Tag Archive for: space

Russia’s Unconventional Warfare: Moscow’s domination of the Information Space


U.S. intelligence and defense services, as well as the Office of the Director of National Intelligence (ODNI) 2023 Threat Assessment recognize China and Russia as the two greatest threats to U.S. national security. The U.S. has more firepower than either of the two and is a member of the world’s most powerful military alliances NATO, Aukus, and the Quad. Consequently, the U.S. would have a distinct advantage in a direct conflict. However, direct conflict remains a future possibility. Meanwhile, Russia and China have both been attacking the U.S. through unconventional warfare for decades. Because Russia is better at understanding American language and culture, and owing to their vast experience, dating back to World War II, arguably, Russia tends to be more effective at unconventional warfare than China.

George Kennan, the father of the containment policy, defined unconventional warfare as “the employment of all the means at a nation’s command, short of war, to achieve its national objectives.” Unconventional warfare can be military or quasi-military operations, other than conventional, direct warfare. Called the Gray Zone, an area between peace and conflict, unconventional warfare can include the use of covert forces or guerilla warfare in a hot conflict. Proxy wars, such as those fought in Vietnam and Korea would be examples of a conflict between the United States and the USSR which did not involve overt, direct combat between the two. More recent examples would be the Syrian Civil War, where Russia provided military support to the government of President Bashar al-Assad, while the United States was backing various opposition groups. Similar indirect conflicts have taken place in Yugoslavia and Kosovo, as well as Georgia. The most obvious example today is the Ukraine war. Although the direct combatants are Russia and Ukraine, the war can be seen as a great-power struggle between the U.S.-led west and the Russian Federation, although no U.S. troops have taken part.

In addition to backing local forces and actively engaging in combat operations, Russia also deploys the Wagner mercenary group into conflicts around the world. Wagner supports the Kremlin’s objectives, often…

Source…

Android Phones Shipping with Pre-Installed Malware – Global Village Space


Trend Micro, a cybersecurity research firm, has discovered a supply chain attack that has infected millions of Android devices with infostealer malware before they even leave the factory. The majority of the affected devices are budget smartphones, but the attack has also spread to smartwatches, smart TVs, and other smart devices. Senior Trend Micro researcher Fyodor Yarochkin and his colleague Zhengyu Dong spoke about this issue at a conference in Singapore, noting that the root of the problem lies in the fierce competition among original equipment manufacturers.

The issue stems from the fact that smartphone makers are not building all of the components themselves. For example, firmware is being built by third-party firmware suppliers. However, as the price of mobile phone firmware continued to drop, the providers were unable to charge money for their products. As a result, Yarochkin explained, the products started coming with an unwanted extra in the form of “silent plugins.” Trend Micro found dozens of firmware images looking for malicious software and 80 different plugins. Some plugins were part of a wider “business model” that was sold on dark web forums and even marketed on mainstream social media platforms and blogs.

These plugins are capable of stealing sensitive information from the device, stealing SMS messages, taking control of social media accounts, using the devices for ad and click fraud, abusing traffic, and more. One of the more serious problems is a plugin that allows the buyer to take full control of a device for up to five minutes and use it as an “exit node.”

Trend Micro says that close to nine million devices worldwide are affected by this supply chain attack, the majority of which are located in Southeast Asia and Eastern Europe. The researchers did not name the perpetrators, but they did mention China a few times.

This supply chain attack is a worrying development in the world of cybersecurity. It highlights the need for companies to be vigilant when it comes to their supply chains and to ensure that all components are thoroughly vetted before they are used in their products. It also underscores the importance of using…

Source…

Meta warns of ChatGPT malware on Facebook – Global Village Space


AI Tools: The New Weapon for Malware Attacks

Artificial Intelligence (AI) has become a buzzword in the tech industry, and it seems that everyone is obsessed with it, including hackers. In a recent security report released by Facebook’s parent company, Meta, the company’s security team has been tracking new malware threats that weaponize the current AI trend.

Meta claims that it has discovered “around ten new malware families” that are using AI chatbot tools like OpenAI’s popular ChatGPT to hack into users’ accounts. One of the more pressing schemes, according to Meta, is the proliferation of malicious web browser extensions that appear to offer ChatGPT functionality. Users download these extensions for Chrome or Firefox, for example, in order to use AI chatbot functionality. Some of these extensions even work and provide the advertised chatbot features. However, the extensions also contain malware that can access a user’s device.

According to Meta, it has discovered more than 1,000 unique URLs that offer malware disguised as ChatGPT or other AI-related tools and has blocked them from being shared on Facebook, Instagram, and Whatsapp. Once a user downloads malware, bad actors can immediately launch their attack and are constantly updating their methods to get around security protocols. In one example, bad actors were able to quickly automate the process which takes over business accounts and provides advertising permissions to these bad actors.

Meta says it has reported the malicious links to the various domain registrars and hosting providers that are used by these bad actors. However, this is just the tip of the iceberg. Hackers are constantly evolving their tactics and using AI tools to make their attacks more sophisticated and harder to detect.

The use of AI in malware attacks is not new. In fact, it has been around for some time now. Hackers have been using machine learning algorithms to create more effective malware that can evade traditional security measures. They can also use AI to automate their attacks, making them faster and more efficient.

One of the most significant risks associated with AI-powered malware is that it can learn and…

Source…

Is Louisiana’s ID Verification Mandate a Step in the Wrong Direction? – Global Village Space


It was recently announced that Louisiana had introduced legislation that requires users of adult websites to show identification to access the pages. This has stirred up plenty of questions about how much authority governments can have over the policing of the internet.

Aside from the ethical debates surrounding the news, it also feels like this is a step backward. Technology is moving forward rapidly, and improved methods of authentication are already emerging. A more sensible solution could be to jump on the growing trend of biometric technology for accessing websites.

What is the Louisiana Mandate?

PIA reported that lawmakers in Louisiana have decided to implement a new rule for accessing adult websites. In a push to ensure that children don’t encounter content that could be damaging to them, internet users in the state will now be required to use their personal identification credentials to log on.

Experts have noted how other countries, including the UK, Australia, and Germany, have all attempted similar measures in the past. None of these worked. In fact, collecting IDs for age verification can have serious knock-on effects when it comes to data privacy.

This highlights how there’s a need for more modern approaches to authentication that are in line with the advancing technological world. Biometrics has already started to creep in on devices and some sites. However, they haven’t become widespread or used as an alternative to traditional identification methods yet.

How Far Away are We From Ubiquitous Biometrics?

According to Grand View Research, the global biometrics market will be worth around $60 billion by 2025. It is growing at a rate of 20.4 percent each year, and this is being driven by the increased demand for enhanced security methods.

Issues Arising from Biometrics

For the technology to become used for logging onto all sites and devices, internet users need to have the reassurance that their data won’t be sold or lost to third parties.

Like it or not, biometric technology is on the way, and some people believe that it is a great step forward. There’s no doubt, though, that western countries will need to learn how to cope with these challenges. There…

Source…