Cyber war – TC Mech Wars http://tcmechwars.com/ Fri, 02 Sep 2022 22:09:30 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://tcmechwars.com/wp-content/uploads/2021/09/tc.png Cyber war – TC Mech Wars http://tcmechwars.com/ 32 32 UNK Cybersecurity Major Jordan Schnell shares research with US Strategic Command – UNK News https://tcmechwars.com/unk-cybersecurity-major-jordan-schnell-shares-research-with-us-strategic-command-unk-news/ Fri, 02 Sep 2022 19:18:37 +0000 https://tcmechwars.com/unk-cybersecurity-major-jordan-schnell-shares-research-with-us-strategic-command-unk-news/ Post views: 274 OMAHA – Strategic Deterrence Interns from the University of Nebraska’s National Strategic Research Institute (NSRI) recently presented the final research findings from their internship experience to Lt. Gen. Thomas Bussiere, Deputy Commander of Command American strategy. Hosted at Command Headquarters at Offutt Air Force Base in Omaha, the hour-long briefing […]]]>



Post views:
274

OMAHA – Strategic Deterrence Interns from the University of Nebraska’s National Strategic Research Institute (NSRI) recently presented the final research findings from their internship experience to Lt. Gen. Thomas Bussiere, Deputy Commander of Command American strategy.

Hosted at Command Headquarters at Offutt Air Force Base in Omaha, the hour-long briefing provided an opportunity for NU students and ROTC cadets from multiple institutions to share their growing knowledge of strategic deterrence and the end products of three research projects:

  • On the road to war for a new NSRI wargame
  • Game theory for the tripolar deterrence environment
  • Best practices for mitigating cyber vulnerabilities induced by electromagnetic spectrum pathways

“Strategic deterrence is not a static concept, and neither is research,” Bussière said. “I so appreciate the work that NRSI does for strategic deterrence and our national security. Your research sets the stage for the future of deterrence and must be continued and implemented. That’s why we need people like these future leaders to join us in the strategic command enterprise.

Through this experience, the interns enhanced their national security expertise, their skills in their disciplines, and their confidence as professionals, which was demonstrated by their individual contributions to Bussière.

In just four weeks, the five ROTC cadets have developed a comprehensive road to war for an upcoming NSRI war game that will investigate ultra-low and ultra-low yield nuclear employment in a China-Taiwan conflict. Developing the path to war required researching the current rising tensions in the region, and then artfully and realistically translating those tensions into a conflict scenario where the potential employment of nuclear power could be examined.

“I learned that without the effectiveness of nuclear deterrence, in particular, other national security efforts could not succeed,” said Gavin Morse, a U.S. Army cadet and international relations specialist at the Washington University. “The continued exposure to deterrence at the strategic level has inspired me to continue working in this sector.”

A cohort of four NU students applied game theory to understand and model deterrence strategies between multiple competitors, particularly the United States, Russia, and China. Game theory provides a rational framework based on the construction of rigorous models that describe situations of conflict and cooperation between rational decision makers.

“I’m taking away quite a bit of knowledge about game theory, a subject I knew little about before starting this internship,” said Grant VanRobays, a political science student at the University of Nebraska at Omaha. “Game theory is fundamentally about breaking down decision-making into a series of moves by each player in the ‘game.’ I can use this mindset to help improve my own decision-making skills. »

Under the umbrella of Electromagnetic Spectrum Operations, two New York University students investigated best practices for mitigating cyber vulnerabilities induced by radio frequency (RF) pathways. A specific area of ​​interest in this research is whether crowdsourced ethical hacking could be a viable solution. Understanding the latest RF threat mitigation efforts emerging in the commercial world, which was the focus of the students’ work, will allow for more informed recommendations to guide USSTRATCOM’s cybersecurity.

“I have developed my professional skills, namely my comfort level information slides for leaders, and the hands-on experience provided through this internship complements my training in a way that a traditional classroom experience couldn’t,” said cybersecurity expert Jordan Schnell. major in operations at the University of Nebraska at Kearney.

“In addition to solidifying my career choice in cybersecurity, this internship sparked my interest in the field of national security. In the future, I hope to engage in work that will benefit not only the cyber field, but also the nation’s overall security.

As the NSRI Internship Program continues to evolve and grow, the institute has remained focused on the goal of the effort – to introduce young, high-caliber enthusiasts to the career opportunities that exist in nation defense. against strategic attacks, said Maj. Gen., USAF (Ret.) Rick Evans, NSRI Executive Director.

“There are few times I am as proud as when I sit in this briefing room watching and listening to these students and cadets sharing not only their technical efforts, but their pride in what they have accomplished and what that means,” Evans said. “It gives me great confidence to know that our next generation of professionals are interested and ready to take on the national security challenges that our nation will surely face in the years and decades to come.

