Hacker News with Generative AI: Hacking

Chinese hackers accessed Yellen's computer in US Treasury breach (bloomberg.com)
US Treasury Secretary Janet Yellen’s computer was infiltrated and unclassified files were accessed as part of a broader breach of the agency by Chinese state-sponsored hackers, according to two people familiar with the matter.
Russian hackers nearly killed my Django based business (reddit.com)
My wife and I were hiking through the scenic hills of Belgium when I received a concerning email from Amazon Web Services (AWS). The email, titled "Amazon SES Complaint Review Period for AWS Account []", contained the following warning:
Raspberry Pi's RP2350 Hacking Challenge Results Announced (tomshardware.com)
DoubleClickjacking: A New type of web hacking technique (paulosyibelo.com)
“Clickjacking” attacks have been around for over a decade, enabling malicious websites to trick users into clicking hidden or disguised buttons they never intended to click.
Apple iPhone USB-C Hacked (forbes.com)
With 100 million macOS users already reeling from news of a new credential-stealing attack, Safari users warned do not click twice, and even a report about iOS being targeted more by hackers than Android, it’s not been the most reassuring few weeks for Apple users. Now security researchers have disclosed details of a successful bypass of Apple security protections to hack the iPhone USB-C controller. So, what does this mean for smartphone security?
Legendary Hacker Receieves Presidential Pardon (semafor.com)
In early 2015, the Australian hacker Chris Wade got a visit from the fish doctor at his aquarium-filled Florida home. The patient was Gemmy the Gem Tang, a rare saltwater species known for its striking white dots and bright yellow tail that had cost Wade $3,500.
Japan says Chinese hackers have launched attacks (techradar.com)
How Chinese Hackers Graduated from Clumsy Corporate Thieves to Military Weapons (msn.com)
Hacker gains access to the RP2350 OTP secret by glitching the RISC-V cores (tomshardware.com)
One of You (palladiummag.com)
On September 24, 2010, Aaron Swartz, during his fellowship at Harvard, registered a new Acer laptop on the MIT network under the alias “Garry_Host.” The client name: “Ghost_laptop.” Anyone can walk into the MIT campus, connect their computers to the network, and download articles from the digital academic library JSTOR, even without being a student—the difference was that Aaron wrote a Python script to do it faster.
Hacking yourself a satellite – recovering BEESAT-1 [video] (media.ccc.de)
In 2013, the satellite BEESAT-1 started returning invalid telemetry, rendering it effectively unusable. Because it is projected to remain in orbit for at least another 20 years, recovering the satellite and updating the flight software would enable new experiments on the existing hardware. However, in addition to no access to telemetry, the satellite also has no functional software update feature.
Why the Steam Deck Is the Perfect Mini PC for Hackers (write.as)
I bought a Steam Deck OLED in 2024, and it has been a joy to toy around with. It's obviously a pretty neat device for handheld gaming, but it's also a fantastic mini PC for hackers. It has completely replaced my main desktop PC at home (though I still use a Lenovo ThinkPad for actual work).
US Treasury says it was hacked by China in 'major incident' (bbc.com)
Chinese state-sponsored hackers broke into the US Treasury Department's systems earlier this month and were able to access employee workstations and some unclassified documents, American officials said on Monday.
US Treasury computers hacked by Chinese 'threat actor' in 'major incident' (nbcnews.com)
The U.S. Treasury Department said a state-sponsored Chinese hacking operation was able to access third-party software to tap into desktop computers of Treasury employees in what the department is calling "a major incident."
U.S. Treasury systems compromised by Chinese hackers (documentcloud.org)
Sections organize your document with a table of contents
The US Treasury Department was hacked (theverge.com)
The US Treasury Department suffered a “major” security incident after a China state-sponsored hacker broke into the third-party remote management software it uses, as reported earlier by The New York Times.
US Treasury says it was hacked by China (bbc.co.uk)
A Chinese state-sponsored hacker has broken into the US Treasury Department's systems, accessing employee workstations and some unclassified documents, officials said on Monday.
China-backed hackers breached US Treasury workstations (cnn.com)
38C3: Hacker hijacks and repairs Beesat-1 satellites from the ground (heise.de)
The Beesat-1 test satellite launched into space by TU Berlin in 2009 stopped delivering data in 2013. An inventor managed to breathe new life into it.
38C3: Hacking yourself a satellite – recovering BEESAT-1 [video] (media.ccc.de)
In 2013, the satellite BEESAT-1 started returning invalid telemetry, rendering it effectively unusable. Because it is projected to remain in orbit for at least another 20 years, recovering the satellite and updating the flight software would enable new experiments on the existing hardware. However, in addition to no access to telemetry, the satellite also has no functional software update feature.
We've not been trained for this: life after the Newag DRM disclosure [video] (media.ccc.de)
You've probably already heard the story: we got contracted to analyze a bunch of trains breaking down after being serviced by independent workshops. We reverse engineered them and found code which simulated failures when they detected servicing attempts. We presented our findings at 37C3… and then shit hit the fan.
They have not been trained for this (ccc.de)
The Chaos Computer Club (CCC) supports the three hackers who explained in detail at 37C3 how the Polish rail vehicle manufacturer Newag had manipulated its trains in such a way that they could only be repaired in the company's own workshops.
38th Chaos Communication Congress (events.ccc.de)
Phrack 72 "40th Anniversary Edition" Call for Papers (phrack.org)
For the past 40 years, Phrack has been an outlet for hackers. A place for those who want to share knowledge, seek truth, find understanding, bridge gaps, celebrate culture, and of course, break spells.
Subchannel Stations: The Radio Broadcasts You Didn't Know Were There (hackaday.com)
Analog radio broadcasts are pretty simple, right? Tune into a given frequency on the AM or FM bands, and what you hear is what you get. Or at least, that used to be the way, before smart engineers started figuring out all kinds of sneaky ways for extra signals to hop on to mainstream broadcasts.
Twtxt is a decentralised, minimalist microblogging service for hackers (readthedocs.io)
twtxt is a decentralised, minimalist microblogging service for hackers.
N Korea hackers stole $1.3B of crypto this year (bbc.com)
A total of $2.2bn (£1.76bn) in cryptocurrencies has been stolen this year, with North Korean hackers accounting for more than half that figure, according to a new study.
How to Protect Yourself from the Salt Typhoon Hack, No Matter What the FBI Says (theintercept.com)
Hackers have gained sweeping access to U.S. text messages and phone calls — and in response, the FBI is falling back on the same warmed-over, bad advice about encryption that it has trotted out for years.
Scanners Beware: Welcome to the network from hell (medium.com)
In today’s rapidly evolving landscape of technology, networks form the backbone of modern systems. Every second is a race, as malicious actors relentlessly probe for vulnerabilities, seeking their next weak link. But what if we could turn the tables, forcing attackers to question their assumptions and strategies?
Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag (ewpratten.com)
My life is full of very obscure problems