A Manager of the Exmo Bitcoin Exchange Has Been Kidnapped In Ukraine

CaptainDork shares a report from BBC: A manager of the Exmo Bitcoin exchange has been kidnapped in Ukraine. According to Russian and Ukrainian media reports Pavel Lerner, 40, was kidnapped while leaving his office in Kiev’s Obolon district on December 26th. The reports said he was dragged into a black Mercedes-Benz by men wearing balaclavas. Police in Kiev confirmed to the BBC that a man had been kidnapped on the day in question, but would not confirm his identity. A spokeswoman said that the matter was currently under investigation, and that more information would be made public later on. Mr Lerner is a prominent Russian blockchain expert and the news of his kidnapping has stunned many in the international cryptocurrency community. Read more of this story at Slashdot.

Excerpt from:
A Manager of the Exmo Bitcoin Exchange Has Been Kidnapped In Ukraine

Russia is planning to put a luxury hotel on the ISS

While American private corporations are working to offer paying customers a short trip to space (or the edge of it ), Russia is cooking up something grander. According to Popular Mechanics , it saw a proposal detailing Russian space corporation Roscosmos’ plan to build a luxury hotel on the ISS. Anybody whose pockets are deep enough to shell out at least $40 million for the experience can stay there for a week or two. An additional $20 million will buy them the chance to go on a spacewalk with a cosmonaut. The publication says Russian space contractor RKK Energia conjured up the strategy to be able to pay for the construction of the second module it’s building that will set it back $279 to $446 million. RKK Energia is already building the first of the two modules to serve as a science laboratory and power supply station. Although the second module has always been part of the plan, the Russian government is only paying for the first one. The tourist module will reportedly look like the first one from the outside — you can see an illustration of the science module below: [Image credit: Anatoly Zak/Russianspaceweb.com] The inside, however, will have four sleeping quarters around two cubic meters each with 9-inch windows. It will also have two “medical and hygiene” stations, as well as a lounge area with a 16-inch window — after all, if Russia wants guests to pay tens of millions, it will have to be worth it. RKK Energia is hoping to fly one or two tourists per Soyuz flight after NASA stops buying seats on the capsule for astronauts headed to the ISS, which will happen once Boeing’s and SpaceX’s commercial crew program vehicles are ready. To be able to jump-start construction, it has to find 12 (wealthy) passengers willing to pay $4 million up front. And if at least six passengers pay for a week-long stay at the space hotel per year, the company can recoup its investment within seven years. As Popular Mechanics noted, though, the ISS is scheduled to be decommissioned in 2028. The space contractor said the module takes five years to finish, so it will have to start building soon. Source: Popular Mechanics

View original post here:
Russia is planning to put a luxury hotel on the ISS

Russian hackers steal $10 million from ATMs through bank networks

The recent rash of bank system hacks goes deeper than you might have thought — it also includes stealing cash directly from ATMs. Researchers at Group-iB have published details of MoneyTaker, a group of Russian hackers that has stolen close to $10 million from American and Russian ATMs over the past 18 months. The attacks, which targeted 18 banks (15 of which were American), compromised interbank transfer systems to hijack payment orders — “money mules” would then withdraw the funds at machines. The first known attack was in the spring of 2016, when MoneyTaker hit First Data’s STAR network (the largest transfer messaging system for ATMs in the US). They also compromised Russia’s AW CRB network, and swiped documents for OceanSystems’ Fed Link system used by roughly 200 banks across the Americas. And in some cases, the group stuck around after the initial heist — at least one US bank’s documents were stolen twice, while the perpetrators kept spying on Russian bank networks. While it’s not clear who’s behind MoneyTaker, you’re only hearing about them now because they’re particularly clever. They’ve repeatedly switched their tools and methods to bypass software, and have taken care to erase their tracks. For instance, they’ve ‘borrowed’ security certificates from the US federal government, Bank of America, Microsoft and Yahoo. One Russian bank did manage to spot an attack and return some of the ill-gotten gains. This particular hack didn’t directly affect users, since it was more about intercepting bank-to-bank transfers than emptying personal accounts. However, it illustrates both the sophistication of modern bank hacks and the vulnerability of the banks themselves. While it would be difficult to completely prevent hacks, it’s clear that attackers are having a relatively easy time making off with funds and sensitive data. Via: Reuters Source: Group-iB (reg. required)

Excerpt from:
Russian hackers steal $10 million from ATMs through bank networks

The Underground Uber Networks Driven by Russian Hackers

Joseph Cox, reporting for DailyBeat: Uber’s ride-sharing service has given birth to some of the most creative criminal scams to date, including using a GPS-spoofing app to rip off riders in Nigeria, and even ginning up fake drivers by using stolen identities. Add to those this nefariously genius operation: Cybercriminals, many working in Russia, have created their own illegitimate taxi services for other crooks by piggybacking off Uber’s ride-sharing platform, sometimes working in collaboration with corrupt drivers. Based on several Russian-language posts across a number of criminal-world sites, this is how the scam works: The scammer needs an emulator, a piece of software which allows them to run a virtual Android phone on their laptop with the Uber app, as well as a virtual private network (VPN), which routes their computer’s traffic through a server in the same city as the rider. The scammer acts, in essence, as a middleman between an Uber driver and the passenger — ordering trips through the Uber app, but relaying messages outside of it. Typically, this fraudulent dispatcher uses the messaging app Telegram to chat with the passenger, who provides pickup and destination addresses. The scammer orders the trip, and then provides the car brand, driver name, and license plate details back to the passenger through Telegram. Read more of this story at Slashdot.

Continue reading here:
The Underground Uber Networks Driven by Russian Hackers

Russian Hackers Exploited Kaspersky Antivirus To Steal NSA Data on US Cyber Defense: WSJ

An NSA contractor brought home highly classified documents that detailed how the U.S. penetrates foreign computer networks and defends against cyberattacks. The contractor used Kaspersky antivirus on his home computer, which hackers working for the Russian government exploited to steal the documents, the WSJ reported on Thursday (the link could be paywalled; alternative source), citing multiple people with knowledge of the matter. From the report: The hackers appear to have targeted the contractor after identifying the files through the contractor’s use of a popular antivirus software made by Russia-based Kaspersky Lab, these people said. The theft, which hasn’t been disclosed, is considered by experts to be one of the most significant security breaches in recent years. It offers a rare glimpse into how the intelligence community thinks Russian intelligence exploits a widely available commercial software product to spy on the U.S. The incident occurred in 2015 but wasn’t discovered until spring of last year, said the people familiar with the matter. Having such information could give the Russian government information on how to protect its own networks, making it more difficult for the NSA to conduct its work. It also could give the Russians methods to infiltrate the networks of the U.S. and other nations, these people said. Ahead of the publication of WSJ report, Kaspersky founder Eugene Kaspersky tweeted, “New conspiracy theory, anon sources media story coming. Note we make no apologies for being aggressive in the battle against cyberthreats.” Read more of this story at Slashdot.

More:
Russian Hackers Exploited Kaspersky Antivirus To Steal NSA Data on US Cyber Defense: WSJ

