Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - New Version of Mirai IoT Botnet Targeting Flaw in Millions of Devices (securityledger.com)

chicksdaddy writes: An online attack that took an estimated 900,000 Deutsche Telekom broadband routers offline in Germany was the work of the Mirai botnet, a global network of infected cameras, printers, digital video recorders and other Internet of Things devices. But the attacks go well beyond Germany and the true number of vulnerable devices that could be targeted is much larger – numbering in the millions, according to new analysis by the firm Flashpoint. (https://www.flashpoint-intel.com/new-mirai-variant-involved-latest-deutsche-telekom-outage/)

On Monday, Deutsche Telekom acknowledged (https://www.telekom.com/de/medien/details/13-fragen-zu-angriff-auf-router-445088) that broadband routers it operates were knocked offline by a large scale attack that attempted to infect broadband routers with malicious software. Deutsche Telekom said that around 4 percent of its customers were affected by the attack – around 900,000 routers. But DT customers were not the only target. Flashpoint said it has observed infected devices operating from the United Kingdom, Brazil, Turkey, Iran, Chile, Ireland, Thailand, Australia, Argentina and Italy, as well as Germany.

In contrast to earlier rounds of Mirai infections, which relied on brute force (or “dictionary”) attacks that guessed default administrator usernames and passwords, the latest attacks attempted to exploit a known vulnerability in a remote maintenance interface. Attacks were launched using the TR-064 and TR-069 protocols which are common for managing so-called “customer premises equipment” (or CPE) in wide area network environments, DT said. Deutsche Telekom said it is working with manufacturers on firmware updates to address the vulnerability and is rolling them out to customers as they become available. The TR- protocols are what telecommunications firms and others use to remotely manage broadband routers in homes and businesses, said Zak Wikholm, a security research developer at Flashpoint, The Security Ledger reported. (https://securityledger.com/2016/11/report-millions-and-millions-of-devices-vulnerable-in-latest-mirai-attacks/)

While the exact number of infected devices isn’t known, Flashpoint estimates the global population of infected devices to be “five million” endpoints. The total number of vulnerable devices is much, much larger, though. Some estimates put the total number of devices with port 7547 open at around 41 million, Wikholm told Security Ledger. However, only a fraction of those allow parties other than Internet Service Providers to access those devices. That may be around five million devices globally, he said, though the exact number is unknown.

Even that smaller number could spell disaster. Denial of service attacks in recent months that reached upwards of 700 Gigabits per second of traffic were launched from Mirai botnets with only 100,000 to 200,000 infected hosts. Wikholm said object of the attacks appears to be to build large botnets that can be used “as a commercial service.”

Submission + - Muni System Hacker Hit Others By Scanning For Year-Old Java Vulnerability (arstechnica.com)

An anonymous reader writes: The attacker who infected servers and desktop computers at the San Francisco Metropolitan Transit Agency (SFMTA) with ransomware on November 25 apparently gained access to the agency's network by way of a known vulnerability in an Oracle WebLogic server. That vulnerability is similar to the one used to hack a Maryland hospital network's systems in April and infect multiple hospitals with crypto-ransomware. And evidence suggests that SFMTA wasn't specifically targeted by the attackers; the agency just came up as a target of opportunity through a vulnerability scan. In an e-mail to Ars, SFMTA spokesperson Paul Rose said that on November 25, "we became aware of a potential security issue with our computer systems, including e-mail." The ransomware "encrypted some systems mainly affecting computer workstations," he said, "as well as access to various systems. However, the SFMTA network was not breached from the outside, nor did hackers gain entry through our firewalls. Muni operations and safety were not affected. Our customer payment systems were not hacked. Also, despite media reports, no data was accessed from any of our servers." That description of the ransomware attack is not consistent with some of the evidence of previous ransomware attacks by those behind the SFMTA incident—which Rose said primarily affected about 900 desktop computers throughout the agency. Based on communications uncovered from the ransomware operator behind the Muni attack published by security reporter Brian Krebs, an SFMTA Web-facing server was likely compromised by what is referred to as a "deserialization" attack after it was identified by a vulnerability scan. A security researcher told Krebs that he had been able to gain access to the mailbox used in the malware attack on the Russian e-mail and search provider Yandex by guessing its owner's security question, and he provided details from the mailbox and another linked mailbox on Yandex. Based on details found in e-mails for the accounts, the attacker ran a server loaded with open source vulnerability scanning tools to identify and compromise servers to use in spreading the ransomware, known as HDDCryptor and Mamba, within multiple organizations' networks.

Submission + - Holding Shift + F10 During Windows 10 Updates Opens Root CLI, Bypasses BitLocker (bleepingcomputer.com)

An anonymous reader writes: Windows security expert and infrastructure trainer Sami Laiho says that by holding SHIFT + F10 while a Windows 10 computer is installing a new OS build, an attacker can open a command-line interface with SYSTEM privileges. This CLI debugging interface also grants the attacker full access to the computer's hard drive data, despite the presence of BitLocker. The CLI debugging interface is present when updating to new Windows 10 and Windows 10 Insiders builds.

