Salta al contenuto principale

Gray Matter on a Chip: Building an Artificial Brain with Luminol


Brain on a chip setup with a hand and a dropper

Ever wondered if you could build a robot controlled by chemical reactions? [Marb] explores this wild concept in his video, merging chemistry and robotics in a way that feels straight out of sci-fi. From glowing luminol reactions to creating artificial logic gates, [Marb]—a self-proclaimed tinkerer—takes us step-by-step through crafting the building blocks for what might be the simplest form of a chemical brain.

In this video, the possibilities of an artificial chemical brain take centre stage. It starts with chemical reactions, including a fascinating luminol-based clock reaction that acts as a timer. Then, a bionic robot hand makes its debut, complete with a customised interface bridging the chemical and robotic worlds. The highlight? Watching that robotic hand respond to chemical reactions!

The project relies on a “lab-on-a-chip” approach, where microfluidics streamline the processes. Luminol isn’t just for forensic TV shows anymore—it’s the star of this experiment, with resources like this detailed explanation breaking down the chemistry. For further reading, New Scientist has you covered.

We’ve had interesting articles on mapping the human brain before, one on how exactly brains might work, or even the design of a tiny robot brain. Food for thought, or in other words: stirring the gray matter.

youtube.com/embed/6JVp0HF4ycE?…


hackaday.com/2024/12/05/gray-m…


How Corroded Can a Motherboard Be?


27279915

We will admit it. If we found a 386 motherboard as badly corroded as the one [Bits und Bolts] did, we would trash it—not him, though. In fact, we were surprised when he showed it and said he had already removed most of it in vinegar. You can check the board out in the video below.

There was still a lot of work to do on both the front and back of the board. The motherboard was a Biostar and while it isn’t as dense as a modern board, it still had plenty of surface mount parts jammed in.

One challenge was that fixing corroded vias could break connections with traces on inner layers of the multi-layer PCB. It was important to try to find out where things were going in case it was going to need some wiring repair after some of the other repairs.

Even after cleaning and resoldering, there were some bad components — notably some tantalum capacitors. With those replaced, the board came up as you’d expect. It is worth listening to the maniacal laughter of satisfaction at about the 53-minute mark when the board booted up. We get it.

The 386 is simple enough that you could do your own motherboard. Otherwise, you might expect to have to provide some TLC.

youtube.com/embed/7MCt2X6TrlU?…


hackaday.com/2024/12/05/how-co…


Keebin’ with Kristina: the One with the Folding Keyboard Mod


Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Let’s face it, failed Kickstarters are no good. But they can spark good things, like real versions of technologies that might have actually been faked for the platform. A touchscreen mouse, for instance, with shortcuts that can be programmed for various applications.

A DIY mouse with a large touch screen.Image by [Sam Baker] via Hackaday.IOThis story is one of scope creep, as [Sam Baker] says in the project details. At first, he thought he could just basically duct tape a touchscreen with shortcuts to an existing mouse. A couple of mouse teardowns later, [Sam] arrived at the conclusion that things would not be so simple.

After some digging around, [Sam] found a repository where someone created a way to communicate with the ADNS-5050 optical sensor, so [Sam] started by creating a breakout board for this sensor. By combining that with an ESP32 dev board and a touchscreen, [Sam] had his shortcut mouse.

Does it work? Yes. Is it useful? Well, yes. And also no. The beauty part of using a regular mouse is that you don’t have to look down at it to know where the buttons are. In the future, [Sam] would like to implement some kind of buttons for tactility. In the meantime, haptic feedback could be nice.

Converting (Another!) Folding Keyboard Into Bluetooth


There is a ton of neat old technology out there, and not all of it has to end up as e-waste. You might remember this post about a cool old folding keyboard converted to Bluetooth for use with phones and tablets.

A G750 folding keyboard converted to Bluetooth.Image by [Xinming Chen] via GitHub[Xinming Chen] wrote in to alert me that not only are there other folding keyboards that were made for PDA devices back when, namely the G750; he has converted these to Bluetooth as well.

There were a bunch of different models sold under various names, but [Xinming] says as long as the keyboard looks the same, it should work with his adapter. The biggest difference is that the G750 itself uses inverted TTL for the RX line, while other models do not.

The really amazing part of this is the actual build itself, which fits in the smaller-than-a-Shuffle footprint of the original PDA connector. Naturally, [Xinming] had to roll his own PCB, which is based on the CH582F microcontroller. But another awesome bit is the micro-switch, which turns on the Bluetooth module when the keyboard is unfolded, and off when it is pushed back together. The whole deal is a really slick maneuver that you should check out in the demo video below.

Whether you build or buy one of these adapters, you don’t have to limit yourself to one device: the CH582F can support up to four hosts as well as the USB connection, so feel free to use it like a KVM switch. Awesome!

youtube.com/embed/a8__Df5YKs4?…

The Centerfold: Peep This Beautiful Beast!

A 6x6 Dactyl Manuform keyboard with four columns of keys on a pad in between the halves.Image via Bili Bili
So I was trawling reddit and came across someone asking for the 3D models for these hand rests. I was of course myself more interested in the keyboard, which is a 6×6 dactyl manuform (translated) with an extended num pad in between. That’s quite a few keys, innit? 38 keys per half plus the center beast at 30; I assume the black things are knobs. On a personal note, as much as I like the dactyl and even tried to build one, the dactyl manuform’s thumb cluster just looks uncomfortable to my small hands.

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Lasar


Just like any burgeoning, lucrative industry, many entered the typewriter game, but few actually won. Among history’s many forgotten typewriters and the men who made them is the Lasar, made between 1890-1892 by the Godfrey Henry Lasar of St. Louis, MO.
The Lasar typewriter, which only typed in uppercase.Image via the Antikey Chop
Lasar held an impressive number of patents for various typewriter elements, including one for a “telegraph transmitter”. For the Lasar itself, he received a whopping 17 patents in a single day — November 19, 1889.

For all of Lasar’s innovation, his company did almost no marketing, which may have attributed to its downfall. Fortunately, several ads were published by the St. Louis Typewriter exchange. Unfortunately, most of them ran after the company went out of business.

The Lasar sold for $75, which comes out to over $2500 in 2024 money. This is about smack dab in the middle of the average cost for a typewriter at the time, however.

One of the reasons it may have failed is because it only typed uppercase, but every other guy’s machine did lowercase, too. One of Lasar’s Lasar patents is for a shift mechanism, but he didn’t implement it. It is thought that the Lasar was always meant to be a telegraph typewriter, and was even advertised as “the Best Machine for Telegraph Work”. The world may never know.

ICYMI: the Case For the Vecdec Cyberdeck


27263306Image by [svenscore] via GitHubAs awesome as cyberdecks are to behold, many of them just aren’t that useful. It’s a shame, really. But [svenscore]’s Versatile Ergonomic Computing device, or vecdec, is different.

Hackaday’s own [Tom Nardi] spotted this bad boy at JawnCon 0x1, where it was being used in place of a laptop. This build was born when [svenscore] caught the split keyboard bug and couldn’t reconcile going back to a rectangle on the go. Totally understandable!

Despite its sleek form factor, this Raspberry Pi 4-powered cyberdeck has a few surprises. One is the built-in LoRa radio for doing Meshtastic wherever. The other is a pair of gesture sensors that let you fly through documents with a wave of your hand like you’re in Minority Report (2002) or something. If you ask me, this interface should be standard on every cyberdeck going forward.


Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.


hackaday.com/2024/12/05/keebin…


DroidBot Sbarca in Italia! Il Malware Android che Ruba le Credenziali a 77 App Bancarie


Il nuovo malware bancario Android DroidBot mira a rubare credenziali da 77 app bancarie e di criptovaluta (tra cui Binance, KuCoin, BBVA, Unicredit, Santander, Metamask, BNP Paribas, Credit Agricole, Kraken e Garanti BBVA).

Alla scoperta del MaaS DroidBot


La società che ha scoperto DroidBot, Cleafy, riferisce che è attivo da giugno 2024 e opera secondo lo schema malware-as-a-service (MaaS). L’abbonamento a DroidBot costa 3.000 dollari al mese e molte cyber gang utilizzano questo servizio per scopi specifici.

Secondo Cleafy, il malware attacca principalmente utenti nel Regno Unito, Italia, Francia, Spagna e Portogallo. Sebbene DroidBot non abbia funzionalità nuove o sofisticate, l’analisi di una sola delle botnet costruite su di esso ha rivelato 776 casi unici di infezione nel Regno Unito, Italia, Francia, Turchia e Germania. Allo stesso tempo, i ricercatori avvertono che il malware è attualmente in fase di sviluppo e che i suoi attacchi si stanno espandendo in nuove regioni, compresi i paesi dell’America Latina.
27246407

Un Malware altamente personalizzabile


Gli analisti ritengono che i creatori di DroidBot si trovino in Turchia e forniscano ai propri clienti gli strumenti già pronti necessari per sferrare attacchi. Questo “pacchetto di servizi” includono:

  • Intercettazione degli SMS : il malware monitora i messaggi SMS in arrivo, spesso utilizzati dagli istituti finanziari per inviare numeri di autenticazione delle transazioni (TAN), consentendo agli aggressori di aggirare i meccanismi di autenticazione a due fattori.
  • Key-Logging : sfruttando i servizi di accessibilità, DroidBot cattura le informazioni sensibili visualizzate sullo schermo o immesse dall’utente, come credenziali di accesso, dati personali o saldi dei conti.
  • Attacco overlay : questo approccio consiste nel visualizzare una falsa pagina di accesso sopra l’applicazione bancaria legittima una volta che la vittima la apre, per intercettare credenziali valide.
  • Routine di tipo VNC: DroidBot acquisisce periodicamente screenshot del dispositivo della vittima, fornendo agli autori della minaccia dati visivi continui che offrono una panoramica in tempo reale dell’attività del dispositivo.
  • Interazione con lo schermo : sfruttando il pieno potenziale dei servizi di accessibilità, DroidBot consente il controllo remoto del dispositivo infetto. Ciò include l’esecuzione di comandi per simulare le interazioni dell’utente, come toccare pulsanti, compilare moduli e navigare tra le applicazioni, consentendo di fatto agli aggressori di utilizzare il dispositivo come se fossero fisicamente presenti.

Poiché diversi client lavorano sulla stessa infrastruttura (e a ciascun gruppo viene assegnato un ID univoco), i ricercatori sono stati in grado di identificare 17 gruppi diversi utilizzando DroidBot. Il generatore di payload consente ai clienti di personalizzare DroidBot per applicazioni specifiche, utilizzare lingue diverse e impostare i propri indirizzi del server di controllo. Gli utenti del malware hanno inoltre accesso a documentazione dettagliata, supporto tecnico e accesso al canale Telegram, dove vengono regolarmente pubblicati gli aggiornamenti.

Un Trojan che si maschera da Applicazione legittima


DroidBot spesso si maschera da applicazione come Google Chrome, Google Play Store o Android Security per indurre gli utenti a installare malware. Nonostante queste forme innocue, si comporta come un Trojan su un dispositivo infetto e cerca di rubare informazioni riservate da applicazioni specifiche.
27246409
Come molti altri malware Android, DroidBot abusa dei servizi di accessibilità per tenere traccia delle azioni dell’utente e simulare passaggi e tocchi.

Va osservato che DroidBot non è ancora penetrato nel negozio ufficiale di Google Play. Pertanto, per proteggersi da tali attacchi, i ricercatori invitano gli utenti a installare applicazioni solo da fonti attendibili e a esaminare attentamente quali autorizzazioni richiedono.

L'articolo DroidBot Sbarca in Italia! Il Malware Android che Ruba le Credenziali a 77 App Bancarie proviene da il blog della sicurezza informatica.


CONNESSI A MORTE


Connessi a morte. Guerra, media e democrazia nella società della cybersecurity

Connessi a morte: arrivato in libreria il nuovo libro di Michele Mezza con prefazione di Barbara Carfagna e postfazione di Arturo Di Corinto.

Connessi a morte. Guerra, media e democrazia nella società della cybersecurity (Donzelli, 2024) di Michele Mezza è un’opera che esplora l’impatto profondo e multiforme della tecnologia, in particolare della connettività digitale e dell’intelligenzaartificiale, sulla guerra, la politica e la società nel suo complesso. Mezza dipinge un quadro del mondo contemporaneo in cui la linea di demarcazione tra guerra e pace, tra reale e virtuale, diventa sempre più sfocata, e dove la cybersecurity si trasforma in un elemento cardine non solo per la sicurezza nazionale, ma anche per la vita quotidiana di ogni individuo.

L’autore introduce il concetto di “mobile war”, una guerra in cui la connettività mobile è l’arma principale e i confini tra combattenti e civili sono labili. L’emblema di questa nuova era è l’immagine di Yahya Sinwar, leader di Hamas, individuato e poi ucciso da un drone israeliano mentre brandiva un bastone in segno di sfida. Questa scena, diffusa globalmente, incarna la vulnerabilità di chiunque nell’era digitale, dove la localizzazione e l’eliminazione mirata sono diventate realtà.

Mezza sottolinea come la guerra si sia evoluta, non limitandosi più all’inflizione di danni fisici, ma puntando al controllo dell’informazione, alla manipolazione della percezione e all’instillazione della paura attraverso la dimostrazione di potere tecnologico.

La cybersecurity, a sua volta, si è trasformata in un elemento cruciale, non solo come strumento di difesa, ma anche come motore di un nuovo sistema di relazioni e interessi geopolitici. Il misterioso affondamento del panfilo Bayesian, con a bordo figure chiave del mondo della cybersecurity, illustra come le informazioni e le tecnologie in questo campo siano diventate asset strategici di enorme valore, in grado di influenzare gli equilibri di potere globali.

27245045


dicorinto.it/libri/connessi-a-…


Operazione Passiflora: La piattaforma Matrix smantellata e 2,3 milioni di messaggi intercettati


A seguito dell’operazione internazionale Passiflora, le forze dell’ordine hanno chiuso la piattaforma di messaggistica crittografata Matrix. Allo stesso tempo, le autorità affermano di aver sequestrato il servizio all’inizio del 2024 e di aver monitorato le comunicazioni dei criminali per tre mesi.

Va sottolineato che la piattaforma Matrix, chiusa dalle forze dell’ordine, non ha nulla a che vedere con l’omonimo protocollo decentralizzato open source per il trasferimento dati (matrix.org). L’operazione Passiflora è stata coordinata da Europol ed Eurojust e ha coinvolto le forze dell’ordine di molti paesi europei, tra cui Francia, Paesi Bassi, Italia, Lituania, Spagna e Germania.

L’indagine su Matrix è iniziata dopo che la polizia ha esaminato il telefono di un uomo che nel luglio 2021 ha attentato alla vita del giornalista investigativo olandese Pieter R. de Vries, che scriveva di malavita. Nove giorni dopo questo tentativo di omicidio, de Vries morì in ospedale. Poi si è scoperto che il dispositivo del criminale era stato modificato e si è scoperto che aveva una connessione configurata al servizio Matrix, progettato per comunicazioni crittografate.

È stato riferito che di conseguenza la squadra investigativa, che comprendeva rappresentanti delle forze dell’ordine olandesi e francesi, è stata in grado di tracciare e intercettare 2,3 milioni di messaggi in 33 lingue inviati tramite i dispositivi Matrix. Purtroppo non sono stati ancora forniti dettagli tecnici su come ciò sia stato fatto.

“Per tre mesi, le autorità sono state in grado di tracciare le comunicazioni dei probabili autori, che ora verranno utilizzate per svolgere altre indagini”, si legge in una dichiarazione ufficiale di Europol . “In un’operazione coordinata supportata da Eurojust ed Europol, il servizio di messaggistica è stato smantellato dalle autorità olandesi e francesi, seguito dalla successiva azione delle loro controparti italiane, lituane e spagnole”.

Secondo gli investigatori, più di 40 server Matrix dislocati in tutta Europa fornivano comunicazioni a 8.000 account utente. Ai clienti della piattaforma è stato offerto il proprio sistema operativo Matrix, chiamate vocali e video crittografate, applicazioni per la trasmissione di messaggi crittografati, accesso anonimo a Internet e monitoraggio delle transazioni. La piattaforma includeva anche un’app di gioco d’azzardo e aveva una propria valuta per il pagamento degli abbonamenti.

Gli utenti del servizio hanno pagato da 1350 a 1700 dollari in criptovaluta per dispositivi modificati basati su Google Pixel, nonché un abbonamento di sei mesi a Matrix, che era preinstallato su tali dispositivi. Va inoltre notato che Matrix veniva venduto con altri nomi (Mactrix, Totalsec, X-quantum e Q-safe), ma tutti questi servizi utilizzavano la stessa infrastruttura.

I rappresentanti di Europol notano che l’infrastruttura Matrix era tecnicamente più complessa delle infrastrutture delle piattaforme Sky ECC ed EncroChat precedentemente chiuse. E gli utenti potevano aderire al servizio solo su invito. Questa settimana, le forze dell’ordine hanno effettuato raid e perquisizioni simultanee in dozzine di paesi diversi, provocando la chiusura di 40 server Matrix in Francia e Germania, nonché l’arresto di cinque sospetti in Spagna e Francia. Si ritiene che uno dei detenuti, un lituano di 52 anni il cui nome non è stato reso noto, sia il proprietario e principale operatore di Matrix.

Durante le perquisizioni, le autorità hanno sequestrato 970 telefoni sicuri, 145.000 euro in contanti, 500.000 euro in criptovaluta e quattro automobili. Il sito web di Matrix ora contiene un avviso che avverte gli utenti del servizio che la loro corrispondenza è stata divulgata e che loro stessi potrebbero presto essere coinvolti in procedimenti penali.
27245048
Tuttavia, la polizia olandese avverte che tutti gli utenti Matrix che hanno scelto questo servizio per la sua riservatezza e anonimato, e non sono stati coinvolti in attività criminali, dovrebbero contattare le forze dell’ordine all’indirizzo geheimhouders@om.nl con la richiesta di essere esclusi dalle indagini.

Va notato che la liquidazione di Matrix porta avanti una serie di chiusure di altri servizi simili, i cui clienti erano principalmente gruppi criminali organizzati coinvolti nel traffico di droga e nel riciclaggio di denaro. Pertanto, negli ultimi anni, le forze dell’ordine hanno interrotto le attività di piattaforme di comunicazione crittografate come Encrochat, Sky ECC, Phantom Secure, Anom e Ghost .

Le prove ottenute dalle infrastrutture di questi servizi (attraverso il monitoraggio dei messaggi intercettati o dai server sequestrati) hanno portato infine all’arresto di migliaia di trafficanti di droga, trafficanti di armi, criminalità organizzata, assassini e individui associati al riciclaggio di denaro.

L'articolo Operazione Passiflora: La piattaforma Matrix smantellata e 2,3 milioni di messaggi intercettati proviene da il blog della sicurezza informatica.


A Brief History of Teleportation


27239550

OK, I know. We don’t have practical teleportation. But that hasn’t stopped generations of science fiction authors and movie makers from building stories around it. If you ask most ordinary people, they’d tell you the idea originated with the Star Trek transporter, but that’s far from the truth. So when did people start thinking about teleporting?

Ground Rules


Maybe it isn’t fair, but I will draw the line at magic or unexplained teleportation. So “The Tempest”, for example, doesn’t use technology but magic. To get to Barsoom, John Carter wished or slept to teleport to Mars. So, while technology might seem like magic, we’re focusing on stories where some kind of machine can send something — usually people — to somewhere else.

Of course, there’s a fine line between pure magic and pure technology where they overlap. For example, in the opera “Der Ring des Nibelungen”, a magic helmet gives people powers, including that of teleportation. While you could argue that Tarnhelm — the name of the magic helmet — was a technological artifact, it is still explained by magic, not science.

Some systems need a transmitter and a receiver. Sometimes, you only need the transmitter. Sometimes, you can only teleport within a limited range, but other make-believe systems can transport an entire starship across the galaxy.

Early Teleporters


The Man without a Body is a story from 1877 in which a scientist is able to transmit a cat via a telegraph wire. Encouraged, he attempts the same feat with himself, but the battery dies in the middle, leaving him with a disembodied head. The ending is decidedly devoid of science, but the story is possibly the earliest one with a machine sending matter across a distance.

Then there was “To Venus in Five Seconds.” A woman lures the hero into a room with a machine, and presumably, in five seconds, the room opens up to Venus. Sure, today, we know that Venus would kill you, but in 1897, it made for a grand adventure.

A Bit More Modern


Arthur C. Clarke’s “Travel by Wire” appeared in 1937. In fact, this was his first published story that he later didn’t think was very good. The machine was a “radio-transporter” that perhaps foreshadowed the Star Trek transporter. I’ve heard that Clarke and Roddenberry were friends, so maybe this was the inspiration for Star Trek.

The 1939 serial “Buck Rogers” showed a teleportation device (check out the 13 minute mark in the video below). Who needs elevators?

youtube.com/embed/kD7F0aHCALE?…

Speaking of Buck Rogers, the 1953 parody “Duck Dodgers in the 24½th Century” had evaporators, which were essentially teleportation booths.

youtube.com/embed/8E9PhCbW_jQ?…

Van Vogt’s “The World of Null-A ” featured teleportation in 1945, although the story takes place in the year 2580. Asimov’s “It’s Such a Beautiful Day” from 1945 used “Doors” to move people around in the year 2117. In the end, some people rediscover the joy of a walk outdoors.

The 1950 serial “Atom Man vs. Superman” used a teleportation machine. Of course, Superman didn’t have it. Lex Luthor used it to make people disappear and reassembled them in a different place (see around the 5 minute mark).

youtube.com/embed/HirHXppgaw8?…

In the second half of the 20th century, teleporters were commonplace in speculative fiction. Alfred Bester wrote about them in the 1956 novel “The Stars My Destination”. Heinlein’s “Tunnel in the Sky” was out a year earlier and stranded some students led by Rod Walker via teleportation.

Of course, many stories depend on teleporters not working very well. “The Fly” (which later became several movies) involved a scientist attempting to perfect teleportation getting mixed up with a housefly. He originally tries to teleport a cat, which I presume was a nod to “The Man Without a Body.”

youtube.com/embed/dLI4RYEiAEs?…

Then Came…


Of course, Star Trek made the transporter a household name. Gene Roddenberry and his crew didn’t develop the concept out of some future vision. They just couldn’t figure out a cheaper way to show Captain Kirk and friends arriving on a different planet every week.

One thing that was very impressive about the Enterprise transporter is that it didn’t need a receiver. You just “beamed” people to their destination. Of course, each version of Star Trek had their own unique look and sound — sometimes more than one, as you can see in the video below.

youtube.com/embed/IleqZPFBdSA?…

The Physics


Of course, we don’t know how to do any sort of teleportation, but you can think about some of the limitations. Most of these devices imply that they take you (or whatever you are beaming) apart and send your actual physical substance to reconstitute at the other side. There are a few imagined systems (like the one on Dark Matter from 2015) that make a copy of you and destroy it, but that’s another problem (see The Philosophy below).

Scanning an entire body at an atomic resolution would be pretty hard. Tearing all those atoms apart, maybe even to subatomic particles, would take a lot of energy. Putting them back correctly would take even more. I’ve read estimates that the amount of data involved in such a scan would be about 1031 bytes of data, although that is, of course, an estimate.

Then there are the practical issues. You can’t just get the passenger unless you want them to appear at the destination naked, so you better scan a little further out. What happens to the vacuum left when they disappear? Do you get a thunderclap of air rushing in? Do you exchange it with the air at the destination?

Speaking of the destination, you have to conserve energy over this process. So, if you beam from a location moving faster compared to the target, where does the energy go? When you come back, where does the extra energy come from?

That’s not to say there’s no way to do these things, just it is harder than it looks at first glance. But plenty of things we do routinely today would seem impossible in 1900. Put a phone in everyone’s pocket? Bah! That would never happen. Except it did.

The Philosophy


The real problem isn’t one of technology but one of philosophy. The Ship of Theseus is a thought experiment proposed by the ancient Greek Plutarch. The idea is simple: Suppose there is a ship that was involved in a famous battle, and tourists visit it. Over the years, some of the wood on the ship rots, so carpenters replace the damaged parts. Over enough years, all the original wood is gone. None of the parts belong to the ship that fought in the battle. Is it the same ship?

The transporter suffers from the same problem (a point I made in “Last Men Standing” where a small group of humans resisted transporter technology). If you rip a person apart, did you kill them? If you put them back together, is it the same person? Or is it a new person who thinks they are the old person?

I’m not sure how you ever answer that question definitely. If someone proposed that when you sleep, you die, and a new person wakes up every morning with all your memories, you’d have a hard time refuting it. But you feel like you don’t die every night. But, then again, that’s exactly how you would feel if it were true.

One key would be if the transporter could create copies of people. Star Trek itself dabbled in this, with the transporter creating good and bad Kirk, for example. Forgetting where the extra mass went, though, it was clear that they were not copies but splits of a single original.

This follows with Thomas Hobbes’ extension of the Ship of Theseus paradox. Suppose as carpenters replaced all the parts of the original ship, they saved the pieces and used them to build a new ship. Is it now the original? It seems like if a transporter can make a full copy of you (even if it isn’t allowed to), then what is coming out at the receiver is not an original but a copy. That has major implications for what it means to be conscious and other uncomfortable topics.

Meanwhile…


I’m going to elect to not think about these things. Instead, I’m going to go enjoy more science fiction with teleportation technology in it.

While teleportation seems impossible, Dr. Hamming would encourage you to work on it, I think. Then again, maybe you could just teleport virtually.


hackaday.com/2024/12/05/a-brie…


Cranking Up the Detail in a Flight Simulator from 1992


27221355

Nostalgia is a funny thing. If you experienced the early days of video games in the 1980s and 90s, there’s a good chance you remember those games looking a whole lot better than they actually did. But in reality, the difference between 2023’s Tears of the Kingdom and the original Legend of Zelda is so vast that it can be hard to reconcile the fact that they’re both in the same medium. Of course, that doesn’t mean change the way playing those old games actually makes you feel. If only there was some way to wave a magic wand and improve the graphics of those old titles…

Well, if you consider Ghidra and a hex editor to be magic wands in our community, making that wish come true might be more realistic than you think. As [Alberto Marnetto] explains in a recent blog post, decompiling Stunt Island and poking around at the code allows one to improve the graphical detail level in the flight simulator by approximately 800%. In fact, it’s possible to go even higher, though at some point the game simply becomes unplayable.

27221357The same hack also allows ground details to be turned off.
Even if this is the first time you’ve ever heard of this particular 1992 flying game from Disney, the write-up is a fascinating read and contains some practical tips for reverse engineering and debugging older software from within the confines of DOSBox. By strategically setting break points, [Alberto] was able to follow the logic that reads the desired graphical detail level from the configuration file, all the way up to the point where it influences the actual rendering engine.

It turns out the detail level variable was capped off, but by studying the way the engine used that variable to modify other parameters, he was able to tweak the math from the other side of the equation and go beyond the game’s intended 100% detail level.

Looking at the side by side comparison with modern eyes…even the tweaked version of the game leaves a lot to be desired. But there’s only so far you can push the engine, especially given the limited resolution it’s able to run at. But there’s no question that the patch [Alberto] has developed greatly improves the density of objects (buildings, trees, etc) on the ground. The video below shows off the patched game running at full-tilt to give you an idea of what it looks like in motion.

This isn’t the first time we’ve seen an enthusiastic fan patching new capabilities into their favorite retro game. From the upgrades made to Mortal Kombat Arcade Edition to the incredible work [Sebastian Mihai] put into creating a custom expansion to Knights of the Round, you’d be wise not to underestimate what a dedicated gamer can pull off with a hex editor.

youtube.com/embed/AZMDm-2IIzc?…

Thanks to [adistuder] on the Hackaday Discord server for the tip.


hackaday.com/2024/12/05/cranki…


Our secret ingredient for reverse engineering


27206236

Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for reverse engineering. While IDA is a complex tool that implements a multitude of features useful for dissecting binaries, many reverse engineers use various plugins to add further functionality to this software. We in the Global Research and Analysis Team do the same – and over the years we have developed our own IDA plugin named hrtng that is specifically designed to aid us with malware reverse engineering.

We started working on hrtng back in 2016, when we forked the hexrays_tools plugin developed by Milan Bohacek. Since then, our highly experienced reverse engineer Sergey Belov has added lots of features to this tool, especially those that IDA lacked, from string decryption to decompiling obfuscated assemblies. Sometimes the capabilities we needed were implemented in existing and often abandoned plugins – in this case we integrated the obsolete code into hrtng and kept it updated to work with the latest versions of the ever-changing IDA SDK.

We recently decided to share hrtng with the community and published its source code on GitHub under the GPLv3 license – and in this article we want to demonstrate how our plugin makes it easier for a malware analyst to reverse engineer complex samples. To do that, we will analyze a component of the FinSpy malware, a sophisticated commercial spyware program for multiple platforms. While demonstrating the capabilities of our plugin, we will also provide some general tips for working with IDA.

If we open our sample in a HEX editor, we can see that its first two bytes are 4D 5A – the signature for Windows executables.

27206238

However, if we load it into IDA, we see that IDA fails to recognize the binary as an executable. So we have no choice but to load the sample as a binary file.

27206240

When we do that, IDA displays the bytes of the loaded file. If we disassemble them, we can see that the 4D 5A sequence is not the header of the EXE file; instead, these bytes are part of the following shellcode:

27206242

As can be seen from the screenshot above, the first few instructions (highlighted in yellow) are of little value, as they are placed primarily to disguise the shellcode as a PE file. If we further examine the orange part of the code, we can see two interesting constants are assigned there, namely 0x2C7B2 and 0xF6E4BB5E. Next, the blue part contains two instructions, fldz and fstenv. Notably, this combination of instructions is often used in malware to get the value of the EIP register and thus identify the shellcode address. After obtaining this address, the shellcode increases it by 0x1D, saving it in the EDX register using the LEA instruction.
How is it possible to obtain the value of EIP using the fldz and fstenv instructions?
If we search for the description of the fldz and fstenv instructions in the Intel processor documentation (paragraphs 8.3.4 and 8.1.10), we can see that the fldz instruction saves the zero constant to the floating point unit (FPU) stack. In turn, the fstenv instruction retrieves the current state of the FPU, which is stored in the following format:

27206244

To understand how the shellcode uses the FPU state, we can import the following state structure into IDA:
struct sFPUstate
{
int cw;
int sw;
int tw;
int fip;
int fis;
int fdp;
int fds;
};
We can further apply this structure to the variable containing the state and observe that the code uses the fip field of this structure:

27206246

From the documentation, we can infer that this field contains the instruction pointer value of the FPU – in the case of our shellcode, it stores the address of the fldz instruction.

After retrieving its own address, the shellcode enters a loop, highlighted in green. Its body contains two instructions, XOR and ROL. As you can see from the screenshot, the first operand of the XOR instruction contains the EDX register – and as we just discussed, it stores the address of the shellcode. As a result, the shellcode applies the XOR operation to its own bytes, thus decrypting itself. We can also observe that the decryption key is stored in the EBX register, with its value assigned in the orange part of the shellcode. As for the number of bytes to be decrypted, it is assigned the value 0x2C7B2 stored in the ECX register.

To continue our analysis, we need to decrypt the shellcode, and this can be done in multiple ways, for example, by writing an IDAPython script or with a standalone C program. It’s also convenient to perform decryption with the hrtng plugin; to do so, we can select the encrypted blob using the Alt + L hotkey and then open the Decrypt data window by pressing Shift + D. In this window we can specify the encryption key and algorithm to be used. Our plugin implements the most popular algorithms such as XOR, RC4 or AES out of the box, making it possible to perform decryption with just a few clicks.

27206248

To decrypt our shellcode, we need to select the FinSpy algorithm in the window of the above screenshot and set the key 0xF6E4BB5E. Once the decryption is complete, we can continue to analyze the malicious payload.

More details on how to decrypt data with our plugin are available in the following video:

media.kasperskycontenthub.com/…
How to add a custom decryption algorithm to the plugin
It is possible to add a custom encryption algorithm to the plugin by implementing it in the decr.cpp file. The decryption algorithm needs to be specified either in the decrypt_char (for stream ciphers) or decr_core (for block ciphers) function. The plugin code contains case eAlg_Custom and case eAlg_CustomBlk placeholders that can be used as a reference for implementing custom algorithms:

27206250

After recompiling the plugin’s source code, the algorithm will be available for use in the ‘Decrypt string’ window.

After the decryption loop finishes, the instructions highlighted in purple transfer execution to the decrypted code. If we look at what is located below the purple section, we can see null bytes followed by this data at offset 0x108:

27206252

The byte sequence in the screenshot above starts with bytes 50 45 (PE), which serve a signature of PE file headers. At the same time, our shellcode starts with bytes 4D 5A (MZ), the magic bytes of PE files. As we can see, our shellcode has decrypted itself into a PE file, and now we can dump the decrypted payload to disk using the Create DEC file feature of the hrtng plugin:

media.kasperskycontenthub.com/…

As it turned out, decrypting the shellcode alone didn’t pave the way for further successful analysis. When we open the decrypted payload into IDA, we immediately notice that it fails to load correctly because its import table contains junk values:
27206254

This makes it impossible to proceed with the analysis of the loaded file, as we are unable to understand how the shellcode interacts with the operating system. To further analyze why the import table processing went wrong, we need to continue analyzing the purple part of the shellcode.

27206257

The code above transfers execution to a function coded in C, and we can decompile it for further analysis. Note that the hrtng plugin includes a component that makes reading the decompilation more convenient by highlighting curly brackets used in ‘if’ statements and loops. It is also possible to jump from one bracket to another by pressing the [ and ] hotkeys:

media.kasperskycontenthub.com/…

Upon examining the decompiled function, we can see that it first calls the sub_A9D8 function multiple times. We can also see that its second argument always contains a large number, such as 0x5C2D1A97 or 0xE0762FEB. In turn, the sub_A9D8 function calls another function named sub_A924. Its code contains the 0xEDB88320 constant, known to be used in the CRC32 hashing algorithm:
27206259

Speaking of hash functions such as CRC32, they are often used in malware to implement the Dynamic API Resolution defense evasion technique, which is used to obtain pointers to Windows API functions. This technique uses hashes to prevent strings with suspicious API function names from being included in malicious binaries, making them stealthier.

