Salta al contenuto principale



🔁 Spamouflage, ecco come si intensifica la campagna di disinformazione legata alla Cina in vista delle presidenziali Usa feddit.it/post/106...

Spamouflage, ecco come si intensifica la campagna di disinformazione legata alla Cina in vista delle presidenziali Usa
feddit.it/post/10644858

Il nuovo post di cybersecurity è su feddit.

in reply to Informa Pirata

sarebbe interessante,giusto per conoscere anche quali e quante sono le campagne messe in atto dastati/unitieuropa/l'occidente insomma i "buoni",perché non credo siano proprio degli stinchi di santo😁😆

Informa Pirata reshared this.



Gualtieri: “Stiamo valutando di rendere Fontana di Trevi visitabile su prenotazione e a numero chiuso”


@Politica interna, europea e internazionale
“Stiamo ragionando sull’ipotesi di rendere la Fontana di Trevi visitabile su prenotazione e a numero chiuso”. Lo rivela il sindaco di Roma Roberto Gualtieri. Il primo cittadino spiega che si tratta di una ipotesi “molto



I2C For Hackers: Digging Deeper


19188505

Last time, I gave you an overview of what you get from I2C, basics like addressing, interface speeds, and a breakdown of pullups. Today, let’s continue looking into I2C capabilities and requirements – level shifting, transfer types, and quirks like combined transfers or clock stretching.

Level Shifting

Today, the overwhelming majority of I2C devices are 3.3 V logic. but this wasn’t always the case. If you work with old tech or with I2C on VGA/DVI/HDMI ports, you will see 5 V I2C networks, and if you work with very new tech, you will see 1.8 V I2C networks; rarely, you might even see 2.5 V networks!

Interfacing 5 V devices with a 3. 3V controller, it might not be necessary to level shift. You need to a) wire pullups to 3.3 V, and b) win the device input tolerance lottery. Same goes interfacing 3.3 V devices with 1.8 V hosts – wire up pullups to 1.8 V and pray to the stars. It can work in production – here’s Adafruit taking the 3.3 V-pulled-up Raspberry Pi I2C bus, and connecting it to a 5 V-powered MCP23017 chip that drives a 5 V-connected HD44780 display.

If your arrangement is different, or you’re experiencing a problem, you will want a level shifter circuit. At their simplest, two N-FETs like 2N7002 will do wonders. If you want smaller PCB footprint, better parameters, or more channels, there are level shifter chips, with many of them wonderfully suited for I2C (read the datasheet!). As we’ve featured before, some shifter ICs are too smart for their own good, while others will do just fine – if in doubt, remember to use your logic analyzer judiciously.

Two Ways To Talk


There are two kinds of I2C transfers you could expect to perform – I’d call them “simple transfers” and “register transfers”. With simple transfers, you send an address, and after the device ACKs, you either send or receive a single byte – it’s just like working with a shift register. With register transfers, you send an address, then a register number, and the device sends you the “contents” of that register – it’s more like working with an SPI display.

The PCF8574 is an I2C GPIO expander that does simple transfers. It has eight GPIO pins, and it only does simple transfers. How does that work, given it does both input and output? Well, the PCF8574 has only three possible states for all pin, with two of them combined together. The “Low” state (writing 0) is a hard pull down to GND. The “High” state (writing 1) is a weak pull to VCC – which also makes the pin work as an input with a pullup enabled. To check the input state, just read the expander state, and see if any of the pins you’ve set to 1 are now reading as 0. You can’t do a lot of high-side driving, sure, but you can still drive LEDs and check buttons, plus, this scheme is dead simple and covers a ton of use cases.

A good few I2C devices use simple transfers – the LM75 temperature sensor, for instance, only has to return temperature. You can read out multiple bytes at once, of course – simple transfers aren’t inherently limited to a single byte! PCF8575, the 16-bit sister of the PCF8574, has 16 GPIOs, I’ve used simple transfers with an ATMega328P keypard controller I created at some point – it would return keycodes, taken from a ring buffer. However, at some point, I decided to add more features to it, like ADC reading to help out a Pi Zero it was connected to, and had to upgrade it to register transfers.

The MCP23017 is a GPIO expander that uses register transfers. It has 16 GPIO pins, and a ton of features, each with their own register. Since one register contains 8 bits and we have 16 GPIOs, there are two registers per feature, and as such, there are two registers for pin directions, two for enabling integrated pullups, two for reading out input states, two for setting pins as outputs, and so on. They can even be arranged in two different ways, one backwards compatible with a different chip, by changing a bit in the status register! It’s a fair bit more complex chip than the PCF8574, but the complexity pays off where you need it.

I2C EEPROMs work with register transfers, too – some use 8-bit addresses, which allows for up to 256 bytes of storage. Higher-capacity EEPROMs use 16-bit (two-byte) addresses, where you’re expected to send in two bytes before you can read data out; if you try to read from such an EEPROM using two-byte addresses, you will just read back zeroes, so beware!

Quirks


But what if the device can’t keep up with the multi-byte transactions that your microcontroller is asking for? Maybe you have an EEPROM that needs time before it can read out a value from its internal memory so that it your MCU can receive it, maybe it’s a sensor that needs to average some values quickly and it just can’t catch up with even the lax timing requirements of 100 kHz I2C.

There’s a solution – it’s called clock stretching, and it’s basically an I2C device holding SCL low after receiving a byte, extending ACK state for a long time, until it can actually return meaningful data. As long as SCL is low, the controller should wait for the device. It’s essentially a way for a device to say “wait, not yet, I need some time before I can give you what you’re looking for”.

Raspberry Pi didn’t support clock stretching for the longest time due to a silicon bug. Every single Pi version before Pi 4 couldn’t handle clock stretching, including all of the Pi Zero versions released at the time of writing this article. The workaround, if you need one – use software I2C. It consumes more CPU since you have to use a kernel driver that bitbangs the bus, but it does have functional clock stretching. And of course the Raspberry Pi isn’t alone: if you are likely to need clock stretching, make sure that the microcontroller hardware peripheral supports it properly.

Next time, we dive into the physical layer, look at logic analyzer traces, understand how communication happens, and the ways it can break despite our best intentions.


hackaday.com/2024/09/05/i2c-fo…



Boccia replica a Sangiuliano: “Il potere strumentalizza la mia storia, difendo la mia dignità di donna”


@Politica interna, europea e internazionale
Boccia replica a Sangiuliano: “Difendo la mia dignità di donna” All’indomani della discussa intervista che il ministro Sangiuliano ha rilasciato al Tg1 rivelando che Maria Rosaria Boccia è stata la sua amante, arriva la replica della diretta



Beretta Narp, ecco il nuovo fucile d’assalto sviluppato con l’esercito italiano

[quote]Dopo il successo e l’interesse destato a inizio anno alla Defence and Security Equipment International (Dsei) di Londra, all’Esposizione internazionale dell’industria della difesa (Mspo) di Kielce, in Polonia, in corso in questi giorni, continua il percorso di lancio e



Cattaneo: “Forza Italia è favorevole allo Ius Scholae, ma priorità al Governo”


@Politica interna, europea e internazionale
Solo una cifra: 914.860. Un numero, per una volta, espresso non in euro, ma in persone. Anzi, in bambine e bambini. Sono quelli che sono italiani di fatto, ma non per la legge, quelli che frequentano le nostre scuole sedendo nei banchi accanto ai nostri figli, ma da



🔁 Internet Archive ha perso un'importante battaglia legale feddit.it/post/10648267 Il nuovo post di skariko è su feddit.it/c/informatica h...

