Morrissey Technology

Loading

Study Reveals Hackers Can Steal Data Via HDMI Cables

Study Reveals Hackers Can Steal Data Via HDMI Cables

Morrissey Technology – A recent study by a research team at the Universidad de la Republica Montevideo, Uruguay, revealed that hackers can use artificial intelligence (AI) and HDMI cables to steal data on their victims’ computers. Read the explanation. The research, entitled ‘Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations’, was published on the arXiv preprint server. The research was conducted by Santiago Fernandez Emilio Martinez, Gabriel Vareal, and Pablo Muse Federico Larroca.

HDMI cables are usually used to transfer the screen display from a laptop or PC to a projector to have a larger display. This cable apparently produces electromagnetic radiation that can be captured by hackers. In this study, researchers found that hackers also used AI technology in hacking practices via HDMI cables.

The study involved capturing electromagnetic radiation emitted from a computer’s HDMI cable. They then trained the AI ​​system by providing screen samples associated with radiation signals traveling through the computer’s HDMI cable. As time went by, these systems gradually became better at interpreting text displayed on computer screens.

Test results show this system is able to reconstruct text from a computer screen randomly with 70 percent accuracy. They also note these systems may be good enough to steal passwords, sensitive data, or in some cases, encrypted communications. The researchers found that they could improve their results by using text recognition software on the text after it had been parsed.

Researchers say hackers may have conducted similar research. This means such screen hacks may have targeted a number of victims. According to them, all that is needed is hardware capable of capturing the electromagnetic radiation emitted by HDMI cables placed close to buildings, such as in the back seat of a car. The team further suggests that most people are not at risk of such an attack, due to the expertise required by this technique. Instead, they suggest that it is more likely that governments or corporate entities will be targeted.

https://www.balaitradisionaldenpasar.org/

Beware of AI Application Ads on Facebook, Accounts Can Be Stolen

Beware of AI Application Ads on Facebook, Accounts Can Be Stolen

Morrissey Technology – The trend of using artificial intelligence (AI) has been spreading in recent times. Not surprisingly, many technology companies promote their AI products through advertisements on social media. However, users also need to be careful and not carelessly click on AI application advertisements on social media, especially Facebook. The reason is, a fake ad on Facebook targets users looking for an AI image editing tool and steals their credentials by tricking them into installing a fake application that imitates the original software.

According to Bleeping Computer, hackers are exploiting the popularity of AI-based image creation tools by creating malicious websites that closely resemble the original service and tricking potential victims into infecting themselves with information-stealing malware. This was discovered by Trend Micro researchers who analyzed the ad.

The attack began with a phishing message sent to the Facebook page owner or admin, which would redirect them to a fake account protection page designed to trick them into providing login information. After stealing their credentials, the perpetrators hijacked the accounts, took control of their pages, published malicious social media posts, and promoted them through paid advertising.

“We discovered a malvertising campaign involving threat actors stealing social media pages (often related to photography), changing their names to appear connected to a popular AI photo editor,” said Trend Micro researcher Jaromir Horejsi.

“The threat actor then created a malicious post with a link to a fake website that was made to resemble a legitimate photo editor website. To increase traffic, the perpetrator then boosted the malicious post through paid advertising,” he continued.

Facebook users who click on the URL in the malicious ad will be sent to a fake web page masquerading as genuine AI photo editing and creation software, and will then be asked to download and install a software package. Instead of installing AI image editing software, victims installed an ITarian remote desktop tool that was configured to launch a downloader that automatically deployed the Lumma Stealer malware.

This malware then silently infiltrates their systems, allowing hackers to collect and compromise sensitive information such as credentials, cryptocurrency wallet files, browser data, and password manager databases. This data is then sold to other cybercriminals or used by attackers to break into victims’ online accounts, steal their money, and promote further fraud.

“Users should enable multi-factor authentication (MFA) on all social media accounts to add an extra layer of protection against unauthorized access,” advises Horejsi.

