TechLetters #82 - industrial ransomware, processor frequency data leak, disinformation hits Swedish govt, Covid19 apps used for movement control of populations, Russia looses processors, beaver attack
Frequency side channels attacks on modern microprocessors. Intel/AMD (maybe ARM) processors affected. Can be used in a remote setup to, for example, recover cryptographic keys. The suggested mitigation from Intel is here. Just do the same things as against other power-related leaks.
Italian-made RCS found in use by Kazakh government? For Android. Allows its hacking and control over the device. This system is used by other governments, too. This is called “lawful interception” (or so).
Ransomware for Programmable Logic Controllers. Demonstrated against Siemens S7-300 (water treatment environment), at a low cost. PLCs will not be reflashed because this means financial loss: ransoms must be lower than that. Antyviruses will not detect it because it’s in the firmware.
Likely disinformation operation aimed at the government of Sweden. Propagated modified photos as if to indicate alleged Sweden's support for the Kurdistan Workers Party (it is the official reasons for Turkey's disagreement with Sweden's accession to NATO ...).
Chinese citizens planned to protest but were thwarted by Covid19 health passes. Suddenly "authorities turned their Covid19 health code apps red". Transportation was impossible.
Significant internet outage in Canada. Cyberattack? Well, not quite. The culprit was identified as a single beaver.
In case you feel it's worth it to forward this content further:
If you’d like to share: