driven by tech-savvy youth, is transforming the battlefield. Despite his proficiency, Darwin grapples with the emotional toll of taking lives as the war intensifies.
Analyst Comments: Drone warfare has become a critical tool in Ukraine's fight against Russia, and operators like Darwin are at the forefront of this technological shift. His ability to execute precise strikes showcases the evolving nature of military engagement, where inexpensive and versatile drones are reshaping traditional combat strategies. However, the psychological burden faced by young drone pilots, thrust into such significant roles, highlights a darker reality of modern warfare. As both sides in the conflict increase their reliance on these technologies, the human cost—both in terms of mental strain and casualties—remains a crucial aspect of the ongoing war.
FROM THE MEDIA: In a deeply personal and revealing look, "Darwin," a 20-year-old drone pilot for Ukraine, shares his experiences on the front lines. Operating with precision, Darwin has played a key role in Ukraine's defense, executing more than 300 confirmed strikes on Russian targets. His story underscores the growing importance of drone warfare, as young Ukrainians are using their tech skills to level the playing field against a stronger adversary. Yet, despite his tactical success, Darwin struggles with the moral and emotional weight of his actions, reflecting the broader human cost of this highly technological conflict.
READ THE STORY: ESET
Critical NVIDIA AI Vulnerability CVE-2024-0132 Exposes AI Workloads in Cloud and On-Premise Environments
Bottom Line Up Front (BLUF): Wiz Research has identified a critical vulnerability, CVE-2024-0132, in the NVIDIA Container Toolkit, widely used in AI workloads. This flaw could allow attackers to escape containers, gaining full access to the underlying host, which poses significant risks for cloud environments and AI applications. Organizations using the affected toolkit are urged to update to the latest versions immediately.
Analyst Comments: The discovery of CVE-2024-0132 highlights the expanding attack surface in AI and containerized environments. As AI adoption accelerates, tools like the NVIDIA Container Toolkit play a pivotal role in enabling GPU utilization within cloud and on-premise environments. This vulnerability is particularly dangerous in multi-tenant or shared environments, as an attacker could break out of a container, compromising the underlying host system and accessing sensitive data across AI workloads. Given the rapid deployment of AI infrastructure, this vulnerability underscores the need for security teams to prioritize patching and safeguard shared GPU resources. The prevalence of this toolkit in AI services makes this a critical security concern.
FROM THE MEDIA: Wiz Research has uncovered a critical vulnerability, CVE-2024-0132, in the NVIDIA Container Toolkit, used to run GPU-accelerated containers in cloud and on-premise environments. The flaw enables attackers controlling a container image to perform a container escape, accessing the host file system and potentially gaining root privileges. This could lead to the exposure of sensitive data in shared AI environments. With an estimated 35% of cloud environments impacted, NVIDIA has issued a security patch (v1.16.2) and strongly advises users to update their systems. Trend Micro has also integrated detection and prevention for this vulnerability into its Trend Vision One™ platform.
READ THE STORY: TrendMicro // WIZ
Critical Flaws in Linux CUPS Printing System Enable Remote Command Execution
Bottom Line Up Front (BLUF): A series of security vulnerabilities in the Linux CUPS (Common Unix Printing System) has been disclosed, potentially allowing remote command execution. These flaws enable attackers to exploit improperly validated printer attributes and malicious print drivers, potentially leading to data theft or system damage. While the flaws are serious, they affect a limited number of systems, primarily those with misconfigured network settings.
Analyst Comments: These vulnerabilities in CUPS underscore the persistent risk posed by seemingly mundane system services like printing, which are often overlooked in security planning. Although remote command execution is possible through an exploit chain, the flaws are unlikely to cause widespread impact due to the limited exposure of CUPS to the public internet. Nevertheless, patching remains critical, particularly for systems with network-exposed printers in production environments. This mirrors past vulnerabilities such as Log4Shell and Heartbleed, though experts agree the scope here is more contained.
FROM THE MEDIA: Recent security vulnerabilities found in the Linux CUPS printing system, tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, could allow remote attackers to gain control over affected systems by exploiting misconfigured or malicious printers. The vulnerabilities, if exploited, would allow an attacker to execute commands via a fake printer device. Although systems running Red Hat Enterprise Linux (RHEL) and other Linux distributions are affected, they are not vulnerable by default configurations. Experts recommend disabling the vulnerable service, restricting UDP port 631 traffic, and applying patches once available.
READ THE STORY: THN
Ransomware Group Storm-0501 Exploits Microsoft Entra ID to Infiltrate Cloud Environments
Bottom Line Up Front (BLUF): Storm-0501, an emerging ransomware group, has been compromising cloud environments by stealing Microsoft Entra ID credentials. The group leverages on-premises attacks to pivot into cloud infrastructures, using backdoors for persistent access, data theft, and ransomware deployment. The attacks highlight vulnerabilities in hybrid cloud setups, especially for accounts without Multi-Factor Authentication (MFA).
Analyst Comments: Storm-0501’s ability to exploit Microsoft Entra ID credentials reveals a growing trend of ransomware groups targeting hybrid cloud environments. By using vulnerabilities in both on-premise and cloud systems, the group can implant persistent backdoors, enabling long-term access. This highlights the critical need for organizations to enforce MFA, monitor privileged accounts, and secure cloud environments to prevent unauthorized lateral movement. As hybrid cloud models become more prevalent, threat actors are refining their techniques to exploit gaps in security frameworks, underscoring the importance of integrated cloud defense strategies.
FROM THE MEDIA: Microsoft has issued a warning about the ransomware group Storm-0501, which has been targeting hybrid cloud environments by stealing Microsoft Entra ID credentials. The attackers gain initial access to on-prem systems and then pivot to the cloud, using compromised Entra ID accounts to implant backdoors. These campaigns often involve deploying ransomware like Embargo or simply maintaining persistent access for data theft. The group uses tools such as Impacket to steal credentials and Cobalt Strike for lateral movement. Microsoft advises enforcing MFA and monitoring for unusual account behavior to mitigate these risks.
READ THE STORY: The Register
Kia Cars Vulnerable to Remote Control via License Plate Exploit
Bottom Line Up Front (BLUF): Researchers uncovered a critical vulnerability in Kia vehicles, enabling hackers to take remote control of car functions—like unlocking doors and starting the engine—using just the car's license plate. The flaw, which affected most Kia models made since 2013, was fixed in August 2024 following responsible disclosure earlier in the year.
Analyst Comments: The fact that attackers could exploit a car’s license plate to access and control it underscores how vulnerable modern vehicles can be to cyberattacks. Although Kia has patched the issue, it serves as a reminder of the increasing need for stronger cybersecurity protections as cars become more digitally integrated.
FROM THE MEDIA: Researchers found that hackers could use a car's license plate and VIN to take control of Kia vehicles through Kia's dealership API. Once inside, attackers could add themselves as users and remotely unlock, start, or even track the vehicle, all without notifying the owner. The issue, which affected Kia cars made after 2013, was patched in August, and there is no evidence of the exploit being used maliciously.
READ THE STORY: THN
Personal Data of Millions of French Citizens Left Unprotected, Raising Concerns Over Identity Theft and Fraud
Bottom Line Up Front (BLUF): An Elasticsearch server containing 95 million records of personal data belonging to French citizens has been exposed, potentially impacting millions. The leaked information includes phone numbers, emails, addresses, and partial payment details, posing significant risks of cyberattacks, fraud, and identity theft.
Analyst Comments: This breach underscores the dangers of improperly configured databases, especially those handling sensitive personal information. The discovery of 95 million records, exceeding France's population, indicates data aggregation from various sources, some of which may have come from previous breaches. With data spanning multiple sectors, including telecommunications and retail, affected individuals and companies face heightened risks of targeted attacks, such as spear-phishing and account hijacking. Given the scope of the exposure, this incident is likely to draw significant attention from European regulators under GDPR, emphasizing the critical need for robust data protection and breach detection measures.
FROM THE MEDIA: Researchers from Cybernews, along with cybersecurity expert Bob Dyachenko, discovered an open Elasticsearch server containing over 95 million records of French citizens. The data, which includes names, phone numbers, addresses, emails, and partial payment information, appears to have been compiled from at least 17 separate breaches. Affected companies span industries like telecommunications, e-commerce, and social media, with the exposed information putting millions at risk of identity theft and fraud. While the owner of the database remains unknown, it is suspected that the exposure was unintentional due to misconfiguration.
READ THE STORY: Cybernews
DragonForce Ransomware Group Uses Modified LockBit and Conti Variants
Bottom Line Up Front (BLUF): A new ransomware group, DragonForce, has emerged as a significant threat, deploying modified versions of LockBit 3.0 and Conti ransomware to conduct global attacks. They utilize double extortion techniques, exfiltrating data before encrypting it, while offering affiliates 80% of the ransom. The group targets key industries like manufacturing and transportation, leveraging advanced tools such as SystemBC and Cobalt Strike for persistence and lateral movement.
Analyst Comments: DragonForce's rise showcases the increasing sophistication of ransomware groups, blending established malware like LockBit and Conti with new, customized features. The group's strategic focus on industries critical to global supply chains amplifies the pressure on victims to pay. By integrating advanced evasion techniques like BYOVD and offering affiliates a lucrative 80% share, DragonForce is attracting a network of cybercriminals, escalating the global ransomware threat.
FROM THE MEDIA: Discovered in 2023, DragonForce has quickly become a formidable ransomware-as-a-service (RaaS) operation. The group utilizes a leaked version of LockBit 3.0 and a modified ContiV3 variant to carry out double extortion attacks. Their affiliate program, launched in mid-2024, enables partners to customize ransomware builds, bypassing security systems like XDR and EDR. DragonForce has already claimed 82 victims, primarily in the U.S. manufacturing and transportation sectors, and continues to expand its reach with advanced tools like SystemBC for persistence and Cobalt Strike for network infiltration.
READ THE STORY: Group IB
Malicious Crypto App Disguised as WalletConnect Drains $70K from Users
Bottom Line Up Front (BLUF): A malicious app posing as the legitimate WalletConnect protocol was discovered on Google Play, stealing approximately $70,000 in cryptocurrency from over 150 victims. The app remained undetected for nearly five months, leveraging fake reviews and evasion techniques. This marks the first instance of a cryptocurrency drainer exclusively targeting mobile users.
Analyst Comments: By exploiting a trusted protocol like WalletConnect and deceiving users with fake reviews, the attackers managed to distribute the malicious app to over 10,000 users. The use of advanced techniques like deep links and smart contracts to siphon cryptocurrency without needing traditional malware permissions highlights the evolving threat landscape for mobile users. Enhanced app store security and user education are critical in preventing such sophisticated attacks.
FROM THE MEDIA: Check Point Research uncovered a malicious app on Google Play that impersonated WalletConnect, stealing around $70,000 in cryptocurrency from users. The app, active for five months and downloaded over 10,000 times, tricked users into signing fraudulent transactions, allowing attackers to drain funds from their wallets. The app utilized fake reviews to gain credibility, and most victims were unaware they had been targeted.
READ THE STORY: THN
Cybersecurity Concerns Mount Over U.S. Railroads as TSA Implements New Regulations
Bottom Line Up Front (BLUF): The U.S. rail system is increasingly vulnerable to cyberattacks, with potential consequences including train derailments, economic disruptions, and threats to national security. In response, the Transportation Security Administration (TSA) introduced cybersecurity regulations in 2022, requiring rail operators to strengthen defenses and report incidents. While progress has been made, the industry still lags behind other sectors in cybersecurity readiness, raising concerns as adversaries like China target critical infrastructure.
Analyst Comments: The U.S. rail industry’s delayed adoption of cybersecurity measures highlights significant risks, particularly in times of national crisis. Modernization has made rail systems easier targets for attacks, with digitized operations creating vulnerabilities hackers can exploit. The TSA's regulatory approach represents an essential first step in securing these networks, yet more investment and collaboration are needed. The failure to secure railroads could have disastrous consequences, especially during wartime, where rail systems are critical for mobilizing military assets.
FROM THE MEDIA: Railroads remain a prime target for cyberattacks due to outdated systems and widespread operational complexity. Recent TSA regulations push for better protections, but the rail industry lags behind, raising concerns about potential disruptions, especially during wartime.