“Organizations must educate their employees about the dangers of phishing attacks and how to recognize suspicious messages and links. Users should always verify the legitimacy of links, especially those that ask for personal information or login credentials,” he continued.

https://www.karangasem-bangkit.org/

malware

Horrified, a New Virus Appears That Drains Your Account and Deletes Your Cellphone Data

Morrissey Technology – A malware or malicious software on Android called BingoMod was found to be able to drain accounts and delete cellphone data. This malware was found to be promoted via text messages, and masquerades as a legitimate mobile security tool. This malware can steal up to 15,000 Euros or IDR 262 million per transaction. According to the researchers who analyzed it, BingoMod is currently under active development. They say malware authors are focusing on adding code obfuscation and various evasion mechanisms to reduce detection rates.

Researchers at Cleafy, an online fraud management and prevention solution, reported BleepingComputer, found BingoMod distributed in smishing (SMS phishing) campaigns. They use various names that usually indicate mobile security tools such as APP Protection, Antivirus Cleanup, Chrome Update, InfoWeb, SicurezzaWeb, WebSecurity, WebsInfo, WebInfo, and APKAppScudo. In one example, the malware used the icon for the free AVG AntiVirus & Security tool available on Google Play. During the installation process, the malware requests permission to use the Accessibility Service, which provides advanced features that allow broad control over the device.

Once active, BingoMod steals any login credentials, takes screenshots, and reads SMS messages. To perform on device fraud (ODF), the malware creates a socket-based channel to receive commands and an HTTP-based channel to send screenshot feeds, thereby enabling near real-time remote operations. ODF is a common technique used to initiate criminal transactions from a victim’s device, circumventing standard anti-fraud systems that rely on identity verification and authentication. Cleafy researchers explain the Virtual Network Computing (VNC) activity abusing Android’s Media Projection API to obtain screen content in real-time.

Once received, the content is converted into a suitable format and transmitted via HTTP to the cybercriminal or threat actor’s infrastructure. One of the features of this activity is that it can leverage Accessibility Services to impersonate users and enable screen-casting requests, which are exposed by the Media Projection API. Commands that a remote operator can send to BingoMod include clicking on certain areas, writing text on certain input elements, and launching applications. This malware also enables manual overlay attacks via fake notifications initiated by cybercriminals. Additionally, devices infected with BingoMod can also be used to further spread malware via SMS.

https://www.gvardeysk.org/

TikTok AI Cloud

TikTok Revealed to Be a Big Customer of Microsoft’s AI Cloud, What Can It Do?

Morrissey Technology – It was revealed that TikTok is one of the largest consumers of AI Cloud Computing managed by Microsoft. What can video-based social media do with AI? Quoting from The Verge, TikTok paid at least US$20 million (Rp. 322.77 billion) per month to Microsoft to access the OpenAI model last March. That amount is almost equivalent to a quarter of Microsoft’s Cloud division’s revenue. Microsoft’s AI cloud business, according to The Information, is currently achieving annual revenue of around US$1 billion (Rp. 16.14 trillion). Microsoft is also investing multibillion US dollars to make OpenAI its proprietary cloud, and has also poured hundreds of billions of dollars into building the supercomputer that powers ChatGPT.

On the one hand, a study reports that TikTok may not need Microsoft’s cloud AI capabilities if it develops its own Large Language Model (LLM). Last year, the company that houses TikTok, ByteDance, secretly used OpenAI technology to create its own LLM. That practice is generally considered reckless in the world of AI. It is also a direct violation of OpenAI’s terms of service, which state that its model output cannot be used ‘to develop any artificial intelligence models that compete with our products and services’. Microsoft, from which ByteDance buys its OpenAI access, has a similar policy.

Following the report, OpenAI suspended ByteDance’s account to investigate potential violations of its developer license. At the time, ByteDance said it was using the technology ‘to a very limited extent’ to help build its own language models.

AI search feature on TikTok

In May, TikTok was reportedly testing an AI Search Highlights feature on its search page. Quoting The Verge, this AI-based feature will summarize the contents of various videos and highlight them. On the AI ​​disbursement highlights feature page, TikTok explains that its material is supported by ChatGPT made by OpenAI. Meanwhile, at the bottom of the AI ​​search results, TikTok will display videos that the algorithm system considers relevant.