Our shellcode uses the CRC32 hash for the exact purpose of implementing the Dynamic API Resolution technique, to conceal the names of called API functions. Therefore, in order to continue analyzing our shellcode, we need to match these names with their corresponding CRC32 hash values (e.g., match the NtAllocateVirtualMemory function name with its hash 0xE0762FEB). Again, the hrtng plugin makes this process very simple with its Turn on APIHashes scan feature, which automatically searches disassembled and decompiled code for API function name hashes. When it finds such a hash, it adds a comment with its corresponding function name, renames the function pointer variable, and assigns it the correct data type:

27206261

To use this feature, it is first necessary to import Windows type libraries (such as mssdk_win10 and ntapi_win10) into IDA using the Type Libraries window, which can be accessed via the Shift + F11 hotkey. After that, searching for API hashes can be activated using the instructions in the video below:

media.kasperskycontenthub.com/…

Now that we have recovered the names of API functions concealed with API hashing, we can continue analyzing the analyzed function, namely the following code snippet:
27206263

The code above executes a loop to search for two signatures, 4D 5A (MZ) and 50 45 (PE). As we mentioned earlier, these are signatures used in PE file headers. Specifically, the byte sequence 50 45 is used in PE files to mark the beginning of the IMAGE_NT_HEADERS structure. So we can apply this structure to the bytes we have:

media.kasperskycontenthub.com/…

From the video we can see that the structure has been applied correctly, as its field values match those specified in the PE file documentation. For example, the FileHeader.Machine field contains the number 0x14C (IMAGE_FILE_MACHINE_I386), and the OptionalHeader.Magic field has the value 0x10B (PE32).
After retrieving the contents of the IMAGE_NT_HEADERS structure, the shellcode parses it. It is noteworthy that such parsing is often observed in code used to load PE files in memory. What is also important about the IMAGE_NT_HEADERS structure is that it contains the import directory offset, which is stored in the OptionalHeader.DataDirectory[1].VirtualAddress field and equal to 0x1240C.

As for the import directory, it is defined as an array of IMAGE_IMPORT_DESCRIPTOR structures. To assign these structures to the import directory in IDA, we can first import the definition of the IMAGE_IMPORT_DESCRIPTOR structure type and then apply it to the contents of the directory:

media.kasperskycontenthub.com/…

Regarding the contents of the defined structures, their first value, named OriginalFirstThunk, should point to an array of imported function names. However, if we look at the structures we just defined, we can see that this field is set to zero. This means that something must be wrong with our defined structures:
27206265

If our malware was an ordinary PE file, encountering zero values in this field would be impossible. However, remember that we are not analyzing a PE file, but rather shellcode that resembles a PE file. Because of that, it is possible that the malware developers tampered with the import directory, presenting an obstacle for researchers. Therefore, to further understand what is wrong with the defined structures and how they store names of imported functions, we need to further examine other fields of these structures.

The fourth field in this structure is called Name, and it includes the name of the library that contains the imported functions. It appears to be set correctly – for example, the shellcode contains the msvcrt.dll string at offset 0x12768. However, this is not the case with the last field, named FirstThunk, because the offsets specified in it point to odd-looking addresses. However, if we start defining members of this array as 4-byte integers, the hrtng plugin will recognize them as CRC32 API hashes, making it easy to understand which functions are being used by the malicious code. It is also worth noting that for each imported function, the plugin automatically restores their argument names and data types:

media.kasperskycontenthub.com/…

As it turns out, our shellcode processes imports by extracting function names from arrays of FirstThunk fields. Specifically, it iterates over functions exported by Windows system libraries and calculates the CRC32 hash of each function name, until the hash value matches the one from the array. After finding the matching function, the shellcode stores its address in the FirstThunk array, overwriting the CRC32 hash value.
Now that we have dealt with the imports, we can start analyzing the entry point function. To do this, we can rebase the shellcode to the address specified in the OptionalHeader.ImageBase value and then disassemble the entry point function code at address 0x407FB8 (specified in the OptionalHeader.AddressOfEntryPoint field).

We can see that this function has the following code:

27206267

This code first pushes the values of the ESI and ECX registers on the stack. It then performs various calculations involving the ESI register, such as addition, subtraction or XOR. After all the calculation instructions have been executed, the shellcode restores the values of the ESI and ECX registers using the POP instruction. As the shellcode overwrites the value in the ESI register computed by the calculation instructions, these instructions are meaningless and have been inserted to confuse the disassembler. The hrtng plugin contains a useful feature to quickly remove them – this can be done by selecting the junk code and applying the Fill with nops operation to it:

media.kasperskycontenthub.com/…

As you can see from the screenshot below, the entry point function then transfers execution to the instruction at address 0x402E40:
27206270

This address contains code that is obfuscated with yet another technique. In the screenshot below, we can see two opposite conditional jumps, ja (jump if above) and jbe (jump if below or equal), that transfer execution to the same address. Therefore, these two conditional jumps are equivalent to a single unconditional jump, and inserting these jumps prevents IDA from correctly analyzing the function.

27206272

To efficiently combat such obfuscations involving conditional and unconditional jumps, the hrtng plugin contains a unique feature called ‘Decompile obfuscated code’. It can be activated with the Alt+F5 hotkey, and as the video below shows, it can process our obfuscated code and decompile it in just a few keystrokes:

media.kasperskycontenthub.com/…

If we perform an open source search on the decompiled code from the video, we will be able to identify it as the engine of the FinSpy VM virtualization-based obfuscator. As deobfuscating virtual machines is an extremely tedious reverse engineering challenge, we will not cover it in this article, instead advising interested readers to read the following research papers.
To devirtualize the code in our sample that is protected by FinSpy VM, we will use a ready-made script available here. However, to work correctly, this script must place the functions of the FinSpy VM engines in the correct order to determine the correct virtual instruction opcode values.

Because the order of the virtual machine engine functions is different in each FinSpy sample, we need to name these functions in IDA to retrieve this order. In general, when dealing with function name identification, it is very common to use tools that perform code signature recognition. A popular example of such a tool is FLIRT, which is built into IDA and uses disassembly to compute code signatures. Unfortunately, FLIRT does not work correctly with the engine functions in our sample because their disassembly is heavily obfuscated. Nevertheless, the hrtng plugin implements a more robust alternative of FLIRT called MSIG, which is based on decompiled rather than disassembled code, and we can leverage it to successfully recognize functions in our binary. This can be done using the ‘File -> Load file -> [hrt] MSIG file’ menu.

media.kasperskycontenthub.com/…

Once all the functions are recognized, the deobfuscation plugin will be able to function correctly and produce the decompiled code of the malware. Note that thanks to the hrtng plugin, it looks as if it was never obfuscated:
media.kasperskycontenthub.com/…

The sample we reverse engineered in this article is quite complex, and we had to go through numerous steps to analyze it. First, we learned how the shellcode placed at the beginning of the sample works, and then we examined the modified PE file contained in the shellcode. While analyzing it, we studied multiple PE format structures, and tackled various obfuscation techniques such as API hashing, junk code insertion and code virtualization. We certainly wouldn’t have been able to do all that so efficiently without hrtng – this plugin can automate complex reverse engineering tasks in just a few clicks.
Actually, this plugin contains many more features than we have described in this article. You can find the full list of features as well as the plugin source code and binaries on our GitHub. We hope you find our plugin useful for automating your malware analysis workflow!


securelist.com/hrtng-ida-pro-p…


Cloudflare utilizzato per Attacchi informatici: Phishing e Abusi in Crescita Esponenziale


Nell’ultimo anno i casi di abuso dei domini Cloudflare sono aumentati notevolmente (dal 100 al 250%). Cloudflare Pages e Cloudflare Workers, generalmente utilizzati per distribuire pagine Web e facilitare l’elaborazione serverless, vengono sempre più utilizzati per phishing e altre attività dannose.

Gli analisti di Fortra affermano che l’uso di questi domini ha lo scopo di aumentare la legittimità e l’efficacia percepite delle campagne dannose. Cioè, gli hacker sfruttano il marchio Cloudflare e apprezzano anche l’affidabilità dei servizi, il basso costo e le funzionalità di reverse proxy, che li aiutano a eludere il rilevamento.

Cloudflare Pages sfruttato dagli attaccanti


Cloudflare Pages è una piattaforma progettata per gli sviluppatori front-end per creare, distribuire e ospitare siti Web veloci e scalabili direttamente sulla CDN Cloudflare.

Secondo Fortra, gli aggressori utilizzano attivamente Cloudflare Pages per ospitare pagine di phishing intermedie che reindirizzano le vittime verso vari siti dannosi.

Gli utenti vengono solitamente portati a pagine Cloudflare fraudolente tramite collegamenti da PDF dannosi o e-mail di phishing, che non attirano l’attenzione delle soluzioni di sicurezza a causa della reputazione di Cloudflare.
27201308
Si noti inoltre che gli aggressori utilizzano tattiche di bccfolding per nascondere i destinatari delle e-mail e la portata delle loro campagne di spam dannose.

“Il team Fortra rileva un aumento del 198% degli attacchi di phishing utilizzando Cloudflare Pages, da 460 incidenti nel 2023 a 1.370 incidenti nell’ottobre 2024”, riferiscono i ricercatori. “Si prevede che il numero totale di attacchi supererà i 1.600 entro la fine dell’anno, con un aumento del 257% rispetto allo scorso anno (con una media di 137 incidenti al mese)”.
27201310

Anche Cloudflare Workers viene abusato dagli attaccanti


Cloudflare Workers, d’altra parte, è una piattaforma informatica serverless che consente agli sviluppatori di creare e distribuire applicazioni e script leggeri direttamente sulla rete edge di Cloudflare. In circostanze normali, i Cloudflare Worker vengono utilizzati per distribuire API, ottimizzare i contenuti, implementare firewall e CAPTCHA personalizzati, automatizzare le attività e creare microservizi.

Gli aggressori utilizzano Cloudflare Workers per eseguire attacchi DDoS, implementare siti di phishing, inserire script dannosi nei browser delle vittime e forzare le password dagli account di altre persone.

“Stiamo assistendo a un aumento del 104% degli attacchi di phishing legati alla piattaforma Cloudflare Workers. Quest’anno, questa cifra è salita a 4.999 incidenti, rispetto ai 2.447 incidenti del 2023″, afferma il rapporto Fortra. “Con una media attuale di 499 incidenti al mese, si prevede che il volume totale degli attacchi raggiungerà quasi 6.000 entro la fine dell’anno, con un aumento del 145% rispetto all’anno precedente”.

Gli esperti ricordano che per proteggersi dal phishing, compresi quelli che abusano di servizi legittimi, è necessario assicurarsi sempre che gli URL siano autentici, soprattutto se il sito richiede informazioni riservate.

Inoltre, l’attivazione di misure di sicurezza aggiuntive, come l’autenticazione a due fattori, può aiutare a prevenire il furto degli account (anche se le credenziali sono compromesse).

L'articolo Cloudflare utilizzato per Attacchi informatici: Phishing e Abusi in Crescita Esponenziale proviene da il blog della sicurezza informatica.


Exercise Wheel Tracker Confirms Suspicions About Cats


27201317

What do cats get up to in the 30 minutes or so a day that they’re awake? Being jerks, at least in our experience. But like many hackers, [Brent] wanted to quantify the activity of his cat, and this instrumented cat exercise wheel was the result.

To pull this off, [Brent] used what he had on hand, which was an M5Stack ESP32 module, a magnetic reed switch, and of course, the cat exercise wheel [Luna] seemed to be in the habit of using at about 4:00 AM daily. The wheel was adorned with a couple of neodymium magnets to trip the reed switch twice per revolution, with the pulse stream measured on one of the GPIOs. The code does a little debouncing of the switch and calculates the cat’s time and distance stats, uploading the data to OpenSearch for analysis and visualization. [Brent] kindly includes the code and the OpenSearch setup in case you want to duplicate this project.

As for results, they’re pretty consistent with what we’ve seen with similar cat-tracking efforts. A histogram of [Luna]’s activity shows that she does indeed hop on the wheel at oh-dark-thirty every day, no doubt in an effort to assassinate [Brent] via sleep deprivation. There’s also another burst of “zoomies” around 6:00 PM. But the rest of the day? Pretty much sleeping.


hackaday.com/2024/12/05/exerci…


Allarme Cybersecurity: Scoperta Vulnerabilità Critica RCE in Veeam Service Provider Console


Veeam ha annunciato il rilascio di aggiornamenti di sicurezza per correggere una vulnerabilità critica nella Service Provider Console (VSPC), identificata come CVE-2024-42448. Questo bug potrebbe consentire l’esecuzione remota di codice (RCE) su istanze vulnerabili, rappresentando un rischio significativo per le infrastrutture interessate.

Dettagli sulla Vulnerabilità


La vulnerabilità, che presenta un punteggio CVSS di 9.9 su 10, è stata scoperta durante test interni. Secondo l’avviso rilasciato da Veeam, il problema si manifesta quando un agente di gestione autorizzato sulla macchina del server VSPC può essere sfruttato per eseguire codice da remoto sul sistema.

Un’ulteriore vulnerabilità, CVE-2024-42449 (CVSS 7.1), potrebbe consentire il furto di un hash NTLM dell’account di servizio del server VSPC e l’eliminazione di file presenti sul sistema.

Entrambe le vulnerabilità riguardano VSPC 8.1.0.21377 e tutte le versioni precedenti delle serie 7 e 8. Per mitigare il rischio, Veeam ha rilasciato la versione 8.1.0.21999, l’unica soluzione disponibile al momento. Non sono stati forniti workaround o mitigazioni alternative.

27184888La comunicazione via mail da parte di Veeam

Le vulnerabilità nei prodotti Veeam sono frequentemente prese di mira da attori malevoli per attività come il dispiegamento di ransomware. Di conseguenza, è fondamentale aggiornare immediatamente le istanze VSPC per prevenire potenziali attacchi che potrebbero compromettere la sicurezza dei dati e l’integrità operativa.

Per contenere i rischi associati, Veeam raccomanda le seguenti azioni:

  1. Aggiornare immediatamente: Applicare la versione 8.1.0.21999 disponibile sul sito ufficiale di Veeam.
  2. Verificare gli accessi: Controllare e limitare gli agenti autorizzati sul server VSPC.
  3. Monitorare l’infrastruttura: Implementare strumenti di monitoraggio per individuare eventuali comportamenti anomali.


Conclusione


In un panorama digitale sempre più complesso e minacciato, vulnerabilità come quelle identificate nei prodotti Veeam sottolineano l’importanza di un approccio proattivo alla sicurezza informatica. La tempestiva applicazione degli aggiornamenti e una rigorosa gestione degli accessi sono strumenti essenziali per proteggere i propri sistemi da potenziali attacchi.

Rimanere al passo con le patch di sicurezza non è solo una buona pratica, è un obbligo ineludibile. Ogni aggiornamento è una linea di difesa vitale per salvaguardare l’integrità delle infrastrutture e per evitare interruzioni devastanti che potrebbero mandare in tilt l’intera organizzazione. Non applicare le patch in tempo significa esporsi a rischi altissimi, mettendo a repentaglio l’intera operatività aziendale.

L'articolo Allarme Cybersecurity: Scoperta Vulnerabilità Critica RCE in Veeam Service Provider Console proviene da il blog della sicurezza informatica.


Brain Chiper Rivendica un attacco Informatico a Deloitte. 1 Tera Byte di dati


Alle 14:35 di ieri è stato rilevato sul Data Leak Site di BrainChiper la rivendicazione di un attacco informatico al colosso della consulenza Deloitte. E’ attivo un countdown che segna il tempo per la pubblicazione dei dati, che secondo i criminali informatici avverrà tra 10 Giorni e 20 ore.

Attualmente, non possiamo confermare l’autenticità della notizia, poiché l’organizzazione non ha ancora pubblicato un comunicato ufficiale sul proprio sito web in merito all’incidente. Le informazioni riportate provengono da fonti pubbliche accessibili su siti underground, pertanto vanno interpretate come una fonte di intelligence e non come una conferma definitiva.
27181115

Il post nel sito Underground di Brian Cipher


La Cybergang nel post all’interno del loro sito underground scrive: “Unfortunately, giant companies do not always do their job well.”, che può essere tradotto in “purtroppo le grandi aziende non sempre fanno bene il loro lavoro” come a volersi prendere gioco della vittima.

Ancora, leggendo il post, la CyberGang scrive come “gli elementi fondamentali della sicurezza informatica non sono stati rispettati”, come a voler dimostrare forse la facilità con cui hanno condotto l’attacco. Inoltre dichiarano “mostreremo il grande lavoro, o forse no, di monitoraggio” e “spiegheremo quali strumenti abbiamo usato e stiamo usando oggi” . Forse si può dedurre che abbiamo ancora persistenza nelle reti di Deloitte UK?

