Home » Posts tagged 'hackers'

Tag Archives: hackers

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

FBI says Chinese hackers preparing to attack US infrastructure

FBI says Chinese hackers preparing to attack US infrastructure

FBI Director Christopher Wray testifies before a House Approbations Subcommittee
FBI Director Christopher Wray testifies before the House Approbations Subcommittee on Capitol Hill in Washington, U.S., April 11, 2024. REUTERS/Michael A. McCoy/File Photo Purchase Licensing Rights, opens new tab
Nashville, Tennessee, April 18 (Reuters) – Chinese government-linked hackers have burrowed into U.S. critical infrastructure and are waiting “for just the right moment to deal a devastating blow,” FBI Director Christopher Wray said on Thursday.
An ongoing Chinese hacking campaign known as Volt Typhoon has successfully gained access to numerous American companies in telecommunications, energy, water and other critical sectors, with 23 pipeline operators targeted, Wray said in a speech at Vanderbilt University.
China is developing the “ability to physically wreak havoc on our critical infrastructure at a time of its choosing,” Wray said at the 2024 Vanderbilt Summit on Modern Conflict and Emerging Threats. “Its plan is to land low blows against civilian infrastructure to try to induce panic.”
Wray said it was difficult to determine the intent of this cyber pre-positioning which was aligned with China’s broader intent to deter the U.S. from defending Taiwan.
China claims democratically governed Taiwan as its own territory and has never renounced the use of force to bring the island under its control. Taiwan strongly objects to China’s sovereignty claims and says only the island’s people can decide their future.
Earlier this week, a Chinese Ministry of Foreign Affairs spokesperson said, opens new tab Volt Typhoon was in fact unrelated to China’s government, but is part of a criminal ransomware group.
In a statement, China’s Embassy in Washington referred back to the MFA spokesperson’s comment. “Some in the US have been using origin-tracing of cyberattacks as a tool to hit and frame China, claiming the US to be the victim while it’s the other way round, and politicizing cybersecurity issues.”

…click on the above link to read the rest of the article…

Hackers Used SWIFT To Steal $6 Million From Russian Bank

In the latest revelation about the Society for Worldwide Interbank Telecommunication’s vulnerability to hackers – who’ve stolen tens of millions of dollars from banks and central banks mostly by stealing the special private keys used to sign off on transactions – Russian authorities revealed that hackers had made off with about 340 million rubles ($6 million) during an attack carried out last year,according to Reuters.

While that’s not the largest sum ever stolen by infiltrating SWIFT (indeed it pales in comparison to the more than $80 million stolen from the Bank of Bangladesh’s reserve account at the New York Fed back in 2016) the news comes just days after Russian authorities said the country’s banking system would be ready to abandon SWIFT if the US and European Union tried to cut off its banks.

In a report about the incident, the Russian authorities said hackers had gained control of a computer at a Russian bank and used SWIFT to transfer the money to their own accounts. Of course, the bureaucrats who run SWIFT from Brussels insist that the SWIFT system itself has never been infiltrated – and that the vulnerabilities exploited by hackers are solely the responsibility of the participating institutions. The irony here is that this is the same excuse advanced by bitcoin evangelists and others who wax about the “immutable” blockchain and its security features, only to overlook that hundreds of millions of dollars in cryptocurrencies have been stolen by hackers over the past few years.

To be sure, SWIFT officials have warned that hacking attacks are becoming “increasingly prominent” after the theft of the Bangladesh funds, which disappeared after landing in accounts based in the Philippines and then Macau.

…click on the above link to read the rest of the article…

Bitcoin Doesn’t Exist – 5


Gustave Courbet Sunset on Lake Geneva 1876
Chapter 1 of this five-part series by Dr. D is here: Bitcoin Doesn’t Exist – 1

Chapter 2 is here: Bitcoin Doesn’t Exist – 2

Chapter 3 is here: Bitcoin Doesn’t Exist – 3

Chapter 4 is here: Bitcoin Doesn’t Exist – 4

Next up: all 5 chapters combined in one big essay.

Dr. D: Bitcoin can be stolen. Although “Bitcoin” can’t be hacked, it’s only software and has many vulnerabilities. If held on an exchange, you have legal and financial risk. If held at home, you could have a hard drive fail and lose your passwords. If it’s on a hardware fob like a Trezor, the circuits could fail. For a robust system, computers themselves are pretty fragile. You could write down your passwords on paper, and have a house fire. You could print out several copies, but if any of the copies are found, they have full access to your account and stolen without you knowing. You could have your passwords stolen by your family, or have a trojan take a screen or keystroke capture.

Hackers could find a vulnerability not in Bitcoin, but in Android or AppleOS, slowly load the virus on 10,000 devices, then steal 10,000 passwords and clear 10,000 accounts in an hour. There are so many things that can go wrong, not because of the software, but at the point where you interface with the software. Every vault has a door. The door is what makes a vault useful, but is also the vault’s weakness. This is no different than leaving blank checks around, losing your debit card, or leaving cash on your dashboard, but it’s not true that there are no drawbacks. However the risks are less obvious and more unfamiliar.

…click on the above link to read the rest of the article…

Bitcoin Doesn’t Exist – 1


Gustave Courbet The wave 1869
A while ago, I asked a regular commenter at the Automatic Earth, who goes by the moniker Dr. D, to try and write an article for us. Not long after, I received no less than 31 pages, and an even 12345 words. Way too long for today’s digital attention spans. We decided to split it into 5 chapters. After we work through those 5, we’ll post it as one piece as well. Dr. D, who insists on sticking with his nom de plume, picked his own topic, and it’s -fittingly- bitcoin. A topic about which one can cover a lot of ground in 12345 words.

Now, I wouldn’t be me if I didn’t throw in my own two Satoshis: Dr. D claims that “..everyone has an equal opportunity to solve the next calculation..”, but while that may perhaps have been sort of true at the very start, it isn’t now. It’s not true for the computerless or computer-illiterate, for those too poor to afford the electricity required by bitcoin mining, and for various other -very large- groups of people.

The equal opportunity idea sounds nice, but I think bitcoin runs the risk of creating just another set of elites, while reinforcing existing elites, who can afford to either buy bitcoin at whatever price at some point in time, or spend large sums to build mining ‘installations’ in locations where electricity is cheap. And sure, there will be losers among elites too, but inequality itself will not change; only the faces of winners and losers will, while the world’s real losers will remain just that.

It’s nothing new of course, inequality is our society’s middle name, but maybe that is precisely the problem. Maybe bitcoin should have come with an inbuilt way to spread wealth, not just shift it around.

Then again, it may all just be a giant bubble. Or a bubble inside a bubble inside a bubble.

…click on the above link to read the rest of the article…

Pentagon Worried about Hackers Causing Stock Market Crash

Pentagon Worried about Hackers Causing Stock Market Crash

The Pentagon?! But no one’s worried when stocks get manipulated higher.

It’s funny, the all-out government effort to prevent a major decline of the stock market, or of individual stocks, via manipulation or hacking. Now even the Pentagon is looking into it.

What’s funny is that everyone cheers when manipulation, hacking, and other shenanigans cause the market or individual stocks to soar. It’s just declines they’re worried about at these precarious levels.

Manipulating stocks higher is a time-honored game that routinely receives kudos from all around. The Fed printed nearly $4 trillion and cut rates to zero for eight years – no matter what the damage to the real economy – for the sole purpose of manipulating up asset prices including stock prices. “Wealth effect,” Ben Bernanke called it. Corporate executives and analysts exaggerate future earnings only to deflate them at the last minute, because stock prices are “forward looking” and fake future earnings is all that matters, even if reality now sucks. And on and on. Whatever it takes to push stock prices up, by hook or crook, is cool. These are our heroes.

But when some lonely dude might hack into high-speed stock trading systems or spook the trading algos, quant-fund managers, and high-speed traders and throw algorithmic trading off track to where prices might actually fall in a major way, all heck breaks loose, and the Pentagon feels empowered to step in.

Trading by automated systems, such as used by quant funds and high-speed traders, is beginning to dominate stock trading. The risk of hacking into those systems or manipulating those systems in other ways is a real issue – but it should cut both ways. And the systems themselves are designed to manipulate prices, so….

…click on the above link to read the rest of the article…

DARPA Asks HFT Traders How Hackers Will Crash The Market 

DARPA Asks HFT Traders How Hackers Will Crash The Market 

Having been responsible for the biggest flash crashes in recent years, it is no surprise that when it comes to the market’s growing structural vulnerabilities, high frequency traders have emerged as the primary authority on how to crash the market in the blink of an eye. Which is perhaps why none other than the Pentagon is seeking advice from HFTs on how hackers could “unleash chaos” in the US financial system.

According to the Wall Street Journal, the Department of Defense’s research arm, the Defense Advanced Research Projects Agency, better known as DARPA, has been consulting with executives at HFT firms and quant hedge funds as well as people from exchanges and other financial companies, over the past year and a half. Officials described the effort as an early-stage pilot project aimed at “identifying market vulnerabilities.” The WSJ notes that meeting participants described meetings as informal sessions in which attendees brainstorm about “how hackers might try to bring down U.S. markets, then rank the ideas by feasibility.

Why approach HFTs? Because of all market participants, it is the “high freaks” who, better than anyone, know how to force a market crash at will. The WSJ was a bit more diplomatic:

High-speed traders and quant-fund managers, who use sophisticated computer programs to buy and sell stocks, sometimes in fractions of a second, form the core of the group. Such traders tend to have deep expertise in the inner workings of financial markets and the automated systems that account for huge swaths of trading activity today.

Among the potential scenarios probed by the Pentagon: Hackers could cripple a widely used payroll system; they could inject false information into stock-data feeds, sending trading algorithms out of whack; or they could flood the stock market with fake sell orders and trigger a market crash.

…click on the above link to read the rest of the article…

Report: Hackers can now cause blackouts on US electrical grid

Report: Hackers can now cause blackouts on US electrical grid

It was inevitable that someday, hackers would have the ability to exert control over the U.S. electrical grid.  According to the computer security firm Symantec, someday is today.

Hacking attacks over the last several months that targeted U.S. energy companies have been able to gain “operational control” over systems, thus threatening blackouts across the U.S., says Symantec.  The hacker group known as DragonFly 2.0 was able to gain control in at least 20 places, according to the firm.

Wired:

Symantec on Wednesday revealed a new campaign of attacks by a group it is calling Dragonfly 2.0, which it says targeted dozens of energy companies in the spring and summer of this year. In more than 20 cases, Symantec says the hackers successfully gained access to the target companies’ networks. And at a handful of US power firms and at least one company in Turkey – none of which Symantec will name – their forensic analysis found that the hackers obtained what they call operational access: control of the interfaces power company engineers use to send actual commands to equipment like circuit breakers, giving them the ability to stop the flow of electricity into US homes and businesses.

“There’s a difference between being a step away from conducting sabotage and actually being in a position to conduct sabotage … being able to flip the switch on power generation,” says Eric Chien, a Symantec security analyst. “We’re now talking about on-the-ground technical evidence this could happen in the US, and there’s nothing left standing in the way except the motivation of some actor out in the world.”

…click on the above link to read the rest of the article…

 

WESTERN SPY AGENCIES SECRETLY RELY ON HACKERS FOR INTEL AND EXPERTISE

WESTERN SPY AGENCIES SECRETLY RELY ON HACKERS FOR INTEL AND EXPERTISE

The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.

In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document.

These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.

By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content:

…click on the above link to read the rest of the article…

 

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress