The internet is racing to cut ties with 8chan after another deadly shooting

https://www.engadget.com/2019/08/05/8chan-cloudflare-internet-services-pull-support/

Less than an hour before this weekend’s deadly mass-shooting in El Paso, Texas, the suspect appears to have posted a rambling post filled with white nationalist and racist statements on 8chan. After a day of waffling, Cloudflare announced it would cut the security services it had provided the far-right site. That exposed 8chan to distributed denial of service (DDoS) attacks, and for a time, the site was down. But 8chan soon found a way back online. Now, internet infrastructure companies are playing whack-a-mole, pulling the plug as other services step in to help 8chan get back online.

Soon after Cloudflare terminated its support for 8chan, another host and anti-DDoS protection company BitMitigate stepped in. BitMitigate’s owner, Epik, is notorious for providing services to sites like Gab and Daily Stormer, both known for their far-right supporters, including neo-Nazis and white supremacists. But Voxility, which was effectively providing service to Epik and BitMitigate, pulled its backend support for both. According to New York Times reporter Kevin Roose, Tucows, 8chan’s domain name registrar, will no longer support the site, either. At the time of this writing, 8chan is down.

This isn’t the first time Cloudflare has been urged to end its support for 8chan. In fact, the shooting in El Paso was the third mass shooting this year in which the suspect is believed to have posted about the attack on 8chan before carrying it out. 8chan was linked to the Christchurch shooting in New Zealand and another in California.

In the past, Cloudflare has been reluctant to pull its services from extremist websites, claiming it didn’t want to violate free speech. According to a report by The Guardian, Cloudflare also believed that by keeping "bad" sites in the company’s network, it could notify law enforcement when necessary. Other companies, it said, may not do the same. Cloudflare did make an exception when it terminated its contract with the Daily Stormer. But CEO Matthew Prince told Ars Technica that he hated doing so. "The pressure to take it down just kept building and building," he said.

In a blog post explaining Cloudflare’s most recent exception, CEO Matthew Prince wrote, "The rationale is simple: they have proven themselves to be lawless and that lawlessness has caused multiple tragic deaths."

But those who pick up after Cloudflare may use the same free-speech argument. In a statement released today, Epik’s CEO Rob Monster said, "Freedom of speech and expression are fundamental rights in a free society. We enter into a slippery slope when we start to limit speech that makes us uncomfortable." Monster said Epik did not solicit 8chan’s business, and at the moment it’s only providing registration services. It hasn’t decided whether or not to provide DDoS protection. "From what little we know so far, the Chans are not lawless and do have moderation," Monster added.

Now, it’s unclear if Epik will be able to provide support for 8chan. Because Epik and BitMitigate only have a small percentage of the server capacity of Cloudflare, they rely on renting it from providers like Voxility. Whether or not they support 8chan might actually be up to those providers. In a statement to The Washington Post, Voxility executive Maria Sirbu said, "As soon as we were notified … we proceeded with (completely) removing" BitMitigate. She said Voxility is taking a "firm stand" and urged others to take more action in "keeping the internet a safer place."

But as Prince pointed out in his blog post, 8chan will likely find a way back online. After all, Cloudflare pulled support from the Daily Stormer years ago, and the site continued on seemingly unimpeded, until today. "I have little doubt we’ll see the same happen with 8chan," Prince wrote. "While removing 8chan from our network takes heat off of us, it does nothing to address why hateful sites fester online."

Still, now that there’s so much awareness for the level of hate and violence that 8chan and sites like it breed, it will probably be harder for 8chan to find the services it needs. Even if it can find support from a company like Epik, other internet infrastructure companies, like Voxility, might step in and pull the plug.

Source: Epik

via Engadget http://www.engadget.com

August 5, 2019 at 02:24PM

Ransomware, “wiper” malware attacks have more than doubled, IBM team says

https://arstechnica.com/?p=1546117

RYAZAN, RUSSIA - JUNE 28, 2017: The silhouette of a young man against a red background with a projected message related to the Petya ransomware; on 27 June 2017 a variant of the Petya ransomware virus hit computers of companies in Russia, Ukraine, and other countries in a cyber attack. Alexander Ryumin/TAS (Photo by Alexander Ryumin TASS via Getty Images)
Enlarge /

RYAZAN, RUSSIA – JUNE 28, 2017: The silhouette of a young man against a red background with a projected message related to the Petya ransomware; on 27 June 2017 a variant of the Petya ransomware virus hit computers of companies in Russia, Ukraine, and other countries in a cyber attack. Alexander Ryumin/TAS (Photo by Alexander Ryumin TASS via Getty Images)

Alexander RyuminTASS via Getty Images

It would be hard to miss the rise of ransomware attacks given how visible some have been this year. With multiple state and local governments set back on their heels by ransomware—including the RobbinHood ransomware attack in May that the City of Baltimore is still recovering from, to the tune of $10 million in recovery costs and $8 million in lost revenue—ransomware attacks have become an almost daily part of the news. But these attacks against municipal and state governments are only the most high-profile part of a much larger trend, according to a report issued by IBM’s X-Force Incident Response and Intelligence Services (IRIS) today.

