Researchers crack open unusually advanced malware that hid for 5 years

The name “Project Sauron” came from code contained in one of the malware’s configuration files. (credit: Kaspersky Lab) Security experts have discovered a malware platform that’s so advanced in its design and execution that it could probably have been developed only with the active support of a nation state. The malware—known alternatively as “ProjectSauron” by researchers from Kaspersky Lab and “Remsec” by their counterparts from Symantec—has been active since at least 2011 and has been discovered on 30 or so targets. Its ability to operate undetected for five years is a testament to its creators, who clearly studied other state-sponsored hacking groups in an attempt to replicate their advances and avoid their mistakes. State-sponsored groups have been responsible for malware like the Stuxnet- or National Security Agency-linked Flame , Duqu , and Regin . Much of ProjectSauron resides solely in computer memory and was written in the form of Binary Large Objects, making it hard to detect using antivirus. Because of the way the software was written, clues left behind by ProjectSauron in so-called software artifacts are unique to each of its targets. That means that clues collected from one infection don’t help researchers uncover new infections. Unlike many malware operations that reuse servers, domain names, or IP addresses for command and control channels, the people behind ProjectSauron chose a different one for almost every target. Read 8 remaining paragraphs | Comments

See the original post:
Researchers crack open unusually advanced malware that hid for 5 years

New evidence suggests DNC hackers penetrated deeper than previously thought

The suspected hacking of a Democratic National Committee consultant’s personal Yahoo Mail account provides new evidence that state-sponsored attackers penetrated deeper than previously thought into the private communications of the political machine attempting to defeat Republican nominee Donald Trump. According to an article published Monday by Yahoo News, the suspicion was raised shortly after DNC consultant Alexandra Chalupa started preparing opposition research on Trump Campaign Chairman Paul Manafort. Upon logging in to her Yahoo Mail account, she received a pop-up notification warning that members of Yahoo’s security team “strongly suspect that your account has been the target of state-sponsored actors.” After Chalupa started digging into Manafort’s political and business dealings in Ukraine and Russia, the warnings had become a “daily occurrence,” Yahoo News reported, citing a May 3 e-mail sent to a DNC communications director. (credit: Yahoo News) It was one of more than 19,000 private DNC messages posted to WikiLeaks on Friday. The massive e-mail dump came five weeks after DNC officials said hackers with backing from the Russian government had breached its network and made off with opposition research into Trump and almost a year’s worth of private e-mail. The airing on WikiLeaks, which included messages in which DNC officials derided Democratic candidate Bernie Sanders, has already led to the resignation of Chair Debra Wasserman Schultz. Now, the revelations about Chalupa’s Yahoo account suggest the hack may have gone deeper than previously reported. Read 3 remaining paragraphs | Comments

Read the article:
New evidence suggests DNC hackers penetrated deeper than previously thought

Tor Project Completely Replaces Board After Sexual Assault Scandal

A little more than one month after the Tor Project’s public face Jacob Applebaum stepped down following accusations from multiple women that he sexually assaulted them, the nonprofit has completely replaced its board. Read more…

Excerpt from:
Tor Project Completely Replaces Board After Sexual Assault Scandal

New and Improved CryptXXX Ransomware Rakes In $45,000 In 3 Weeks

An anonymous reader writes:Whoever said crime doesn’t pay didn’t know about the booming ransomware market. A case in point, the latest version of the scourge known as CryptXXX, which raked in more than $45, 000 in less than three weeks. Over the past few months, CryptXXX developers have gone back and forth with security researchers. The whitehats from Kaspersky Lab provided a free tool that allowed victims to decrypt their precious data without paying the ransom, which typically reaches $500 or more. Then, CryptXXX developers would tweak their code to defeat the get-out-of-jail decryptor. The researchers would regain the upper hand by exploiting another weakness and so on. Earlier this month, the developers released a new CryptXXX variant that to date still has no decryptor available. Between June 4 and June 21, according to a blog post published Monday by security firm SentinelOne, the Bitcoin address associated with the new version had received 70 bitcoins, which at current prices is valued at around $45, 228. The figure doesn’t include revenue generated from previous campaigns. Read more of this story at Slashdot.

View the original here:
New and Improved CryptXXX Ransomware Rakes In $45,000 In 3 Weeks

Access To Thousands Of Compromised Government Servers Selling For $6 On Black Market

An anonymous reader writes: Researchers have uncovered an underground market selling information of over 70, 000 compromised servers. Russia-based Kaspersky Lab revealed that the online forum, named xDedic, seems to be operated by a Russian-speaking organisation and allows hackers to pay for undetectable access to a wide range of servers, including those owned by government, corporate and academic groups in more than 170 countries. Access to a compromised server can be bought for as little as $6. This kit comes with relevant tools to instruct on launching denial-of-service attacks and spam campaigns on the targeted network, as well as allowing criminals to illegally produce bitcoin and breach online systems, such as retail payment platforms. Read more of this story at Slashdot.

