Hacker News with Generative AI: Cybersecurity

Swedish police focus on Chinese ship after suspected undersea cable sabotage (theguardian.com)
Swedish police investigating the believed sabotage of two fibre-optic undersea cables in the Baltic Sea have said a Chinese ship off the coast of Denmark was “of interest” as Danish officials said its navy was shadowing a Chinese-registered cargo ship.
Europe's Internet resilience mitigates impact of submarine cable cuts (cloudflare.com)
When cable cuts occur, whether submarine or terrestrial, they often result in observable disruptions to Internet connectivity, knocking a network, city, or country offline.
Does the Internet Route Around Damage? – Baltic Sea Cable Cuts (ripe.net)
This week's Internet cable cuts in the Baltic sea have been widely reported, even as attempts to understand their cause and impact are ongoing. We turn to RIPE Atlas to provide a preliminary analysis of these events and examine to what extent the Internet in the region is resilient to these events.
GitHub projects targeted with malicious commits to frame researcher (bleepingcomputer.com)
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects.
Ghost Tap: New cash-out tactic with NFC Relay (threatfabric.com)
Threat actors are scaling the cash-outs
D-Link says replace vulnerable routers or risk pwnage (theregister.com)
Owners of older models of D-Link VPN routers are being told to retire and replace their devices following the disclosure of a serious remote code execution (RCE) vulnerability.
Chinese ship investigated over 'sabotaged' Baltic Sea internet cables (telegraph.co.uk)
Swedish investigators are looking into the movements of a Chinese vessel in the Baltic Sea after two internet cables were severed in what some Western leaders suspect was an act of sabotage.
Hackers Steal MLB Star Kris Bryant's $200K Lamborghini by Rerouting Delivery (carscoops.com)
Thieves were reportedly able to use a compromised email to reroute the car to a different destination
Chinese vessel spotted where Baltic Sea cables were severed (afr.com)
Investigators of two severed data cables in the Baltic Sea are looking at the movements of a Chinese bulk carrier, the second such probe in recent months amid rising jitters in Europe over potential acts of sabotage.
GitHub projects targeted with malicious commits to frame researcher (bleepingcomputer.com)
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects.
US extradites Russian for extorting millions in Phobos ransomware payments (techcrunch.com)
The U.S. government has secured the extradition of an alleged Russian hacker who allegedly served as a key administrator of the prolific Phobos ransomware operation.
Threat Actor Exposes Playbook for Exploiting NPM to Build Blockchain-Powered (socket.dev)
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Two telecoms cables in Baltic Sea severed, raising suspicions of sabotage (theguardian.com)
Two undersea fibre-optic communications cables in the Baltic Sea, including one linking Finland and Germany, have been severed, raising suspicions of sabotage by bad actors.
Finland and Germany on the severed undersea cable in the Baltic Sea (auswaertiges-amt.de)
We are deeply concerned about the severed undersea cable connecting Finland and Germany in the Baltic Sea. The fact that such an incident immediately raises suspicions of intentional damage speaks volumes about the volatility of our times. A thorough investigation is underway. Our European security is not only under threat from Russia‘s war of aggression against Ukraine, but also from hybrid warfare by malicious actors. Safeguarding our shared critical infrastructure is vital to our security and the resilience of our societies.
DNA testing company vanishes along with its customers' genetic data (malwarebytes.com)
A DNA testing company that promised clients insights into their genetic disposition has suddenly disappeared.
Finland and Lithuania Report Severed Undersea Data Cables (bloomberg.com)
An undersea data cable connecting Finland and Germany was cut in the early hours of Monday by what was likely an external impact and a nearby link between Lithuania and Sweden was also damaged.
Security means securing people where they are (yossarian.net)
Standard disclaimer: These are my personal opinions, not the opinions of my employer, PyPI, or any open source I projects I participate in (either for funsies or because I’m paid to). In particular, nothing I write below can be interpreted to imply (or imply the negation of) similar opinions by any of the above, except where explicitly stated.
Teen behind hundreds of swatting attacks pleads guilty to federal charges (wired.com)
In perhaps the largest swatting case to ever be prosecuted, an 18-year-old from Lancaster, California, has pleaded guilty to federal charges stemming from a nationwide spree of hundreds of shooting and bomb threat hoaxes that sent police scrambling to high schools, courthouses, and the homes of law enforcement officials and prominent politicians.
Drinking water systems for 26M Americans face high cybersecurity risks (scworld.com)
The Environmental Protection Agency’s (EPAs) Office of Inspector General (OIG) on Nov. 13 reported that 97 drinking water systems serving about 26.6 million Americans around the country have either “critical or high-risk” cybersecurity vulnerabilities.
Mystery Palo Alto Networks hijack-my-firewall zero-day officially under exploit (theregister.com)
A critical zero-day vulnerability in Palo Alto Networks' firewall management interface that can allow an unauthenticated attacker to remotely execute code is now officially under active exploitation.
Fake AI video generators infect Windows, macOS with infostealers (bleepingcomputer.com)
Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing malware, used to steal credentials and cryptocurrency wallets from infected devices.
Russian spy ship confirmed to be operating near cables off Dublin (rte.ie)
A Russian spy ship has been operating near subsea cables in the Irish Sea just north of Dublin in recent days, according to vessel tracking data and military sources.
NSO's attacks against WhatsApp users unsealed (techcrunch.com)
On Thursday, WhatsApp scored a legal victory by convincing a U.S. federal judge to publicly release three court documents that include new revelations about the inner workings of Pegasus, the spyware made by Israeli surveillance tech maker NSO Group.
National Security Just Called, They Can't See the Email Traffic (mad-scientist.club)
I vividly remember the first time I installed Linux. It was December 25th, 1996, and with tears running down my face, I put a SuSE Linux install disk into the floppy drive. Things were never the same again.
NSO – not government clients – operates its spyware, legal documents reveal (theguardian.com)
Legal documents released in ongoing US litigation between NSO Group and WhatsApp have revealed for the first time that the Israeli cyberweapons maker – and not its government customers – is the party that “installs and extracts” information from mobile phones targeted by the company’s hacking software.
Trust no one: why we can't trust most stats about the cybersecurity industry (ventureinsecurity.net)
There is a problem in cybersecurity: solid industry analysis is hard to come by.
Fault Injection – Down the Rabbit Hole (humanativaspa.it)
This series of articles describes fault injection attack techniques in order to understand their real potential by testing their limits and applicability with limited hardware (available on the market at an acceptable cost). It explores possible ways of using an attack that, in my opinion, is greatly underestimated.
Threat actor attempted to slipstream a malware payload into yt-dlp's GitHub repo (twitter.com)
North Korean hackers create Flutter apps to bypass macOS security (bleepingcomputer.com)
North Korean threat actors target Apple macOS systems using trojanized Notepad apps and minesweeper games created with Flutter, which are signed and notarized by a legitimate Apple developer ID.
Sophos has installed monitoring software on its customers' systems for years (heise.de)
Sophos has installed monitoring software on its customers' systems for years – in the name of security, of course. Jürgen Schmidt takes a critical view of this.