According to data from X-Force IRIS, the ransomware problem is part of a much larger overall increase in destructive malware attacks that has been spiking over the past six months. X-Force’s response to cases of destructive malware increased 200% between January to July 2019 in comparison to the previous six-month period.

“Of those destructive malware cases, 50% targeted organizations in the manufacturing industry,” the researchers noted. “Other sectors significantly affected included oil and gas and education. Most of the destructive attacks we have observed hit organizations in Europe, the United States, and the Middle East.”

IRIS has witnessed ransomware attacks—criminal attacks where a ransom is demanded in exchange for a key—specifically increase by 116%. “While not all ransomware attacks incorporate destructive malware,” the IRIS team wrote, “the simultaneous increase in overall ransomware attacks and ransomware with destructive elements underscores the enhanced threat to corporations from ransomware capable of permanently wiping data.”

Going low

The line between ransomware and purely destructive malware has been blurred ever since the WannaCry and NotPetya attacks used ransomware-based attacks solely for destructive purposes. Ransomware itself can be considered destructive malware, since it renders data irretrievable if victims don’t pay for an encryption key. But there has also been a rise in the use of purely destructive attacks by cybercriminals—a type of attack usually associated with state-backed attackers in the past, such as the Iran-attributed Shamoon, the US-Israel-attributed Stuxnet (which actually destroyed hardware with malicious commands), and the North Korea-attributed Dark Seoul attacks.

“Wiper” capable ransomware like LockerGoga and MegaCortex still have a financial component, but these initiatives go after industrial systems as well as data. And attacks such as the GermanWiper malware use the same “faux ransomware” approach as NotPetya—they offer a key in exchange for a ransom but are irreversible. Additionally, the IRIS team noted that they had seen “financially motivated attackers switch to destructive tactics when they perceive they are not achieving their objective…using destruction as a means of revenge.”

“There are two forms of targeted attacks in the destructive world—’I need to be low and slow until I gather the information I need and plan out my attack,’ or ‘I’m going to drop in, release it, and let it go wild,'” as Christopher Scott, IBM X-Force IRIS’ Global Remediation Lead, put it. But the latter are not in the majority. IRIS observed attackers “reside” within targeted organizations’ networks for up to over four months before launching their destructive payloads—giving the malicious actors plenty of time to perform reconnaissance of the network and stealthily spread their access. And the attackers will go to great lengths to preserve access to key bits of infrastructure within the network throughout their intrusion, allowing them “to maintain control of their strongholds for as long as possible, and to cause as much damage as they can.”

This extended time on the network also gives defenders more time to detect the attacks before they move to the destructive climax. And finding and knocking out their points of access early can help prevent or reduce the blow of an attack in progress.

While some non-targeted ransomware attacks have exploited vulnerabilities in servers to gain access to their victims’ networks, the majority of targeted ransomware and destructive attacks begin either with a spear-phishing email, “credential stuffing” (guessing or outright brute-force attacks with passwords), “watering-hole” attacks (using a site related to a job or industry to spread malware, sometimes through malvertising or compromise of the website), or through some other compromise of a third-party system (such as a cloud service or software-as-a-service provider).

PowerShell scripts are still heavily used by ransomware attacks to spread across networks. But with PowerShell scripts increasingly being blocked by organizations on typical users’ systems, destructive attackers are more often targeting “privileged accounts”—those with administrative access across a wide range of systems. “Unlike attempting remote access, which can generate significant noise,” the X-Force IRIS report noted, “moving laterally with a privileged account can allow the adversary to stealthily move between devices while appearing to be legitimate administrative activity.”

In some cases that the IRIS team responded to, an attacker used administrative access to “wipe an organization’s entire email system,” making it even more difficult to respond to the attack.

Defensive measures

Preventing ransomware and destructive attacks outright would be the ideal solution, but it may not be realistically possible for many organizations—especially as more attacks come in from third-party networks. So instead, isolating the parts of network infrastructure that are affected is essential to limit the damage, the IRIS report noted.