“We appreciate the attention USSTRATCOM pays to the efforts of these students, as well as the investment of time and expertise that university and NSRI researchers have provided to ensure that the students have a great experience. »



]]>
Quantum computing as important as the atomic bomb: Expert https://tcmechwars.com/quantum-computing-as-important-as-the-atomic-bomb-expert/ Tue, 30 Aug 2022 21:24:02 +0000 https://tcmechwars.com/quantum-computing-as-important-as-the-atomic-bomb-expert/ Chinese tech giant Baidu is developing its own quantum computer to compete with the United States in the race for next-generation information processing. The computer does not surpass rivals currently being developed in America but, according to an expert, signals fierce competition over the future of data security. Arthur Herman, a senior fellow at the […]]]>

Chinese tech giant Baidu is developing its own quantum computer to compete with the United States in the race for next-generation information processing. The computer does not surpass rivals currently being developed in America but, according to an expert, signals fierce competition over the future of data security.

Arthur Herman, a senior fellow at the conservative think tank Hudson Institute, said Baidu’s recently announced quantum effort fell short of similar efforts by companies like Google and IBM.

“This quantum computer they’re touting only has 10 qubits, and that’s a pretty small number,” Herman said during an Aug. 29 interview on the “China in Focus” program on sister media NTD. from The Epoch Times.

“Google’s Sycamore quantum computer has 60 qubits Plus. IBM’s is over 70 qubits.

A quantum bit, or qubit, is a basic unit of quantum information used by quantum computers. While traditional processors use normal bits, which can be turned on or off to create binary code, qubits can be turned on, off, or both. and extinguish simultaneously in a phenomenon known as superposition.

The existence of this third state will allow quantum processors, in theory, to achieve much faster processing speeds than their traditional counterparts.

So governments and corporations are racing to develop quantum computing to be the first to dominate data, because such fast processing speeds could enable mass decryption of current security measures. However, the actual applications of the technology are still very limited.

Herman, who leads the Hudson Institute’s Quantum Alliance initiative, said this limited usefulness now belies the global implications of quantum technology. Moreover, he said, the race for breakthrough quantum capabilities could reach a breakthrough at any time.

“There are too many indications that with one or two major breakthroughs, conceptually [or] at the engineering level, that suddenly the process will take [a] a much shorter time than even the experts wanted to predict,” Herman said.

“It will be easy for such a device to decrypt all existing public encryption systems. In other words, such a device will be able to erase any type of encryption that currently exists in order to extract any type of data, classified or not, to which it wishes to have access.

This possible capability is what makes the technology so popular among nations around the world, and why the United States and China are competing to deploy it before the other.

“At the moment, we really have nothing to worry about,” Herman said. “It’s an indication that the United States… [is] still far ahead in the race to develop a large-scale quantum computer.

“Just because we have a lead doesn’t necessarily mean we’re going to win,” Herman added. “It’s like the hare and the tortoise. We are like the hare, we sprinted ahead… but the Chinese are advancing towards us, slowly but surely.

A seven-cubit quantum device is seen at the IBM Thomas J. Watson Research Center in Yorktown Heights, NY, Feb. 27, 2018. (Seth Wenig/AP Photo)

“As important as the Manhattan Project”

While Baidu’s recently announced quantum computer is only 10 qubits, the company says it has also developed a 36-qubit chip. IBM, meanwhile, said it hopes to develop a 4,000 cubit quantum computer by 2025.

For his part, Herman said the 10,000 or more qubits needed for codebreaking efforts to truly begin would likely not occur until the 2030s.

“People are starting to realize that what seemed like a distant threat [on] the horizon is actually a lot closer than we thought,” Herman said.

“What you’re talking about is the ultimate cyber warfare weapon that could result from the race we’re in with China toward a quantum computer.”

Herman said the unstable timeline for developing next-generation quantum technologies was a problem. Another, he said, was developing adequate security protocols for the arrival of this technology. It’s hard to predict what quantum cyberwarfare will look like, he said.

“The reason I created the Quantum Alliance Initiative in the first place is that we can’t afford to gamble,” Herman said.

” The fact is that [China] can use this [through threats], as well as at the deployment level, in a way that is really difficult to understand and evaluate at this stage. What would quantum-scale cyber warfare really look like? »

So while Herman thinks the US shouldn’t be worried about Baidu’s latest quantum attempt, he thinks the world should be worried about the moves towards quantum technology as a whole. Like the atomic weapons of World War II, he said, it would only take the development of one or two of these devices to change the nature of information security forever.

“It’s potentially as important as the Manhattan Project to creating the atomic bomb,” Herman said.

“[It’s] potentially as important as the race to create the hydrogen bomb because of the huge catastrophic effect [that would occur] if the Chinese had a decoding quantum computer before we had it or before we were really ready to deal with it.

Andrew Thornebrook

Follow

Andrew Thornebrooke is a reporter for The Epoch Times and covers China-related issues with a focus on defense, military affairs, and national security. He holds an MA in Military History from Norwich University.

Tiffany Meier

Follow

Tiffany Meier is a New York-based journalist and host of NTD’s China in Focus.

]]>
A Nitrokod miner has infected systems in 11 countries since 2019Security Affairs https://tcmechwars.com/a-nitrokod-miner-has-infected-systems-in-11-countries-since-2019security-affairs/ Mon, 29 Aug 2022 13:12:10 +0000 https://tcmechwars.com/a-nitrokod-miner-has-infected-systems-in-11-countries-since-2019security-affairs/ Researchers spotted a Turkey-based crypto-miner malware campaign, tracked as Nitrokod, that infected systems in 11 countries. Check Point researchers discovered a Turkey-based crypto miner malware campaign dubbed Nitrokod that infected machines in 11 countries Threat actors dropped the malware from popular software available on dozens of freeware websites including Softpedia and uptodown. Experts have noticed […]]]>

Researchers spotted a Turkey-based crypto-miner malware campaign, tracked as Nitrokod, that infected systems in 11 countries.