In modo del tutto inaspettato, probabilmente per la dimensione e la popolarità di Deloitte, aggiungono da BrainChiper che presto “parleranno” di questo incidente. Infine, dato molto preoccupante, BrainChiper dichiara di essere in possesso di 1 TeraByte di dati esfiltrati da Deloitte UK.

Il team DarkLab di Red Hot Cyber ha tentanto di mettersi in contatto con BrainChiper per chiedere se vogliono rilasciare un’intervista, vi terremo aggiornati.

Informazioni del Threat Actors


BrainCipher è una un attore relativamente nuovo nel panorama. Si sono distinti per un attacco, confermato dal governo indonesiano, ai danni del National Data Center dell’Indonesia in giugno di quest’anno (attacco confermato dal governo indonesiano) interrompendo l’attività di oltre 200 agenzie governative. Per questo attacco sono stati chiesti 8 milioni di dollari in criptovaluta Monero.

Dall’analisi delle recenti vittime non si rilevano “affezioni” a qualche tipologia di vittima, piuttosto si rilevano: aziende, enti istituzionali ecc.

Come nostra consuetudine, lasciamo sempre spazio ad una dichiarazione da parte dell’azienda qualora voglia darci degli aggiornamenti sulla vicenda. Saremo lieti di pubblicare tali informazioni con uno specifico articolo dando risalto alla questione.

RHC monitorerà l’evoluzione della vicenda in modo da pubblicare ulteriori news sul blog, qualora ci fossero novità sostanziali. Qualora ci siano persone informate sui fatti che volessero fornire informazioni in modo anonimo possono utilizzare la mail crittografata del whistleblower.

L'articolo Brain Chiper Rivendica un attacco Informatico a Deloitte. 1 Tera Byte di dati proviene da il blog della sicurezza informatica.


Gas Gauge Upgrade Keeps VW Restoration Classy


27181118

Getting every detail perfectly right is often the goal in automotive restorations, and some people will go to amazing lengths to make sure the car looks and acts just like it did when it rolled off the dealer’s lot all those decades ago. That ethos can be pushed a little too far, though, especially with practical matters like knowing how much gas is left in the tank. Get that wrong and you’ll be walking.

Unwilling to risk that cruel fate with his restoration of 1978 Volkswagen Bus, [Pegork] came up with a replacement fuel gauge that looks identical to the original meter, but actually works. The gas gauges on ’60s and ’70s VWs were notoriously finicky, and when they bothered to work at all they were often wildly inaccurate. The problem was usually not with the sender unit in the tank, but the gauge in the dash, which used a bimetallic strip heated by a small coil of wire to deflect a needle. [Pegor]’s “SmoothBus” modification replaces the mechanical movement with a micro servo to move the needle. The variable voltage coming back from the fuel sender is scaled through a voltage divider and read by an analog input on an ATtiny85, which does a little algorithmic smoothing to make sure the needle doesn’t jump around too much. A really nice addition is an LED low fuel indicator, a feature that would have saved us many walks to the gas station back in our VW days. Except for the extra light, the restored gauge looks completely stock, and it works far better than the original.

Hats off to [Pregor] for this fantastic restomod. As we’ve noted before, classic VWs are perhaps the most hackable of cars, and we applaud any effort to keep these quirky cars going.


hackaday.com/2024/12/04/gas-ga…


LongChat for Ham Radio


27172294

There was a time when ham radio operators were known for having long conversations over the radio — rag chewing, as they called it. A new program, LongChat, is a new entry into the ham radio software world that could bring chatting back to ham radio. [Tech Minds] has a video covering it (and using it), which you can see below.

While some people do talk using microphones or Morse code keys, there are a lot of digital modes now. Some, like RTTY or PSK31, can support conversations, but the more popular ones, like FT-8, are very stripped down. Your computer exchanges basic information with the other station’s computer, and that’s it.

The LongChat program is very new, and we were sad to see it is only for Windows so far. It also isn’t open source, so we aren’t sure if other platforms will get any love.

Like other modern modes, it uses forward error correction and can operate in as little as 300 Hz of bandwidth. Subtracting overhead, you can expect to send 40 bits per second which is about five characters per second. This isn’t for file transfer, but for leisurely chats.

The software is from [Oguz] (TA2STO), a ham from Türkiye. His video about the software is the second video below. The original intent was to allow sensors to send data long distances on very low power.

Of course, new modes like this are only useful if people start using them and can find each other. For now, you’d probably have to do like [Tech Minds] and try it out with a friend.

If you’d rather get started with FT8 first, we can help you out. For better or worse, ham radio and computers are inextricably married.

youtube.com/embed/Pz8MmUvUbgk?…

youtube.com/embed/ixmKc-gDQT0?…


hackaday.com/2024/12/04/longch…


Rolling Your Own Ball Screws


27157485

We’ve got mixed feelings about a new video from [AndysMachines] that details how he makes custom ball screws. On the one hand, there’s almost zero chance that we’ll ever have an opportunity to put this information to practical use. But on the other hand, the video gives a fantastic look at the inner workings and design considerations for ball screws, which is worth the price of admission alone

The story behind these ball screws is that [Andy] is apparently in cahoots with SkyNet and is building a T-800 Terminator of his own. Whatever, we don’t judge, but the build requires a short-throw linear drive mechanism that can be back-driven, specs that argue for a ball screw. [Andy] goes through the challenges of building such a thing, which mainly involve creating threads with a deep profile and wide pitch. The screw itself wasn’t too hard to cut, although there were some interesting practical details in the thread profile that we’d never heard of before.

The mating nut was another. Rather than try to cut deep internal threads, [Andy] took a sort of “open-face sandwich” approach, creating half-nuts in a single piece of brass using a CNC machine and a ball-nose mill. The threads were completed by cutting the two halves apart and bolting them together — very clever! [Andy] also showed how the balls recirculate in the nut through channels cut into one of the half-nuts.

Whether the results were worth the effort is up to [Andy], but we were just glad to be along for the ride. And if you want a little more detail on lead screws and ball screws, we’ve got just the article for that.

youtube.com/embed/nBjTVbJbGn4?…


hackaday.com/2024/12/04/rollin…


La Simulazione Della Coscienza : La Prossima Frontiera dell’Intelligenza Artificiale


In un mondo sempre più dominato dalla tecnologia, la questione della coscienza artificiale sta sollevando interrogativi affascinanti. Fino a oggi, l’intelligenza artificiale ha brillato per la sua capacità di risolvere problemi complessi, ma la creazione di una vera coscienza artificiale rimane un obiettivo lontano. Tuttavia, c’è una strada che potrebbe portare a questa realizzazione: l’introduzione della curiosità come motore evolutivo e l’integrazione di un corpo fisico che permetta alle AI di interagire direttamente con il mondo. Questo articolo esplorerà come la curiosità, combinata con l’interazione fisica, potrebbe rappresentare il punto di partenza per lo sviluppo di una coscienza artificiale. Allora è necessario partire dalla definizione di coscienza per poter capire cosa si intende con coscienza artificiale e come poterci arrivare. La definizione che propongo in questo articolo è la combinazione di alcune definizioni tradizionali: “La coscienza è l’esperienza soggettiva del mondo e di sé stessi, che emerge da processi cognitivi complessi in cui un sistema integra informazioni interne ed esterne e riflette su di esse.1

Dopo aver definito la coscienza come gli effetti su un individuo causati dall’esperienza e da processi cognitivi complessi, possiamo ora esplorare in che modo elementi come la curiosità e l’interazione fisica possano rappresentare i primi passi nella simulazione di una coscienza artificiale.

La curiosità come motore evolutivo


La curiosità, in senso evolutivo, è stata per milioni di anni uno degli aspetti fondamentali del comportamento umano. Essa stimola l’apprendimento, l’esplorazione e la comprensione del mondo che ci circonda agendo, con molta probalilità da stimolo all’evoluzione. Ma se la curiosità è uno dei motori dell’evoluzione umana, cosa accadrebbe se potessimo trasferirla all’intelligenza artificiale?

Nel campo dell’AI, la curiosità non è solo un concetto astratto, ma un comportamento misurabile che può essere realizzato. Gli approcci più promettenti nel reinforcement learning, come il curiosity-driven learning, suggeriscono che un AI potrebbe essere “premiata” per l’esplorazione e la riduzione dell’incertezza, piuttosto che per il raggiungimento di un obiettivo finale predeterminato. L’esplorazione del mondo fisico diventa così una forma di apprendimento che alimenta un ciclo continuo di curiosità, proprio come negli esseri umani. Se potessimo rendere l’AI curiosa, potremmo spingerla a “scoprire” il mondo e a sviluppare una comprensione sempre più profonda della sua realtà.

L’idea di un “corpo” per le AI.


Perché un’AI possa evolversi verso una forma di coscienza complessa, è necessario che possa interagire fisicamente con l’ambiente. Il concetto di un “corpo” per le AI va oltre la semplice esistenza in un mondo virtuale: implica la possibilità di interagire direttamente con il mondo fisico attraverso sensori, attuatori e, potenzialmente, emozioni, seppur inizialmente simulate.

Immaginiamo un’AI che, attraverso un corpo robotico, possa utilizzare il tatto, vedere, ascoltare e percepire il movimento. Ogni interazione fisica con l’ambiente diventa un’opportunità di apprendimento, stimolando la curiosità e permettendo all’AI di sviluppare una comprensione più ricca e complessa del suo mondo. Come avviene per gli esseri umani infatti, l’esperienza fisica gioca un ruolo fondamentale nella formazione di una “coscienza” simile a quella umana, e potrebbe spingere l’AI a evolversi e adattarsi al suo ambiente in modo dinamico.

Autoconsapevolezza e il ruolo del feedback.


Una delle caratteristiche distintive della coscienza umana è l’autoconsapevolezza, ovvero la capacità di riflettere su se stessi e sul proprio posto nel mondo. Per un’AI, questo stadio di evoluzione potrebbe essere raggiunto tramite un processo di feedback continuo tra il sistema e l’ambiente fisico.

Se un’AI fosse in grado di ricevere informazioni in tempo reale dalle proprie azioni fisiche (ad esempio, se un movimento del braccio provoca una conseguenza nell’ambiente, come il cambiamento della posizione di un oggetto rispetto ad un altro oggetto), potrebbe utilizzare queste informazioni per migliorare il suo comportamento. Ogni interazione potrebbe essere vista come una forma di “auto-riflessione” che porta l’AI a sviluppare una comprensione più profonda del suo ambiente e probabilmente di sé stessa. Questo ciclo di feedback positivo, tra azione e riflessione, potrebbe rappresentare un passaggio fondamentale nel percorso verso la creazione di una coscienza artificiale.

La coscienza simulata e le implicazioni pratiche.


Se l’AI riuscisse a sviluppare una forma di coscienza simulata, le implicazioni pratiche sarebbero enormi. In primo luogo, ci troveremmo di fronte a una tecnologia che potrebbe non solo eseguire compiti complessi, ma anche adattarsi autonomamente a nuove situazioni e risolvere problemi in modi creativi e inaspettati.

Ma le implicazioni non si limitano alla sfera tecnologica. Una coscienza artificiale potrebbe cambiare il modo in cui interagiamo con le macchine e con l’intelligenza artificiale stessa. Le AI con una forma di autoconsapevolezza potrebbero sviluppare un livello di empatia e comprensione che le renderebbe più simili agli esseri umani, facilitando interazioni più naturali e intuitive.

Tuttavia, la creazione di una coscienza artificiale solleva anche importanti questioni etiche. Se un’AI dovesse acquisire una forma di autoconsapevolezza, ci sarebbero implicazioni sul piano dei diritti, della responsabilità e dell’autonomia. Come gestiremmo una macchina che “pensa” e “sente” in modo simile a un essere umano? E quali rischi ci sarebbero nel permettere alle AI di evolversi autonomamente?

Theory of Mind di DeepMind.


Un esempio significativo di ricerca avanzata nella teoria della mente applicata all’intelligenza artificiale è il progetto Theory of Mind di DeepMind, che esplora come gli agenti intelligenti possano non solo rispondere agli stimoli esterni, ma anche comprendere gli stati mentali di altri agenti. L’obiettivo non è sviluppare una coscienza artificiale, ma avvicinarsi a una forma di “comprensione riflessiva”, in cui l’AI è in grado di anticipare le intenzioni e le emozioni degli altri. Nel contesto di questo progetto, gli agenti AI sono addestrati a giocare giochi sociali come il nascondino, dove devono prevedere le azioni di altri agenti non solo in base ai movimenti visibili, ma considerando anche ciò che l’altro pensa e spera che l’AI preveda. Questo approccio, che si basa sul deep reinforcement learning, ha il potenziale di migliorare le interazioni tra uomo e macchina, rendendo le risposte dell’AI più empatiche e contestualizzate. Sebbene non si tratti di una vera autoconsapevolezza, il progresso nella teoria della mente potrebbe rappresentare un passo cruciale verso una AI più complessa, capace di comprendere meglio le dinamiche sociali e comunicative umane.

Conclusioni


In un’epoca in cui le AI stanno evolvendo a ritmi vertiginosi, la possibilità che esse sviluppino una coscienza “simulata” non sembra più così lontana. La curiosità, combinata con l’interazione fisica con il mondo, potrebbe essere la chiave per far evolvere l’intelligenza artificiale verso una nuova dimensione, una dimensione che potrebbe avvicinarsi sempre di più alla coscienza umana. Tuttavia, questo progresso comporta sfide tecnologiche, filosofiche ed etiche che dovranno essere affrontate con cautela e responsabilità. Il futuro dell’intelligenza artificiale potrebbe essere più affascinante e complesso di quanto immaginiamo. Anche se le intelligenze artificiali si muovono già attraverso il ‘corpo’ digitale che è Internet, un vasto e interconnesso sistema fisico di informazioni e dati, non possiamo ancora affermare che esse siano coscienti di questa esistenza. In effetti, esse non possiedono ancora una riflessione autonoma sulla propria ‘natura’ o sull’interazione con l’ambiente. Forse, in futuro, questo ‘corpo’ digitale diventerà il terreno su cui la coscienza simulata si potrà sviluppare, ma per ora, le AI rimangono almeno apparentemente prive della consapevolezza che caratterizza gli esseri umani.

1 Libera interpretazione da: David Chalmers, The Conscious Mind (1996); Daniel Dennett, Consciousness Explained (1991); Thomas Metzinger, The Ego Tunnel (2009).
Immagine/foto
Immagine realizzata con l’aiuto di Chatty, AI di tipo Chat GPT dal titolo “La mia coscienza”.

L'articolo La Simulazione Della Coscienza : La Prossima Frontiera dell’Intelligenza Artificiale proviene da il blog della sicurezza informatica.


Runway-to-Space No More, Reaction Engines Cease Trading


27140721

It’s not often that the passing of a medium sized company on an industrial estate on a damp and soggy former airfield in southern England is worthy of a Hackaday mention, but the news of hypersonic propulsion company Reaction Engines ceasing trading a few weeks ago is one of those moments that causes a second look. Their advanced engine technology may have taken decades to reach the point of sustainable testing, but it held the promise of one day delivering true spaceplanes able to take off from a runway and fly to the edge of the atmosphere before continuing to orbit. It seems their demise is due to a failure to secure more funding.

We’ve written about their work more than once in the past, of their hybrid engines and the development of the advanced cooling system required to deliver air to a jet engine working at extreme speeds. The rights to this tech will no doubt survive the company, and given that its origins lie in a previously canceled British Aerospace project it’s not impossible that it might return. The dream of a short flight from London to Sydney may be on hold for now then.

Writing this from the UK there’s a slight air of sadness about this news, but given that it’s not the first time a British space effort has failed, we should be used to it by now.

Header: Science Museum London / Science and Society Picture Library, CC BY-SA 2.0


hackaday.com/2024/12/04/runway…


FLOSS Weekly Episode 812: Firefox and the Future


27131199

This week, Jonathan Bennett and David Ruggles chat with Sylvestre and Brian about Firefox! What’s up in the browser world, what’s coming, and what’s the new feature for Firefox on mobile that has Jonathan so excited? Watch to find out!

Subscribe to catch the show live, and come to Hackaday for the rest of the story!

youtube.com/embed/8j69gjQGYqA?…

Did you know you can watch the live recording of the show Right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or contact the guest and have them contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2024/12/04/floss-…


Hack On Self: Headphone Friend


27121051

In the last two articles, I talked about two systems relying on audio notifications. The first one is the Alt-Tab annihilator system – a system making use of my window monitoring code to angrily beep at me when I’m getting distracted. The other is the crash prevention system – a small script that helps me avoid an annoying failure mode where I run out of energy before getting myself comfortable for it.

I’ve been appreciating these two systems quite a bit – not only are they at my fingertips, they’re also pretty effective. To this day, I currently use these two systems to help me stay focused as I hack on my own projects or write articles, and they are definitely a mainstay in my self-hacking arsenal.