Al Smart Search TikTok provides ChatGPT answers to search queries. TikTok is ultimately trying to capitalize on some of the habits its users – especially the younger generation – have developed on the app. Many young TikTokers treat TikTok like a search engine, choosing to look for restaurant or product recommendations on the app rather than using platforms like Google Search. And like Google, TikTok now seems to be leaning towards AI results by incorporating content from top content creators.

https://www.santacroyadetera.org/

Malware

There’s Dangerous Malware Hiding for Years on Google Play

Morrissey Technology – Security researchers at Kaspersky discovered malware, or rather spyware, called Mandrake hiding inside an application on Google Play. This spyware was found in crypto asset, astronomy and utility tools applications, which are available officially within Google Play. What’s worse, Mandrake has been available for two years and has been downloaded 32 thousand times.

The sample studied by Kaspersky featured advanced obfuscation and evasion techniques, allowing it to remain undetected by security vendors. Interestingly, Mandrake is not new spyware at all. Its action was first discovered in 2020 by BitDefender, which at that time discovered that this spyware infected in two large waves.

Applications compromised by Mandrake were first available on Google Play between 2016-2017, and then appeared again between 2018-2020. And, the ultimate ability of this spyware is that it can operate without being detected by Google, which can then infect large numbers of users, reaching hundreds of thousands of victims over four years. This espionage malware was then discovered again by Kaspersky researchers in April 2024 with more sophisticated capabilities.

“This new sample features advanced obfuscation and evasion techniques, including redirecting malicious functions to native obfuscated libraries using OLLVM, implementing certificate pinning for secure communication with command and control (C2) servers, and performing extensive checks to detect whether Mandrake is operating on rooted devices or in an emulated environment,” Kaspersky wrote.

The applications infiltrated by Mandrake this time were all published on Google Play in 2022. These applications are presented as file sharing applications via Wi-Fi, astronomy service applications, Amber for Genshin games, crypto asset applications, and applications with logic puzzles . As of July 2024, none of these apps had been detected as malware by any vendor, according to VirusTotal. Although it is no longer on Google Play, the app has been available for a long time, and was most downloaded in Canada, Germany, Italy, Mexico, Spain, Peru and the UK.

“After evading detection for four years in its initial version, the latest Mandrake campaign remained undetected on Google Play for another two years. This demonstrates the sophisticated skills of the threat actors involved. It also highlights a troubling trend: as restrictions and security checks tighten “As regulations become more stringent, the sophistication of threats that slip through official app stores increases, making them increasingly difficult to detect,” said Tatyana Shishkova, principal security researcher at Kaspersky’s GReaT (global research and analysis team).

https://hupack.com/-/for4d/

For4d

https://emservices.mx/

https://purenewsmag.com/

Situs Toto

https://sditalfirdausgedawang.sch.id/

Bandar Togel

https://cdn.org.br/

Microsoft

Microsoft Opens Up About the Real Cause of Azure and 365 Down

Morrissey Technology – Technology company Microsoft opened up about Microsoft 365 and Azure services being down for nine hours worldwide last Tuesday (30/7). It all turned out to be triggered by fake traffic or distributed denial-of-service (DDoS) cyber attacks.

The company based in Redmond, Washington DC, United States (US) said that it previously had a defense mechanism for DDoS attacks. However, from a temporary investigation into the DDoS defense that occurred this week, it actually strengthened the impact of the attack.

“Even though the initial trigger event was a Distributed Denial-of-Service (DDoS) attack, which activated our DDoS protection mechanisms,” said Microsoft’s official statement.

“Preliminary investigations indicate that errors in the implementation of our defenses amplified the impact of the attack rather than mitigating it.”

Microsoft’s security team is also working to understand DDoS, and mitigate its defenses.

“Once the nature of the usage spike was understood, we implemented network configuration changes to support our DDoS protection efforts, and failed over alternate network paths to provide relief,” the statement continued.

Previously the service outage due to the DDoS attack impacted Microsoft Entra, several Microsoft 365 and Microsoft Purview services (including Intune, Power BI, and Power Platform), as well as Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy , and the Microsoft Azure Portal.