“Even in cases where an attack materializes, if the affected parts of the infrastructure are isolated, an organization can significantly limit the damage and prevent some of the impact to its operations,” the team wrote. “Reducing the number of devices affected by a destructive attack can also drastically reduce the cost and time associated with reconstitution.” Isolating critical parts of network infrastructure from third-party networks is an important part of that—using multiple layers of security control and network defenses.

IRIS’ other advice to organizations includes running tests of response plans “under pressure” and using threat intelligence resources to get a better idea of the potential risks they face. But all of these seem like a lot to ask for some of the types of organizations that have been falling to ransomware. Nowadays, ransomware-targeted organizations are ones that fall below the information security poverty line in terms of administrative and security resources, have shallow IT expertise internally, and can’t even manage to train users on potential threats from phishing attacks.

via Ars Technica https://arstechnica.com

August 5, 2019 at 12:54PM

French Inventor Hoverboards Across the English Channel, Manages Not to Crash This Time

https://gizmodo.com/french-inventor-hoverboards-across-the-english-channel-1836951967

Image: Michel Spingler ((AP)

We all know that age-old adage: if you don’t succeed, try, try again. Sometimes you’ve just got to pick yourself up by your bootstraps, get back on your hoverboard, and give crossing that English Channel another go.

After Franky Zapata wiped out mid-way through his inaugural attempt last month, the French inventor finally completed the journey on his second try Sunday, the Guardian reported, turning the possibility of hoverboard invasion into a completely valid fear.

You can check out Zapata’s flight—or rather, hover—in the video below.

The 40-year-old military reservist used his self-designed Flyboard to make the 22-mile trip, stopping halfway to refuel the supply of kerosene strapped to his back that was powering his flight (the device can only run for 10 minutes; otherwise France would have conquered the world by now). Zipping between Sangatte, France and Dover, England took him all of about 20 minutes. Eat that, Marty McFly.

“We made a machine three years ago… and now we’ve crossed the Channel, it’s crazy. Whether this is a historic event or not, I’m not the one to decide that, time will tell,” Zapata told the BBC after completing his sojourn straight out of science fiction.

He’s been tinkering with the technology for this Flyboard model for three years (a water-powered hoverboard he invented in 2011 shared the same name) in part with the help of a French military grant he received last year totaling roughly $1.4 million. Last month, Zapata also dazzled onlookers when he buzzed around at this year’s Bastille Day military parade wielding a hopefully unloaded rifle, prompting France’s armed forces minister to posit the gizmo could be used “as a flying logistical platform or, indeed, as an assault platform,” according to a Guardian report.

But if you’re worried about an invasion of hoverboarding supersoldiers, fear not: Zapata also said in 2017 he was working with the U.S. military creating a similar device for combat. Hopefully, they’ll have figured out the 10-minute flight limit by then, otherwise we’ll have a Vine-length World War 3. 

via Gizmodo https://gizmodo.com

August 4, 2019 at 12:54PM

Oregon garbage truck driver taught an autistic boy about friendship

https://www.autoblog.com/2019/08/04/autistic-boy-garbage-truck-driver-friendship/

A simple act of kindness started the relationship between 48-year-old Rene Vesi and 8-year-old Dima Kerdivara. Every Wednesday morning, as he drove a garbage truck by Dima’s house, Vesi saw the youngster looking out the window. When Vesi started waving to Dima, he was met with smiles that eventually turned into regular meetings on the front lawn. Now, Vesi is part of Dima’s crucial weekly routine, which has helped the autistic boy develop his social skills, his parents say. 

Dima has a box of Waste Management-branded items that he keeps in his home. He has a yellow safety vest, a hat, a toy truck, a small soccer ball, a recycling pamphlet, and even a miniature garbage can. They are all gifts from Vesi, who has worked for the company for 15 years and has had the Kerdivaras on his route for at least three years. Throughout that time, Vesi and Dima have bonded and become close friends. 

According to mother Alla and father Dmitry, the interactions have significantly helped Dima gain confidence and more abilities to express his emotions. Even moreso than other therapy methods, which include sessions with horses and various classes. 

“He lives in his own world,” Dmitry Kerdivara Sr. said. “This interaction creates a bridge between our world and his. And it takes away the fear. Because we know that there are good people who will help him.”

For more background on Vesi and the Kerdivaras, head over to The Oregonian for the full story. 

via Autoblog https://ift.tt/1afPJWx

August 4, 2019 at 08:35AM

Climate Change Has Made Our Stormwater Infrastructure Obsolete

https://earther.gizmodo.com/climate-change-has-made-our-stormwater-infrastructure-o-1836909668

We are not ready for the extreme rainfall coming with climate change. A quick dramatic thunderstorm in New York on Wednesday flooded Staten Island so badly that brown murky water joined bus riders for their evening ride home.

It’s just one in a growing number of examples of infrastructure not being up to the task. And now, a newly published study shows just how unprepared our infrastructure across the U.S. is to handle extreme rainfall events. Many cities’ water management systems—think stormwater drains or dams—aren’t equipped to handle climate change-influenced weather shifts, according to the study published in Geophysical Research Letters. Staten Island got a taste of that when stormwater infrastructure failed to handle about the inch of rain that fell in 20 minutes. That’s because the system wasn’t built to withstand that much rain in such short a time. But New Yorkers aren’t alone in this predicament.

“The take-home message is that infrastructure in most parts of the country is no longer performing at the level that it’s supposed to because of the big changes that we’ve seen in extreme rainfall,” lead author Daniel Wright, a hydrologist at the University of Wisconsin-Madison, said in a statement.

The team of researchers looked at the data from more than 900 weather stations for the years 1950 to 2017 to find out how often extreme storms shot past the standards city infrastructure can handle. The scientists found that extreme weather events are happening 85 percent more often in the eastern U.S. in 2017 compared to 1950. In the West, overwhelming storms are happening 51 percent more often.

Climate change is shifting precipitation patterns and making rainfall event more extreme as our planet’s rising temperature is increasing the amount of water vapor in the atmosphere. We’re seeing that play out already, but these events are expected to grow much worse: If we continue with business as usual, today’s most extreme downpours could become five times more likely by the end of the century.

When infrastructure gets backed up, the result is often floods or even flash floods that can be dangerous. People and cars can be swept away if they’re not expecting the water to rise. Standing water also poses risks to health and infrastructure. It can contain contaminants (see: Hurricane Florence) that can ruin people’s homes and have averse impacts on health, which is the Centers for Disease Control and Prevention recommend avoiding wading into floodwaters. 

If the water infrastructure could handle this amount of water in such a short amount of time, however, it wouldn’t be such a hazard. The study authors hope their findings help inform a new age of renovation. Many presidential candidates like to go on about updating infrastructure, and well, here’s a start. Get to it.

via Gizmodo https://gizmodo.com

August 2, 2019 at 03:06PM

Scientists are making human-monkey hybrids in China

https://www.technologyreview.com/s/614052/scientists-are-making-human-monkey-hybrids-in-china/

In a controversial first, a team of researchers have been creating embryos that are part human and part monkey, reports the Spanish daily El País.

Daring biologist: According to the newspaper, the Spanish-born biologist Juan Carlos Izpisúa Belmonte, who operates a lab at the Salk Institute in California, has been working working with monkey researchers in China to perform the disturbing research.

Their objective is to create “human-animal chimeras,” in this case monkey embryos to which human cells are added. 

Why, why? The idea behind the research is to fashion animals that possess organs, like a kidney or liver, made up entirely of human cells. Such animals could be used as sources of organs for transplantation.

Making chimeras: The technique for making chimeras involves injecting human embryonic stem cells into a days-old embryo of another species. The hope is that the human cells will grow along with the embryo, adding to it.

Izpisúa Belmonte tried making human-animal chimeras previously by adding human cells to pig embryos, but the human cells didn’t take hold effectively.

Because monkeys are genetically closer to humans, it’s possible that such experiments could now succeed. To give the human cells a better chance of taking hold, scientists also use gene-editing technology to disable the formation of certain types of cells in the animal embryos.

Controversial? Extremely. In the US, the National Institutes of Health says federal funds can never be used to create mixed human-monkey embryos. However, there is no such rule in China, which is probably why the research is occurring there.

So far, no part-human part-monkey has been born. Instead, the mixed embryos are only being allowed to develop for a week or two in the lab, at which time they can be studied. That is according to Estrella Núñez, a biologist and administrator at the Catholic University of Murcia, in Spain, who told El País her university is helping to fund the research.

Asked if the El Pais report is accurate, the Salk Institute did not reply. Núñez said in an email she could not comment further until “the results are published.”

Questions: Pablo Ross, a veterinary researcher at the University of California, Davis, who previously worked with Salk on the pig-human chimeras, says he doesn’t think it makes sense to try to grow human organs in monkeys.

“I always made the case that it doesn’t make sense to use a primate for that. Typically they are very small, and they take too long to develop,” he says. 

Ross suspects the researchers have more basic scientific questions in mind. Injecting human cells into monkey embryos could address “questions of evolutionary distance and interspecies barriers,” he says.

via Technology Review Feed – Tech Review Top Stories https://ift.tt/1XdUwhl

August 2, 2019 at 01:56PM