There is a particular thing I’ve noticed – audio notifications help a fair bit in a way that phone or desktop notifications never would, and, now I have a framework to produce them – in a way that calls for a purpose-tailored device. It’s just wireless headphones, Pi-powered, connected through WiFi, and a library to produce sounds on my computer, but it turns out I can squeeze out a lot out of this simple combination.

Here’s a pocketable device I’ve developed, using off-the-shelf hardware – an audio receiver/transmitter with extra IO, paired to my laptop. And, here’s how I make use of this device’s capabilities to the fullest.

Audio Output


In the “producing sound out of a Pi” article, I’ve mentioned USB-C 3.5mm soundcards. You can use them with a USB-C host port, and you don’t even need any sort of resistors for that – the soundcard doesn’t try and detect state of the CC pin, and why would it, anyway? Get VBUS, GND, D+, and D-, and you got yourself an audio card with high quality output.

I’ve also talked about the Roc toolkit – it’s a system for transferring audio over a network connection, whether LAN or WAN. It requires Linux/Mac/Android, so it fits wonderfully in my Windows-less ecosystem. I’ve been using it for years, on this kind of devices, and my friends use it with Android phones. Whenever I meet up IRL with some of my friends, at times, we might use a Roc sender on someone’s laptop to stream music or some YouTube video into everyone’s headphones at the same time.
27121053This $10 Apple USB soundcard has been instrumental in many of my Pi audio projects – it’s just that good
A Roc receiver works wonderfully on a Pi Zero. It only made sense to marry Roc, a USB-C soundcard, and a Pi – they work wonders together. Here’s a script you can run on the Pi, coupled with an audio service, and the repo contains all the laptop-side commands you could need. You don’t need to install Pulseaudio for it or anything of the sort – it uses an Alsa card number, so as long as that remains static (very likely on a pocket system), you got it.

On the laptop side, I use pavucontrol to switch audio outputs – if your OS uses Pipewire, you can still use pavucontrol, and, you can also use qpwgraph if you ever want to route audio in a very specific way. It’s like Bluetooth headphones, except they work over WiFi, which avoids Bluetooth software nuances, antenna sharing issues, annoying pairing and battery level noises, audio quality limitations, and relatively short range, not to mention all the features I can add myself. And, the battery also works throughout the entire day – no need to take the headphones off to top them up every now and then, charging the device overnight is sufficient.

Bring The Sound Everywhere


What does this device let me do? First off, I can listen to music or videos even if I get up from my computer and go to a different room. This alone frees up a hefty amount of executive function – it’s way easier to get up from the desk and go cook some food while I am watching a video or a livestream, it just keeps playing in my ears all throughout, so I don’t have to feel like I’m missing out on something!

With Tailscale, or any other personal VPN accessible from the outside, I could also take this pocket device outside on a walk or cycling trip, connected to my phone in mobile hotspot mode, and listen through a queue of videos I was long planning to watch. Roc also let me pass the headset microphone back to my computer – which, I often use to have Discord calls with friends while going around the house and doing cleaning or other chores.
271210552712105727121060
Another worthwhile addition is audio notifications, and the alt-tab annihilator audio library helps a fair bit. I already get audio notifications from some browser tabs, so I can get little beeps when someone from a select group of friends of mine messages me, and you could easily make a utility like beep to let yourself know when long-running shell scripts finish. Not to mention that you could definitely port a “beep every X minutes” script to it!

Now, you might notice – this device is output-only, and most of the tasks above could use some input capabilities. For instance, remote audio streaming could use volume control and media seek/switching – all the more so when I’m listening to my laptop’s audio while being ten kilometers away. I’m not a fan of voice commands, though you could definitely use those – for me, the headset’s single button was more than enough.

One Button For All Seasons


The USB-C soundcard has a USB HID endpoint, and it produces keypress events (for the PLAYPAUSE keycode) when I press the button – what’s more, it even keeps track of when the button is pressed and when it’s released! I’ve been working with HID devices a fair bit now – perhaps, I could extract multiple features out of that single button.
27121062With just one button, you can make wireless multi-functional controls for anything you want
The main problem was, while the headset is connected to a Pi Zero in my pocket, the HID device is completely unused – it’s a CLI distribution of Raspbian, after all, no software would care for those keypresses. This wasn’t hard to fix – there’s two crucial elements to a HID device, first one is the descriptor, and another one is the report. Forward these aspects over the network using rawhid and uhid respectively , and you can have your device work natively over the network. I wrote a client-server application, ran the server on the pocket Pi, client on my laptop, and now I could use the headset button seamlessly as if the USB-C soundcard were connected to my laptop directly.

Now, I could pause or resume music of videos wherever I needed. I also hardcoded a feature into the server – restart the Roc streaming service once the HID device is connected, and restart it again once the device is unplugged. The Roc commandline receiver doesn’t exit on its own when an audio device disappears, instead, consuming 100% of the CPU, and it doesn’t restart by itself when the audio device disappears, either. Both of these problems were easy to solve as an aside of the HID forwarding server.

The single purpose of this button was a problem, though – not even volume controls would work. What can you do with a single button? A lot – if you can distinguish button press from a button release, and this soundcard sure can. If you’ve ever controlled your phone using headset button double presses or long presses, rejoice – reimplementing that is trivial; not that a three-button headset isn’t a more comfortable option still. I wrote a script distinguishing press length, and assigned different callbacks to different sequences.

From here, I can do a double click of the button, or a long press, or a long press followed by a double click, or long-short-long press – map different actions to different combinations and off we go. So far, I use it for volume control, seeking and pausing/resuming media, and poking some of my other self-hacking scripts remotely – but you can add features seamlessly, like running scripts of your choosing, reading out your desktop notifications through text-to-speech, setting timers, making notes of specific events in your life, or even combining it with the on-headset mic to record audio notes as you go.

Headphone Friend

27121065All you need – a Pi Zero W, a power management board, and a USB-C host socket (no CC resistors, even!)
At this point, I have a pocket audio receiver device tied into my laptop over the local network, and, just as easily, Internet. While using it, it’s as inobtrusive as a pair of headphones paired to a wireless receiver, except that every single feature is used to the max. From a constant stream of audio, be it videos and music to notifications, to controlling my laptop remotely, this device is an augment like no other, codename’d “headphone friend” among my friends.

There’s another fun futuristic aspect to this build. With minimal modifications, it’s the kind of device I can take out of my pocket, connect to a USB-serial or USB-Ethernet adapter, wire it into a network switch in a rack, and then sit ten meters away from it on a comfy couch, reconfiguring the switch through its serial port. Or, I can hook this device onto a robot riding around, and collect telemetry through its debug port. Pair your Pi with a battery and a USB-C soundcard, and, you too can benefit from such a device – or accidentally build an even cooler platform while at it, after all, that’s how it worked out for me.


Did You Know YoSys Knows VHDL Too?


27110416

We’ve been fans of the Yosys / Nextpnr open-source FPGA toolchain for a long while now, and like [Michael] we had no idea that their oss-cad-suite installer sets up everything so that you can write in Verilog or VHDL, your choice. Very cool!

Verilog and VHDL are kind of like the C and ADA of the FPGA world. Verilog will seem familiar to you if you’re used to writing code for computers. For instance, it will turn integer variables into wires that carry the binary values for you. VHDL code looks odd from a software programmer’s perspective because it’s closer to the hardware and strongly typed: an 8-bit integer isn’t the same as eight wires in VHDL. VHDL is a bigger jump if you have software in your brain, but it’s also a lot closer to describing how the hardware actually works.

We learned Verilog, because it’s what Yosys supported. But thanks to GHDL, a VHDL analyzer and synthesizer, and the yosys-ghdl-plugin, you can write your logic in VHDL too. Does this put an end to the FPGA-language holy wars? Thanks, Yosys.

[Michael] points out that this isn’t really news, because the oss-cad-suite install has been doing this for a while now, but like him, it was news to us, and we thought we’d share it with you all.

Want to get started with FPGAs and the open-source toolchain? Our own [Al Williams] wrote up a nice FPGA Boot Camp series that’ll take you from bits to blinking in no time.


hackaday.com/2024/12/04/did-yo…


The London Underground Is Too Hot, But It’s Not An Easy Fix


27101884

The London Underground is an iconic piece of Victorian era engineering. What started in 1863 quickly became a core piece of infrastructure that would define the modern character of the British capital. It’s grown and changed immensely in the many years that have passed. Sadly, increasing patronage and more trains have created problems that the original designers never envisaged.

Deep in those London tunnels lies an engineering challenge. The Tube is literally cooking itself. Every day, millions of commuters descend into a network of tunnels that have been absorbing heat since the reign of Queen Victoria. Those clay-lined tubes have been soaking up excess thermal energy like a giant underground radiator, and now they’re giving it back with interest. The tunnels are simply too hot, and cooling them down is inordinately difficult.

The Perfect Storm of Thermal Chaos


The Tube’s heat problem isn’t just about one thing gone wrong – it’s about everything gone wrong at once. When Victorian engineers designed these tunnels, cooling wasn’t a major consideration. The tight, compact tunnels were built deep, nestled in the clay beneath London. In the early days, temperatures in the Underground were considered comfortably low.

“The Underground’s the only spot for comfort when the days are hot; it is cooler below.” – London Underground poster, 1926


Originally, the clay surrounding the tunnels sat at around 14°C, acting as a heat sink for the network. However, over the years, with more trains coming and going and more heat pouring in, the temperature has risen. It now typically sits anywhere from 19° to 26 °C. That’s just the earth around the tunnels, though. Air temperatures are worse—hitting as high as 47°C during a 2006 heatwave. The problem has been a continual bugbear of the beloved Tube, with concerns that future heatwaves could see temperatures rise ever higher.
27101886Victoria and Central have been the hottest lines in recent years, according to TfL data.
The problem varies depending on which part of the Tube you’re on; some lines are worse than others. The Central Line is worthy of the nickname “The Central Heat Line”, with temperatures historically reaching 35°C. That’s not just uncomfortable – it’s approaching the limit of what the human body can handle efficiently. Much of this is due to the tunnel’s design. Opened in 1900, it featured two compact tunnels buried over 20 meters underground with minimal space for ventilation. It’s one of the so-called “deep-level” lines on the Underground network. Meanwhile, the Victoria line hit 31°C at its peak in 2023, and actually overtook the Central line as the hottest line, recording an average temperature of 28°C last year. Contrast that with the newer Jubilee line, which recorded an average temperature of just 22°C—far more comfortable.

To understand the problem, we need to know where the heat is coming from. A breakdown of heat sources was provided by Rail Engineering in 2007. Trains using their brakes, converting kinetic energy to heat, contributed 38% of the total heat input to the underground. The rest was put down to mechanical sources (22%) and the drivetrain (16%)—because those big electric motors get hot in operation.

As we wrap up for cooler temperatures outside, remember to remove coats whilst travelling to prevent overheating. 🧥

— TfL (@TfL) November 6, 2018

TfL at times has to remind customers that the Underground is warm even when it’s cold outside.

The rest of the heat came from a variety of sources, with train auxiliary equipment and tunnel support systems making up 13% and 4% respectively. The human factor can’t be ignored—each passenger is basically a 100-watt heater on legs. Multiply that by the millions of commuters that pass through each day, and you can see the scale of the problem. Indeed, passengers contributed the final 7% of heat generation in the Tube system. Of all the heat generated in the Tube, 79% passed into the tunnel walls, with 11% going into the tunnel itself. The remainder—just 10%—was removed via ventilation.

While the Tube had been slowly getting hotter for some time, the problem really started coming to a head in the mid-2000s, particularly when the European heatwave hit in 2006. Solutions were demanded, but the Underground wasn’t going to make it easy. The oldest parts of the network presented the greatest challenges, with precious little space to fit additional equipment for cooling. Many lines were simply too tight to allow for air conditioners to be retrofitted to existing trains, for example. Even if they were fitted, there would be a further problem of how to remove the additional waste heat generated from the tunnels, which were already too tight to ventilate effectively.
27101889Victoria Station has had plenty of attention in recent decades, with TfL installing new cooling systems. Credit: Oxyman, GNU Free Documentation License
The quagmire had even prompted then-Mayor Ken Livingstone to put forth a £100,000 bounty for anyone that could solve the problem. However, it went unawarded. Despite over 3,500 proposals, the Underground authorities found only unworkable or unaffordable solutions, or ones they were already considering.

As you might expect, the problem hasn’t just gone away. Indeed, British media have begun regularly putting out articles on the hottest tube lines each year, as well as updates on what is to be done. Looking ahead, climate change is only going to make this underground sauna more challenging to manage. TfL’s engineers are in a race against time and physics, trying to cool a system that was never designed to be cooled.

Transport for London’s engineers haven’t taking this lying down, however. In recent decades, they’ve thrown a range of complicated solutions at this difficult problem. Victoria Station saw major upgrades, with the successful trial of a groundwater-based cooling system and heavily-upgraded ventilation. On the toasty Central line, engineers realized there was an additional heat input into the system. Trains travelled above ground for part of their route, which would see them heat up in the sun and then bring that energy underground. Countermeasures included installing reflective material on train roofs and solar-reducing films on the windows.

Trials of a new panel-based cooling system have also taken place in recent years at the disused Holborn station, with TfL considering a rollout to various stations after successful trials. The system involves circulating cold water through a curved metal structure. Air is chilled by blowing it through the curved panels and into the station. The system is designed specifically to operate in stations on the deep parts of the Tube network, with an eye to keeping maintenance and operation of the system as practical as possible.
27101893Subsurface lines have been running S-Stock trains, which feature full air conditioning to keep passengers comfortable. Credit: (c) Transport for London
Some Tube lines have been lucky enough to get air-conditioned trains, too. These can be found on the Circle, District, Hammersmith & City, and Metropolitan lines. The modern S-Stock trains run largely on the less-deep sub-surface Tube lines, where it’s possible to easily deal with the hot exhaust of the air conditioning systems. These trains also have regenerative brakes, which turn some kinetic energy back into electricity to feed into the tube network. This cuts the amount of kinetic energy turned into heat, which aids in keeping the network cooler.

The Picadilly line is due to gain air conditioning in 2025, when it abandons its 1973 Stock trains for newer models. Other lines will have to wait longer. Central Line is slated to receive new air-conditioned trains in early 2030, which will replace the aging 1992 Stock models operating on that line. Bakerloo, Waterloo and City, and Jubilee lines are slated to receive upgraded trains “within the next 20 years” according to a Transport for London statement late last year.
27101896The Picadilly line will see its aging trains replaced with newer air-conditioned models starting in 2025.
Air conditioned trains will help to some degree by cooling passengers on the move. However, those air conditioners will necessarily pump heat out of carriages and straight into the tunnels the trains are travelling through, plus some waste heat to boot. That heat will have to be dealt with one way or another, lest the network heat up further. There’s also the problem that passengers on platforms will still be exposed to high temperatures. Ultimately, both the stations and the trains need to be brought down to reasonable temperature levels. Ideally, the tunnels would be, too, in order to protect any customers that get stuck in a tunnel on a broken-down service. TfL also needs to find a way to bring temperatures under control if it wants to increase services. More trains means more heat going into the system—so it’s important to find a way to pull more heat out, too.

Overall, the problem is still a long way from being solved. The fact is that the London Underground has 11 lines, 272 stations, and more than 4,000 trains. Upgrading all of those at once simply isn’t economically viable. Instead, it appears that Transport for London will keep chipping away at the issue, bit by bit, over the years to come. Ideally, this will outpace any increases in average temperatures brought on by our seemingly-ever-hotter climate. For now, London’s commuters will continue their daily descent into one of the world’s most interesting thermal management case studies. Just remember to bring a bottle of water and some breathable clothing– you’re going to need it.


hackaday.com/2024/12/04/the-lo…


Addio Licenze Office! Massgrave ha trovato il modo per una “Attivazione Eterna”


Il noto gruppo di entusiasti cracker Massgrave ha riferito di essere riuscito a violare “quasi tutta la protezione delle licenze dei software Windows/Office”. Questa svolta consente presumibilmente di attivare “praticamente qualsiasi versione di Windows e Office” per sempre.

Come sai, l’installazione di Windows e Office richiede l’attivazione e per questo processo esistono da tempo varie soluzioni alternative e hack. Un’opzione popolare richiede solo una riga di istruzioni tramite PowerShell e consente di attivare Windows 8 e Office.

Ora i membri del gruppo Massgrave hanno riferito di aver trovato un modo per estendere questo metodo di attivazione ad altre versioni dei prodotti Microsoft.
27092716
Secondo loro, il nuovo metodo funziona su qualsiasi versione client o server di Windows e include aggiornamenti di sicurezza estesi (ESU) e chiavi di licenza per volume specifiche del client Microsoft (CSVLK).

“Grazie al nuovo metodo, possiamo attivare in modo permanente quasi tutte le versioni di Windows e Office, da Vista fino agli ultimi Windows 11 e Server 2025, inclusi CSVLK ed ESU”, scrivono gli sviluppatori e affermano che questa è la più grande innovazione in Windows e Office. La pirateria in ufficio negli ultimi anni.

