Hackers find out worth of Iranian drones sold to Russia

Shahed-136 drones in launcher

Hackers from the Prana Network group have compromised the mail servers of the Iranian company IRGC Sahara Thunder, which contained an array of data on the production of Shahed-136 attack drones for Russia.

Source: a statement by Prana Network, reported by Militarnyi

Details: As noted, the IRGC Sahara Thunder company is a fictitious company run by the Islamic Revolutionary Guard Corps that facilitates the sale of weapons to Russia.

In particular, the hackers published information about negotiations between the Iranian and Russian sides on the location of production in the Russian free economic zone Alabuga.

It is noted that the Iranian side announced the starting price of the Shahed attack drone at 23 million roubles per unit (about US$375,000). However, during the negotiations, an agreement was reached at the level of 12 million roubles per unit, when ordering 6,000 units (about US$193,000) or 18 million roubles (about US$290,000) when ordering 2,000 units.

According to other published documents, at least part of the Russian Federation’s financial transactions and payments with Iran are made in gold.

For example, in February 2023, Alabuga Machinery transferred 2 million grams of gold to the Iranian shell company Sahara Thunder, presumably as payment for services and goods.

Background: In August 2023, The Washington Post obtained internal documents on the operation of the Iranian drone manufacturing plant in the Alabuga Special Economic Zone in Tatarstan, Russia, which is scheduled to produce 6,000 Shahed kamikaze drones by 2025.

Source: Hackers find out worth of Iranian drones sold to Russia

Astronomers Measure the Mass of the Milky Way by Calculating How Hard it is to Escape

[…] how can we determine the mass of something larger, such as the Milky Way? One method is to estimate the number of stars in the galaxy and their masses, then estimate the mass of all the interstellar gas and dust, and then rough out the amount of dark matter… It all gets very complicated.

A better way is to look at how the orbital speed of stars varies with distance from the galactic center. This is known as the rotation curve and gives an upper mass limit on the Milky Way, which seems to be around 600 billion to a trillion solar masses. The wide uncertainty gives you an idea of just how difficult it is to measure our galaxy’s mass. But a new study introduces a new method, and it could help astronomers pin things down.

Estimated escape velocities at different galactic radii. Credit: Roche, et al

The method looks at the escape velocity of stars in our galaxy. If a star is moving fast enough, it can overcome the gravitational pull of the Milky Way and escape into interstellar space. The minimum speed necessary to escape depends upon our galaxy’s mass, so measuring one gives you the other. Unfortunately, only a handful of stars are known to be escaping, which is not enough to get a good handle on galactic mass. So the team looked at the statistical distribution of stellar speeds as measured by the Gaia spacecraft.

The method is similar to weighing the Moon with a handful of dust. If you were standing on the Moon and tossed dust upward, the slower-moving dust particles would reach a lower height than faster particles. If you measured the speeds and positions of the dust particles, the statistical relation between speed and height would tell you how strongly the Moon pulls on the motes, and thus the mass of the Moon. It would be easier just to bring our kilogram and scale to measure lunar mass, but the dust method could work.

In the Milky Way, the stars are like dustmotes, swirling around in the gravitational field of the galaxy. The team used the speeds and positions of a billion stars to estimate the escape velocity at different distances from the galactic center. From that, they could determine the overall mass of the Milky Way. They calculated a mass of 640 billion Suns.

This is on the lower end of earlier estimates, and if accurate it means that the Milky Way has a bit less dark matter than we thought.

Source: Astronomers Measure the Mass of the Milky Way by Calculating How Hard it is to Escape – Universe Today

Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs

An underground website called OnlyFake is claiming to use “neural networks” to generate realistic looking photos of fake IDs for just $15, radically disrupting the marketplace for fake identities and cybersecurity more generally. This technology, which 404 Media has verified produces fake IDs nearly instantly, could streamline everything from bank fraud to laundering stolen funds.

In our own tests, OnlyFake created a highly convincing California driver’s license, complete with whatever arbitrary name, biographical information, address, expiration date, and signature we wanted. The photo even gives the appearance that the ID card is laying on a fluffy carpet, as if someone has placed it on the floor and snapped a picture, which many sites require for verification purposes.

[…]

 

Source: Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs

Hugging Face launches open source AI assistant maker to rival OpenAI’s custom GPTs

Hugging Face, the New York City-based startup that offers a popular, developer-focused repository for open source AI code and frameworks (and hosted last year’s “Woodstock of AI”), today announced the launch of third-party, customizable Hugging Chat Assistants.

