Tag Archive for: reaper

Five vengeful ways US could hit back after Russia fighter jet downs Reaper drone


RUSSIA and the US are facing a crisis after a Russian fighter jet brought down a US reaper drone.

The incident over the Black Sea marks the first time since the height of the Cold War that an American aircraft has been brought down by the Russians.

And the US has warned it could escalate into war as fears of miscalculation are now looming over Putin’s bloody war in Ukraine.

The drone was taken down while flying over the Black Sea near Russian occupied Crimea – close to the current frontline.

US officials said the Russian Su-27 jet struck the propeller of the MQ-9 Reaper drone resulting in it crash landing in the sea and its loss.

Prior to the collision, which happened at 7am local time, two Su-27s had “dumped fuel on and flew in front of the MQ-9” in a “reckless” and “unprofessional” manner.

Horrified US military personnel in Germany watched a live feed from the drone as the Russian jets repeatedly flew around it, dumping fuel to damage cameras and sensors, reported New York Times.

Senior US officials have been worried for months that some sort of incident over the Black Sea could lead to a miscommunication and confrontation.

And predictably, the Russians denied everything – instead claiming the Reaper crashed due to a mistake by the pilot.

But what are the options for the US should they wish to respond to the Russians?

MISSILE STRIKES

The most direct form of retaliation – and of course the most dangerous – would be a direct attack on Russian targets.

It was a course of action contemplated by Donald Trump back in 2019 when the Iranians shot down a US surveillance drone with a missile.

The president had reportedly initially approved attacks on a handful of Iranian targets, like radar and missile batteries.

But despite saying the US has been “cocked and loaded” to attack he called off the strike with 10 minutes to spare after being told that the airstrike might kill as many as 150 people.

But unlike the Iranian incident, the US appear to be chalking up this drone drama to reckless accident rather than a deliberate aggressive action.

So this lowers the chances of Washington taking military action in response.

Also – any attack on the Russian military risks the…

Source…

Credit card skimmers now need to fear the Reaper

Enlarge / The SkimReaper, shown here with a sample card-skimming device, can help law enforcement find and shut down card skimming operations. (credit: Sean Gallagher)

BALTIMORE—At the USENIX Security Symposium here today, University of Florida researcher Nolen Scaife presented the results of a research project he undertook with Christian Peeters and Patrick Traynor to effectively detect some types of “skimmers”—maliciously placed devices designed to surreptitiously capture the magnetic stripe data and PIN codes of debit and credit cards as they are inserted into automated teller machines and point-of-sale systems. The researchers developed SkimReaper, a device that can sense when multiple read heads are present—a telltale sign of the presence of a skimmer.

Nolen and his fellow researchers worked with data provided by the New York City Police Department (NYPD) to assess the types of credit-card-skimming gear currently in the wild. They uncovered four broad categories of skimming gear:

  • Overlays—devices that get placed on top of the slot for the ATM or point-of-sale system. They can be modeled to match a specific ATM type’s card slot or, in some cases, overlay an entire device such as a credit card reader at a retail point of sale. Overlays on ATM machines are sometimes accompanied by a keypad that is placed atop the actual keypad to collect PIN data.
  • Deep inserts—skimmers engineered to be jammed deep into the card reader slots themselves. They’re thin enough to fit under the card as it is inserted or drawn in to be read. An emerging version of this is a “smart chip” skimmer that reads EMV transactions passively, squeezed between the card slot and the EMV sensor.
  • Wiretap skimmers—devices that get installed between a terminal and the network they connect to. This suggests there’s a fundamental security problem to begin with.
  • Internal skimmers—devices installed in-line between the card reader of a terminal and the rest of its hardware. These, Scaife said, are more common in gas-pump card readers, where the attacker has a greater chance of being able to gain access to the internals without being discovered.

Overlays and deep inserts are by far the most common types of skimmers—and are increasingly difficult to detect. Police, Scaife noted, often find them only by looking for the cameras used by skimmers to capture PIN numbers, because most of the common detection tips—including trying to shake the card slot to see if it dislodges—are ineffective.

Read 3 remaining paragraphs | Comments

Biz & IT – Ars Technica

North Korea’s ‘Reaper’ hacking group is stepping up its cyber warfare capabilities and is an ‘advanced persistent threat’

  1. North Korea’s ‘Reaper’ hacking group is stepping up its cyber warfare capabilities and is an ‘advanced persistent threat’  Daily Mail
  2. US and North Korea planning ‘cyber war’ as hacker armies faces off  Daily Star
  3. Report Details North Korea’s Cyberwarfare Activities  Newsmax
  4. North Korea’s Growing Criminal Cyberthreat  Scientific American
  5. Full coverage

cyber warfare news – read more

North Korean Reaper APT uses zero-day vulnerabilities to spy on governments

  1. North Korean Reaper APT uses zero-day vulnerabilities to spy on governments  ZDNet
  2. North Korea poised to launch large-scale cyberattacks, says new report  Chicago Tribune
  3. North Korean cyberspies ready to launch mass cyberattacks: Report  Washington Examiner
  4. Full coverage

zero day exploit – read more