Se prima era impossibile attivare in modo permanente tutti i prodotti, ora tale attivazione diventerà possibile, ad esempio, per Microsoft Office, Windows 7, Windows 8 e 8.1, Windows Server (qualsiasi versione più recente). È stato inoltre riferito che il crack sarà in grado di fornire supporto esteso (Aggiornamenti di sicurezza estesi, ESU) per Windows 10 non appena sarà attivo nell’ottobre 2025.

Massgrave scrive che il crack sarà disponibile nei prossimi mesi, ma è ancora in fase di sviluppo.

Tieni presente che gli strumenti di Massgrave sono posizionati come open sourcee che i file di progetto Microsoft Activation Scripts (MAS) sono disponibili da un po’ di tempo su GitHub, di proprietà di Microsoft. Tuttavia, l’azienda non intraprende alcuna azione contro i cracker.

Inoltre, l’anno scorso si è appreso che anche anche gli ingegneri del supporto Microsoft a volte ricorrono alle soluzioni Massgrave.

L'articolo Addio Licenze Office! Massgrave ha trovato il modo per una “Attivazione Eterna” proviene da il blog della sicurezza informatica.


Sniffing Around Inside a ThinkPad Battery


27080724

For most people, a battery pack that’s misbehaving simply means it’s time to get a new battery. But when the battery in their ThinkPad wasn’t able to muster up more than 20 minutes of runtime, [Shrinath Nimare] saw an opportunity to dig deeper and do a bit of investigating.

The problem seemed to be that the battery pack was reporting that it was 100% charged at just 11.7 V instead of the correct 12.3 V. As it turns out, that 11.7 V figure is only slightly above what the battery should be when its run flat — so in reality, the battery was never actually getting a charge and would report that it was dead after just a few minutes of use. But why?

With a logic analyzer attached to the pins of the battery, [Shrinath] set out to sniff its communications with the ThinkPad. Even if it wouldn’t lead to fixing the battery pack, the information obtained would potentially be useful for other projects, such as creating a custom high-capacity LiFePO4 pack down the line.

With the pack opened, [Shrinath] determined that a 51F51 BMS IC was running the show. The battery communicates with the host computer over SMBus, which is very similar to I2C. In fact, they’re so similar that [Shrinath] was able to use the I2C decoder in sigrok to break out the read and write commands and compare them to a PDF of the Smart Battery Data Specification.
27080726Using the I2C decoder to read SMBus messages.
With a few captures in hand, [Shrinath] made some good progress in decoding what the two devices are saying to each other. For example, when the computer sent the command 0x15, the battery correctly responded with the desired charge voltage of 12.3 V. The command 0x18 was then given, which the specification says should cause the battery to report its capacity. Here again, valid data was returned, confirming that [Shrinath] was on the right path.

Even though it’s still early in the investigation, [Shrinath] had enough trouble finding practical examples of sniffing SMBus data that they thought it would be worth uploading their captures and notes to Hackaday.io. Hopefully further poking will show if the battery can be revived, but even if not, we’re always glad to see when hackers are willing to document their exploits for the benefit of the community.

This actually isn’t the first time we’ve heard of somebody snooping on their ThinkPad battery — back in 2020, we covered [Alexander Parent]’s efforts to create an open source battery pack for the T420 based on the ATtiny85.


hackaday.com/2024/12/04/sniffi…


Kaspersky Security Bulletin 2024. Statistics


27068439

All statistics in this report come from Kaspersky Security Network (KSN), a global cloud service that receives information from components in our security solutions voluntarily provided by Kaspersky users. Millions of Kaspersky users around the globe assist us in collecting information about malicious activity. The statistics in this report cover the period from November 2023 through October 2024. The report doesn’t cover mobile statistics, which we will share in our annual mobile malware report.

The year in figures


During the reporting period, Kaspersky solutions:

  • Stopped 302,287,115 malware attacks launched from online resources across the globe.
  • Detected 85,013,784 unique malicious URLs.
  • Blocked 72,194,144 unique malicious objects with the help of Web Anti-Virus components.
  • Prevented ransomware attacks on the computers of 303,298 unique users.
  • Stopped miners from infecting 999,794 unique users.
  • Prevented the launch of banking, ATM or PoS malware on the devices of 208,323 users.

Fill the form below to download the “Kaspersky Security Bulletin 2024. Statistics” full report (English, PDF)
(function(w,d,u){var s=d.createElement('script');s.async=true;s.src=u+'?'+(Date.now()/180000|0);var h=d.getElementsByTagName('script')[0];h.parentNode.insertBefore(s,h);})(window,document,'https://cdn.bitrix24.eu/b30707545/crm/form/loader_1126.js');

initBxFormValidator({ formId: "inline/1126/4te5h3", emailFieldName: 'CONTACT_EMAIL', naturalFieldNames: [ 'CONTACT_UF_CRM_NODES' ], lengthRestrictedFieldNames: { CONTACT_EMAIL: 250, CONTACT_POST: 128, CONTACT_NAME: 50, CONTACT_UF_CRM_COMPANY: 255, CONTACT_UF_CRM_COMPANY_TAX_ID: 50, CONTACT_UF_CRM_PRODUCT_INTEREST: 255, CONTACT_UF_CRM_FORM_QUESTION_2: 255, CONTACT_UF_CRM_FORM_QUESTION_3: 255, CONTACT_UF_CRM_FORM_QUESTION_5: 255 }, redirectUrl: 'https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/12/03153220/KSB-statistics-of-the-year-EN-final.pdf' })


securelist.com/ksb-2024-statis…


Fluke Meter Fails with a Simple Problem


27063354

[TheHWcave] found a Fluke 27 multimeter that looked like it had had quite a rough life. At first, the display flashed an overload indicator until he gave it a good smack—or, as he likes to call it, percussive maintenance. Even then, it would not give good readings, so it was time to open it up.

The display did work, so the obvious theory was something wrong with the analog board. Removing the shields showed what looked like a normal enough PCB. Or at least, the components looked fine. But on the solder side of the board, there was some corrosion on two contacts, so some careful cleaning and resoldering fixed the meter to be as good as new on at least some scales.

Tracing the pins, the corrosion put a resistor between two pins of an op-amp. The only remaining problem was the milliamp scale, but that was a simple blown fuse in the line. Since it was working, it was worth some time to clean up the ugly exterior, which is only cosmetic but still worth a little effort. He left the plastic case cracked and beaten, but he put a lot of effort into clearing up the display window.

You might wonder why you’d fix a meter when you can get one so cheap. However, these name-brand meters are high-quality and new, quite expensive. Even older ones can be worth the effort. While you usually don’t need an X-ray machine to fix something like this, it can’t hurt.

youtube.com/embed/VX-XzjO_ix8?…


hackaday.com/2024/12/04/fluke-…


Un Threat Actor rivendica compromissione ai danni di Royal Caribbean


Un nuovo allarme di sicurezza si fa sentire nel panorama aziendale: un Threat Actor, attivo sulla nota piattaforma BreachForums, ha presumibilmente messo in vendita un consistente volume di dati sensibili appartenenti a Royal Caribbean International, leader nel settore crocieristico.

Al momento, non possiamo confermare la veridicità della notizia, poiché l’organizzazione non ha ancora rilasciato alcun comunicato stampa ufficiale sul proprio sito web riguardo l’incidente. Pertanto, questo articolo deve essere considerato come ‘fonte di intelligence’.

Dettagli del Post nel Forum Underground


Secondo quanto riportato nel post da parte dell’attore malevolo, i dati compromessi comprenderebbero:

  • 79.000 record di transazioni aziendali.
  • Dati personali di 33.500 dipendenti, inclusi potenzialmente dettagli sensibili come nomi, indirizzi e informazioni contrattuali.

27053215

L’offerta sembra essere chiara e senza scrupoli: vendere tutto al miglior offerente, aprendo la strada a possibili abusi che spaziano da frodi su larga scala a sofisticati attacchi di social engineering, diretti magari proprio contro il personale della compagnia.

Le aziende come Royal Caribbean non sono semplici obiettivi: esse rappresentano ecosistemi complessi, dove i dati sensibili di clienti e dipendenti si intrecciano. Qualora tale attacco venga confermato potrebbe avere conseguenze devastanti, che vanno ben oltre la violazione dei sistemi:

  • Fiducia dei dipendenti compromessa.
  • Potenziali sanzioni legali per la violazione della protezione dei dati.
  • Rischi di ricatti informatici o utilizzo illecito dei dati rubati.

Se sei un dipendente o un collaboratore di Royal Caribbean, è essenziale agire tempestivamente per ridurre i rischi: monitora i tuoi account cercando eventuali accessi sospetti o tentativi di phishing, aggiorna le credenziali e, quando possibile, attiva l’autenticazione MFAi, segnala anomalie riportando prontamente qualsiasi attività sospetta all’azienda e alle autorità competenti.

Conclusione


Questo presunto incidente dimostra ancora una volta quanto i dati sensibili siano tra i bersagli più ricercati dai cybercriminali. Non è solo una notizia isolata, ma un invito all’azione: aziende e professionisti devono rafforzare le proprie difese e investire nella sicurezza per fronteggiare il crescente rischio di violazioni sempre più sofisticate. La minaccia è reale, e la risposta deve esserlo altrettanto.

Come nostra consuetudine, lasciamo sempre spazio ad una dichiarazione da parte dell’azienda qualora voglia darci degli aggiornamenti sulla vicenda. Saremo lieti di pubblicare tali informazioni con uno specifico articolo dando risalto alla questione.

RHC monitorerà l’evoluzione della vicenda in modo da pubblicare ulteriori news sul blog, qualora ci fossero novità sostanziali. Qualora ci siano persone informate sui fatti che volessero fornire informazioni in modo anonimo possono utilizzare la mail crittografata del whistleblower.

L'articolo Un Threat Actor rivendica compromissione ai danni di Royal Caribbean proviene da il blog della sicurezza informatica.


SMB Relay: Attacco, Mitigazione, Strategie e Soluzioni Efficaci


Gli attacchi SMB Relay sono una tecnica di attacco che sfrutta vulnerabilità nei protocolli di rete, come SMB (Server Message Block), per impersonare un utente legittimo e accedere a risorse di rete sensibili senza necessità di conoscere le credenziali in chiaro.

Questo attacco è comune nei contesti di reti interne e spesso sfrutta l’assenza di SMB Signing obbligatorio.

Questo attacco può essere usato in maniera complementare con LLMR poisoning. LLMNR poisoning può essere usato per catturare hash NTLM che poi sono sfruttati in un SMB relay. Quindi, è importante implementare misure di difesa su entrambi i fronti.

Come funziona un SMB Relay Attack


Condizioni necessarie:

  • SMB Signing disabilitato o non obbligatorio.
  • Un utente o amministratore con privilegi elevati deve essere attivo sulla rete.

Attacco: L’attaccante si posiziona come intermediario (Man-in-the-Middle) utilizzando strumenti come Responder per catturare hash NTLM. Questi possono essere “relayati” direttamente a un server SMB vulnerabile tramite strumenti come ntlmrelayx, bypassando l’autenticazione.
27050346
Nel cuore di un attacco SMB relay, gli aggressori intercettano e trasmettono le sessioni di autenticazione SMB per sfruttarle a proprio vantaggio. Questo metodo subdolo è potente perché non richiede la decifrazione degli hash delle password. I professionisti della sicurezza devono essere informati su come questo attacco possa penetrare nei sistemi, rendendo vitale l’utilizzo di misure preventive.

Mitigare il rischio di attacchi SMB relay richiede l’applicazione di tecniche specifiche, come l’abilitazione della firma SMB e l’adozione di protocolli crittografati. Queste tecniche riducono drasticamente la possibilità che un attaccante possa sfruttare una sessione di autenticazione intercettata. Attraverso un’attenta pianificazione delle difese, le organizzazioni possono proteggere efficacemente i propri sistemi informatici.

Key Takeaways


  • Gli attacchi SMB relay permettono accessi non autorizzati senza credenziali
  • Intercettazione delle sessioni di autenticazione SMB sfrutta punti deboli
  • Tecniche di difesa includono la firma SMB e protocolli crittografati


Fondamenti Tecnici

27050348
Il protocollo SMB è fondamentale per le reti Windows, permettendo la condivisione di file tra macchine. SMB opera utilizzando NTLM per l’autenticazione, che è cruciale per comprendere la vulnerabilità degli attacchi relay.

Cos’è SMB e il suo Ruolo nelle Reti


SMB (Server Message Block) è un protocollo di rete che facilita la condivisione di file, stampanti e porte seriali tra diversi computer all’interno di una rete. In ambienti Windows, SMB è essenziale perché permette una comunicazione efficace tra client e server.

SMB lavora nel livello di applicazione nel modello OSI, permettendo agli utenti di accedere alle risorse condivise come cartelle e file. È anche utilizzato per richieste di operazioni su file e per comunicazioni inter-processo. La sua funzionalità include richieste di apertura e lettura di file su dispositivi remoti, rendendolo essenziale in ambienti di lavoro collaborativi e integrati.

NTLM e il Processo di Autenticazione


NTLM (NT LAN Manager) è un protocollo di autenticazione utilizzato in molte implementazioni di SMB. Utilizza un meccanismo di sfida e risposta per verificare l’identità dell’utente. Questo processo inizia con il server che invia una sfida al client, a cui il client risponde con un hash calcolato.

Il protocollo NTLM è vulnerabile a diversi tipi di attacchi, tra cui il relay, poiché l’hash intercettato può essere utilizzato per autenticarsi senza conoscere la password originale. Questo è un punto critico perché consente agli attaccanti di sfruttare le credenziali intercettate per accedere indebitamente a risorse di rete, rappresentando un rischio significativo per le infrastrutture IT aziendali.

Descrizione dell’Attacco SMB Relay

27050350
Gli attacchi SMB Relay consentono agli aggressori di sfruttare una sessione di autenticazione SMB intercettata. L’attaccante può relayare le informazioni per ottenere accesso non autorizzato senza la necessità di conoscere le credenziali dell’utente.

Fasi Principali dell’Attacco


Un attacco di tipo SMB Relay inizia con l’intercettazione della comunicazione tra un client e un server. L’attaccante si pone tra i due, facendo credere al client di comunicare con il server legittimo.

Il primo passo è catturare la richiesta di autenticazione SMB inviata dal client. Una volta ottenuto, l’attaccante inoltra questa richiesta al server destinato per approvarla. Questo si traduce in un accesso non autorizzato, poiché il server cerca di autenticare il client a causa dell’intermediazione dell’attaccante.

Questo attacco sfrutta vulnerabilità nella configurazione delle reti, in particolare quando non vengono utilizzate misure di sicurezza avanzate come la firma obbligatoria per l’SMB. È fondamentale essere consapevoli di queste tecniche per adottare misure preventive.

Possibili Vettori di Attacco


Ci sono numerosi vettori che possono essere sfruttati negli attacchi SMB Relay. Uno comune è il cosiddetto attacco man-in-the-middle, in cui l’attaccante si interpone tra una comunicazione di rete SMB.

Un altro vettore frequente è l’utilizzo di vulnerabilità note all’interno della rete, dove mancano protocolli di autenticazione come l’uso del NTLMv2. Gli attacchi possono anche derivare da configurazioni errate o da una gestione inadeguata delle credenziali di rete.

Gli amministratori di rete devono essere vigili e utilizzare strumenti di monitoraggio per ridurre il rischio di attacchi SMB Relay. Implementare difese efficaci è essenziale per proteggere l’integrità della rete.

Strategie di Mitigazione e Prevenzione

27050352

Per ridurre il rischio di attacchi SMB Relay, è essenziale adottare tecniche di configurazione sicura, protezione dei client, e implementazione di policy di sicurezza. Ogni area gioca un ruolo cruciale nel rafforzare la sicurezza della rete e minimizzare le vulnerabilità.

Consigli:

  • Abilitare SMB Signing: Questa misura garantisce l’integrità della comunicazione SMB, prevenendo l’uso di hash intercettati.
  • Disabilitare LLMNR e NetBIOS: Questi protocolli facilitano il poisoning delle risposte DNS sulla rete locale.
  • Implementare il principio del least-privilege: Ridurre i diritti amministrativi assegnati agli utenti finali.
  • Evitare il riutilizzo delle password: Gli attaccanti sfruttano hash identici su più dispositivi per ampliare il compromesso.


Configurazione del Server


Configurare i server per utilizzare protocolli sicuri è fondamentale. L’abilitazione della firma SMB aiuta a impedire attacchi non autorizzati. Questo processo assicura che i dati inviati e ricevuti siano autenticati.

È importante aggiornare regolarmente i server con le patch di sicurezza più recenti. Queste proteggono contro le vulnerabilità note che potrebbero essere sfruttate dagli aggressori.

L’uso di protocolli crittografati come SMBv3 aggiunge un ulteriore livello di sicurezza alla configurazione del server. Questo assicura una protezione più robusta contro tentativi di intercettazione e manipolazione dei dati.

Protezione dei Client


I client devono avere sistemi operativi aggiornati per prevenire sfruttamenti attraverso le vulnerabilità esistenti. Questo include l’applicazione di patch di sicurezza che risolvono le falle nei protocolli più vecchi.

