MIT developed a low-cost prosthetic hand that can help amputees feel again

In a joint project with Shanghai Jiao Tong University, the school designed a neuroprosthetic that costs about $500 in components. It’s an inflatable hand made from an elastomer called EcoFlex and looks a bit like Baymax from Big Hero 6.

The device foregoes electric motors in favor of a pneumatic system that inflates and bends its balloon-like digits. The hand can assume various grasps that allow an amputee to subsequently do things like pet a cat, pour a carton of milk or even pick up a cupcake. The device translates how its wearer wants to use it through a software program that “decodes” the EMG signals the brain sends to an injured limb.

The prosthetic weighs about half a pound and can even restore some sense of feeling for its user. It does this with a series of pressure sensors. When the wearer touches or squeezes an object, they send an electric signal to a specific position on their amputated arm. Another advantage of the arm is it doesn’t take long to learn how to use it. After about 15 minutes, two volunteers found they could write with a pen and stack checkers.

“This is not a product yet, but the performance is already similar or superior to existing neuroprosthetics, which we’re excited about,” said Professor Xuanhe Zhao, one of the engineers who worked on the project. “There’s huge potential to make this soft prosthetic very low cost, for low-income families who have suffered from amputation.”

[…]

Source: MIT developed a low-cost prosthetic hand that can help amputees feel again | Engadget

Facebook says Russia-linked ad agency tried to smear Covid vaccines

Facebook said Tuesday that it has removed hundreds of accounts linked to a mysterious advertising agency operating out of Russia that sought to pay social media influencers to smear Covid-19 vaccines made by Pfizer and AstraZeneca.

A network of 65 Facebook accounts and 243 Instagram accounts was traced back to Fazze, an advertising and marketing firm working in Russia on behalf of an unknown client.

The network used fake accounts to spread misleading claims that disparaged the safety of the Pfizer and AstraZeneca vaccines. One claimed AstraZeneca’s shot would turn a person into a chimpanzee. The fake accounts targeted audiences in India, Latin America and, to a lesser extent, the U.S., using several social media platforms including Facebook and Instagram.

[…]

The Fazze network also contacted social media influencers in several countries with offers to pay them for reposting the misleading content. That ploy backfired when influencers in Germany and France exposed the network’s offer.

[…]

Fazze’s effort did not get much traction online, with some posts failing to get even a single response. But, while the campaign may have fizzled, it’s noteworthy because of its effort to enlist social media influencers, according to Nathaniel Gleicher, Facebook’s head of security policy.

“Although it was sloppy and didn’t have very good reach, it was an elaborate setup,” Gleicher said on a conference call announcing Tuesday’s actions.

[…]

Facebook investigators say some influencers did post the material, but later deleted it when stories about Fazze’s work began to emerge.

French YouTuber Léo Grasset was among those contacted by Fazze. He told The Associated Press in May that he was asked to post a 45- to 60-second video on Instagram, TikTok or YouTube criticizing the mortality rate of the Pfizer vaccine.

When Grasset asked Fazze to identify their client, the firm declined. Grasset refused the offer and went public with his concerns.

The offer from Fazze urged influencers not to mention that they were being paid, and also suggested they criticize the media’s reporting on vaccines.

[…]

Source: Facebook says Russia-linked ad agency tried to smear Covid vaccines

‘Easy money’: How international scam artists pulled off an epic theft of Covid benefits

[…]

Russian mobsters, Chinese hackers and Nigerian scammers have used stolen identities to plunder tens of billions of dollars in Covid benefits, spiriting the money overseas in a massive transfer of wealth from U.S. taxpayers, officials and experts say. And they say it is still happening.

Among the ripest targets for the cybertheft have been jobless programs. The federal government cannot say for sure how much of the more than $900 billion in pandemic-related unemployment relief has been stolen, but credible estimates range from $87 million to $400 billion — at least half of which went to foreign criminals, law enforcement officials say.

Those staggering sums dwarf, even on the low end, what the federal government spends every year on intelligence collection, food stamps or K-12 education.

“This is perhaps the single biggest organized fraud heist we’ve ever seen,” said security researcher Armen Najarian of the firm RSA, who tracked a Nigerian fraud ring as it allegedly siphoned millions of dollars out of more than a dozen states.

Jeremy Sheridan, who directs the office of investigations at the Secret Service, called it “the largest fraud scheme that I’ve ever encountered.”

“Due to the volume and pace at which these funds were made available and a lot of the requirements that were lifted in order to release them, criminals seized on that opportunity and were very, very successful — and continue to be successful,” he said.

While the enormous scope of Covid relief fraud has been clear for some time, scant attention has been paid to the role of organized foreign criminal groups, who move taxpayer money overseas via laundering schemes involving payment apps and “money mules,” law enforcement officials said.

“This is like letting people just walk right into Fort Knox and take the gold, and nobody even asked any questions,” said Blake Hall, the CEO of ID.me, which has contracts with 27 states to verify identities.

Officials and analysts say both domestic and foreign fraudsters took advantage of an already weak system of unemployment verification maintained by the states, which has been flagged for years by federal watchdogs. Adding to the vulnerability, states made it easier to apply for Covid benefits online during the pandemic, and officials felt pressure to expedite processing. The federal government also rolled out new benefits for contractors and gig workers that required no employer verification.

In that environment, crooks were easily able to impersonate jobless Americans using stolen identity information for sale in bulk in the dark corners of the internet. The data — birthdates, Social Security numbers, addresses and other private information — have accumulated online for years through huge data breaches, including hacks of Yahoo, LinkedIn, Facebook, Marriott and Experian.

At home, prison inmates and drug gangs got in on the action. But experts say the best-organized efforts came from abroad, with criminals from nearly every country swooping in to steal on an industrial scale.

[…]

Under the Pandemic Unemployment Assistance program for gig workers and contractors, people could apply for retroactive relief, claiming months of joblessness with no employer verification possible. In some cases, that meant checks or debit cards worth $20,000, Hall said.

“Organized crime has never had an opportunity where any American’s identity could be converted into $20,000, and it became their Super Bowl,” he said. “And these states were not equipped to do identity verification, certainly not remote identity verification. And in the first few months and still today, organized crime has just made these states a target.”

[…]

The investigative journalism site ProPublica calculated last month that from March to December 2020, the number of jobless claims added up to about two-thirds of the country’s labor force, when the actual unemployment rate was 23 percent. Although some people lose jobs more than once in a given year, that alone could not account for the vast disparity.

The thievery continues. Maryland, for example, in June detected more than half a million potentially fraudulent unemployment claims in May and June alone. Most of the attempts were blocked, but experts say that nationwide, many are still getting through.

The Biden administration has acknowledged the problem and blamed it on the Trump administration.

[…]

In a memo in February, the inspector general reported that as of December, 22 of 54 state and territorial workforce agencies were still not following its repeated recommendation to join a national data exchange to check Social Security numbers. And in July, the inspector general reported that the national association of state workforce agencies had not been sharing fraud data as required by federal regulations.

Twenty states failed to perform all the required database identity checks, and 44 states did not perform all recommended ones, the inspector general found.

“The states have been chronically underfunded for years — they’re running 1980s technology,” Hall said.

[…]

The FBI has opened about 2,000 investigations, Greenberg said, but it has recovered just $100 million. The Secret Service, which focuses on cyber and economic crimes, has clawed back $1.3 billion. But the vast majority of the pilfered funds are gone for good, experts say, including tens of billions of dollars sent out of the country through money-moving applications such as Cash.app.

[…]

One of the few examples in which analysts have pointed the finger at a specific foreign group involves a Nigerian fraud ring dubbed Scattered Canary by security researchers. The group had been committing cyberfraud for years when the pandemic benefits presented a ripe target, Najarian said.

[…]

Scattered Canary took advantage of a quirk in Google’s system. Gmail does not recognize dots in email addresses — John.Doe@gmail.com and JohnDoe@gmail.com are routed to the same account. But state unemployment systems treated them as distinct email addresses.

Exploiting that trait, the group was able to create dozens of fraudulent state unemployment accounts that funneled benefits to the same email address, according to research by Najarian and others at Agari.

In April and May of 2020, Scattered Canary filed at least 174 fraudulent claims for unemployment benefits with the state of Washington, Agari found — each claim eligible to receive up to $790 a week, for a total of $20,540 over 26 weeks. With the addition of the $600-per-week Covid supplement, the maximum potential loss was $4.7 million for those claims alone, Agari found.

[…]

Source: ‘Easy money’: How international scam artists pulled off an epic theft of Covid benefits

Secret terrorist watchlist with 2 million records exposed online

July this year, Security Discovery researcher Bob Diachenko came across a plethora of JSON records in an exposed Elasticsearch cluster that piqued his interest.

The 1.9 million-strong recordset contained sensitive information on people, including their names, country citizenship, gender, date of birth, passport details, and no-fly status.

The exposed server was indexed by search engines Censys and ZoomEye, indicating Diachenko may not have been the only person to come across the list:

exposed watchlist records
An excerpt from exposed watchlist records (Bob Diachenko)

The researcher told BleepingComputer that given the nature of the exposed fields (e.g. passport details and “no_fly_indicator”) it appeared to be a no-fly or a similar terrorist watchlist.

Additionally, the researcher noticed some elusive fields such as “tag,” “nomination type,” and “selectee indicator,” that weren’t immediately understood by him.

“That was the only valid guess given the nature of data plus there was a specific field named ‘TSC_ID’,” Diachenko told BleepingComputer, which hinted to him the source of the recordset could be the Terrorist Screening Center (TSC).

[…]

Source: Secret terrorist watchlist with 2 million records exposed online

If there are 2 million names on that list, isn’t the definition of ‘terrorist’ maybe a little bit broad?

T-Mobile Confirms It Was Hacked, lost full subscriber info for USA

T-Mobile confirmed hackers gained access to the telecom giant’s systems in an announcement published Monday.

The move comes after Motherboard reported that T-Mobile was investigating a post on an underground forum offering for sale Social Security Numbers and other private data. The forum post at the time didn’t name T-Mobile, but the seller told Motherboard the data came from T-Mobile servers.

[…]

Source: T-Mobile Confirms It Was Hacked