PlayStation 4 Update 5.0 Officially Revealed

After the PlayStation 4’s 5.0 update was leaked last week, Sony decided to officially reveal what’s coming in the update. GameSpot highlights the new features in their report: Some of the enhancements center around streaming using the PS4’s built-in broadcasting capabilities. PS4 Pro users will be able to stream in 1080p and 60 FPS, provided their connection is strong enough, and PSVR users will be able to see new messages and comments coming through while broadcasting. PSVR is also adding 5.1ch and 7.1ch virtual surround sound support. Next up, the PS4’s Friends List is being updated with greater management tools, such as the ability to set up separate lists of friends. You’ll be able to create a list of all the people you play Destiny with and send them all an invite, for example. This feature replaces the old Favorite Groups tab. In another move to help reduce the amount of time spent in menus, the Quick Menu is being updated to have more options. For example, you’ll be able to check on download progress and see new party invites. You can also leave a party from within that menu and see your current Spotify playlist. Notifications are also being improved when watching films and TV, as you can now disable message and other notification pop-ups while watching media. You can also change how much of a message is displayed, as well as its color, when playing or watching any form of content. Finally, Parental Control features are being overhauled in favor of what Sony calls “Family on PSN.” This replaces the old Master/Sub account system; instead, one user is deemed the Family Manager, and they can set up other accounts and appoint them as a Parent/Guardian, Adult, or Child. Parents or Guardians can restrict Child accounts in their “use of online features and communication with other players, set restrictions for games, restrict the use of the internet browser, and set spending limits for PlayStation Store.” Note that Sony says the first time any North American user tries to set up an Adult account, they will be charged $0.50 “to verify that you are an adult.” Read more of this story at Slashdot.

Read more here:
PlayStation 4 Update 5.0 Officially Revealed

US Cyber Command may be splitting off from the NSA

It sounds as though the United States’ Cyber Command will break off from the National Security Agency and be more aligned with the military in the future. The move would “eventually” cleave Cyber Command from the intelligence-focused NSA and instead align it more with the military, according to the Associated Press . “The goal is to give Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, ” AP reports. The NSA’s core task of intelligence gathering sometimes is at odds with military cyber warfare operations, hence the proposed separation. Prior to this, the two had clashed on getting intel from Islamic State networks (the NSA’s task) and attacking (Cyber Command’s). But there are concerns that splitting off from the NSA could come at a cost. Specifically, Cyber Command’s access to the intelligence agency’s resources including some of the top mathematicians in the country and a “gigantic” super computer, according to AP ‘s sources. The moves to start the separation had begun under President Obama, and now the nitty gritty of how the “divorce” (our word) will proceed is up in the air. The result of that is uncertainty over staffing, resources and leadership. Currently both groups are led by the same person, Admiral Mike Rogers , but the shift could see new leadership for the NSA transfer to a civilian. Cyber Command may remain under military leadership under the Army’s Lieutenant General William Mayville. Mayville served as director of operations for the Joint Staff. This comes after the Cyber Command has gained a bigger seat at the table during military operations and an increased focus on using cyber warfare in places like Russia and the Middle East. Source: Associated Press

View the original here:
US Cyber Command may be splitting off from the NSA

Russian exoskeleton suit turns soldiers into Stormtroopers

In a bid to make its armed forces look even more intimidating, Russia has taken inspiration from science-fiction to create some futuristic-looking new combat suits. Developed by the state-owned Central Research Institute for Precision Machine Building, this very Star Wars-esque combat armor features a powered exoskeleton, ballistic protection from bullets and shrapnel and a heads-up display. While just a concept at the moment, the suit’s designers hope it will enter full production in the next few years. While they haven’t detailed what the heads-up display would be used for, the combat armor’s powered exoskeleton helps the wearer carry heavy loads, bearing some of the brunt to lower the soldiers’ fatigue. While its designers have clearly spent a lot of time playing video games, we’ve already seen that Russia’s not alone in its bid to create an army of Master Chiefs . Now, taking that idea one step further, a U.S program called Tactical Light Operator Suit (or TALOS) is underway, which is creating an Iron Man-esque suit for American special forces. With exoskeleton-powered soldiers and flying Volvos on the horizon, at this point we’re just patiently waiting for the first real-world superheroes to reveal themselves. Source: Reuters

View post:
Russian exoskeleton suit turns soldiers into Stormtroopers

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Originally posted here:
‘WannaCry’ ransomware attack spreads worldwide (update)

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Follow this link:
‘WannaCry’ ransomware attack spreads worldwide (update)