Hacker News with Generative AI: Hacking

Hackers could attack Europes energy grid [video] (dw.com)
Cyber criminals are able to access solar power installations and throw entire electricity grids into chaos. DW talked to some well-minded hackers about the threat and what consumers can do to avoid it.
The Fall of FiveM (fivem.team)
Behind the friendly, smiling, snail mascot of FiveM - you'll find many dark secrets.
All Kindles can now be jailbroken (kindlemodding.org)
All Kindles can now be jailbroken
China's Salt Typhoon Spies Still Hacking Telecoms by Exploiting Cisco Routers (wired.com)
When the Chinese hacker group known as Salt Typhoon was revealed last fall to have deeply penetrated major US telecommunications companies—ultimately breaching no fewer than nine of the phone carriers and accessing Americans' texts and calls in real time—that hacking campaign was treated as a four-alarm fire by the US government.
White Hat Hackers Expose Iridium Satellite Security Flaws (ieee.org)
In a recent demonstration, German white hat hackers showed how to intercept text messages sent via the U.S. satellite communication system Iridium and locate users with an accuracy of about 4 kilometers.
PDF Running Linux (hackaday.com)
The days that PDFs were the granny-proof Swiss Army knives of document sharing are definitely over, according to [vk6]. He has managed to pull off the ultimate mind-bender: running Linux inside a PDF file.
Mac OS on an unmodified Wii (2022) (hackaday.com)
We’re used to the so-called “Hackintoshes”, non-Apple hardware running MacOS. One we featured recently was even built into the case of a Nintendo Wii. But [Dandu] has gone one better than that, by running MacOS on an unmodified Wii, original Nintendo hardware (French, Google Translate link).
LLMs Were Backdoored Years Ago (remyhax.xyz)
8M Requests Later, We Made SolarWinds Supply Chain Attack Look Amateur (watchtowr.com)
Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments, and more.
Practical HTTPS Interception: 20 Years of SSL/TLS Interception (thc.org)
TL;DR: An attacker can trick Let's Encrypt (LE) to issue new TLS certificates for any domain that the attacker intercepts traffic for. The attacker can then decrypt the TLS traffic. This one thing that TLS is supposed to prevent from happening. The fault is that LE uses cleartext HTTP to verify the ACME-challenge (which the attacker can intercept).
Gmail Security Warning for 2.5B Users–AI Hack Confirmed (forbes.com)
Another Gmail AI hack attack has been confirmed.
Hackers crack Subaru's connected services to access data, door locks and more (jalopnik.com)
If you own a modern Subaru, chances are you’ve heard of Starlink — the company’s connected services suite, which lets you control your car through an app or call roadside assistance to your location. That system, though, has other functionality that you might not know: Storing your car’s location history for the last year, and making that information available through an admin panel that until recently was left wide open for hackers.
Poisoning AI with ".аss" subtitles [video] (youtube.com)
Hacker infects 18,000 "script kiddies" with fake malware builder (bleepingcomputer.com)
A threat actor targeted low-skilled hackers, known as "script kiddies," with a fake malware builder that secretly infected them with a backdoor to steal data and take over computers.
Hackers get $886,250 for 49 zero-days at Pwn2Own Automotive 2025 (bleepingcomputer.com)
The Pwn2Own Automotive 2025 hacking contest has ended with security researchers collecting $886,250 after exploiting 49 zero-days.
Subaru Security Flaws Exposed Its System for Tracking Cars (wired.com)
Now-fixed web bugs allowed hackers to remotely unlock and start any of millions of Subarus. More disturbingly, they could also access at least a year of cars’ location histories—and Subaru employees still can.
Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025 (bleepingcomputer.com)
On the first day of Pwn2Own Automotive 2025, security researchers exploited 16 unique zero-days and collected $382,750 in cash awards.
Hacking Subaru: Tracking and controlling cars via the admin panel (samcurry.net)
On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK connected vehicle service that gave us unrestricted targeted access to all vehicles and customer accounts in the United States, Canada, and Japan.
Bambu Connect's Authentication X.509 Certificate and Private Key Extracted (hackaday.com)
Hot on the heels of Bambu Lab’s announcement that it would be locking down all network access to its X1-series 3D printers with new firmware, the X.509 certificate and private key from the Bambu Connect application have now been extracted by [hWuxH].
Chinese hackers accessed Yellen's computer in US Treasury breach (bloomberg.com)
US Treasury Secretary Janet Yellen’s computer was infiltrated and unclassified files were accessed as part of a broader breach of the agency by Chinese state-sponsored hackers, according to two people familiar with the matter.
Russian hackers nearly killed my Django based business (reddit.com)
My wife and I were hiking through the scenic hills of Belgium when I received a concerning email from Amazon Web Services (AWS). The email, titled "Amazon SES Complaint Review Period for AWS Account []", contained the following warning:
Laser Fault Injection on a Budget: RP2350 Edition (courk.cc)
Raspberry Pi's RP2350 Hacking Challenge Results Announced (tomshardware.com)
DoubleClickjacking: A New type of web hacking technique (paulosyibelo.com)
“Clickjacking” attacks have been around for over a decade, enabling malicious websites to trick users into clicking hidden or disguised buttons they never intended to click.
Apple iPhone USB-C Hacked (forbes.com)
With 100 million macOS users already reeling from news of a new credential-stealing attack, Safari users warned do not click twice, and even a report about iOS being targeted more by hackers than Android, it’s not been the most reassuring few weeks for Apple users. Now security researchers have disclosed details of a successful bypass of Apple security protections to hack the iPhone USB-C controller. So, what does this mean for smartphone security?
Legendary Hacker Receieves Presidential Pardon (semafor.com)
In early 2015, the Australian hacker Chris Wade got a visit from the fish doctor at his aquarium-filled Florida home. The patient was Gemmy the Gem Tang, a rare saltwater species known for its striking white dots and bright yellow tail that had cost Wade $3,500.
Japan says Chinese hackers have launched attacks (techradar.com)
How Chinese Hackers Graduated from Clumsy Corporate Thieves to Military Weapons (msn.com)
Hacker gains access to the RP2350 OTP secret by glitching the RISC-V cores (tomshardware.com)
One of You (palladiummag.com)
On September 24, 2010, Aaron Swartz, during his fellowship at Harvard, registered a new Acer laptop on the MIT network under the alias “Garry_Host.” The client name: “Ghost_laptop.” Anyone can walk into the MIT campus, connect their computers to the network, and download articles from the digital academic library JSTOR, even without being a student—the difference was that Aaron wrote a Python script to do it faster.