Original post:
Access To Thousands Of Compromised Government Servers Selling For $6 On Black Market

Russian Hackers Reportedly Stole Donald Trump Opposition Research From The DNC

Russian hackers were able to snatch all of the Democratic National Committee’s opposition research on Donald Trump, according to US officials who spoke to the Washington Post . The hackers were able to read emails and instant messages as a result of the breach. Read more…

Continue Reading:
Russian Hackers Reportedly Stole Donald Trump Opposition Research From The DNC

NASA Satellite Finds 39 Unreported Sources of Toxic Air Pollution

An anonymous reader quotes a report from Phys.Org: Using a new satellite-based method, scientists at NASA, Environment and Climate Change Canada, and two universities have located 39 unreported and major human-made sources of toxic sulfur dioxide emissions. A known health hazard and contributor to acid rain, sulfur dioxide (SO2) is one of six air pollutants regulated by the U.S. Environmental Protection Agency. The 39 unreported emission sources, found in the analysis of satellite data from 2005 to 2014, are clusters of coal-burning power plants, smelters, oil and gas operations found notably in the Middle East, but also in Mexico and parts of Russia. In addition, reported emissions from known sources in these regions were — in some cases — two to three times lower than satellite-based estimates. Altogether, the unreported and underreported sources account for about 12 percent of all human-made emissions of sulfur dioxide — a discrepancy that can have a large impact on regional air quality, said Chris McLinden, an atmospheric scientist and lead author of the study. The co-author of the study, Nickolay Krotkov, says quantifying the sulfur dioxide bull’s-eyes is a two-step process that would not have been possible without an improvement in the computer processing that transforms raw satellite observations from the Dutch-Finnish Ozone Monitoring Instrument aboard NASA’s Aura spacecraft into precise estimates of sulfur dioxide concentrations, and the ability to detect smaller concentrations using a new computer program that precisely detects sulfur dioxide that had been dispersed and diluted by winds. Read more of this story at Slashdot.

Read More:
NASA Satellite Finds 39 Unreported Sources of Toxic Air Pollution

SpaceX wins its first military launch contract

Elon Musk has been fighting to be treated with the same level of respect as Lockheed Martin and Boeing, and it looks like his persistence has paid off. Reuters is reporting that the US Air Force has handed SpaceX a contract worth $83 million to launch the next GPS satellite into orbit. It’s a big deal, because until now, only Lockheed and Boeing (through the United Launch Alliance ) have been permitted to fling objects into the heavens on the Air Force’s behalf. The launch will take place in May 2018 from Florida atop a Falcon 9 rocket, although while Musk has won the battle, he might also be well on the way to winning the war. Back in 2014, the US Air Force awarded a contract for 26 rocket launches to ULA, the space joint venture from Boeing and Lockheed Martin. Musk believed that SpaceX was able to offer a better deal, and was peeved he wasn’t even allowed the chance to bid for the business. Shortly afterward, Musk launched a lawsuit to try and block the contract, alleging that there was something fishy about the contract process. Namely that one of the officials in charge of awarding the deal was subsequently handed a cushy job at the ULA . It didn’t take long for red-faced bodies at the Pentagon to agree that it needed to improve “the competitive landscape” for “national security space launches.” Reuters is also suggesting that the ULA might not be able to compete with SpaceX and its ability to make space launches progressively cheaper. That’s not much of a surprise, since the company has struggled in recent years to deal with its upstart rival. Part of this is down to the fact that its Atlas V rockets use Russian-made rocket engines, which are cheap and reliable but politically inconvenient. In the wake of the occupation of Crimea, the US imposed trade sanctions on Russia that preclude ULA from sourcing its engines. Last week the Motley Fool published a report that said that something might be rotten in the state of the ULA more generally. Former executive Brett Tobey apparently told students at the University of Colorado that it simply couldn’t compete with SpaceX. He reportedly said that it was because of the way his former company’s pricing structure was laid out, representatives were prohibited from quoting under $125 million. Even worse is that when the subsidiary costs are also included in the calculation, the price of a ULA launch is closer to $200 million. In addition, the firm has announced that it’ll cut jobs, and could let anywhere between 375 and 500 employees go between now and 2017. By comparison, SpaceX is riding high after showing that its Falcon 9 rocket can land on a platform after being shot into space . Reusable rockets is going to massively reduce the cost for each launch, and should help make journeys into the heavens that much cheaper. In addition, Musk is pledging to get the first SpaceX capsules to land on Mars by 2018 , an ambitious goal, but one that he’s uniquely equipped to see to reality.

See the original article here:
SpaceX wins its first military launch contract

Kremlin Falls For Its Own Fake Satellite Imagery

An anonymous reader writes: The Turkish downing of the Russian SU-24 jet last November saw a predictable series of statements from each side claiming complete innocence and blaming the other entirely. Social media was a key battleground for both sides — the Turkish and Russian governments, along with their supporters — as each tried to establish a dominant narrative explanation for what had just happened. In the midst of the online competition, a little-observed, funhouse mirror of an online hoax was brilliantly perpetrated, one with consequences likely exceeding the expectation of the hoaxster. The Russian Ministry of Defense was duped by a fake image that Russian state media itself had circulated more than a year earlier, as a way to deny Moscow’s involvement in the downing of Malaysia Airlines Flight 17. Read more of this story at Slashdot.

See the original article here:
Kremlin Falls For Its Own Fake Satellite Imagery

Sci-Hub, a Site With Open and Pirated Scientific Papers

lpress writes: Sci-Hub is a Russian site that seeks to remove barriers to science by providing access to pirated copies of scientific papers. It was established in 2011 by Russian neuroscientist Alexandra Elbakyan, who could not afford papers she needed for her research and it now claims to have links to 48 million pirated and open papers. I tried it out and found some papers and not others, but it provides an alternative for researchers who cannot afford access to paid journals. After visiting this site, one cannot help thinking of the case of Aaron Swartz, who committed suicide as a result of prosecution for his attempt to free scientific literature. Read more of this story at Slashdot.

View original post here:
Sci-Hub, a Site With Open and Pirated Scientific Papers