READ THE STORY: The Record
North Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Bottom Line Up Front (BLUF): North Korean APT group Kimsuky (also known as Sparkling Pisces) has been linked to two new malware strains, KLogEXE and FPSpy, in recent spear-phishing campaigns targeting Japanese and South Korean organizations. These advanced tools allow Kimsuky to conduct cyber espionage by capturing system information, logging keystrokes, and running arbitrary commands on compromised systems.
Analyst Comments: The emergence of KLogEXE and FPSpy highlights Kimsuky's persistent threat in the Asia-Pacific region. While spear-phishing remains their go-to attack method, these new strains signal their evolution towards more sophisticated, stealthy operations. KLogEXE’s roots in a previous PowerShell-based keylogger and FPSpy’s enhanced backdoor capabilities underscore their intent to deepen their intelligence gathering. The group's ability to modify existing malware to suit their espionage goals demonstrates an ongoing commitment to improving their cyber warfare toolkit.
FROM THE MEDIA: Kimsuky, a notorious North Korean APT group active since 2012, has added two new malware strains to its arsenal—KLogEXE and FPSpy. These strains are primarily delivered through spear-phishing emails designed to deceive targets into downloading malicious files. KLogEXE, a keylogger, collects data on running applications, keystrokes, and mouse clicks, while FPSpy is capable of gathering system information, executing commands, and enumerating files. According to Unit 42 researchers, these campaigns have predominantly targeted Japanese and South Korean organizations, reflecting Kimsuky’s continued focus on cyber espionage in the region.
READ THE STORY: THN
Items of interest
OpenAI Chief Technology Officer Resigns Amid Restructuring
Bottom Line Up Front (BLUF): OpenAI’s Chief Technology Officer, Mira Murati, has resigned as the company plans to shift from a nonprofit to a for-profit structure. The departure marks a significant personnel change amid broader upheaval, with several key executives leaving. The transition will position OpenAI to attract new investments while retaining a nonprofit arm focused on its original mission of AI for social good.
Analyst Comments: Mira Murati's resignation, along with OpenAI’s shift toward a for-profit model, reflects a broader transformation within the company. While OpenAI’s nonprofit origins emphasized creating AI for public benefit, the growing market demand for generative AI and substantial financial interests appear to be driving a more commercial direction. This move, combined with the departure of several key executives, signals a critical juncture for the company as it seeks to balance profit generation with its original AI safety mission. Investors like Microsoft and other tech giants are closely involved in this restructuring, hinting at OpenAI's growing influence in the AI market.
FROM THE MEDIA: OpenAI's CTO, Mira Murati, has stepped down as the organization restructures to become a for-profit entity. This change follows the departure of several top executives and reflects OpenAI’s increasing focus on product delivery and securing investor support. CEO Sam Altman will assume greater technical responsibilities as OpenAI works to finalize its transition, which aims to balance commercial success with its original goal of developing AI for the greater good.
READ THE STORY: WSJ
OpenAI Weighs Sam Altman Stake In For-Profit Shift (Video)
FROM THE MEDIA: Sources tell Bloomberg that OpenAI is discussing giving CEO Sam Altman a 7% equity stake in the company and restructuring to become a for-profit business. The company is considering becoming a public benefit corporation, tasked with turning a profit and also helping society, said the people, who asked not to be identified because the information is private. The transition is still under discussion and a timeline has not been determined, one of the people said. Meanwhile, China is considering injecting up to 1 trillion yuan ($142 billion) of capital into its biggest state banks to increase their capacity to support the struggling economy, according to people familiar with the matter. Sources say the funding will mainly come from the issuance of new special sovereign bonds.
The Possibilities of AI [Entire Talk] - Sam Altman (OpenAI) (Video)
FROM THE MEDIA: Sam Altman is the co-founder and CEO of OpenAI, the AI research and deployment company behind ChatGPT and DALL-E. Altman was president of the early-stage startup accelerator Y Combinator from 2014 to 2019. In 2015, he co-founded OpenAI as a nonprofit research lab with the mission to build general-purpose artificial intelligence that benefits all humanity. In this conversation with Stanford adjunct lecturer Ravi Belani, Altman gives advice for aspiring AI entrepreneurs and shares his insights about the opportunities and risks of AI tools and artificial general intelligence.
The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.