Microsoft said it plans to release a Initial Post-incident Review (PIR) within 72 hours and a Final Post-incident Review within the next two weeks, with additional details and learnings from this week’s outage. So far, Microsoft has stated that there have been no specific threats made by the perpetrators regarding this DDoS attack.

If we look back, in June 2023, Microsoft also confirmed that an actor known as Anonymous Sudan alias Storm-1359 carried out a DDoS attack which resulted in the outage of Azure, Outlook and the OneDrive web portal.

Additionally, early last July, tens of thousands of Microsoft 365 customers were impacted by another widespread outage. At that time, Microsoft said this was due to changes to the Azure configuration. Other major outages also affected Microsoft 365 services in July 2022 following an incorrect Enterprise Configuration Service (ECS) deployment and in January 2023 following a Wide Area Network IP change.

https://onlinecitycabs.com/

Meta

Meta Admits There is a Bug That Makes the IG Stories Archive Disappear

Morrissey Technology – On Wednesday (1/8) a number of Instagram users around the world said they were shocked because they received notifications that their uploads in the Stories feature archive had been permanently deleted and could not be restored. What is it?

“Certain photos have been permanently deleted from the app’s Stories archives, unable to be recovered,” the notification said.

Meta the digital company that oversees Instagram–admitted that there was a bug or error code that caused a number of users’ story archives to disappear. In an official statement, a Meta spokesperson last Wednesday said the bug could be anticipated.  Apart from that, he said that not all Instagram users experience this problem. Those who were found to be affected by the bug, he said, were the ones who then received notifications.

“We discovered and fixed a bug that was causing some people’s Story highlights and archives to be deleted. Unfortunately, we were unable to restore these Stories and we are notifying people in the app if they were impacted,” the Meta spokesperson said without explaining how many Instagram users who are affected.

Instagram Stories is a more relaxed and less binding form of posting on a user’s account. Users can upload photos, videos, or text posts that will disappear within 24 hours.

Additionally, more exclusive content can be included in a curated Close Friends list or can be permanently placed on your profile as a story highlight. Stories are different from regular posts, as they are often personalized with music, gifs, text, filters, and interactive features like polls or quizzes. Even though it can disappear within 24 hours, Instagram provides an archive feature that allows users to save one of their stories.

https://nourishingherbs.co.uk/

https://createxpro.com/

AMD

AMD Will Become an AI Chip Company, Similar to Nvidia

Morrissey Technology – Nvidia was originally known as a graphics chip manufacturing company, but now the majority of its revenue comes from AI chips. AMD seems to be following Nvidia’s steps. In AMD’s Q2 2024 financial report, it appears that half of AMD’s sales come from products for data centers, not chips for PCs, consoles, or for industry and motor vehicles. AMD’s data center business has doubled in a year, and this quarter its growth was driven by one chip, the AMD Instinct MI300 accelerator, which is a competitor to Nvidia’s H100 AI chip.

According to AMD CEO Lisa Su, from sales of this chip AMD earned more than UDS 1 billion in one quarter, as quoted by detikINET from The Verge, Wednesday (31/8/2024). From this it can be seen that AMD is following in the footsteps of Nvidia, which can reap huge profits from the H100 chip which is very popular for AI processing purposes. Now Nvidia even claims to release a new AI chip every year.

Likewise with AMD, which plans to release new AI chips every year. They have prepared the M1325X which will be available in Q4 2024, then the M1350 for 2025, and the MI400 for 2026. Lisa Su said the M1350 chip will be very competitive with the Nvidia Blackwell which was revealed to the public last March and is predicted to be the fastest AI chip in the world .

Even now, the M1300 chip is always sold out, meaning sales are in accordance with the chip’s production capacity. He also admitted that with the supply chain continuing to increase, chip supply will still be limited until 2025.

Despite following Nvidia’s steps, AMD’s data center business is still nothing compared to Nvidia. AMD’s revenue of “only” USD 2.8 billion is far less than Nvidia’s revenue which reached USD 22.6 billion in the same quarter. It should be noted, this income is also a new largest record for Nvidia.