Internet Archive ha perso un'importante battaglia legale
feddit.it/post/10648267

Il nuovo post di skariko è su feddit.it/c/informatica

wired.

Maronno Winchester reshared this.



OMS Pubblica Uno Studio Decisivo: Nessun Legame tra Cellulari e Cancro al Cervello


L’Organizzazione Mondiale della Sanità (OMS) ha pubblicato i risultati di un esperimento su larga scala che probabilmente metterà fine al dibattito di lunga data sugli effetti dei telefoni cellulari sullo sviluppo del cancro al cervello. Gli scienziati hanno analizzato più di 5.000 articoli scientifici e selezionato 63 studi condotti dal 1994 al 2022 per uno studio dettagliato.

I risultati del lavoro sono stati pubblicati sulla rivista scientifica Environmental International .

Il dibattito sui potenziali pericoli dei telefoni cellulari risale al 1993, quando David Reynard, residente in Florida, fece causa alla NEC America. Ha affermato che le radiazioni di un telefono cellulare hanno contribuito allo sviluppo di un tumore al cervello in sua moglie. Sebbene la causa sia stata archiviata nel 1995, il caso ha suscitato timore nella mente di molte persone.

Nel 2011 l’OMS e l’Agenzia internazionale per la ricerca sul cancro (IARC) hanno deciso di classificare le radiazioni dei telefoni cellulari come possibili cancerogeni per l’uomo. E nel 2016, un altro studio ha dimostrato che le radiazioni dei gadget possono effettivamente causare cancro al cervello e alle ghiandole surrenali nei topi e nei ratti.

Tuttavia, un nuovo esperimento condotto da esperti dell’Agenzia australiana per la protezione dalle radiazioni e la sicurezza nucleare (ARPANSA) smentisce queste paure. Gli scienziati hanno scoperto che, nonostante la rapida crescita dell’uso dei telefoni cellulari negli ultimi vent’anni, non si è verificato un aumento corrispondente dei casi di cancro alla testa o al collo.

Il team ha analizzato gli effetti delle onde radio provenienti dalle torri cellulari e ha anche studiato le occupazioni associate a una maggiore esposizione alle radiazioni in radiofrequenza. In entrambi i casi non è stata trovata alcuna connessione con lo sviluppo del cancro.

Mark Ellwood, professore di epidemiologia all’Università di Auckland e coautore dello studio, ha osservato che il lavoro copre un’ampia gamma di fonti di radiazioni a radiofrequenza. Hanno preso in considerazione non solo i telefoni cellulari, ma anche altri dispositivi: radio, televisori, baby monitor, router Wi-Fi, radar, nonché numerosi dispositivi industriali e medici.

Le conclusioni degli scienziati sono logiche, data l’enorme prevalenza degli smartphone nel mondo moderno. Secondo alcune stime ne fanno uso tre quarti della popolazione mondiale. Gli americani, ad esempio, trascorrono in media 4 ore e 37 minuti al giorno sui loro telefoni e questi numeri non fanno che aumentare con l’avanzare della tecnologia. Nonostante ciò, il tasso di incidenza del cancro al cervello è rimasto praticamente invariato dal 1982.

Ken Karipidis dell’ARPANSA afferma che il nuovo studio si basa su molti più dati rispetto al campione IARC del 2011. Gli scienziati hanno anche sottolineato di aver osservato persone che utilizzano i telefoni cellulari più frequentemente e per lunghi periodi – più di 10 anni.

L'articolo OMS Pubblica Uno Studio Decisivo: Nessun Legame tra Cellulari e Cancro al Cervello proviene da il blog della sicurezza informatica.

Gazzetta del Cadavere reshared this.



Il tuo accesso a Telegram e alla sua privacy dopo l’arresto di Pavel Durov ti desta preoccupazione? Ecco cosa dovresti (e non dovresti) fare adesso.

Maronno Winchester reshared this.



La Casa Bianca pubblica l'ultimo piano per proteggere una componente chiave di Internet: la sicurezza del routing Internet

I funzionari dell'amministrazione hanno lanciato l'allarme: una serie di regole tecniche per l'instradamento dei dati su Inte…



Balnerai, accordo Governo-Ue: concessioni prorogate al settembre 2027, ma i gestori protestano


@Politica interna, europea e internazionale
Il Governo Meoni ha raggiunto un accordo con la Commissione europea che consente di prorogare fino a tutto settembre 2027 le concessioni balneari (in scadenza alla fine di quest’anno). L’intesa prevede che le gare per la riassegnazione delle concessioni



Il commento di Vittorio Feltri sul caso Boccia: “Il ministro Sangiuliano si è fatto fottere dalla pucchiacca” | VIDEO


@Politica interna, europea e internazionale
Vittorio Feltri: “Il ministro Sangiuliano si è fatto fottere dalla pucchiacca” Anche il giornalista Vittorio Feltri ha commentato la vicenda Boccia-Sangiuliano all’indomani dell’intervista rilasciata al Tg1 dal ministro della Cultura. In un

in reply to Elezioni e Politica 2025

quando un uomo e una donna stanno vicino, e si avvicinano e si avvicinano… finiscono a letto. Normale, per l’amor di Dio, ma bisogna stare molto attenti, perché quando una donna la porti a letto non la puoi portare anche in ufficio, sennò è un casino, perché le donne confondono l’ufficio con il letto e quindi pretendono anche di comandare.


Una persona che dice cose del genere dovrebbe stare in un ospizio o al massimo in un bar. Non direttore di un giornale



Getting Root on Cheap WiFi Repeaters, the Long Way Around


19177484

What can you do with a cheap Linux machine with limited flash and only a single free GPIO line? Probably not much, but sometimes, just getting root to prove you can is the main goal of a project. If that happens to lead somewhere useful, well, that’s just icing on the cake.

Like many interesting stories, this one starts on AliExpress, where [Easton] spied some low-cost WiFi repeaters, the ones that plug directly into the wall and extend your wireless network another few meters or so. Unable to resist the siren song, a few of these dongles showed up in the mailbox, ripe for the hacking. Spoiler alert: although the attempt on the first device had some success by getting a console session through the UART port and resetting the root password, [Easton] ended up bricking the repeater while trying to install an OpenWRT image.

The second attempt, this time on a different but similar device, proved more fruitful. The rudimentary web UI provided no easy path in, although it did a pretty good job enumerating the hardware [Easton] was working with. With the UART route only likely to provide temptation to brick this one too, [Easton] turned to a security advisory about a vulnerability that allows remote code execution through a specially crafted SSID. That means getting root on these dongles is as simple as a curl command — no hardware hacks needed!

As for what to do with a bunch of little plug-in Linux boxes with WiFi, we’ll leave that up to your imagination. We like [Easton]’s idea of running something like Pi-Hole on them; maybe Home Assistant would be possible, but these are pretty resource-constrained machines. Still, the lessons learned here are valuable, and at this price point, let the games begin.


hackaday.com/2024/09/05/gettin…



CISGIORDANIA. Sei palestinesi uccisi dall’esercito israeliano a Tubas e Faraa


@Notizie dall'Italia e dal mondo
Tra gli uccisi c’è Mohammed Zubeidi, figlio di Zakaria Zubeidi, un noto ex comandante delle Brigate di Al Aqsa nella città di Jenin durante la seconda Intifada
L'articolo CISGIORDANIA. Sei palestinesi uccisi dall’esercito israeliano a Tubas e Faraa



Come valutare l’appoggio italiano all’Ucraina. L’intervento dell’amm. Caffio

[quote]Le pur valide analisi sulla penalizzazione insita nell’esclusione dell’Italia dal Quintetto di concertazione sul sostegno all’Ucraina nel colpire obiettivi sul territorio russo vanno integrate, a modesto avviso di chi scrive, da considerazioni di natura giuridica. L’Italia non è in guerra con la Russia, è stato più volte detto



Gli Stati Uniti accelerano sull’intelligence satellitare

[quote]La National geospatial-intelligence agency (Nga) e la Space force degli Stati Uniti collaboreranno per trasmettere dati di Intelligence raccolti dai satelliti direttamente sul campo di battaglia. Il nuovo Joint mission management center della Nga a Springfield includerà anche operatori della Space force per elaborare i



Il declino e la caduta di Mahmoud Abbas


@Notizie dall'Italia e dal mondo
Come il leader palestinese ha dato priorità a un accordo di pace rispetto all'unità politica interna e non ha ottenuto nessuna delle due cose
L'articolo Il declino e la caduta di Mahmoud Abbas proviene da Pagine Esteri.

pagineesteri.it/2024/09/05/med…



Tropic Trooper spies on government entities in the Middle East


19162821

Executive summary


Tropic Trooper (also known as KeyBoy and Pirate Panda) is an APT group active since 2011. This group has traditionally targeted sectors such as government, healthcare, transportation and high-tech industries in Taiwan, the Philippines and Hong Kong. Our recent investigation has revealed that in 2024 they conducted persistent campaigns targeting a government entity in the Middle East, starting in June 2023.

Sighting this group’s TTPs in critical governmental entities in the Middle East, particularly those related to human rights studies, marks a new strategic move for them. This can help the threat intelligence community better understand the motives of this threat actor.

The infection came to our attention in June 2024, when our telemetry gave recurring alerts for a new China Chopper web shell variant (used by many Chinese-speaking actors), which was found on a public web server. The server was hosting an open-source content management system (CMS) called Umbraco, written in C#. The observed web shell component was compiled as a .NET module of Umbraco CMS.

In our subsequent investigation, we looked for more suspicious detections on this public server and identified multiple malware sets. These include post-exploitation tools, which, we assess with medium confidence, are related to and leveraged in this intrusion.

Furthermore, we identified new DLL search-order hijacking implants that are loaded from a legitimate vulnerable executable as it lacks the full path specification to the DLL it needs. This attack chain was attempting to load the Crowdoor loader, which is half-named after the SparrowDoor backdoor, detailed by ESET. During the attack, the security agent blocked the first Crowdoor loader, prompting the attackers to switch to a new, previously unreported variant, with almost the same impact.

We attribute this activity to the Chinese-speaking threat actor known as Tropic Trooper with high confidence. Our findings reveal an overlap in the techniques reported in recent Tropic Trooper campaigns. The samples we found also show a high overlap with samples previously attributed to Tropic Trooper.

Background


In June 2024, we detected a new version of the well-known China Chopper web shell. Further investigation followed as it represents a module within Umbraco CMS, receiving commands via the Umbraco controller.

On the same public server hosting Umbraco, we found other suspicious implants and malware clusters, which appeared to be part of the same attack. The installed security agent kept detecting these malware implants, and the attackers tried to drop additional post-exploitation tools to achieve their main objectives: in this intrusion we assess with high confidence that the motive is cyber espionage.

The table below shows the discovered malware families related to this intrusion. The subsequent sections of this report provide a technical analysis of these malware clusters.

Malware SetDescriptionOldest VariantEarliest VariantSample Count
1 – Web shells.NET Web shells found dropped into path
c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\rootwith filename similar to this pattern
App_Web_{8}[a-z0-9].dll
2023.08.252024.04.1837
2 – Post-exploitation toolsMultiple post-exploitation tools dropped
into path
c:\sql\tools\attunitycdcoracle\x64\1033Main usage: network scanning, lateral
movement, defense evasion
Main tools: Fscan, Swor and batch scripts
2024.05.072024.05.085
3 – DLL search-order hijacking implants – Crowdoor loadersMultiple malicious DLLs, side-loaded into
other legitimate executables, dropped into
paths c:\Windows\branding\data and
c:\Users\Public\Music\dataThe malicious samples are called Crowdoor,
which, when run, drop CobaltStrike and
maintain persistence.
2024.04.182024.05.155

Technical details

Webshells — Umbraco modules
MD53f15c4431ad4573344ad56e8384ebd62
Sha-1311d1d50673fbfc40b84d94239cd4fa784269465
Sha2568df9fa495892fc3d183917162746ef8fd9e438ff0d639264236db553b09629dc
Link-Time2024-05-06 10:19:28
File Typedynamic-link-library, 32-bit, console / Microsoft Visual C# / Basic .NET | Microsoft.NET
File NameApp_Web_dentsd54.dll

The module exhibits characteristics commonly associated with malicious activity, including obfuscation and dynamic execution of commands. The commands are received and dispatched by the
umbraco_bind_aspx module, as can be seen below.
Malicious module found inside Umbraco CMS on the compromised server
Malicious module found inside Umbraco CMS on the compromised server

The
umbraco_bind_aspx is a class generated by the ASP.NET framework for an ASPX page within Umbraco CMS. The framework automatically calls the __BuildControlTree() function. This function, implemented by the attackers, is responsible for calling malicious code as the argument to the RenderMethod() function. Also, event validation, which is a security feature in ASP.NET that prevents unauthorized events from being logged on the server, is disabled by setting EnableEventValidation to false as can be seen in the screenshot below.
Malicious function implementing China Chopper registered as a callback function
Malicious function implementing China Chopper registered as a callback function

__Render__control1() is the main malicious function. As can be seen in the screenshot below, a Base64 string is decoded and then executed via dynamic evaluation using JavaScript.
Obfuscated dynamic JS code execution
Obfuscated dynamic JS code execution

The script employs multiple Base64 decodings before the final JavaScript payload is generated and executed. The resulting code resembles the known functionality associated with the China Chopper web shell, a popular web shell used by attackers for remote access and control over compromised web servers.