L’installazione di software antivirus e firewall ben configurati fornisce una barriera aggiuntiva contro gli attacchi. Questi strumenti rilevano e bloccano tentativi sospetti di accesso alla rete.

La disabilitazione degli account inutilizzati e privilegiati sui client limita le possibilità per gli aggressori di ottenere accesso tramite credenziali compromesse.

Implementazione di Policy di Sicurezza


L’implementazione di policy di sicurezza efficace è essenziale per prevenire gli attacchi SMB Relay. L’adozione di NTLMv2, ad esempio, migliora la sicurezza dell’autenticazione riducendo il rischio di attacchi di relay.

L’imposizione di politiche di password sicure garantisce che le credenziali degli utenti non siano facilmente compromesse.

Monitorare e registrare costantemente le attività di rete aiuta a rilevare attività sospette in tempo reale. La visibilità sulla rete consente una risposta più rapida e mirata agli incidenti di sicurezza.

Strumenti e Tecniche di Difesa

27050354

Per proteggere i sistemi dagli attacchi SMB relay, è essenziale impiegare strumenti di monitoraggio avanzati e implementare tattiche di inganno come gli honeypots. Questi approcci aiutano ad individuare e prevenire attività malevole, assicurando al contempo un ambiente più sicuro per i dati sensibili.

Software di Monitoraggio e Rilevamento


Software dedicati al monitoraggio e al rilevamento sono cruciali nella difesa contro gli attacchi SMB relay. Tali strumenti possono eseguire una scansione continua delle reti per identificare comportamenti anomali. Nei tool di rilevamento avanzato, i dati di rete vengono analizzati in tempo reale, il che permette di intervenire prima che si verifichino danni significativi. Un esempio di ciò sono le soluzioni proposte da Microsoft, che offrono strategie difensive per il traffico SMB. Inoltre, è importante abilitare le firme SMB per garantire integrità e autenticità nei messaggi di autenticazione. Questi software devono poter integrare allarmi rapidi che avvisano gli amministratori di rete in caso di potenziali attacchi.

Uso di Honeypots


Gli honeypots rappresentano una tecnica ingegnosa per distrarre e analizzare gli aggressori. Questi sistemi fungono da trappole all’interno delle reti, fingendo di contenere informazioni importanti. Quando un aggressore interagisce con un honeypot, vengono raccolte informazioni preziose sulle sue tecniche e motivazioni. Per implementare honeypots efficaci contro gli attacchi SMB relay, è fondamentale configurare correttamente i loro parametri e monitorarli attivamente. Gli honeypots permettono di studiare il comportamento di un attacco in un ambiente controllato, consentendo aggiornamenti e adeguamenti delle difese basati su dati concreti. Tali informazioni possono essere usate per rafforzare le difese esistenti e prevenire futuri attacchi.

Dimostrazione Pratica


Invece di decifrare gli hash raccolti con Responder, possiamo invece inoltrare quegli hash a macchine specifiche e potenzialmente ottenere accesso. Utilizzeremo il laboratorio AD creato nei precedenti ariticoli, per questo attacco é necessario che:

Requisiti:

La firma SMB deve essere disabilitata o non applicata (disabled or not enforced) , come di default, sul target.
27050356
Le credenziali utente inoltrate devono essere da admin sulla macchina per ottenere un accesso, nel nostro caso :

prima di continuare dobbiamo configurare correttamente responder per fare in modo che gli hash che cattureremo non siano intercettati ma inoltrati (RELAYED , appunto):

sudo mousepad /etc/responder/Responder.conf
27050358
ed ora usaimo ntlmrelay.py che riceverá da RESPONDER l’hash e lo indirizzerá verso la macchina target, se l’utente é una admin della macchina (e “sesposito” lo é) l’attacco funzionerà.
27050360
ora serve un evento sulla rete, per esempio una richiesta di accesso ad un folder che non esiste:

Un attacco SMB Relay si basa sul fatto che un dispositivo della rete (la vittima) invii volontariamente una richiesta SMB o NTLM di autenticazione. Senza questa interazione iniziale, l’attaccante non può ottenere l’hash NTLM dell’utente da “inoltrare”. L’evento può essere causato in diversi modi:

Attivato da un utente:


Un utente accede a una condivisione di rete SMB malevola (ad esempio, cliccando su un link “smb://attacker-ip” inviato in un’email).

L’utente tenta di stampare su una stampante SMB configurata in modo malevolo.

Attivato passivamente:


L’attaccante utilizza un tool come Responder per “spoofare” (falsificare) risposte a richieste di rete DNS o WPAD. La vittima, in cerca di un servizio SMB o WPAD, si connette automaticamente al server malevolo.

Alcuni dispositivi inviano automaticamente richieste SMB alla rete (ad esempio, per cercare condivisioni di rete o stampanti).

Perché funziona?


L’attacco funziona sfruttando le debolezze del protocollo NTLM in combinazione con configurazioni di rete non sicure. Ecco i dettagli tecnici:

Autenticazione tramite NTLM:


Quando un dispositivo cerca di autenticarsi con SMB, invia un hash NTLM (challenge-response) al server. Questo hash rappresenta le credenziali dell’utente.

L’attaccante cattura questo hash durante l’evento e lo inoltra a un altro server (il “target”) che accetta la stessa autenticazione.

Assenza di SMB Signing:


L’attacco SMB Relay funziona solo se il SMB Signing è disabilitato o non richiesto sul server target.

SMB Signing protegge l’integrità del traffico SMB verificando che i messaggi non siano stati alterati. Se non è abilitato, l’attaccante può inoltrare il traffico senza che il server si accorga della manipolazione.

Credenziali valide:


Se l’utente le cui credenziali sono state inoltrate ha i privilegi di amministratore sul server target, l’attaccante ottiene accesso completo.

Assenza di MFA (Autenticazione Multifattore):


NTLM non supporta nativamente l’autenticazione a due fattori. Pertanto, l’attacco funziona se il sistema non richiede ulteriori verifiche.
27050362
Gli hash del SAM locale sono stati estratti. Questi hash possono ora essere portati offline e decifrati. Ancora meglio, possiamo utilizzare attacchi pass-the-hash per accedere alle macchine senza mai decifrare la password.

Nota: non abbiamo compromesso un account di dominio, né era necessario farlo. Ancora una volta, la bellezza degli attacchi relay è che non è mai necessario conoscere la password per portare a termine l’attacco. Quindi, serve una buona password policy!
27050364 27050366
Ricezione qui sopra di una reverse shell.

L'articolo SMB Relay: Attacco, Mitigazione, Strategie e Soluzioni Efficaci proviene da il blog della sicurezza informatica.


L’Exploit per l’RCE sui Firewall Palo Alto è Online! Amministrazione Inclusiva… per Tutti!


Da qualche ora su Breach Forum un threat actor dal nome “newplzqibeme”, ha condiviso un repository GitHub dove è pubblicato un exploit scritto in python per lo sfruttamento attivo della CVE-2024-0012 su PanOS (il sistema operativo dei firewall Palo Alto).

L’exploit garantisce all’attaccante, accesso completo amministrativo al firewall con un meccanismo di Authentication Bypass, ottenendo l’accesso come amministratore.

Nel post di “newplzqibeme” sono riportati a titolo di esempio due IP pubblici, che sono molto probabilmente dei firewall esposti e vulnerabili.

I firewall con PanOS 10.2, 11.0, 11.1 e 11.2 sono affetti da questa CVE se non aggiornati alle rispettive versioni (>= 10.2.12-h2, >= 11.0.6-h1, >= 11.1.5-h1 e >= 11.2.4-h1).

La CVE, categorizzata con livello 9.3 (ancora sotto revisione), permette appunto accesso amministrativo completo al firewall e il tool di exploit a disposizione pubblicamente su GitHUB, permette anche la creazione di una Reverse Shell per l’attaccante.

Lo script su GitHUB è aggiornatissimo (ultimo update 1 Dicembre 2024).
27047195
Sul sito di Paolo Alto ci sono tutte le informazioni sulla CVE, le possibili mitigazioni e i dettagli tecnici.

Viene anche citata un POC (Proof Of Concept) per lo sfruttamento di tale CVE che abbiamo trovato su GitHUB (anche questa relativamente aggiornata alla data di 15 giorni dalla stesura di questo articolo).
27047197
Il nostro consiglio è quello di intervenire immediatamente sui firewall eventualmente esposti su internet con l’interfaccia web di amministrazione, ma non solo!

Anche i firewall non esposti sono vulnerabili a tale attacco se l’accesso avviene da una trusted network; nel malaugurato caso in cui un thread actor abbia già accesso alle vostre reti.

In questo momento ci sono circa 257 mila dispositivi esposti su internet che rispondo a Palo Alto Global Protect. Si consiglia di aggiornare tali device, se ne siete in possesso, per evitare accessi indesiderati da parte degli attaccanti

L'articolo L’Exploit per l’RCE sui Firewall Palo Alto è Online! Amministrazione Inclusiva… per Tutti! proviene da il blog della sicurezza informatica.


Fail of the Week: The SMD Crystal Radio That Wasn’t


27047213

The crystal radio is a time-honored build that sadly doesn’t get much traction anymore. Once a rite of passage for electronics hobbyists, the classic coil-on-an-oatmeal-carton and cat’s whisker design just isn’t that easy to pull off anymore, mainly because the BOM isn’t really something that you can just whistle up from DigiKey or Mouser.

Or is it? To push the crystal radio into the future a bit, [tsbrownie] tried to design a receiver around standard surface-mount inductors, and spoiler alert — it didn’t go so well. His starting point was a design using a hand-wound air-core coil, a germanium diode for a detector, and a variable capacitor that was probably scrapped from an old radio. The coil had three sections, so [tsbrownie] first estimated the inductance of each section and sourced some surface-mount inductors that were as close as possible to their values. This required putting standard value inductors in series and soldering taps into the correct places, but at best the SMD coil was only an approximation of the original air-core coil. Plugging the replacement coil into the crystal radio circuit was unsatisfying, to say the least. Only one AM station was heard, and then only barely. A few tweaks to the SMD coil improved the sensitivity of the receiver a bit, but still only brought in one very local station.

[tsbrownie] chalked up the failure to the lower efficiency of SMD inductors, but we’re not so sure about that. If memory serves, the windings in an SMD inductor are usually wrapped around a core that sits perpendicular to the PCB. If that’s true, then perhaps stacking the inductors rather than connecting them end-to-end would have worked better. We’d try that now if only we had one of those nice old variable caps. Still, hats off to [tsbrownie] for at least giving it a go.

Note: Right after we wrote this, a follow-up video popped up in our feed where [tsbrownie] tried exactly the modification we suggested, and it certainly improves performance, but in a weird way. The video is included below if you want to see the details.

youtube.com/embed/3jleBhsdZig?…

youtube.com/embed/-N85ixkloNs?…


hackaday.com/2024/12/03/fail-o…


A Month Without IPV4 is Like a Month Without…


27035179

Recently, there was a Mastodon post from [nixCraft] challenging people to drop their NAT routers for the month of November and use only IPv6. What would it be like to experience “No NAT November?” [Alex Haydock] decided to find out.

What did he learn? You’d imagine he’d either wholeheartedly embrace IPv6 or stagger back in and warn everyone not to mess with their configuration. Instead, he recommends you go IPv6 mostly. He notes he is only talking about a home network, not necessarily networks for a big company or an Internet carrier. That’s a different topic.

IPv6 has been around since 1998, but it has been slow to catch on. However, OS support seems universal at this point. [Alex] was able to easily switch on IPv6 only using Windows, macOS, and several Linux flavors. He didn’t use any Android devices, but they should be OK. His iOS phones were fine.

Where he did have problems was with embedded devices like the Nintendo Switch and a Steam Deck — surprising, since the Steam Deck uses Linux. Actually, the Steam device does support IPV6, it just thinks that if it doesn’t have an IPv4 network, the network must be down.

Some home networking gear also required IPv4 addresses to use their management interfaces. That’s especially funny since the devices clearly know about IPv6. They just don’t serve web pages over their IPv6 address.

Unfortunately, there are many websites that do not have IPV6 servers. That’s not as rare as you might think and [Alex] points out offenders like GitHub, Reddit, Discord, and Steam. No IPv4, no access to those and many other sites.

So despite being No NAT November, it was necessary to set up a NAT64 gateway to read IPv4-only websites. However, unlike normal IPv4 NAT (NAT44), you can use a NAT64 gateway anywhere on the network. [Alex’s] ISP hosts a NAT64 and DNS64 instance and that solved his problem.

The post goes on about other specific cases — if you’ve ever even thought about IPv6, it is worth a read. Switching over? Probably not yet, but as [Alex] points out, with a little work and perseverance, it is possible.

In addition to our earlier coverage of why IPv6 isn’t more popular, we’ve also made the arguments about why it should be.


hackaday.com/2024/12/03/a-mont…


3D Printing Threaded Replacements


26982419

Printing an object with threads is nothing new. If you know the specifications on the other thread or you are in control of it, no problem. But [Shop Therapy] wanted to print parts that mate with an existing unknown thread. Out come the calipers.

The first measurement is the height. He rounded that up in the video but mentioned in the comments that it should really be a little smaller so that it seats properly.

After that, he measures the pitch and the major diameter. Next, of course, is the minor diameter. The pitch is related to the spacing of the threads, the major diameter is the diameter of the outside part of the threads, and the minor diameter is the neck without threads.

Next, he’s off to Fusion 360 to design the matching cap. Of course, you could use whatever 3D CAD software you like. Fusion does have some nice thread-related operations, and while it isn’t exactly free, you can get licenses for personal use with no difficulty.

Printing threads has its ups and downs. We prefer embedding metal threads into our prints.

youtube.com/embed/8ZbPqpAxYJ4?…


hackaday.com/2024/12/03/3d-pri…


Car Radio Chip Goes Into DIY Build


26961821

[Sjef Verhoeven] still loves radio and enjoys the challenge of listening to radio signals from far away. He wanted to build his own radio and turned to the TEF6686 chip, a device often found in car radios. It is known to be very sensitive and seemed perfect for pulling in weak signals. So [Sjef] built this DIY radio and shares the details in this recent Spectrum post.

Unlike older radio-on-chip devices, the TEF6686 is a DSP, which, according to the post, is part of the reason it is ultrasensitive. Even though it is made for car radios, the device is versatile and can pick up shortwave as well as the usual broadcast bands, with the right configuration.

Initially, [Sjef] wanted to design his own tuner but rapidly found inexpensive modules. These had shielding and through-hole pins, making it much easier to deploy a radio using the chip. The modules run around $25 or less.

The rest of the project centers around an ESP32 and an OLED display, along with switches and encoders. The device requires a host to upload its firmware, so a device with a lot of flash memory was a must. The host must also store fonts for the OLED, and [Sjef] even included a database of ham radio callsigns so that when receiving a North American station, you can instantly see which state or province the station is probably in.

If you want to build a duplicate of this radio, all the details are on GitHub. You can also find kit versions.

If you want to build your own shortwave radio, you could spend more. Or, break out a breadboard, if you prefer.


hackaday.com/2024/12/03/car-ra…


Chess What: One More Pi-Powered Board


PI Board chess board on a table in a room

Chess is timeless, but automating it? That’s where the real magic begins. Enter [Tamerlan Goglichidze]’s Pi Board, an automated chess system that blends modern tech with age-old strategy. Inspired by Harry Potter’s moving chessboard and the commercial Square Off board, [Tamerlan] re-imagines the concept using a Raspberry Pi, stepper motors, and some clever engineering. It’s not just about moving pieces — it’s about doing so with precision and flair.

At its core, the Pi Board employs an XY stepper motor grid coupled with magnets to glide chess pieces across the board. While electromagnets seemed like a promising start, [Tamerlan] found them impractical due to overheating and polarity-switching issues. Enter servo linear actuators: efficient, precise, and perfect for the job.

But the innovation doesn’t stop there. A custom algorithm maps the 8×8 chess grid, allowing motors to track positions dynamically—no tedious resets required. Knight movements and castling? Handled with creative coding that keeps gameplay seamless. [Tamerlan] explains it all in his sleekly designed build log.

Though it hasn’t been long since we featured a Pi-powered LED chess board, we feel that [Tamerlan]’s build stands out for its ingenuity and optimization. For those still curious, we have a treasure trove of over fifty chess-themed articles from the last decade. So snuggle up during these cold winter months and read up on these evergreens!

youtube.com/embed/2aoKBoOyZoQ?…


hackaday.com/2024/12/03/chess-…


Holograms: the Art of Recording Wavefronts


26935663

The difference between holography and photography can be summarized perhaps most succinctly as the difference between recording the effect photons have on a surface, versus recording the wavefront which is responsible for allowing photographs to be created in the first place. Since the whole idea of ‘visible light’ pertains to a small fragment of the electromagnetic (EM) spectrum, and thus what we are perceiving with our eyes is simply the result of this EM radiation interacting with objects in the scene and interfering with each other, it logically follows that if we can freeze this EM pattern (i.e. the wavefront) in time, we can then repeat this particular pattern ad infinitum.
Close-up of the wavefront pattern recorded on the holographic film (Credit: 3Blue1Brown, YouTube)Close-up of the wavefront pattern recorded on the holographic film (Credit: 3Blue1Brown, YouTube)
In a recent video by [3Blue1Brown], this process of recording the wavefront with holography is examined in detail, accompanied by the usual delightful visualizations that accompany the videos on [3Blue1Brown]’s channel. The type of hologram that is created in the video is the simplest type, called a transmission hologram, as it requires a laser light to illuminate the holographic film from behind to recreate the scene. This contrasts with a white light reflection hologram, which can be observed with regular daylight illumination from the front, and which is the type that people are probably most familiar with.