Check Point researchers discovered a Turkey-based crypto miner malware campaign dubbed Nitrokod that infected machines in 11 countries

Threat actors dropped the malware from popular software available on dozens of freeware websites including Softpedia and uptodown. Experts have noticed that the software can also be easily found through Google by searching for “Google Translate Desktop Download”.

The campaign worked under the radar for years as the operators adopted several tricks, such as implementing a delayed mechanism to trigger a long, multi-step infection.

“The software can also be easily found through Google when users search for ‘Google Translate Desktop download’. While the apps display ‘100 CLEAN’ banners on some sites, the apps are actually Trojans and contain a delayed to trigger a long, multi-step infection that ends with cryptomining malware. reads the analysis published by Check Point. “After the initial installation of the software, the attackers delayed the infection process for weeks and removed the traces of the original installation. This allowed the campaign to operate successfully under the radar for years.

The malicious code is first executed almost a month after the installation of the Nitrokod software on the victim’s system, the infection chain analyzed by the researcher consists of 6 stages.

The attackers used a mechanism of planned attacks to implement delays between each step of the infection chain.

The chain of infection begins with the installation of an infected program downloaded from the Internet. Upon running the software, an actual Google Translate application is installed and an updated file is removed, which starts a series of four droppers until the actual malware is removed.
Once the malicious code is executed, the malware connects to the C2 server to get the configuration of the XMRig crypto-miner and starts mining cryptocurrencies.

In order to avoid detection, the level 5 dropper performs a few checks to determine if malicious code is running in a virtual machine or if some security programs are installed on the infected machine. If any of the security software is found, the malware exits.

Check Point shared Indicators of Compromise (IoC) for this campaign.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases piracy, Nitrokod)




]]>
Does the United States need a cyber force? https://tcmechwars.com/does-the-united-states-need-a-cyber-force/ Sat, 27 Aug 2022 01:00:00 +0000 https://tcmechwars.com/does-the-united-states-need-a-cyber-force/ Does the United States need a Cyber ​​Force? Did he need a Space Force? Why does the Department of Homeland Security persist? Although the creation of a new institution may seem prudent in practice, each represents a knee-jerk response from Washington DC to complicated future challenges and more bureaucracy. At the recent Black Hat Cybersecurity […]]]>

Does the United States need a Cyber ​​Force? Did he need a Space Force? Why does the Department of Homeland Security persist? Although the creation of a new institution may seem prudent in practice, each represents a knee-jerk response from Washington DC to complicated future challenges and more bureaucracy.

At the recent Black Hat Cybersecurity Conference in Las Vegas, former Cybersecurity and Infrastructure Security Agency (CISA) Director Chris Krebs implored the audience: “We need to create an agency that is focused on improving digital risk management services. He also suggested that CISA could be separated from the Department of Homeland Security (DHS) to create a new agency.

The Cyberspace Solarium Commission considered the need for a new cabinet-level organization and ultimately decided to support the idea of ​​a National Cyber ​​Director instead. Someone was needed to be the point of contact for cybersecurity operations within the US government outside of the Department of Defense (DoD). Yet creating a new agency would be fraught with pitfalls, including competing mission sets, bureaucratic bloat, and short-sighted failures in creating the last two major bureaucracies, Space Force and DHS.

Past failures of bureaucracy

The most recent new ministerial organization put in place by the United States is revealing. The cumulative failures of DHS are hard to ignore. Created in 2002 in response to the mistakes of 9/11, the department quickly rose to prominence for typical airport theater security, now through the Transportation Security Agency (TSA), a sub-unit of DHS. An organization remarkably hated by both left and right, DHS has failed to prosecute immigration cases while simultaneously creating a human rights catastrophe known as the Family Separation Policy based on the idea of ​​border deterrence. DHS also completely missed the January 6 danger while being complicit in avoiding accountability.

Space Force, apparently now the US Army’s 6th uniformed force, didn’t fare much better. Founded in 2019 by President Donald Trump to “reopen NASA and go to space,” the organization has been littered with controversy and overlapping missions with the Air Force and NASA. Gen. Jay Raymond recently sat down with Comedy Central’s Daily Show to promote the new military branch and clear up some confusion.

When asked what the Space Force actually does, General Raymond remarked, “We operate the GPS constellation for free to the world that provides global navigation…most people don’t know that’s provided free.” GPS management is a job the DOD and Air Force have long handled without incident, making it doubtful that this is a win for the new organization.

When harassed by comedian Ronny Chieng about threats farther than near Earth orbit, General Raymond noted, “So again, our mission is a little bit closer to home… we don’t focus on extraterrestrials.” Chieng ended his segment by saying, “So while I’m still not sure what it does, Space Force represents what the U.S. government does best: finding new ways to donate billions of dollars to the military complex. -American industrialist.

While the idea of ​​creating a force to fight aliens is ludicrous, if we’re going to have a space force, it might be prudent to think about long-term earth defense and the viability of controlling any threats that might come in. in Earth’s orbit, including falling satellites and other debris. Dealing with future extreme challenges that may arise could be a logical Space Force mission. Yet the American military and bureaucracy generally have a remarkable lack of imagination.

Face the future

There is an urgent need to consider future developments and anticipate long-term threats. The aim should be to build a strategy on realistic analyzes and scenarios, not fictional information based on science fiction. Such a foundation would help Space Force create a unique set of missions that could serve humanity long into the future. With respect to a cyberforce, it is necessary to consider the evolving need to control, manage and protect digital information as a future imperative largely divorced from modern conceptions of cyberwarfare.

There is probably an eventual need for an entire organization that will manage digital infrastructure, cybersecurity and information warfare. Unfortunately, the community cannot imagine how modern actors will use cyber capabilities during war, let alone create an organization that will manage the flow of digital information long after war. While it may seem prudent to create a new government organization to help manage misinformation, studies show that the government is trying to tackle misinformation.

If and when the United States creates a new bureaucratic organization, it must seek to avoid past mistakes and short-sighted bureaucratic thinking. The digital future needs more than a cyber agency or digital agency to deal with disinformation threats or catalog vulnerabilities. The United States needs a whole-of-government approach to managing and controlling information that respects privacy and the Constitution. Without it, as The Daily Show suggests, the US government will fall back on its typical solution of handing out massive sums to entrepreneurs to create a new cyber-industrial complex.

Brandon Valeriano is a senior fellow at the Cato Institute and a distinguished senior fellow at Marine Corps University.

Image: DVIDS.

]]>
Cybersecurity skills shortage has led to a talent war between agencies, says Commerce CIO https://tcmechwars.com/cybersecurity-skills-shortage-has-led-to-a-talent-war-between-agencies-says-commerce-cio/ Thu, 25 Aug 2022 00:34:03 +0000 https://tcmechwars.com/cybersecurity-skills-shortage-has-led-to-a-talent-war-between-agencies-says-commerce-cio/ Written by Nihal Krishan August 24, 2022 | FEDSCOOP Federal agencies, including the Commerce Department, have resorted to poaching staff from other departments due to a shortage of cybersecurity skills in government, the agency’s chief information officer said. Andre Mendes. “We basically hire people from one federal agency to another. We’re stealing people from each […]]]>

Written by Nihal Krishan

Federal agencies, including the Commerce Department, have resorted to poaching staff from other departments due to a shortage of cybersecurity skills in government, the agency’s chief information officer said. Andre Mendes.

“We basically hire people from one federal agency to another. We’re stealing people from each other, that’s what it’s all about,” Mendes told FedScoop.

“It’s a very, very difficult situation with cybersecurity hiring. It’s extremely difficult to find the right people with the right skills right now,” said Mendes who spoke at the FedTalks technology conference on Wednesday, hosted by FedScoop.

Hiring difficulties arise amid a tight labor market and a severe shortage of qualified cyber engineers and analysts. CyberSeek, a recruiting website for cybersecurity jobs in the United States, which is funded by the Department of Commerce, estimates that there are currently 714,548 open cybersecurity jobs nationwide, which include positions in the public and private sectors.

In the public sector, there are nearly 39,000 cyber vacancies and 69,322 cybersecurity experts currently employed, according to estimates published by the website.

There has been a huge increase in cybersecurity job openings over the past year, following a series of massive attacks over the past two years against Federal Government, Colonial Pipeline and meat producer JBS who raised awareness among the general public. the need for increased cybersecurity in government and the private sector.

Along with difficulties hiring cybersecurity experts, Mendes also said the federal government is struggling to hold its technology vendors and contractors accountable for cybersecurity flaws and issues.

“All federal agencies must hold their suppliers accountable in terms of susceptibilities. So when you sell a product to the federal government, you need to give some assurance that the product works as claimed and doesn’t unduly expose you to cybersecurity attacks due to inherent flaws in its scope,” Mendes said.

The Presidential National Security Telecommunications Advisory Committee (NSTAC) on Tuesday introduced proposals that would require all agencies in the executive civilian branch to monitor operational technology systems in real time.

Mendes said the presidential proposals would help improve cybersecurity, but would receive a strong backlash from the tech industry and IT vendors.

“The administration has just started the process and there will be huge lobbying against it from vendors trying to minimize its effects. Vendors will do their best to minimize their exposure to change because they don’t want have accountability, they haven’t had accountability in the past, so why should they have it now, but the reality is that in today’s environment, we can’t afford not to have accounts to give back,” Mendes said.

Shortly after becoming the CIO of the Commerce Department in 2020, Mendes said he would like to see greater accountability in the federal government for agency IT budgets due to executive “black hole” spending. regulations or modernization.

Mendes said he has worked in recent years to use his nearly $4 billion a year budget more efficiently with less spending on IT tools and resources.

“We can demonstrate a clear reduction in costs in large measure due to greater collaboration within the agency over the past two years,” Mendes said.

“We’re leveraging those dollars elsewhere, where they’re more mission oriented to trade and official affairs offices and less to IT infrastructure,” he added.

Commerce spends about 30% of its budget on IT thanks to heavy users such as the National Oceanic and Atmospheric Administration, the National Institute for Standards and Technology, the US Patent and Trademark Office, and the Census Bureau.

Speaking to FedScoop, Mendes cited the International Trade Administration, where he previously served as CIO, as an example of an agency where consolidating corporate IT services has been successful in reducing costs.

According to the CIO, the use of cloud-first environments and layers of abstraction has resulted in significant cost savings which has resulted in ITA spending only 10% of its IT budget. Mendes added that efficiencies have allowed employees to work on more mission-focused areas, such as pricing.

]]>
The Premeditated ‘Tigray Genocide’ Cyber ​​War Against Ethiopia in the Age of Social Media – https://tcmechwars.com/the-premeditated-tigray-genocide-cyber-war-against-ethiopia-in-the-age-of-social-media/ Tue, 23 Aug 2022 07:25:06 +0000 https://tcmechwars.com/the-premeditated-tigray-genocide-cyber-war-against-ethiopia-in-the-age-of-social-media/ Addis Ababa, August 23, 2022 (Walta)– A team of scientists and data analysts from GETFACTet investigated social media data to find the origin and trend of the hashtag that popularized the Tigray Genocide narrative around the world, which played a role key in the international community’s response to Ethiopia, including US foreign policy. The data […]]]>


Addis Ababa, August 23, 2022 (Walta)– A team of scientists and data analysts from GETFACTet investigated social media data to find the origin and trend of the hashtag that popularized the Tigray Genocide narrative around the world, which played a role key in the international community’s response to Ethiopia, including US foreign policy.

The data that revealed shocking information indicates that non-military actors outside Ethiopia were coordinating the #TigaryGenocide cyber campaign linked to the pre-planned military attack of the Tigray People’s Liberation Front (TPLF) military command or ” preventive strike” against the Ethiopian army. base.

According to the results, on the night of November 3-4, 2020, 17 accounts were created, and the first “#TigrayGenocide” tweet started on Tuesday at 7:46 p.m. from one of these accounts. This is believed to be the genesis of the “#TigrayGenocide” hashtag, and it has never been used before this day.

This shows that the “#TigrayGenocide” was launched before and during the attack on thousands of Ethiopian National Defense Forces (ENDF) personnel stationed in Tigray, many of whom were massacred by TPLF forces while they slept. “#TigrayGenocide” was already up and circulating on international social media long before Ethiopian forces responded to the TPLF attack that sparked the ongoing war and humanitarian crisis.

Upon closer examination of the numbers, approximately 184 additional accounts were created, with a total of 201 accounts created on almost the same day on November 4, 2020, pushing “#TigrayGenocide” around the world. This is the largest number of accounts created to spread the genocide narrative in a single day (Figure 1, see November 4 pic).

On November 5, 2020, an additional 156 new accounts were created, with a cumulative 357 who tweeted “#TigrayGenocide”. Between November 5 and November 30, 2020, nearly 1,633 cumulative new accounts were opened and reached 75,581 “#TigrayGenocide” tweets (this does not include retweets, replays or likes), see Figure 3.

After November 5, 2020, daily new account creation decreased by more than 80%, while #TigrayGencoide retweets increased sharply. This indicates that the first 201 accounts created on November 3 and 4, 2020 were those that fueled the genocide hashtag for the consecutive months following the start of the conflict.

Figure 1. The number of newly created accounts per day that start tweeting “#TigrayGenocide” versus date.

Figure 2. New accounts created accounts (accumulated over time) starting to tweet “#TigrayGenocide” relative to date.
Figure 3. Cumulative tweet “#TigrayGenocide” versus date.

While retweets of the “TigrayGenocide” hashtag grew exponentially, there was no communication (internet or phone) between November 4 and November 30 from the Tigray region to the outside world. This raises an important question – if there was no communication in November with Tigray, then who are the eyewitnesses to the alleged “genocide” and who is reporting it to the world?
Another eyebrow-raising fact about the “#TigrayGenocide” campaign is that the hashtag circulates without providing specific incidents that include the number of victims, location, date and time of the alleged genocidal act. This loose use of the term “genocide” without confirmed evidence has made this serious term a broad statement.

Looking further into these accounts, we discovered that a large percentage of accounts tweeting “#TigrayGenocide” in the first two months were outside of Ethiopia and concentrated in specific locations such as Melbourne-Australia, Colorado-USA, Enschede-Netherlands and Islington. -London.

Over time between January and February 2021, the same hashtag was trending with 50,000 retweets per day. A coordinated effort of non-Ethiopian individuals from Tanzania and Kenya, with over a million followers, tweeted this hashtag, giving it an international voice on social media.

The fact that #TigrayGenocide started on the night of November 3-4 during the attack and blackout of the TPLF, even before the response of the Ethiopian National Defense Forces (ENDF), clearly shows that actors not military outside Ethiopia were coordinating a #TigrayGenocide cyberattack with military action in Tigray. This campaign was designed to distract the international community and shape public perception away from the actual aggression of the TPLF.

These factual reasons ring alarm bells for those genuinely concerned with the prevention of genocide and conflict. The intentional, premeditated and well-coordinated use of these stories to propagate an unconfirmed narrative of genocide should also be a call to action for international lawyers and policy makers seeking to curb the misuse of the media to create conditions that advance narratives of fear and hate. , which escalate conflicts to ultimately cause the death and dislocation of millions of people based on lies.

(Source:-Getfact)

]]>
Threat actors steal funds from General Bytes Bitcoin ATMSecurity Affairs https://tcmechwars.com/threat-actors-steal-funds-from-general-bytes-bitcoin-atmsecurity-affairs/ Sun, 21 Aug 2022 17:40:31 +0000 https://tcmechwars.com/threat-actors-steal-funds-from-general-bytes-bitcoin-atmsecurity-affairs/ Threat actors exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal BTC from multiple clients. Threat actors exploited a zero-day flaw in General Bytes Bitcoin ATM servers that allowed them to hijack transactions associated with depositing and withdrawing funds. GENERAL BYTES is the world’s largest manufacturer of Bitcoin, Blockchain and Cryptocurrency ATMs. […]]]>

Threat actors exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal BTC from multiple clients.

Threat actors exploited a zero-day flaw in General Bytes Bitcoin ATM servers that allowed them to hijack transactions associated with depositing and withdrawing funds.

GENERAL BYTES is the world’s largest manufacturer of Bitcoin, Blockchain and Cryptocurrency ATMs.

ATMs manufactured by the company are remotely controlled by a Crypto Application Server (CAS), which manages the operation of the devices.

The company issued a security advisory on August 18 admitting the existence of a zero-day flaw actively exploited by threat actors in the wild. Attackers exploited the issue to create an administrator user account through the CAS admin panel

“The attacker was able to create an administrator user remotely through the CAS administration interface via a URL call to the page used for the default installation on the server and create the first administration user. This vulnerability has been present in CAS software since version 20201208. Read more information in the “What happened” section reads the advisory.

Active exploitation of the issue was also confirmed by BleepingComputer who was contacted by a General Bytes customer who told them that attackers were stealing bitcoins from their ATMs.

According to the advisory, the problem lies in the CAS administration interface. Threat actors scanned Digital Ocean’s cloud hosting IP address space for CAS services exposing ports 7777 or 443. Then attackers exploited the vulnerability to create a new admin user, organization and a default terminal. The threat actors accessed the CAS interface and renamed the default admin user to “gb”, then changed the two-way machine encryption settings with his wallet settings and the “invalid payment address” setting “.

These settings allowed attackers to transfer coins to the attacker’s wallet when customers sent coins to an ATM.

According to the notice, the attacks came three days after the company publicly announced the Help Ukraine feature on ATMs.

General Bytes recommends that customers install both server patch versions 20220531.38 and 20220725.22.

The company also shared instructions for configuring server firewalls to control access to Crypto Application Server.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hack, General Bytes Bitcoin ATM)












]]>
Live Updates: Gazprom declares three-day shutdown of Nord Stream 1 at end of August https://tcmechwars.com/live-updates-gazprom-declares-three-day-shutdown-of-nord-stream-1-at-end-of-august/ Fri, 19 Aug 2022 16:59:41 +0000 https://tcmechwars.com/live-updates-gazprom-declares-three-day-shutdown-of-nord-stream-1-at-end-of-august/ © Reuters Gazprom has announced that it will shut down the Nord Stream 1 gas pipeline, which brings gas to Europe via the Baltic Sea, at the end of August, further reducing the flow of gas to Europe as energy prices soar and as the continent struggles to find supplies after Russia invades Ukraine. Russia’s […]]]>
© Reuters

Gazprom has announced that it will shut down the Nord Stream 1 gas pipeline, which brings gas to Europe via the Baltic Sea, at the end of August, further reducing the flow of gas to Europe as energy prices soar and as the continent struggles to find supplies after Russia invades Ukraine.

Russia’s state gas monopoly announced on Friday that it would close the only operating compressor station on Nord Stream 1, in Portovaya near St. Petersburg, from August 31 to September 2.

Gazprom said it would then resume supplying up to 33 million cubic meters of gas to Europe per day, around 20% of NS1’s capacity, or roughly the same amount it supplied by the gas pipeline to Germany in recent weeks.

Russia’s state-backed gas monopoly first cut capacity on the line in June. Gas prices in Europe have more than doubled since then and rose more than 6% on Friday to close at €256 per megawatt hour, the highest closing price on record.

Gazprom can send up to 167 million cubic meters per day through the pipeline, but has limited supply in recent months in a dispute over sanctions. The company said it was unable to supply gas in regular volumes due to delays in repairing and returning turbines made by Germany’s Siemens Energy.

European leaders and energy companies have said there are no technical problems preventing Gazprom from supplying more gas and say Russia is deliberately limiting supplies for political reasons.

In a statement, Gazprom said the repairs were mandated under its contract with Siemens Energy and that the German company’s specialists would help with the repairs.

Siemens Energy declined to comment.

“This is a stark example of Putin’s hybrid energy war against the EU,” said Sergiy Makogon, director general of Ukraine’s state-owned gas transmission network. “Ukraine and Poland have spare transit capacity, which could be used to fully offset flows via Nord Stream 1,” he continued.

Yuriy Vitrenko, CEO of Ukraine’s state-owned gas company Naftogaz, said there was “no sign that Gazprom would compensate” by pumping more gas through Ukraine’s vast pipeline, once a major route for supplying European markets. .

“The aim could be to put pressure on Germany to ease the sanctions and even to allow [Nord Stream 2]to launch, Vitrenko added.

The prospect of Gazprom closing Nord Stream 1

“The prospect of Gazprom shutting down Nord Stream 1 for three days will only scare the market away,” said ICIS analyst Tom Marzec-Manser. “Gas prices jumped at the very end of the trading day when maintenance was announced and could easily rise further on Monday as buyers assess whether they really believe the pipe will be back in service, as reported. said the Russian supplier.”

Additional reporting by Roman Olearchyk in Kyiv, Martin Arnold in Frankfurt and David Sheppard in London

]]>
On TV, August 14-18: Better Call Saul, She-Hulk https://tcmechwars.com/on-tv-august-14-18-better-call-saul-she-hulk/ Sun, 14 Aug 2022 09:00:00 +0000 https://tcmechwars.com/on-tv-august-14-18-better-call-saul-she-hulk/ Bob Odenkirk in You better call Saul; Tatiana Maslany in She-Hulk: LawyerPhoto: Greg Lewis/AMC; Chuck Zlotnick/Marvel Studios Welcome to What’s On, our weekly selection of must-watch shows. Here’s what you need to watch from Sunday, August 14 through Thursday, August 18. All times are in Eastern Time. [Note: The weekend edition of What’s On drops […]]]>

Bob Odenkirk in Better Call Saul and Tatiana Maslany in She-Hulk: Attorney At Law

Bob Odenkirk in You better call Saul; Tatiana Maslany in She-Hulk: Lawyer
Photo: Greg Lewis/AMC; Chuck Zlotnick/Marvel Studios

Welcome to What’s On, our weekly selection of must-watch shows. Here’s what you need to watch from Sunday, August 14 through Thursday, August 18. All times are in Eastern Time. [Note: The weekend edition of What’s On drops on Fridays.]


The fats

You better call Saul (AMC, Monday, 9 p.m., series finale)

Official Season 6 Trailer | You better call Saul

After six great seasons (and a breaking Bad run, of course), Saul Goodman (Bob Odenkirk) finally says goodbye. We’ll find out how his story ends – miserably, we suppose – in the You better call Saul The series finale. Hopefully the episode also checks in one last time with Kim Wexler (Rhea Seehorn) and how things went for her in Florida after the last trip to Albuquerque. The audiovisual club will recap the time and have a panel discussion of the final.


She-Hulk: Lawyer (Disney+, Thursday, 3:01 a.m.)

Official trailer | She-Hulk: Lawyer | Disney+

We will say goodbye to one television lawyer to make way for another. Disney+ She-Hulk: Lawyer centers on Bruce Banner’s cousin, Jennifer Walters (Tatiana Maslany), who only wants to do her job, but a blood transfusion accidentally turns her into a superhero. The show also stars Jameela Jamil, Renée Elise Goldsberry and Ginger Gonzaga, with featured appearances from Mark Ruffalo as Bruce (aka Hulk), Charlie Cox as Daredevil and Tim Roth as Abomination. The audiovisual club will recap the episodes each week.


hidden treasures

Tales of the Living Dead (AMC+, Sunday, 3:01 a.m.)

TWD SDCC Trailer: Tales of the Living Dead | New series premiering on August 14

No one asked for another Walking Dead spin-off, but here we are. The franchise has to live up to its everlasting vibe, right? Tales of the Living Dead is an episodic anthology series featuring new and existing characters in the universe. The cast includes Parker Posey, Terry Crews, Jillian Bell, Olivia Munn, Jessie T. Usher, Daniella Pineda and Poppy Liu.


Selena + Chef (HBO Max, Thursday, 3:01 a.m.)

Selena + Chef Season 4 | Official trailer | HBO Max

Unscripted series Selena + Chef follows the singer and Only murders in the building star Selena Gomez, who tackles a new kitchen with a professional chef in each episode, donating $10,000 to the charity of her choice. The fourth season will feature guest stars like Rachael Ray, Gordon Ramsay, and Priya Krishna.


The undeclared war (Peacock, Thursday, 3:01 a.m.)

The Undeclared War | Official trailer | Original Peacock

Peter Kominsky’s British Thriller The undeclared war arrives in the United States via Peacock. The show is set in a post-pandemic period of 2024 as the upcoming UK general election heats up as it involves the first black Tory Prime Minister. Meanwhile, a team of top analysts from the spy agency GCHQ must attempt to ward off a cyberattack on the country’s electoral system. Hannah Khalique-Brown, Simon Pegg and Maisie Richardson-Sellers co-star.


More good things

Legacy: The True History of the LA Lakers (Hulu, Monday, 12:01 a.m.)

Legacy: The True History of the LA Lakers | Official trailer | Hulu

If you miss HBO winning time, Hulu has you covered. by director Antoine Fuqua Legacy: The True History of the LA Lakers features interviews with Shaquille O’Neal, Kareem Abdul-Jabbar, Magic Johnson, Rob Lowe and others about the rise of the beloved basketball team.


Deepa and Anoop (Netflix, Monday, 3:01 a.m.)