The most obvious exploitation scenario is when a user leaves his computer unattended during the update procedure. A malicious insider can open the CLI debugger and perform malicious operations under a root user, despite BitLocker's presence. But there are other scenarios where Laiho's SHIFT + F10 trick can come in handy. For example when police have seized computers from users who deployed BitLocker or when someone steals your laptop. Windows 10 defaults help police/thieves in this case because these defaults forcibly update computers, even if the user hasn't logged on for weeks or months.

Submission + - Solar Now (Nearly) Cheaper than Coal (sciencealert.com)

managerialslime writes: In India, "this year, solar energy prices in the country dropped to around parity with coal for the first time ever, hitting 4.34 rupees (about 6 US cents) a kilowatt-hour (kWh), while coal tariffs range usually range in between 3–5 rupees/kWh (about 5–8 US cents)." At this rate, solar should be cheaper than coal within 12 to 18 months.

Comment AI 'Could Leave Half Of World Unemployed'? (Score 2) 508

AI 'Could Leave Half Of World Unemployed'?

In 1790, more than 90% of the population in the US was involved in agriculture.

Then came 150 years of relentless automation and today, 2% of the population is engaged in agriculture while today there is 5% unemployment and less than 2% unemployment among the college educated.

In the early 1900s, the automobile industry started putting horse-drawn carriages out of business, destroying 99% of that industry, while today there is 5% unemployment and less than 2% unemployment among the college educated.

In the 1980s, the adoption of email enabled corporate America to "flatten" organizations and lay off a great portion of middle management, while today there is 5% unemployment and less than 2% unemployment among the college educated.

Now, some well meaning idiot who has never read a book on capitalist economics wants to scare us about robots causing mass unemployment.

Today, the US employs, more than 2.5 million people in Arts, Entertainment, and Recreation," and 6.2 million people employed as scientists and engineers. We still have not conquered cancer, heart disease, genetic defect, spinal injuries, or figured out how to cost-effectively deal with global warming.

Only by automating more jobs can we free more people to pursue science, medicine, and engineering.

Bring on the robots!

Submission + - Judge: Stingrays are "simply too powerful" without adequate oversight (arstechnica.com)

managerialslime writes: A federal judge in Illinois has recently taken the unusual step of issuing three new stringent requirements for the government when it wants to deploy cell-site simulators. The move aims to protect the Fourth Amendment rights of innocent bystanders against unreasonable search and seizure.

Of course, for now, this order only applies to this one judge in the Northern District of Illinois.

Submission + - Lessig's Equal Citizens: "Why we need technical people to take on corruption" (medium.com)

Funksaw writes: An article in "Equal Citizens," Lawrence Lessig's Medium-based blog dealing with issues of institutional corruption in democratic politics, explains why, specifically, the reform movement needs (more) people with technical minds and technical skills.

FTA: "What we need are more people willing to look at the laws of this country based on their function. And when I use the word “function,” I mean very specifically the same sense that a computer programmer means it. (Because lord knows, government isn’t functioning by any other definition.)...

It’s not just that big money politics is being injected [like a code injection] into the function of democracy. It’s also that the function of democracy can be warped by an injection. Stopping the injection of money into our democratic function still leaves the function vulnerable to the same—or similar—injection attack.... We need people who can solve the problems of politics like a programmer solves problems in computer code, because a democratic system with vulnerabilities is a democratic system that can fail or be made to fail.
"

The article was authored by the technical adviser to the New Hampshire Rebellion and Mayday.US, two of Lessig's major reform projects.

Submission + - Rich and American? Australia wants you

An anonymous reader writes: Following the success of a millionaire visa program to attract wealthy Chinese, Australia has launched an invite-only visa program that promises citizenship to rich American entrepreneurs. To meet the requirements of the Premium Investment Visa plan Americans must first invest around 15 million Australian dollars. Reuters reports: "Investment advisors who have been briefed on the plan by government officials expressed doubts about the wisdom of targeting Americans, with several telling Reuters the more obvious place to start was Australia's Asian neighbors. After all, why would a successful U.S. entrepreneur want to invest a large chunk of cash in Australia — a country very similar to the United States, just further away from everything — in exchange for a passport that carries few additional benefits to their own? 'The U.S. has some problems that Australia doesn't have. It's got a lot more racial crimes, it's got a lot more gun-related crimes, but I don't think that is going to drive a whole bunch of ultra-rich Americans out of their country,' said Bill Fuggle, a partner at law firm Baker & McKenzie who advises wealthy Chinese migrating to Australia."

Comment Ranking colleges based on their products (Score 1) 130

I've been hiring both interns and recent grads from engineering and programming positions since 1981 when I first hired a dozen interns out of Drexel.

While MIT and Rensselaer Polytechnic Institute interns and grads have impressed me as hands-down the most brilliant, Drexel students are usually the most prepared for the challenges of every-day work life with Rowan University (formerly Glassboro State) coming in somewhat behind Drexel. (Based on my experiences, Drexel's 5-year program that includes 4 six-month internships should be adopted EVERYWHERE).