The new, free product offering allows users of Hugging Chat, the startup’s open source alternative to OpenAI’s ChatGPT, to easily create their own customized AI chatbots with specific capabilities, similar both in functionality and intention to OpenAI’s custom GPT Builder — though that requires a paid subscription

[…]

Phillip Schmid, Hugging Face’s Technical Lead & LLMs Director, posted the news […] explaining that users could build a new personal Hugging Face Chat Assistant “in 2 clicks!” Schmid also openly compared the new capabilities to OpenAI’s custom GPTs.

However, in addition to being free, the other big difference between Hugging Chat Assistant and the GPT Builder and GPT Store is that the latter tools depend entirely on OpenAI’s proprietary large language models (LLM) GPT-4 and GPT-4 Vision/Turbo.

Users of Hugging Chat Assistant, by contrast, can choose which of several open source LLMs they wish to use to power the intelligence of their AI Assistant on the backend

[…]

Like OpenAI with its GPT Store launched last month, Hugging Face has also created a central repository of third-party customized Hugging Chat Assistants which users can choose between and use on their own time here.

The Hugging Chat Assistants aggregator page bears a very close resemblance to the GPT Store page

[…]

 

Source: Hugging Face launches open source AI assistant maker to rival OpenAI’s custom GPTs | VentureBeat

Virgin Galactic: Alignment pin mishap reported to FAA. If only Musk did that too.

Virgin Galactic has reported itself to the US Federal Aviation Administration (FAA) after discovering a detached alignment pin from the mechanism used to keep its suborbital spaceplane attached to the mothership aircraft.

According to the company, the alignment pin is used to ensure the spaceplane (in this case, Unity) is aligned correctly to the mothership (VMS Eve) during the mating of the vehicles on the ground.

In flight, the pin helps to transfer load from drag and other forces from Unity to the shear pin fitting assembly and into the pylon and center wing of the mothership. The alignment pin remained in place during the mated portion of the flight, but detached after Unity was released.

Virgin Galactic said: “While both parts play a role during mated flight, they do not support the spaceship’s weight, nor do they have an active function once the spaceship is released.”

However, having bits of your launch system detach unexpectedly is not great, despite the success of Galactic 06, a suborbital spaceflight launched on January 26, 2024. The mission carried a crew of six, including four private passengers, on a jaunt to just over 55 miles above the Earth before gliding back to a landing at Spaceport America.

The next flight of Unity is planned for the second quarter of 2024, although Virgin Galactic cautioned that this would depend on the review’s outcome.

In November 2023, boss Michael Colglazier announced that flights would be paused from mid-2024 to allow the company to focus on building its upcoming Delta class of spaceplane. Colglazier also announced that approximately 18 percent of the workforce were to be let go.

Virgin Galactic said of the incident: “At no time did the detached alignment pin pose a safety impact to the vehicles or the crew on board.”

VMS Eve completed a lengthy maintenance period just over a year ago, followed by the company commencing commercial operations. Having something fall off, even as minor as a pin that did not affect flight safety is, therefore, a worry.

The company has not elaborated on the cause of the incident or responded to The Register’s queries.

The FAA gave us the following statement: “A mishap occurred during the Virgin Galactic Galactic 06 commercial human spaceflight mission from Spaceport America in New Mexico on Jan. 26. Eight people were on the suborbital mission: two pilots on the WhiteKnightTwo carrier aircraft, and two pilots and four spaceflight participants on the SpaceShipTwo spacecraft. The mishap involved an issue with an alignment pin that provides connection between the carrier aircraft and the spacecraft.

“No public injuries or public property damage have been reported. The FAA is overseeing the Virgin Galactic-led mishap investigation to ensure the company complies with its FAA-approved mishap investigation plan and other regulatory requirements.” ®

Source: Virgin Galactic: Alignment pin mishap wouldn’t affect safety • The Register

Netherlands reveals Chinese attack on defence servers using CoatHanger malware on Fortinet Devices – a real pain to remove

Dutch authorities are lifting the curtain on an attempted cyberattack last year at its Ministry of Defense (MoD), blaming Chinese state-sponsored attackers for the espionage-focused intrusion.

Specialists from the Netherlands’ Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) were called in to investigate an intrusion at an MOD network last year, uncovering a previously unseen malware they’re calling Coathanger.

The name, authorities said, was conjured up based on the “peculiar phrase” displayed by the malware when encrypting the configuration on disk: “She took his coat and hung it up.”

A deep dive into Coathanger’s code revealed the remote access trojan (RAT) was purpose-built for Fortinet’s FortiGate next-generation firewalls (NGFWs) and the initial access to the MoD’s network was gained through exploiting CVE-2022-42475.

According to the MIVD and AIVD, the RAT operates outside of traditional detection measures and acts as a second-stage malware, mainly to establish persistent access for attackers, surviving reboots and firmware upgrades.

Even fully patched FortiGate devices could still have Coathanger installed if they were compromised before upgrading.

In the cybersecurity advisory published today, authorities said the malware was highly stealthy and difficult to detect using default FortiGate CLI commands, since Coathanger hooks most system calls that could identify it as malicious.

They also made clear that Coathanger is definitely different from BOLDMOVE, another RAT targeting FortiGate appliances.

“For the first time, the MIVD has chosen to make public a technical report on the working methods of Chinese hackers. It is important to attribute such espionage activities by China,” said defense minister Kajsa Ollongren in an automatically translated statement. “In this way, we increase international resilience against this type of cyber espionage.”

The advisory also noted that Dutch authorities had previously spotted Coathanger present on other victims’ networks too, prior to the incident at the MOD.

As for attribution, MIVD and AIVD said they can pin Coathanger to Chinese state-sponsored attackers with “high confidence.”

“MIVD and AIVD emphasize that this incident does not stand on its own, but is part of a wider trend of Chinese political espionage against the Netherlands and its allies,” the advisory reads.

The attackers responsible for the attack were known for conducting “wide and opportunistic” scans for exposed FortiGate appliances vulnerable to CVE-2022-42475 and then exploiting it using an obfuscated connection.

After gaining an initial foothold inside the network, which was used by the MOD’s research and development division, the attackers performed reconnaissance and stole a list of user accounts from the Active Directory server.

Not much else was said about the attacker’s activity, other than the fact that the overall impact of the intrusion was limited thanks to the MOD’s network segmentation.

For those worried about whether Chinese cyberspies are lurking in their firewall, the Joint Signal Cyber Unit of the Netherlands (JCSU-NL) published a full list of indicators of compromise (IOCs) and various detection methods on its GitHub page.

The collection of materials includes YARA rules, a JA3 hash, CLI commands, file checksums, and more. The authorities said each detection method should be seen as independent and used together since some focus on general IOCs and others were developed to spot Coathanger activity specifically.

If there is evidence of compromise, it’s possible other hosts that are reachable by the FortiGate device are also compromised. There is also an increased likelihood that attackers may perform hands-on-keyboard attacks.

Affected users should isolate their device immediately, collect and review logs, and consider calling in third-party digital forensics specialists, the advisory reads. Victims should also inform their country’s cybersecurity authority: NCSC, CISA, etc.

The only way to remove Coathanger from an infected device is to completely reformat the device, before reinstalling and reconfiguring it.

Whiffs of China’s involvement in CVE-2022-42475 exploits have long been suspected, but for the first time they’re confirmed today.

First disclosed in December 2022, a month later Fortinet said it was aware that the vulnerability was tied to the breach of a government or government-related organization that had been infected with custom-made malware.

At the time, no fingers were officially pointed other than the fact that this custom malware was compiled on a machine in the UTC+8 timezone, so realistically it was most likely going to be either China or Russia.

China was also accused of being behind exploits of separate Fortinet bug in March, again using bespoke malware for the purposes of cyber espionage. ®

Source: Netherlands reveals Chinese spies attacked its defense dept • The Register

You should be reading your news through an RSS reader

[…] one of the main roles of RSS is to supply directly to you a steady stream of updates from a website. Every new article published on that site is served up in a list that can be interpreted by an RSS reader.

In earlier, simpler internet times, RSS was the way to keep up to date with what was happening on all of your favorite sites. You would open your RSS reader and tap through newly published articles one by one, in chronological order, in the same way you would check your email. It was an easy way to keep tabs on what was new and what was of interest.

[…]

RSS is essentially a standard for serving up text and images in a feed-like format, and not all that dissimilar to HTML. Typically, the feed includes the headline of an article, some of the text (often just the introduction), and perhaps the main image.

[…]

Even when a site doesn’t explicitly offer RSS feeds, the best RSS readers can now produce their own approximation of them by watching for new activity on a site, so you can direct the app toward the site you want to keep tabs on.

[…]

RSS is clearly useful if you have a selection of favorite websites and you want to skim through everything they publish (or everything they publish in a certain category, if the site has several feeds).

[…]

Using RSS means you can catch up on everything, methodically and chronologically, even if you’ve been offline for a week (you don’t have to catch up on everything, of course—but you can, if you want, as your feed will operate on an infinite scroll). It’s also a cleaner, less cluttered way of using the internet, as you only need click through on the specific articles you want to read.

[…]

The best RSS feed running is arguably Feedly, which offers a bunch of features across free and paid-for plans: It has a clean, clear interface, it can generate RSS feeds for sites that don’t have them, it can sort feeds in a variety of ways, it can incorporate email newsletters, and much more besides.

[…]

Source: Embrace RSS: These Are the Best RSS Reader Apps in 2024 | Lifehacker

This is an amazing way to run through multiple news sources quickly.