Deepa & Anoop NEW SERIES Trailer | junior netflix

Created by Munjal Shroff and co-produced by Mattel, this animated children’s series follows the adventures of 7-year-old Deepa and her best friend, a color-changing baby elephant named Anoop. The music-focused show will feature a Bollywood number in each of its 11 half-hour episodes.


Leonardo (The CW, Tuesday, 8 p.m.)

Leonardo | sacrifice | Season Trailer | The CW

The eight-part Leonardo is set against the backdrop of Renaissance Italy and explores the secrets and drama of the life of the famous painter and inventor Leonardo da Vinci (Poldarkby Aidan Turner). keep an eye on The audiovisual club‘s reviews on the site this week.


Can’t miss recaps

Westworld (HBO, Sunday, 10 p.m., season four finale)

Industry (HBO, Monday, 9 p.m.)

Only murders in the building (Hulu, Tuesday, 12:01 a.m.)

What we do in the shadows (FX, Tuesday, 10 p.m.)

Repetition (HBO, Friday, 11 p.m.)


Ends soon

Bad (Paramount+, Sunday, 3:01 a.m., season three finale)

P-Valley (Starz, Sunday, 10 p.m., Season 2 Finale)

Love Island: United Kingdom (Hulu, Tuesday, 12:01 a.m., season eight finale)

Extraordinary Prosecutor Woo (Netflix, Thursday, 3:01 a.m., Season 1 finale)

Pretty Little Liars: Original Sin (HBO Max, Thursday, 3:01 a.m., Season 1 finale)

Sweetness of life: Los Angeles (HBO Max, Thursday, 3:01 a.m., Season 2 finale)

]]>
Army cyber, space and special operations commands integrating as part of a new “triad” concept https://tcmechwars.com/army-cyber-space-and-special-operations-commands-integrating-as-part-of-a-new-triad-concept/ Tue, 09 Aug 2022 23:59:34 +0000 https://tcmechwars.com/army-cyber-space-and-special-operations-commands-integrating-as-part-of-a-new-triad-concept/ Soldiers assigned to the U.S. Army John F. Kennedy Special Warfare Center and School, practice using a PDA-184 computer and an AN/PRC-117G satellite radio during training at the Yarborough at Fort Bragg, North Carolina on August 29, 2019. (K. Kassens/US Army) SMD 2022 — For several months, the U.S. military has been quietly experimenting with […]]]>

Soldiers assigned to the U.S. Army John F. Kennedy Special Warfare Center and School, practice using a PDA-184 computer and an AN/PRC-117G satellite radio during training at the Yarborough at Fort Bragg, North Carolina on August 29, 2019. (K. Kassens/US Army)

SMD 2022 — For several months, the U.S. military has been quietly experimenting with how to more closely link its Special Operations Command, Space and Missile Defense Command, and Cyber ​​Command on the battlefield under a new “triad” concept.

The goal: to better integrate the capabilities of each command to assemble more complex and effective battlefield options in a world where adversaries can operate in multiple domains at once.

The commanding generals of the three organizations revealed the concept for the first time today at the Space and Missile Defense Symposium, saying that the origin of the idea stemmed in part from the success of the fight against terrorism, in especially against the Islamic State.

RELATED: Boeing and Nammo Successfully Test Ramjet and Longer-Range Air-Breathing Artillery

“We have examples in the fight against ISIS of combining lethal and non-lethal effects for a much larger holistic effect which I would say had a greater impact than anyone had predicted before us, really synchronizing our efforts to have an effect on the adversary there,” said Lt. Gen. Jonathan Braga, commander of U.S. Army Special Operations Command.

Operations included lethal options in the physical world combined with non-lethal options, such as information warfare or cyber. An example would be “countering a message, then removing the ability to deliver even a message, provided by a holistic combination of cyber and SOF (special operations forces),” Braga said.

But as 20 years of war in the Middle East draw to a close, the military is turning to more capable adversaries in China and Russia that are far more sophisticated than terrorist groups. Braga said the nation-state threat provides more opportunities to build on space capabilities, providing what he called more “surface contact zone.”

“It provides more opportunities to obviously layer space capabilities,” Braga said. “It just opens up more opportunities for the synergistic effect of the three different legs of the triad.”

RELATED: SPACECOM Integrating Army and Navy Sensors to Improve Space Surveillance

The organizations have been experimenting with the concept together for several months. Lt. Gen. Karbler, commander of the Army’s Space and Missile Defense Command, told reporters that Project Convergence, the Army’s annual sensor-shooter test event, will include some instances of use of the triad, but did not go into detail. SMDC, he said, will provide space capabilities that will integrate special operators and cyberspace.

“That’s the beauty of the Convergence project is that it’s an opportunity to experiment with these capabilities and find out what works best for us,” Karbler said.

Over the next 12 months, the generals said they were looking for more places for experimentation, as well as operational opportunities. Karbler added that the important near-term job is to educate combatant commanders about the existence of this SOF-Space-Cyber ​​triad of the military so they know they have built-in battlefield options. , instead of a single, siled solution.

“Education is a big part of it,” Karbler said. “Then putting our money where our mouth is…showing up for exercises and making sure the added value of what the triad brings is recognized.”

]]>