Mind you, I usually see applicants only from North Eastern colleges, but over the years it means I've probably hired more than 200 of these individuals.

[Unfortunately, I've never even gotten a resume from anyone from my alma mater, the University of Bridgeport, in response to a want-ad, so I can't say good or ill of UB products.]

Submission + - New 4D Printing Technology Reveals Possibilities for Composite Materials (scienceworldreport.com)

managerialslime writes: Forget about printing in 3D; it turns out that scientists are looking forward to printing in 4D. They've successfully added a fourth dimension to their printing technology, opening up exciting possibilities for the creation and use of adaptive, composite materials in manufacturing, packing and biomedical applications.

Comment Re:Well, duh (Score 1) 281

1. Go into debt to obtain college degree
2. ...
3. Profit!

So, all this time, step (2) was "figure out a way to do it"!

Time to revise:

1. Identify a career that pays well and that you would enjoy spending your waking hours being devoted to. (Until you are certain, live at home, work at some crap jobs, and save money while you figure these things out. Take at least one community college or cheap online course year-round and at all times to maintain your study skills and knowledge base. "Undeclared" full-time college majors should be reserved for children of millionaires.)

2. Identify the lowest cost educational providers that provide quality training and education. (Starting at 2 years of community college followed by 2 years of state college should work just fine for 80% of us. Living at home while attending college should be an option if you live close to good inexpensive colleges.)

3. Work while you are in college to pay what you can and minimize borrowings. (College students who are also working can also often apply classroom lessons to their real-world experience. By not living in an "ivory tower," the lessons are integrated and retained instead of being forgotten after an all-night cram session before the final.)

4. Graduate with reasonable debt and start on a great career and great life.

5. PROFIT!

Comment Re:Just part of a much larger problem (Score 1) 281

>> The world is basically starting to overflow with way more people than positions

Not even remotely accurate. Check out the chart at http://tipstrategies.com/blog/... and you will see that while manufacturing employment is on the decline, that Professional Services (including tech), Health Services, Leisure & Hospitality, Financial Services, Government, Trade, Transport, and Utilities have relentlessly grown over the last 40 years.

At the height of the Great Recession (2007-2012), the unemployment rate for people with technical and professional degrees in the US never exceeded 4.5%!

One problem in the US is that our policies discourage risk taking and entrepreneurship. (Single payer college education and healthcare would go a long way toward helping gin this area.) Another problem in the US is that our tax policies insure the biggest corporations hoard cash instead of investing in growing jobs FASTER. A third problem in the US is that we do not treat immigrants with the respect and dignity that future taxpayers deserve.

All are fixable problems. I don't know if we actually fix them. But the solutions are right in front of us.

Comment Re:Booze Bus (Score 3, Insightful) 783

According to the National Highway Traffic Safety Administration (NHTSA) 32,885 people died in traffic crashes in 2010 in the United States (latest figures available), including an estimated 10,228 people who died in drunk driving crashes, accounting for 31% of all traffic deaths that year. (http://www.centurycouncil.org/drunk-driving/drunk-driving-fatalities-national-statistics).

Depending on whose statistics you use, the number of innocent people maimed or otherwise permanently disabled by drunk drivers may exceed 100,000 victims per year.

Taking blood is ridiculous, But breathalyzers save lives. That many of the 10,000 people who die in drunk driving crashes are innocent people who are driving other cars, or are pedestrians, or are passengers, warrants road blocks and breathalyzers, especially on weekend evenings.

Yes, there should be a "red line" defining "reasonable" limits on police searches. But in America, the cost in deaths, pain, and suffering mean that to reduce the odds of some moron injuring me or my loved ones, I'll give up a reasonable degree of freedom and support politicians who promote breathalyzer roadblocks.

Submission + - Water Verified on Mars! (dvice.com)

managerialslime writes: How is this not already the front page of every newspaper on Planet Earth? NASA confirms not just water, but likely water EVERYWHERE on the planet!

Comment What about the other major religions? (Score 1) 626

I'm sure nobody here's interested, but here goes.

In Islam, insects are prohibited as food. Locusts are an exception (the only one AFAIK), so they may be eaten.

What about the other major religions?

From Wikipedia: http://en.wikipedia.org/wiki/Kosher_locust

"
Kosher locusts are varieties of locusts that are deemed premissible for consumption under the laws of kashrut (Jewish dietary law). While the consumption of most insects is considered to be forbidden under the laws of kashrut, the rabbis of the Talmud identified eight kosher species of locusts. However, the identity of those species is in dispute

The Torah states in Parshat Shemini:

        "Every flying insect that uses four legs for walking shall be avoided by you. The only flying insects with four walking legs you may eat are those with knees extending above their feet, [using these longer legs] to hop on the ground. Among these you may only eat members of the red locust family, the yellow locust family, the spotted gray locust family and the white locust family. All other flying insects with four feet [for walking] must be avoided by you."[2]
"

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...