AMD’s income from the PC business — CPU and GPU — also grew in Q2 2024. Ryzen CPU sales increased 49% year over year, as did Radeon 6000 GPUs which also rose. The decline actually came from chips for PlayStation and Xbox, which fell 59%.

https://ahada.org/

http://www.filmmakersnotebook.com/

Elon Musk vs Google

Elon Musk Accuses Google of Blocking Trump in Search Engine

Morrissey Technology – Tesla boss Elon Musk accused the technology giant Google of blocking Donald Trump’s name from their search engine.

“Wow, Google is blocking searches for President Donald Trump!” Musk said in a tweet on X.

“Meddling in the election?” he added.

This upload is accompanied by a screenshot of a Google search which produces only two recommendations when the keyword president donald is entered, namely president donald duck and president donald regan. This upload then triggered various responses, one of which was from the @davidgokhshtein account which said that Google was owned by the Democrats.

“They’re going to be in a lot of trouble if they interfere in the election,” Musk countered.

However, according to the results of CNNIndonesia.com’s experiment, when typing the keyword president donald, Google still brought up Donald Trump’s profile, unlike what happened to Musk. Several weeks ago, Musk uploaded a statement saying he “fully supports” former President Trump in the United States (US) election.

This statement was made not long after Trump was shot while giving a campaign speech in Pennsylvania, USA. Bloomberg released a report that Musk donated to a super PAC that supports Trump, and gave “a sizable amount” to his re-election.

The donation, if it does occur, would be a significant development not only in the presidential campaign, but also in the relationship between the two men. The reason is, both have strong support from millions of fans who are ready to believe almost everything they say.

In recent years, Musk has been known to promote the ‘great replacement’ conspiracy theory and support white pride. His endorsement adds to a growing number of influential voices in Silicon Valley promoting the campaign.

After the Trump incident, Musk’s platform was flooded with a number of hashtags, including ‘#falseflag’ and ‘staged’ to users. Despite this, Musk continues to promote “freedom of opinion” on his social media platform, including misinformation like the one above.

https://situstotologin.id/

https://www.encom-training.com/-/stoto/

Rim Jong Hyok

Wanted! North Korean Hackers Attack America Using Ransomware

Morrissey Technology – A court in Kansas City, United States found guilty Rim Jong Hyok, a North Korean intelligence agent who used ransomware to attack health care providers in America. According to the American Ministry of Foreign Affairs, Rim is part of a syndicate called Andariel, which is managed by the North Korean intelligence agency, or Reconnaissance General Bureau. Even though he has been found guilty, Rim has not been arrested by the American government. In fact, they are offering a reward of USD 10 million for people who can provide location information from Rim, a foreign intelligence agency that carried out cyber attacks on critical American infrastructure.

The victim of the ransomware spread by Andariel was a hospital in Kansas. In their report to the FBI, they said there was a cyber attack in 2021 that blocked access to patient data and lab results. This attack also made the hospital’s computer network unusable. Andariel’s modus operandi has often been used. Namely infiltrating Maui ransomware into the victim’s computer system. Then they demanded a ransom with the threat of releasing confidential information if the ransom was not paid.

In the case of this Kansas hospital, the ransom requested was USD 100 thousand in bitcoin, which had to be paid within 48 hours. The ransom money was allegedly used to buy computers and servers which were later used to carry out other cyber attacks. The ransom was eventually paid, but the flow of the money could be traced until they discovered that someone had transferred the bitcoins to an address belonging to two Hong Kong citizens.

Court documents state that the money was then transferred to a bank in China and withdrawn using an ATM located on the Sino-Korean Friendship Bridge, which connects China with North Korea. Andariel and Rim were found guilty of infiltrating networks belonging to 17 entities spread across 11 states. Four of them are defense contractors, two are American Air Force bases, and NASA.

Andariel is even said to have hidden in NASA’s computer network for three months and managed to steal 17GB of confidential data. Meanwhile, from an American defense contractor, they succeeded in stealing 30GB of confidential data. The FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the US Treasury have issued warnings regarding Andariel’s cyber attacks on health institutions in 2022.

“North Korean cybercriminals may assume that organizations providing health services will be willing to pay ransoms,” the three agencies wrote in a statement.

https://cheapstockbroker.com/opac/for4d/

http://www.cowgirlchicks.com/js/togelonline/

https://menara.web.id/-/togelonline/