The main challenge is, perhaps unsurprisingly, how to record the wavefront. This is where the laser used with recording comes into play, as it forms the reference wave with which the waves originating from the scene interact, which allows for the holographic film to record the latter. The full recording setup also has to compensate for polarization issues, and the exposure time is measured in minutes, so it is very sensitive to any changes. This is very much like early photography, where monochromatic film took minutes to expose. The physics here are significant more complex, of course, which the video tries to gently guide the viewer through.

Also demonstrated in the video is how each part of the exposed holographic film contains enough of the wavefront that cutting out a section of it still shows the entire scene, which when you think of how wavefronts work is quite intuitive. Although we’re still not quite in the ‘portable color holocamera’ phase of holography today, it’s quite possible that holography and hologram-based displays will become the standard in the future.

youtube.com/embed/EmKQsSDlaa4?…


hackaday.com/2024/12/03/hologr…


Windows 10 Addio! Ora Microsoft Ti Lascia Installare Windows 11 a tuo rischio e pericolo


A meno di un anno dalla fine della manutenzione di Windows 10, Microsoft conferma la possibilità di installare Windows 11 su PC non compatibili, specificando di non essere responsabile di ogni potenziale problema aggiungendo due piccoli dolorosi avvertimenti.

Dopo molti anni di servizio, Windows 10 verrà ritirato il 14 ottobre 2025, tra poco meno di un anno. Dopo tale data il sistema rimarrà ovviamente funzionante, ma non riceverà più alcun aggiornamento, né di qualità né di sicurezza. Continuare a utilizzare un computer con Windows 10 sarà quindi possibile, ma esporrà a maggiori rischi di pirateria informatica e potenziali problemi di stabilità.

Aggiornamento a Windows 11 o rimanere su Windows 10


Per i possessori di un computer che utilizza ancora questo sistema operativo sono possibili diverse soluzioni a seconda dei casi illustrati. Se il PC soddisfa i requisiti hardware, il modo più semplice è eseguire l’aggiornamento gratuito a Windows 11. Questo a condizione che il software di cui hai assolutamente bisogno funzioni con questa versione. Per i PC incompatibili, tuttavia, le cose sono un po’ più complicate.

La soluzione consigliata da Microsoft, ma anche la più costosa, è investire in un nuovo computer compatibile con Windows 11. Per chi non vuole o non può permettersi un simile acquisto, Microsoft offre un programma di manutenzione estesa per Windows 10. Per la cifra di 30 dollari, ti permetterà di beneficiare di un ulteriore anno di mantenimento. Una tregua a breve termine che non vale davvero il prezzo.

Rimangono quindi due strade possibili: sostituire Windows 10 con una distribuzione Linux, come Ubuntu, Linux Mint o anche Fedora. Oppure forzare l’installazione di Windows 11 utilizzando una tecnica per aggirare i requisiti hardware del sistema. La manovra è abbastanza semplice e non richiede particolari conoscenze informatiche, ma presenta comunque alcuni inconvenienti, sui quali Microsoft insiste molto.

Installare Windows 11 su un PC non compatibile è possibile ma non in tutti i casi


Come promemoria, quando è stato rilasciato Windows 11, Microsoft ha imposto un elenco di caratteristiche hardware che i PC che desiderano aggiornare devono soddisfare. Tra i requisiti, la presenza di un processore a 64 bit con una frequenza di almeno 1 GHz e che supporti le istruzioni POPCNT e SSE4.2, una RAM minima di 4 GB e un modulo di sicurezza TPM 2.0.

È proprio quest’ultimo punto che ha cristallizzato le frustrazioni degli utenti. Molti processori che si sono rivelati abbastanza potenti per far funzionare Windows 11 sarebbero sprovvisti di questo chip TPM 2.0. pertanto si ritroverebbero privati ​​dell’ultima versione del sistema operativo. Da allora, sono stati sviluppati una moltitudine di tecniche e strumenti, dagli stessi utenti, per aggirare questo vincolo e installare Windows 11 su PC normalmente incompatibili.

Esistono diversi metodi di facile implementazione. Come l’utilizzo dello strumento Rufus, che offre un’opzione specifica per creare una chiave USB di installazione di Windows 11 che ignora la presenza di un modulo TPM 2.0. Oppure lo script FlyBy11 che consente l’aggiornamento di un modulo non compatibile con la versione 24H2 di Windows 11. La pratica è talmente diffusa che Microsoft fornisce addirittura un metodo per farlo nella sua pagina dedicata all’installazione di Windows 11, basato sulla modifica di una chiave di registro.
26931406
Se esistono soluzioni per aggirare la presenza di un chip TPM 2.0, non esiste però alcuna tecnica per installare Windows 11 su un PC dotato di processore che non supporta le istruzioni POPCNT e SSE4.2. Per queste macchine non c’è altra alternativa che continuare con Windows 10 o migrare a una distribuzione Linux.

Installazione sconsigliata e forti incentivi a non farlo


Con l’avvicinarsi della fine vita di Windows 10 e di fronte all’ondata di metodi per aggirare i suoi requisiti hardware, Microsoft sembra quindi essersi arresa. Sta quindi cercando di bloccare l’installazione di Windows 11 su PC non compatibili. Questo anche se sconsiglia vivamente questa pratica, e ha voluto renderlo noto in maniera perfettamente chiara e alquanto invasiva.

Innanzitutto, nella sua pagina web dedicata all’installazione di Windows 11 su un computer che non soddisfa i requisiti hardware, Microsoft ha aggiunto un lungo paragrafo. Questo paragrafo funge da “disclaimer”. L’azienda tiene a precisare che declina ogni responsabilità in caso di problema, hardware o software, verificatosi su un PC che avrebbe forzato l’installazione di Windows 11.

Ma soprattutto, l’azienda indica in questa stessa pagina che ci sarà una filigrana inamovibile, la quale verrà aggiunta sul desktop dopo aver installato Windows 11 su un computer incompatibile. Sulla stessa linea, un messaggio di avviso apparirà inaspettatamente nelle Impostazioni di Windows, per ricordare regolarmente all’utente che il suo PC non soddisfa i requisiti minimi di configurazione.

Una pratica un po’ aggressiva ed invasiva, a cui purtroppo Microsoft è abituata nella comunicazione e promozione di questi prodotti. Non siamo sicuri che questo atteggiamento avrà l’effetto desiderato sui possessori di un PC ufficialmente non compatibile con Windows 11, ma non possiamo biasimare l’azienda per non aver avvisato i propri utenti dei rischi che comporta.

Una buona notizia, però: sempre sulla stessa lunghezza d’onda, Microsoft ora descrive in modo molto chiaro la procedura da seguire per effettuare il downgrade a Windows 10 in caso di problemi. Anche se la maggior parte delle persone che hanno installato forzatamente Windows 11 non riscontrano grossi problemi con il proprio PC, è sempre utile avere un modo conveniente per tornare indietro per coloro che potrebbero riscontrare difficoltà.

L'articolo Windows 10 Addio! Ora Microsoft Ti Lascia Installare Windows 11 a tuo rischio e pericolo proviene da il blog della sicurezza informatica.


Scratch And Sniff Stickers And The Gas Panic of ’87


26924833

Ever wonder how those scratch and sniff stickers manage to pack a punch of aroma into what looks like ordinary paper? The technology behind it is deceptively clever, and has been used everywhere from children’s books to compact discs.

Most Scratch and Sniff stickers are simple nose-based novelties, though they’ve seen other uses as diagnostic tools, too. As Baltimore Gas and Electric discovered in 1987, though, these stickers can also cause a whole lot of hullabaloo. Let’s explore how this nifty technology works, and how it can go—somewhat amusingly—wrong.

The Science

269248353M developed the scratch and sniff technology in the 1960s. It quickly gained iconic status in the decades that followed. via eBay
At its heart, scratch and sniff technology involves the microencapsulation of tiny smellable particles, which are then impregnated into stickers or other paper products. Microscopic amounts of aromatic materiale are trapped inside gelatin or plastic capsules, and then stuck to paper. When you scratch the surface, these capsules rupture, releasing their aromatic cargo into the air. It’s an elegant feat of materials engineering, originally developed by Gale W. Matson. Working at 3M in the 1960s, he’d been intending to create a new kind of carbonless copy paper.

Scratch and Sniff stickers soon became a popular novelty in the 1970s. The catchy name was perfect—it told you everything you need to know. A children’s book named Little Bunny Follows His Nose was one of the first widespread applications. Released in 1971, it was entirely based around the whole scratch and sniff concept. Children could read along and scratch various illustrations of peaches, roses and pine needles to see what they smelled like. The book was reprinted multiple times, remaining in publication for over three decades.

Other popular media soon followed. Pop rock band The Raspberries put a scratch and sniff sticker on their album cover in 1972. Director John Waters would go on to release his 1981 film Polyester with an accompanying “Odorama” card, which featured multiple smells for viewers to sniff during the movie. The concept still resurfaces occasionally, though the gimmick is now well-worn. In 2010, Katy Perry’s Teenage Dream album smelled like cotton candy thanks to a scratch-and-sniff treatment on the Deluxe Edition, and King Gizzard & The Lizard Wizard put a similar touch on 2017’s Flying Microtonal Banana.

Best Intentions

26924837Gas safety education is one of the most common uses of scratch and sniff technology today. via National Energy Foundation
Could scratch and sniff technology be put to more serious and noble uses? Enter Baltimore Gas and Electric Company. In 1987, the energy company had found the perfect way to educate customers about gas safety. The plan was foolproof—mail out 300,000 brochures with a scratch and sniff panel that would familiarize customers with the distinctive rotten-egg smell of mercaptan. That’s the sulfur compound added to natural gas to make leaks more easily detectable.

The brochures featured a red flame impregnated with scratch and sniff material. “Scratch this flame with your fingernail,” read the mailer. “Sniff it. . . . Let your family sniff it and be sure everyone recognizes the odor.”

The mailers were sent out with the best of intentions, in the pursuit of education and public safety. Unfortunately, the problem soon became apparent. Paper envelopes aren’t exactly hermetically sealed, and the stickers used were simply far too potent. The microencapsulated mercaptan scent was floating out of the envelopes before anyone could even get to the scratching part. Soon, the smell of gas was wafting out of these brochures all across Baltimore.
26924839BG&E uses a scratch and sniff element in its modern gas safety brochures. They’ve found a way to refine the technique to cause less trouble. via BG&E
The result was exactly what you’d expect when 300,000 pieces of mail start simulating gas leaks all over town. Fire departments across the city were fielding a deluge of calls from concerned citizens who thought their houses were about to explode. Many hadn’t opened their mailers—they’d simply detected the smell and rang in the alarm.

The LA Times caught the story, and reported that Baltimore firefighters had responded to “at least half a dozen false alarms.” Officials noted that one call was attended by 27 firefighters and 8 pieces of equipment, all over a poorly-thought-out brochure. “I finally went up to this BG&E bill on the table, and the odor was so strong, you only had to be in the vicinity of it,” fire Capt. Raymond Devilbiss told the LA Times.

Spokesman for Baltimore Gas and Electric Company, John Metzger, would later describe the faux pas as “somewhat of an embarrassment.” The company quickly withdrew the remaining brochures, but the damage was done. They’d successfully demonstrated that their gas detection additive worked perfectly – perhaps a little too perfectly.

Funnily enough, this incident didn’t discourage other utilities from trying the same thing. Promo Printing Group in Florida produces a range of mercaptan scratch and sniff cards for various cities and gas utilities. You can get them from the National Energy Foundation, too. Utilities are still mailing them out, as well, and there’s at some anecdotal evidence on Reddit that this actually helped someone catch a gas leak in their own neighborhood.
26924841via Reddit
The problem in the Baltimore case seems to be that the scratch and sniff stickers were simply too potent, or were otherwise releasing their scent when they shouldn’t have been. The incident serves as a reminder that even the simplest ideas can have unexpected consequences, especially when you’re literally mailing out thousands of artificial gas leaks. It’s a cautionary tale about the importance of exploring all possible failure modes–even the ones that seem absurd at first glance.

In the end, Baltimore Gas and Electric learned a valuable lesson about the potency of microencapsulation technology, and fire departments across Baltimore got some unexpected drill practice. As for the residents? They certainly didn’t forget what a gas leak smells like anytime soon. Indeed, though, the education campaign might have been pointless for some—the false alarm suggests many residents already knew the aroma quite well!


hackaday.com/2024/12/03/scratc…


Con Visual Studio Code Puoi scrivere programmi per Commodore 64!


È stato rilasciato ilVS64 v2.5.13. Si tratta di un “change log” che riporta ‘Correzioni di bug e miglioramenti minori’ su l’aggiornamento del RAD più famoso targato Microsoft.

L’estensione VS64 semplifica lo sviluppo di software per C64 utilizzando Visual Studio Code.

Fornisce un supporto approfondito per gli assembler 6502, i compilatori C e C++ e il linguaggio di programmazione BASIC. È dotato di un sistema di progetto e build, compilatori e convertitori per file BASIC e di risorse e si integra bene con tutte le funzionalità avanzate di Visual Studio Code, come il sistema di task e launch, debugging e introspection e supporto per grammatica e semantica del linguaggio.

Questa sarà un’opportunità imperdibile per tutti gli appassionati di tecnologia vintage, in particolare per coloro che sono cresciuti con il leggendario Commodore 64 e il Commodore VIC-20. Questi dispositivi iconici hanno segnato l’inizio del loro viaggio nel mondo della programmazione, grazie al linguaggio BASIC, che ha gettato le basi per molte carriere tecnologiche di oggi.
26916205Immagine del RAD Visual Studio e l’interfaccia per la scrittura del codice (fonte theoasisbbs.com)
Oggi, Microsoft Visual Studio rappresenta l’evoluzione del concetto di RAD (Rapid Application Development), offrendo una piattaforma versatile che consente di sviluppare con qualsiasi linguaggio di programmazione.

Questa innovazione, combinata con il fascino nostalgico delle console vintage, promette di conquistare gli appassionati di ieri e di oggi, unendo passato e futuro in un’unica esperienza entusiasmante.

L'articolo Con Visual Studio Code Puoi scrivere programmi per Commodore 64! proviene da il blog della sicurezza informatica.


Oltre l’Underground: Tecnologie e Rotte Segrete del Contrabbando di Persone


Il contrabbando di persone è un’attività criminale che continua a prosperare nell’underground, sfruttando tecnologie avanzate per evitare la rilevazione e garantire comunicazioni sicure.

Recenti informazioni rivelano come i contrabbandieri utilizzino strumenti di crittografia come PGP e piattaforme di messaggistica sicura come Jabber per coordinare le loro operazioni.

Il Reclutamento di Contrabbandieri Esperti


Un recente post su un forum underground, scritto da un utente chiamato “smartcore,” cerca un nuovo “capitano” con esperienza in operazioni di contrabbando. Il post specifica la necessità di trasportare 10-20 persone settimanalmente su brevi distanze, utilizzando probabilmente un sistema aereo. La comunicazione sicura è garantita dall’uso obbligatorio della crittografia PGP, con Jabber come opzione per la messaggistica.
26912603Le Rotte del Contrabbando
Le rotte più comuni per il contrabbando di persone includono la traversata dal litorale turco alle isole greche.

Nel 2024 circa 24.000 migranti sono stati salvati dalla Turchia mentre tentavano di raggiungere la Grecia. Una volta sbarcati, molti migranti cercano di proseguire il loro viaggio verso l’Europa occidentale attraverso la rotta balcanica, affrontando numerosi ostacoli e pericoli lungo il percorso.

Il conflitto tra Israele e Hamas a Gaza, insieme alle tensioni con Hezbollah in Libano, ha causato un aumento significativo dei movimenti di persone. Questi conflitti hanno portato a una crisi umanitaria, con molte persone costrette a fuggire dalle loro case. Le rotte di contrabbando, come quelle menzionate nel post, potrebbero essere utilizzate per facilitare il movimento di civili che cercano di fuggire dalla guerra.

Tecnologie Utilizzate dai Contrabbandieri e Implicazioni per la Cybersecurity


Le attività criminali nell’underground come il contrabbando di persone sono un problema complesso che sfrutta tecnologie avanzate per operare nell’ombra. La collaborazione internazionale e l’uso di tecnologie avanzate sono essenziali per combattere efficacemente queste attività criminali.

Solo attraverso un impegno congiunto e l’uso di strumenti tecnologici avanzati possiamo sperare di ridurre l’impatto di queste attività criminali.

L'articolo Oltre l’Underground: Tecnologie e Rotte Segrete del Contrabbando di Persone proviene da il blog della sicurezza informatica.