China Chopper web shell functionality
China Chopper web shell functionality

The attackers then started dropping various samples on this server, notably a dropper that was pushing more compiled variants carrying the same functionality, but using different module names. These module names all match the pattern
App_Web_{8}[a-z0-9].dll. In our telemetry, we noticed exploitation attempts of several CVEs (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207 in Microsoft Exchange, CVE-2023-26360 in Adobe ColdFusion). Therefore, we believe with moderate confidence that these web shells were dropped by exploiting an existing unpatched vulnerability.
According to the timeline of the detection logs, the attackers were able to leverage some of these web shells to execute commands on the affected server and drop more post-exploitation tools utilized for lateral movement. The majority of observed software are open-source tools maintained by Chinese-speaking developers. These implants are dropped into the Umbraco CMS root directory.

We found the following tools:

  • Fscan: A tool for vulnerability scanning including host status detection, port scanning, service enumeration, exploitation, etc. The tool documentation is in simplified Chinese and maintained by Chinese-speaking accounts. The attackers created a script, named i.bat, to identify available machines on the network using simple ICMP ping requests. The output is directed to a text file, which is used later for lateral movement.
  • Swor: A simple penetration testing tool whose author tried to make it immune to removal by security solutions. Based on its documentation, it can deploy mimikatz, FRP and ElevationStation. The tool is open-source and maintained by Chinese-speaking developers. This tool was previously sighted being leveraged in attacks on government entities in Malaysia, which is a similar industry vertical to the Middle East intrusion victimology. We found the same compiled sample in the wild at [domain]/wampthemes/simple/123/In-Swor-v2/1.exe.
  • Neo-reGeorg: An open-source SOCKS5 proxy, the attackers used it to pivot to other machines and evade network-level security controls. Some detections suggest that this tool may be used to proxy traffic, but we have not been able to verify the actual purpose of proxying traffic through this server.
  • ByPassGodzilla: A Chinese web shell encryptor used to obfuscate other deployed web shells to bypass detections. We were able to source different implementations of encrypted web shells in .NET and ASPX scripts from the same server. According to our telemetry, the newly discovered web shell was also associated with a campaign leveraging CVE-2023-26360 early this year targeting vulnerable servers in the Middle East.


Backdoor implants using DLL search-order hijacking


The attackers tried to load a malicious DLL,
datast.dll, from c:\Users\Public\Music\data three times. After these attempts failed, the attackers relied on another malicious loader, VERSION.dll, which was dropped into C:\Windows\branding\data. We discuss this below in the “New samples” section. We believe, based on our telemetry, that the Umbraco web shells were used to drop these files on the infected server.
Since the timeframe for loading the two malicious DLLs,
VERSION.dll and datast.dll, were very close, it allowed us to link the two files. Additionally, the same approach was used for both: leveraging a legitimate executable file vulnerable to DLL search-order hijacking, which would load a malicious DLL dropped into the same path as the legitimate executable.

The datast.dll library
MD5a213873eb55dc092ddf3adbeb242bd44
Sha-13650899c669986e5f4363fdbd6cf5b78a6fcd484
Sha25623dea3a74e3ff6a367754d02466db4c86ffda47efe09529d3aad52b0d5694b30
Link-TimeThu Jul 27 16:21:38 2023 (UTC)
File Typedynamic-link-library | 32-bit
File Namedatast.dll

In this incident, our telemetry points to the malware export being called using the rundll32 command from the
a.bat file (MD5: fca94b8b718357143c53620c6b360470), which we were unable to obtain. A second assumption is that it was loaded through a legitimate executable using DLL search-order hijacking, as datast.dll has been observed before, associated with Tropic Trooper and loaded by the same method. We believe with low to medium confidence that the batch script was merely used for testing purposes as the whole malware-loading chain was designed to be loaded from a legitimate executable.
Once loaded,
datast.dll exports a single function named InitCore. This function usually gets imported by another DLL called datastate.dll. The function implements the main functionality for this loader, decrypting the shellcode for the next stage from a memory buffer inside the datastate.dll file using a variant of the RC4 stream cipher. The first code block is the Key Scheduling Algorithm (KSA), while the second block (the “for” loop in the image below) is the core of the KSA, where it scrambles the initial permutation using the hardcoded RC4 key fYTUdr643$3u.
Code stub responsible for decrypting the next stage
Code stub responsible for decrypting the next stage

Code stub responsible for decrypting the next stage

After decryption, the shellcode is executed, then the next stage is loaded into the address space of the process that loaded
datast.dll.

Hunting for new loaders


As mentioned, the infection chain was not fully executed, forcing the attackers to shift to new undetected variants. By pivoting on the hardcoded RC4 key, we found a new set of files sharing similar code, which turned out to be new updated variants of this family with minor differences in functionality. Below is the chronological view of the evolution of this specific loader as observed from our telemetry and scanning third-party malware repositories.

MD5 hashesFile nameExported functionsFile creation dateSize
fd8382efb0a16225896d584da56c182cdatastate.dllClear – Server2024-02-2381KB
1dd03936baf0fe95b7e5b54a9dd4a577datast.dllLdf/rcd2024-02-2380KB
8a900f742d0e3cd3898f37dbc3d6e054NAClear – Server2023-10-3080kB
a213873eb55dc092ddf3adbeb242bd44datast.dllInitCore2023-07-21178KB
dd7593e9ba80502505c958b9bbbf2838datastate.dllClear – Server2023-03-22178KB
2c7ebd103514018bad223f25026d4db3datastate.dllClear – Server2023-03-1081KB

Recent variants

Updated loader variant in February 2024


In February 2024, a user uploaded three Crowdoor-related files to a multiscanner platform:

File nameMD5 hashDescription
datastate.dllfd8382efb0a16225896d584da56c182cMalicious loader DLL
datast.dll1dd03936baf0fe95b7e5b54a9dd4a577Utility DLL used by datastate.dll
WinStorec10643b3fb304972c650e593b69faaa1Encrypted shellcode payload file

These files are also involved in a DLL search-order hijacking sequence:

  1. A legitimate executable loads a vulnerable DLL (datastate.dll);
  2. This DLL then loads a malicious Crowdoor DLL (datast.dll);
  3. The loader DLL uses this malicious DLL to decrypt and load the Crowdoor payload.

This method is hard to detect since the malicious functions are split across two DLLs, which mostly perform seemingly benign tasks, such as reading files or decrypting RC4 data. Both DLLs have build timestamps future-dating them to 26 May 2027.

The
datastate.dll loader imports two functions from datast.dll — one called rcd (likely “run code”) to execute the shellcode and another called ldf (likely “load file”) to read content from a file that is named after a legitimate executable but without the file extension. In this case, the payload file uploaded is named WinStore, meaning the legitimate executable is WinStore.exe. The loader uses the RC4 key fYTUdr643$3u, the same key as found in the initial sample discussed in the previous section, to decrypt the payload file containing the same Crowdoor shellcode.
The Crowdoor payload from this chain stays active by creating a Windows service named WinStore, which is used as the service name, display name and description. If creation of the service fails, the payload uses the registry auto-start extensibility point (ASEP) at
HKCU\Software\Microsoft\Windows\CurrentVersion\Run with the value WinStore to persist.
When executed, it injects itself into the
colorcpl.exe process with the command-line argument “2” and tries to contact a C2 server that is hardcoded in the payload using its configuration (blog.techmersion[.]com on port 443).
We compared the collected samples with the reference sample (MD5: a213873eb55dc092ddf3adbeb242bd44) and revealed a degree of code similarity in them. For example, the core functions responsible for loading the next stage are almost identical. Based on this, we believe with medium confidence that the newly found samples are related to Tropic Trooper, the same actor behind the Middle East intrusion.

The actor has likely been using this search-order hijacking technique since at least June 2022, which marks the first known instance of a malicious DLL being loaded through a vulnerable executable using this method, according to our telemetry. Tropic Trooper employs this technique to split the malicious code across several stages. In the first stage, only the extraction of the next stage, which was encrypted with the same RC4 key, occurs. Subsequently, the actual loader for the final implant is deployed.

New samples


We investigated the second attempt made by the threat actor after failing to load the previously covered loader. The actor uploaded new samples detailed in the table below:

MD5 HashFile name File pathFile creation dateCompilation timestamps
e845563ba35e8d227152165b0c3e769f (variant 1)VERSION.dllc:\Windows\branding\data2024.04.28Tue Jun 10 10:39:52 2025 (UTC)
0b9ae998423a207f021f8e61b93bc849 (variant 2)VERSION.dllc:\Windows\branding\data2024.05.15Thu Oct 24 10:23:24 2024 (UTC)
475aa86ae60c640eec4fdea93b5ed04d (legitimate executable)inst.exec:\Windows\branding\data2024.04.28NA

As usual, the same DLL search-order hijacking was used. Note that
inst.exe, which is a legitimate executable, imports three functions from VERSION.dll:

  • VerQueryValueW;
  • GetFileVersionInfoW;
  • GetFileVersionInfoSizeW.

Each variant of the dropped
VERSION.dll implements the three exported functions, with minimal differences between both samples. Upon analyzing the three malicious exports from the samples, it is very likely that the attackers built them incrementally. The first sample (MD5: e845563ba35e8d227152165b0c3e769f) was dropped on April 28, immediately after the failed attempt to execute the old loader. This variant had fewer capabilities than the one dropped on May 15, which had a complete implementation for all the malicious capabilities needed to load the same shellcode that would load Crowdoor into memory.
Both variants have compilation timestamps set in the future. Looking at the
GetFileVersionInfoSizeW implementation between the two samples, we see that the most recently dropped sample has the full implementation, while the earlier sample has an empty implementation, implying gradual testing and development of this loader.
The main loading functionality was designed to execute a legitimate
msiexec.exe process, then inject the next stage by writing into its remote address space and creating a remote thread to execute it.

The victim


We sighted this targeted intrusion in a government entity in the Middle East. At the same time, we saw a subset of these samples being used to target a government entity in Malaysia. This matches the type of targets and their location as described in recent Tropic Trooper reports.

Attribution


Based on the samples found, we are reassessing the relationship between Tropic Trooper and the FamousSparrow group, reported by ESET in 2021. Some industry reports link the two groups together.

The following reasons led us to attribute the campaign described in this report and all the observed implants to Tropic Trooper and its associated group, FamousSparrow:

  • Hardcoded RC4 key: the attackers tried to launch a loader previously attributed to Tropic Trooper (MD5: a213873eb55dc092ddf3adbeb242bd44), after they failed to load it from the a.bat file. They relied on a new method maintaining the same approach by using DLL search-order hijacking and used a new loader. Both samples share the same RC4 key.
  • Post-exploitation tools: some of the post-exploitation tools the attackers used were seen before in other attacks within the same timeframe of this campaign, in which the victims aligned with the targeted regions and industry verticals targeted by this threat group.
  • The code similarity between the Middle East intrusion sample and the sample found in the third-party malware repository from February 2024 (MD5: c10643b3fb304972c650e593b69faaa1): both were loading Crowdoor into memory. Also, the command-line argument “2” found in a variant related to Tropic Trooper samples is very similar to SparrowDoor “-k” switch functionality.


Conclusion


The event that made us investigate Tropic Trooper was the recurring detection of the China Chopper web shell. Following our investigation into this incident, we found more samples written by Tropic Trooper as well as third-party tools used in the post-exploitation phase. This improved insights into this threat actor’s TTPs. Notable is the discrepancy in skill set used in various stages of the attack, as well as the choices made after failure. When the actor became aware that their backdoors were detected, they tried to upload newer samples to evade detection, thereby increasing the risk of their new set of samples being detected in the near future. In the same light, the loader sequence goes to great lengths to avoid detection. However, the usage of publicly available tools such as Fscan for further exploitation of the victim’s network again highlights the discrepancy between some relatively advanced parts of their operation and the “noisier” parts.

Investigating the motives of this threat actor led us to conclude that the significance of this intrusion lies in the sighting of a Chinese-speaking actor targeting a content management platform that published studies on human rights in the Middle East, specifically focusing on the situation around Israel-Hamas conflict. Our analysis of this intrusion revealed that this entire system was the sole target during the attack, indicating a deliberate focus on this specific content.

A more detailed analysis of this campaign is available to users of our private Threat Intelligence Portal, with another upcoming report on this activity. To learn more about this report, please contact intelreports@kaspersky.com.

Indicators of Compromise


Umbraco Webshells
3F15C4431AD4573344AD56E8384EBD62
78B47DDA664545542ED3ABE17400C354
3B7721715B2842CDFF0AB72BD605A0CE
868B8A5012E0EB9A48D2DAF7CB7A5D87

Post-Exploitation Tools
149A9E24DBE347C4AF2DE8D135AA4B76
103E4C2E4EE558D130C8B59BFD66B4FB
E0D9215F64805E0BFF03F4DC796FE52E
27C558BD42744CDDC9EDB3FA597D0510
4F950683F333F5ED779D70EB38CDADCF

File Paths:
c:\sql\tools\attunitycdcoracle\x64\1033
c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\root\fc88e889\b64f0276
c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\root\5b841946\ca5a9bf5

Tropic Trooper Loaders
FD8382EFB0A16225896D584DA56C182C
1DD03936BAF0FE95B7E5B54A9DD4A577
8A900F742D0E3CD3898F37DBC3D6E054
A213873EB55DC092DDF3ADBEB242BD44
DD7593E9BA80502505C958B9BBBF2838
2C7EBD103514018BAD223F25026D4DB3
0B9AE998423A207F021F8E61B93BC849
E845563BA35E8D227152165B0C3E769F
A213873EB55DC092DDF3ADBEB242BD44

Domains and IPs
51.195.37[.]155
162.19.135[.]182
techmersion[.]com

Yara Rules

rule tropictrooper_umbraco_compiled_webshells {
meta:
description = "Rule to detect Tropic Trooper Umbraco webshells .NET sample"
author = "Kaspersky"
copyright = "Kaspersky"
distribution = "DISTRIBUTION IS FORBIDDEN. DO NOT UPLOAD TO ANY MULTISCANNER OR SHARE ON ANY THREAT INTEL PLATFORM"
sample = "3f15c4431ad4573344ad56e8384ebd62"

strings:
$s1 = { 72 ?? ?? ?? ?? 28 ?? ?? ?? ?? 6F ?? ?? ?? ?? A2 25 1F 0A 72 ?? ?? ?? ?? A2 25 1F 0B 72 ?? ?? ?? ?? A2 25 1F 0C 72 ?? ?? ?? ?? A2 25 1F 0D 72 ?? ?? ?? ?? A2 25 1F 0E 72 ?? ?? ?? ?? A2 25 1F 0F 72 ?? ?? ?? ?? A2 25 1F 10 72 ?? ?? ?? ?? A2 25 1F 11 72 ?? ?? ?? ?? A2 25 1F 12 72 ?? ?? ?? ?? A2 25 1F 13 72 ?? ?? ?? ?? A2 25 1F 14 72 ?? ?? ?? ?? A2 25 1F 15 72 ?? ?? ?? ?? A2 25 1F 16 72 ?? ?? ?? ?? A2 25 1F 17 72 ?? ?? ?? ?? A2 25 1F 18 72 ?? ?? ?? ?? A2 }

condition:
$s1 and
filesize < 1MB
}


securelist.com/new-tropic-troo…



Tactile Communication Board Speaks the Truth


A client uses an Augmented Alternative Communication board that speaks.

Sometimes, simple things can make a world of difference. Take for example a non-verbal person who can’t necessarily control a touch screen in order to tell someone else what they need or want or think.

The switches of the AAC board, plus the smaller version.This is where Augmentative and Alternative Communication (AAC) devices come in. Recently tasked with building such a device, [Thornhill!] came up with a great design that houses 160 different phrases in a fairly small package and runs on CircuitPython.

Basically, the client presses the appropriate snap-dome button button and the corresponding phrase is spoken through the speaker. The 10×16 grid of buttons is covered with a membrane that both feels nice and gives a bit of protection from spills.

The buttons can achieve high actuation forces and have a crisp tactile response, which means they’re probably gonna go a long way to keep the user from getting frustrated.

This handy AAC board is built on the Adafruit RP2040 Prop-Maker Feather and two keypad matrices. If this weren’t useful enough as it is, [Thornhill!] also built an even smaller version with 16 buttons for the client to wear around their neck.

Did you know? AAC boards aren’t just for humans.


hackaday.com/2024/09/05/tactil…



Non vedo l'ora di liberarci da questi esseri immondi.

Mentre Bloomberg ci comunica che la Russia sbanca con le entrate derivanti dalla vendita di gas e petrolio e piazza un +21% rispetto all'anno scorso, l'Unione Europea commissiona al discepolo Mario Draghi un "rapporto sulla competitività".

Lui si presenta con un piano di guerra che sembra scritto al Pentagono: intanto dice che bisogna semplificare la vita all’industria delle armi, poi chiede che vengano rimossi i divieti per le aziende per spalancare le porte dei finanziamenti UE compresi quelli della banca centrale europea e infine mette nero su bianco che le politiche green tutto sommato vanno bene, però per le armi bisogna chiudere non solo un occhio, bensì tutti e due.

Stiamo parlando di quel personaggio che è stato l'ideatore delle sanzioni che hanno affossato l'Europa e fatto il solletico alla Russia. Nonostante tutto ce lo ritroviamo di nuovo che gironzola per le stanze di Bruxelles ovviamente senza aver mai preso mezzo voto per presentare piani di sviluppo economici. O forse istanze di fallimento dell'UE visto che tutto ciò che tocca alla fine diventa un dramma per i cittadini.

Uno come lui, e non mi stancherò mai di dirlo, dovrebbe essere preso a pesci in faccia e accusato di alto tradimento. Altro che piani e cazzate varie! A proposito, ve lo ricordate il famoso Price Cap? Ci hanno rotto le balle per oltre un anno con questa super idea del discepolo. Adesso che la Russia, grazie a una grande economista, tale Elvira Nabiullina che vale mille mila Draghi è riuscita a vanificare sanzioni e Price Cap, miracolosamente non se ne parla più.

Però in compenso abbiamo abbiamo l'argomento del mese che ha trasformato il dibattito pubblico in un programma di Barbara D'Urso.

T.me/GiuseppeSalamone



Shadow banking, la gigantesca ombra (alla luce del sole) sulla finanza globale


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
L’intermediazione finanziaria non-bancaria approfitta della mancanza di regole per gestire quasi 200mila miliardi di dollari
L'articolo Shadow banking, la gigantesca ombra (alla luce del sole) sulla finanza globale valori.it/shadow-banking-ombra…



Io, comunque, quando anni fa fantasticavo di come sarebbe stato il governo della prima donna premier, fantasticando di svolte culturali, nuovo corso ecc.
Ecco, mai mi sarei immaginata che sarebbe invece stata l'apoteosi del berlusconismo e di quanto di peggio la politica italiana abbia saputo esprimere dalla fine della prima repubblica a oggi.
Dicono che prima di risalire sia necessario toccare il fondo, ma il fondo sembra allontanarsi costantemente.
Mi dispiace tantissimo per i residenti in Italia, almeno per quelli che vedono e capiscono cosa stia succedendo. Per quelli che contribuiscono al problema mi risulta difficile provare empatia.
#Italia #Meloni

16180339887 reshared this.



The Harris campaign is creating “overstimulation,” “ADHD,” or “content sludge” videos designed to appeal to a very online audience with a short attention span.#News
#News


@RaccoonForFriendica nuova versione 0.1.0-alpha19 appena rilasciata! Nuove funzioni: supporto sperimentale ai messaggi diretti, uno degli aspetti più interessanti e forse meno conosciuti di questa piattaforma. Come sempre, se qualcuno ha voglia di provare e di darmi feedback, tenendo conto che è pur sempre un'alpha, contattatemi su Matrix, oppure mandate direttamente un DM su Friendica ora che si può 🚀😉🦝 #friendica #friendicadev #androidapp #androiddev #fediverseapp #opensource #kotlin #kmp #compose #livefasteattrash
in reply to 𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻‍💻🍕

Meglio utilizzare la 0.1.0-alpha20 in cui ho apportato alcune correzioni, specialmente per evitare di inviare erroneamente dei messaggi destinati a un account che non si segue.

Il prossimo obiettivo, per chi se lo stesse chiedendo, è la gestione della media gallery (creazione, modifica e cancellazione di foto e album) con possibilità di inserire nei post come allegato un'immagine già presente nella gallery. Vediamo nel weekend quanto tempo riesco a trovare 😉

reshared this



Putin: "Relazioni Russia-Cina mai così forti". Xi Jinping atteso al vertice BRICS - IN PRIMO PIANO - L'Antidiplomatico
lantidiplomatico.it/dettnews-p…


La posizione dell’Unione Europea e del gruppo di paesi asserviti all’imperialismo yankee era prevedibile. In 25 anni di lotta, abbiamo dimostrato che esiste un altro modo di fare politica, basato sul consenso, e sulla ricerca di una maggiore equità e giustizia sociale. Per questi governi colonialisti, ciò sarà sempre una spina nel fianco, un ostacolo agli interessi di dominio globale. Le loro posizioni fanno parte della stessa agenda diretta da Washington contro la rivoluzione bolivariana.
lantidiplomatico.it/dettnews-v…


Continuiamo a svendere l'industria italiana 🤦🏼‍♂️🤦🏼‍♂️🤦🏼‍♂️
Ex Ilva ufficialmente in vendita: pubblicato il bando • Imola Oggi
imolaoggi.it/2024/09/04/ex-ilv…


🔁 Oggi pixelfed.uno supera i 1000 utenti attivi nell'ultimo mese ed è ora la terza istanza più attiva del fediverso italiano, dopo Mastod...

Oggi pixelfed.uno supera i 1000 utenti attivi nell'ultimo mese ed è ora la terza istanza più attiva del fediverso italiano, dopo Mastodon.uno e livello segreto, non male per un'istanza nata
https://feddit.



Dovremmo porci la domanda del perché aumentano gli infortuni...
Aumentano i morti sul lavoro, 577 in 7 mesi: +3,2% • Imola Oggi
imolaoggi.it/2024/09/03/aument…


Verso un'Europa Nero-Bruna?


Dopo una primavera ed un'estate di elezioni, ed in vista di un autunno che si preannuncia altrettanto gravido di scelte politiche, alcune costanti stanno emergendo all'interno del Vecchio Continente e forse anche altrove. cronachedicambiamento.blogspot.com/2024/09/verso-uneuropa-nero-bruna.html


Il primo anno di Chat Control: notizie dal futuro - Buon "divertimento" con il post distopico di Jeremiah Lee sul primo anno di #Chatcontrol

Questo esercizio di previsione riflette sulle conseguenze dell'approvazione da parte dell'Unione Europea di una proposta volta a scansionare tutte le foto e i video inviati dalle persone per individuare possibili abusi sui minori.

L'articolo di @Jeremiah Lee è pura finzione, ma la proposta è reale.

Le citazioni si basano su affermazioni reali fatte dalle persone cui sono attribuite, ma presentate fuori dai loro contesti originali. I loro contesti originali sono citati.

@Privacy Pride


What happens if the proposed EU chat control regulation passes?

This series of news reports and press releases imagines the first year of cascading consequences.

It illustrates how the well-intentioned-but-flawed proposal will make detecting child abuse imagery more difficult while harming innocent people, national security, and the EU’s digital sovereignty.

Please share. The EU resumes discussions of the proposal today.

(~12 minute read time)

jeremiahlee.com/posts/after-ch…

#ChatControl #longRead




On the podcast this week: generative AI Doom, drama in NaNoWriMo, and Apple's face swap problem.

On the podcast this week: generative AI Doom, drama in NaNoWriMo, and Applex27;s face swap problem.#Podcast




🎥 Oggi dalle ore 15 in occasione della #BiennaleCinema2024, si terrà la cerimonia di premiazione del #concorso scolastico nazionale promosso dal #MIM “Da uno sguardo – film di studentesse e studenti sulla violenza maschile contro le donne”.


"Marty, presto, dobbiamo tornare indietro nell'anno in cui é stato inventato Facebook e impedire così a orde di boomer di iscriversi e smarronare su quanto stavano bene negli anni 70 , presto! "
#ritornoalfuturo

Franc Mac reshared this.



CULTURA. La diaspora palestinese e la parola parlata della poetessa Rafeef Ziadah (Parte 3)


@Notizie dall'Italia e dal mondo
Terza parte dell'articolo sull'artista, attivista per i diritti umani, femminista e accademica che vive a Londra. Rafeef Ziadah ha scritto poesie che si potrebbero definire profetiche.
L'articolo CULTURA. La diaspora



Diamo il benvenuto a Kagi, il motore di ricerca a pagamento e pieno di sorprese, che oggi è entrato nel Fediverso!

@Le Alternative

@Kagi HQ è l'interessantissimo progetto per un motore di ricerca a pagamento, senza traccianti e con un'accuratezza nell'individuazione dei risultati tale da escludere tutto lo spam di Google.

Chi crede che i costi di #Kagi siano troppo elevati, dovrebbe riflettere su un piccolo dettaglio: se Google lascia fare "gratis" tutte quelle ricerche, chi paga quei costi? La risposta potrebbe sembrare semplice: "gli inserzionisti".

Eppure questa sarebbe una risposta incompleta: come dire che la pioggia è causata dalle nuvole!

In realtà quei costi li pagano gli utenti, facendosi mungere e lasciando che Google estragga il loro "valore", un po' come nella human farm di Matrix...

Abbiamo sentito parlare di Kagi per la prima volta sul sito de @Le Alternative (purtroppo da allora i prezzi sono aumentati molto, facendo sorgere molti dubbi sulla sostenibilità del progetto) e recentemente ne ha parlato anche Cory Doctorow su @Cory Doctorow AFK TIL MID-SEPT.

In ogni caso siamo davvero contenti che un servizio come quello di Kagi, efficace e rispettoso della privacy degli utenti, sia approdato qui nel #Fediverso

mastodon.social/@kagihq/113074…


Hello, Fediverse! We're Kagi, and we're on a mission to create a friendlier, more human-centric internet that has the users' best interest in mind.

Our core product is a search engine that is ad-free, tracking-free, and fully supported by our users. We've worked hard to deliver a high-quality, fast, and reliable search experience without compromising user privacy: kagi.com/

Excited to engage with the community here.

#Search #Privacy #AdFree


Anomaly ☑️ doesn't like this.

in reply to Poliverso - notizie dal Fediverso ⁂

perché non usare DuckDuckGo? Privacy senza compromessi.

In alternativa c'è anche il browser Brave

in reply to MuhammadPython

@MuhammaPy perché non a tutti piace il fatto che DuckDuckGo utilizza, principalmente, i risultati di Bing. Ultimamente sto usando la ricerca di Brave (che pare essere indipendente) e in italiano è migliorata moltissimo.
in reply to MuhammadPython

@MuhammadPython perché onestamente con duckduck go non si riesce a trovare mai una mazza... 😅

Ci sono diversi servizi che integrano motori di ricerca esistenti e in alcuni casi aggiungono un proprio sistema, ma un aspetto importante di Kagi è che le ricerche mostrano davvero quello che hai chiesto. Sembra banale, ma oggi non lo è più tanto perché quando fai una ricerca su un qualsiasi motore di ricerca o carichi una vagonata di letame da cui spulciare quello che ti serve, oppure trovi pochi risultati rilevanti.


@Le Alternative



Gli obiettivi climatici europei? «Inadeguati». E le ong sfidano la Commissione in tribunale


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
In caso di successo, la causa potrebbe obbligare l’Unione a rivedere i suoi obiettivi climatici al 2030: dal 55 al 65% di emissioni in meno
L'articolo Gli obiettivi climatici europei? «Inadeguati». E le ong sfidano la Commissione in tribunale proviene da Valori.



Onda nera sulla Germania in crisi


@Notizie dall'Italia e dal mondo
Alternativa per la Germania vince le elezioni in due importanti Land orientali e minaccia la stabilità politica del paese dove la crisi economica continua a mordere
L'articolo Onda nera sulla Germania in crisi proviene da Pagine Esteri.

pagineesteri.it/2024/09/04/mon…



Calciomercato: Londra da sola ha speso il triplo dell’Arabia Saudita


@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori@poliversity.it
I numeri del calciomercato ci dicono che la bolla è gonfiata dai fondi della City londinese, non certo dai campionati arabi
L'articolo Calciomercato: Londra da sola ha speso il triplo dell’Arabia Saudita proviene da Valori.

valori.it/calciomercato-londra…



il nuovo codice per air bnb e simili, ma


"1.5 Le case religiose di ospitalità no-profit sono soggette all’obbligo di CIN?
No, qualora l’attività di ospitalità sia svolta a titolo meramente gratuito. Le libere donazioni corrisposte dagli ospiti non fanno venir meno la gratuità della prestazione offerta. "
ministeroturismo.gov.it/faq-ba…
E vabbè
Unknown parent

friendica (DFRN) - Collegamento all'originale
Andrea R.
@marcoboh 🏳️‍🌈
Non c'è male.
San Zuzzurro delle tasche, non mi far pagar le tasse.
San Pirillo delle olive amare, l'imu non farmi pagare.


If you got an email containing your address and a PDF with a photo of your street, don't freak out: it's a fake sextortion scheme.

If you got an email containing your address and a PDF with a photo of your street, donx27;t freak out: itx27;s a fake sextortion scheme.#News

#News #x27


question, When were programmers supposed to be obsolete?


!Programmer Humor
Hi, this is a question that popped into my mind when i saw an article about some AWS engineer talking about ai assistants taking over the job of programmers, this reminded me that it's not the first time that something like this was said.

My software engineering teacher once told me that a few years ago people believed graphical tools like enterprise architect would make it so that a single engineer could just draw a pretty UML diagram and generate 90% of the project without touching any code,
And further back COBOL was supposed to replace programmers by letting accountants write their own programs.

Now i'm curious, were there many other technologies that were supposedly going to replace programmers that you remember?

i hope someone that's been around much more than me knows something more or has some funny stories to share

in reply to Giovanni Petri

Oracle has a product called Oracle Policy Automation (OPA) that it sells as "you can write the rules in plain English in MS Word documents, you don't need developers". I worked for an insurance organization where the business side bought OPA without consulting IT, hoping they wouldn't have to deal with developers. It totally failed because it doesn't matter that they get to write "plain English" in Word documents. They still lack the structured, formal thinking to deal with anything except the happiest of happy paths.

The important difference between a developer and a non-developer isn't the ability to understand the syntax of a programming language. It's the willingness and ability to formalize and crystallize requirements and think about all the edge cases. As an architect/programmer when I talk to the business side, they get bored and lose interest from all my questions about what they actually want.

Questa voce è stata modificata (1 anno fa)
in reply to Giovanni Petri

  • can AI replace the job of a real programmer, or a team of software engineers? Probably not for a long time.
  • can manager abuse the fantasy that they could get rid of those pesky engineers that dare telling them something is impossible? Yes totally. If they believe adding an AI tool to a team justifies a 200% increase in productivity. Some managers will fire people against all metrics and evidence. Calling that move a success. Same occurred when they try to outsource code to cheaper teams.


Droni navali e sistemi autonomi. Ecco l’accordo della cantieristica francese

[quote]Quella dell’importanza crescente dei veicoli a pilotaggio remoto (i cosiddetti droni) nelle operazioni di combattimento è una delle principali lezioni apprese dal conflitto russo-ucraino, non solo nelle loro configurazioni aeree, ma anche in versioni terrestri e soprattutto navali. È infatti in



I sottomarini a propulsione nucleare di India e Australia preoccupano Pechino

[quote]Quegli americani che argomentano un vantaggio strutturale degli Usa sulla Cina (chiamati nell’ambiente accademico primacists o denialists) si concentrano spesso sulle frontiere dei due Paesi: mentre gli Usa confinano con due Paesi amici e due oceani, Pechino è al centro di una regione



Pfizer, Microsoft, Palantir, Home Depot, and Lockheed Martin were all shown as "clients" of LobbyMatic. All of them say they haven't worked with the company.

Pfizer, Microsoft, Palantir, Home Depot, and Lockheed Martin were all shown as "clients" of LobbyMatic. All of them say they havenx27;t worked with the company.#LobbyMatic #JacobWohl #AIImages #AI #AILobbying



PODCAST. Emergency a Gaza. Stefano Sozza: “Qui la peggiore delle crisi”


@Notizie dall'Italia e dal mondo
Dopo mesi in attesa del permesso umanitario, l'ong italiana è entrata a Gaza per offrire assistenza sanitaria di base alla popolazione martoriata dalla guerra. Abbiamo intervistato il capomissione Stefano Sozza
L'articolo PODCAST. Emergency a Gaza. Stefano Sozza: