Categories
Security

This huge DDoS attack was one of the longest ever recorded

An unprecedented distributed denial of service (DDoS) attack saw over 25.3 billion requests being sent to a target. Imperva, a cyber security software and services company, confirmed the attack.

As reported by Bleeping Computer, the firm’s systems defended the record-breaking attack when it occurred on June 27, 2022.

Getty Images

The threat actors concentrated their efforts on a Chinese telecommunications service provider, which was subjected to an attack that reached 3.9 million requests per second (RPS), with an average of 1.8 million RPS.

Granted, the aforementioned figure doesn’t come remotely close to the largest HTTPS DDoS attack ever recorded (26 million RPS). However, the time span of how long the attack continued was specifically highlighted — this particular attack ended after four hours.

Comparatively, DDoS attempts that exceed the 1 million RPS mark generally end after seconds or several minutes. Imperva also mentioned in its report that around one in 10 DDoS attacks lasts for over an hour.

Due to the automated mitigation solution in place that blocks DDoS attacks in under three seconds, the attempt could have peaked at a much higher number than the 3.9 million figure.

As for the attack itself, it was carried out via a botnet system situated within 180 countries. IP addresses were predominantly based in the U.S., Brazil, and Indonesia. The botnet utilized a network of 170,000 devices that were breached, ranging from modem routers, smart security cameras, and servers. The latter was found to be hosted on public clouds and cloud security service providers.

“The attack started at 3.1M RPS and maintained a rate of around 3M RPS. Once the attack peaked at 3.9M RPS, the attack lowered for several minutes but returned to full strength for another hour,” Imperva said.

The hackers relied on HTTP/2 multiplexing in order to deliver various requests at once via individual connections. Imperva added that this technique is capable of shutting servers down with a limited amount of resources. It also stressed that these sorts of attacks are “extremely difficult to detect.”

DDoS attacks have increased in popularity in recent years. Cloudflare confirmed that this category has seen a 175% increase in incidents within the fourth quarter of 2021.

Google, meanwhile, managed to stop the largest HTTPS DDoS attack in history in August, with the company mitigating an attempt that peaked at 46 million RPS.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Computing

Lenovo Legion gaming laptop and desktop get huge discounts

Lenovo’s Legion lineup is making a name for itself in the gaming industry, and it helps that you can take advantage of gaming laptop deals and gaming PC deals involving the brand’s products. They’re still not cheap, but you’ll be saving hundreds of dollars with every purchase, which you can spend on video games or other accessories that you may need.

Here are two of the best options available from Lenovo right now: the Lenovo Legion Slim 7i gaming laptop, which is is down to $1,350 from $1,950 after a $600 discount, and the Lenovo Legion Tower 7i gaming desktop, which is down to $1,700 from $2,330 after a $630 discount. Both offers are eye-catching, but we’re not sure how long they’ll be available. It’s highly recommended that you finalize your purchase if you’re interested in either one, as they may go offline without warning.

Lenovo Legion Slim 7i — $1,350, was $1,950

Lenovo Legion Tower 7i — $1,700, was $2,330

Lenovo Legion Slim 7i — $1,350, was $1,950

Arif Bacchus / Digital Trends

Lenovo, long associated with reliability, is one of the best laptop brands, and it’s behind some of the best gaming laptops like the Lenovo Legion 5 Pro. The Lenovo Legion Slim 7i is also a worthwhile purchase, as it can smoothly run today’s most popular games with its 10th-generation Intel Core i7 processor and Nvidia GeForce RTX 2060 graphics card. It also features 16GB of RAM, which our guide on how much RAM do you need recommends for gaming. The Lenovo Legion Slim 7i also packs a 15.6-inch Full HD display that will let you appreciate your games’ finest details, support for Dolby Vision and Dolby Atmos for an immersive gaming experience, and a 1TB SSD with Windows 10 Home out of the box that provides ample space to install several titles at a time.

Lenovo Legion Tower 7i — $1,700, was $2,330

The Lenovo Legion Tower 7i gaming PC with RTX 3070.

If you’ve already invest in gaming monitor deals, then going for the Lenovo Legion Tower 7i may be the better choice. The gaming PC packs more power than the Lenovo Legion Slim 7i with its 11th-generation Intel Core i7 processor, Nvidia GeForce RTX 3070 graphics card, and 16GB of RAM, with a 1TB SSD that comes with Windows 11 Home pre-installed. Like the best gaming desktops, the Lenovo Legion Tower 7i ensures that it can keep running at peak performance with the Legion Coldfront 2.0 cooling system, which features enhanced fin thermals, larger fans, and a thermal memory and storage armor.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Computing

This monitor does VR without a headset — for a huge price

If you’d like to indulge in some virtual reality (VR) games, but you don’t love the bulky feeling of a VR headset, Dimenco has a solution for you — a 3D monitor that dials up the immersion to a much higher level.

Equipped with a set of tools that help achieve the 3D effect, Dimenco’s new product doesn’t even require a pair of 3D glasses, let alone a whole VR headset. However, the price is certainly going to be a huge roadblock — it costs well over $10,000.

Dimenco

If you’re familiar with the 3D effect provided by a Nintendo 3DS, you probably already kind of know what to expect from Dimenco’s innovative 32-inch monitor. Officially dubbed the SR-Pro-Display, referring to simulated reality (SR), the display comes decked out with a lot of different tech that helps it achieve that 3D immersion. This includes proprietary image processing technologies, eye tracking capabilities, and special lenticular lenses.

The new SR monitor arrives in a single 32-inch configuration sporting an 8K resolution. Unlike many monitors, you’ll need a reasonably beefy computer to support this screen. Dimenco recommends at least an Intel Core i7 processor from the 10th generation or newer as well as an Nvidia GeForce RTX 2080 Ti graphics card. However, you might need even better hardware depending on your game of choice.

Dimenco’s new product was first introduced during CES 2022 alongside a host of other impressive monitors, such as the enormous Samsung Odyssey Ark. It then reappeared at Siggraph 2022, where TechRadar’s Hamish Hector was able to see it and take it out for a spin in Project Cars 2. Hector praised the display’s ability to crank up the immersion, comparing it to that of a VR headset and saying that it improved his gameplay by a considerable margin.

Dimenco's 3D SR 8K monitor.
Dimenco

On the other hand, it wasn’t quite as powerful as a VR headset, nor should it be — after all, you don’t need any extra hardware, only your own pair of eyes. Hector also talked about the fact that being unable to interact with the screen using your own hands feels weird. It’s still a regular monitor, which means that when you play a game, you’ll be using your keyboard and mouse or perhaps a controller. In VR, your hands play a big part and that affects how real it all feels.

Whether it’s intensely realistic or not, it’s still a good middle ground for those of us who can’t, or don’t want to, use a VR headset instead. However, the pricing of this monitor is quite hard to swallow. You can now buy it directly from Dimenco for a whopping sum of $11,690. At that price, even those who might be interested in trying out this technology may be put off.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Computing

North Korean hackers are targeting this huge crypto exchange

North Korean hackers are attempting to lure in cryptocurrency experts via bogus job offers for crypto exchange platform Coinbase.

As reported by Bleeping Computer, a campaign orchestrated by the well known North Korean Lazarus hacking group has been uncovered, and its target is those involved in the increasingly popular fintech (financial technology) industry.

Getty Images

In what is clearly part of a social engineering attack, the hacking group engages in conversation with targets through LinkedIn, which ultimately culminates in a job offer being presented to the potential victim.

Coinbase is a leading cryptocurrency exchange company, so, at face value, many who are not privy to the attack will naturally be interested in adding them to their resumes. However, if the attack were to succeed, then the consequences could lead to untold amounts of crypto wallets being seized and stolen.

Hossein Jazi, who works as a security researcher at internet security firm Malwarebytes and has been analyzing Lazarus since February 2022, said individuals from the cybergang are masquerading as employees from Coinbase. The scam attracts potential victims by approaching them to fill the role of “Engineering Manager, Product Security.”

If that individual falls for the fake job offer, then they’ll eventually be given instructions to download a PDF explaining the job in full. However, the file itself is actually a malicious executable utilizing a PDF icon to trick people.

The file itself is called “Coinbase_online_careers_2022_07.exe,” which seems innocent enough if you didn’t know any better. But while it opens a fake PDF document created by the threat actors, it also loads malicious DLL codes onto the target’s system.

A fake job offer for Coinbase in the form of a PDF.
Bleeping Computer/@h2jazi

After it’s successfully deployed onto the system, the malware will then make use of GitHub as a central command center in order to receive commands, after which it has free rein to carry out attacks on devices that have been breached.

U.S. intelligence services have previously issued warnings regarding Lazarus’ activity in issuing cryptocurrency wallets and investment apps infected with trojans, effectively allowing them to steal private keys.

And the group’s efforts have been lucrative, to say the least — the FBI found that it had stolen cryptocurrency with a value of over $617 million at the time.

This particular attack, which is connected to a blockchain-based game, materialized due to another deceptive PDF file, which was sent as a job offer to one of the blockchain’s engineers. Once the file was opened, the individual’s system was infected, subsequently paving the way for Lazarus to locate a security flaw and take advantage of it in a big way.

In any case, the prospect is a scary one: opening a single PDF file leading to the entire network being compromised. In the case of Coinbase, which handles billions of dollars in crypto transactions, one can only imagine what the outcome and financial ramifications would be if Lazarus indeed manages to find a way in.

For the time being, if you’re approached by Coinbase in any capacity, it might be a good idea to be cautious of opening any files.

Editors’ Choice






Repost: Original Source and Author Link

Categories
Security

Homeland Security bug bounty reveals huge number of flaws

The outcome of a bug bounty program for the Department of Homeland Security (DHS) has been revealed, and it’s not particularly encouraging news for a government agency synonymous with cyber security.

Participants of DHS’ first-ever bug bounty program, named “Hack DHS,” confirmed that they found a worrying number of security bugs.

Stock Depot/Getty Images

They discovered a total of 122 security vulnerabilities in external DHS systems, according to The Register and Bleeping Computer. Twenty-seven bugs were recognized as “critical severity” flaws.

The Hack DHS initiative saw more than 450 security researchers participate in the program. For their efforts, the government agency paid out a total reward of $125,600 that was distributed amongst the ethical hackers.

As aptly highlighted by The Register, the aforementioned payout figure pales in comparison to what other organizations pay to bug bounty hunters.

For example, Intel has previously offered up to $100,000 for successfully uncovering specific vulnerabilities.

Other technology giants like Microsoft offer 10s of thousands of dollars for finding flaws, while Apple paid a single individual nearly the entirety of the Hack DHS bounty by giving him $100,000 for hacking a Mac.

Google, meanwhile, has awarded nearly $30 million to individuals enrolled in its own bug bounty programs. In one particular case, the company gave a self-taught teenage hacker $36,000 for reporting a certain bug.

Considering the fact that one of the Department of Homeland Security’s key responsibilities involves cyber security, many may understandably be concerned that such a high amount of security bugs were found in the first place. Moreover, the somewhat lackluster payment tiers associated with Hack DHS could be a potential deterrent to future interested parties.

All things considered, it seems the DHS is not as secure as many Americans would have hoped it would be.

A physical lock placed on a keyboard to represent a locked keyboard.
piranka/Getty Images

Homeland Security’s quest to become more secure

Hack DHS was originally introduced in December 2021. Any hacker who joined the program would have to provide a comprehensive breakdown of any vulnerability they find. They also have to detail how that flaw can be targeted and exploited by potential threat actors, as well as explain how it can be specifically utilized to access and extract data from DHS systems.

Once these security defects are put through a verification process by “DHS security experts,” which takes 48 hours to analyze after a bug is detected and submitted, they are generally patched within 15 days or so. In some cases, it takes the government agency longer than half a month to fix the more intricate flaws.

The government agency’s bug bounty program will be conducted via a tiered rollout consisting of three stages. The first phase, payouts, has been completed, while the upcoming second stage will see security researchers hand-picked by the DHS taking part in a live hacking event.

As for the final phase, The Register reports that DHS will share information that it hopes will influence additional bug bounty programs.

The popularity of bug bounty programs is increasingly becoming more prominent in an era where cybercriminals have been intensifying their attempts to infiltrate major companies, especially in the technology space.

For example, Intel unveiled Project Circuit Breaker, an expansion to its bug bounty program that was introduced to recruit “elite hackers.” Google also updated its Vulnerability Reward Program last year by launching a new bug platform.

Elsewhere, Google recently confirmed that a record number of dangerous zero-day exploits were identified in 2021, while cybercrimes are more widespread than ever before.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Security

Hacker steals 1 billion people’s records in huge data breach

An anonymous hacker has stated that he has successfully infiltrated the Shanghai police department’s database. In doing so, he apparently extracted personal information of a staggering one billion Chinese citizens.

The individual, ‘ChinaDan’, took sole responsibility for the data breach. As reported by Reuters and PCMag, he detailed the incident on hacker forum Breach Forums.

Getty Images

He’s currently offering the huge amount of information for 10 Bitcoins, which would translate to around $200,000 at current rates. The aforementioned data is said to equal 23 terabytes (TB) in size.

Dan said he obtained the files containing the names, addresses, and mobile numbers from the Shanghai National Police (SHGA) database.

He also reportedly managed to gain access and retrieve the birthplaces, national ID numbers, and every single crime case related to the one billion citizens, all of whom are based primarily in China.

Currently, Reuters wasn’t able to confirm whether the claim of the post is indeed real. The Shanghai government and its police department have yet to comment on the situation since it materialized earlier this week.

That said, Zhao Changpeng, CEO of popular cryptocurrency exchange Binance, confirmed that the company has intensified its user verification processes. Why? Its threat intelligence arm detected that these records are now being sold on the dark web.

The leak could be attributed to “a bug in an Elastic Search deployment by a (government) agency, he detailed in a tweet. “This has impact on hacker detection/prevention measures, mobile numbers used for account takeovers, etc.”

​​He continued that “apparently, this exploit happened because the gov developer wrote a tech blog on CSDN [the China Software Developer Network] and accidentally included the credentials.”

A large monitor displaying a security hacking breach warning.
Stock Depot/Getty Images

Kendra Schaefer, the head of tech policy research at consultancy Trivium China, said that if the data was actually obtained via the Ministry of Public Security, it would naturally be bad for “a number of reasons. Most obviously it would be among [the] biggest and worst breaches in history,” she said.

Indeed, if the claim from the hacker is ultimately verified, then the cyber incident would rank as probably the largest data breach in history.

The post from ChinaDan itself is already generating a considerable amount of discussion on Chinese social media platform Weibo, as well WeChat throughout the weekend. In fact, the hashtag “data leak” was blocked on Weibo by Sunday afternoon, according to Reuters.

Elsewhere, an underground online marketplace that sold the personal details of around 24 million U.S. citizens was recently shut down. The service’s profits, meanwhile, far exceeds Dan’s $200,000 asking price — since April 2015, blockchain analysis company Chainalysis confirmed that it found $22 million in Bitcoin transactions retrieved by SSNDOB.

2022 has undoubtedly been a busy year for hackers in general. There have been a number of unprecedented situations related to the hacking scene, ranging from various shutdowns such as the largest dark web marketplace being taken offline, to Microsoft launching its own cybersecurity initiative to combat the sheer rise in cybercrime.

Editors’ Choice






Repost: Original Source and Author Link

Categories
Computing

Hackers targeted AMD to steal huge 450GB of top-secret data

A data extortion group known as RansomHouse has asserted that it has stolen upwards of 450GB of sensitive data from AMD.

Team Red has since confirmed that it launched an investigation into the matter after the situation came to light.

Stock Depot/Getty Images

As reported by Bleeping Computer and Tom’s Hardware, RansomHouse is not your regular hacking group that randomly targets whoever they can.

They have a more specific methodology — infiltrate a specific corporate network in order to extract any data it can obtain, after which a ransom demand is made if the victim doesn’t want it leaked or sold to others.

By providing updates over the past week via Telegram, RansomHouse stated it would soon make available for purchase tranches of data for a business that has three letters in its name, with the first letter being A.

As expected, on Monday, AMD was added to its website. It claims to be in possession of 450GB of data, but the exact details pertaining to what that contains remain unconfirmed.

Tom’s Hardware highlights how Restore Privacy reviewed the data published by the group — it found that it seemingly includes “network files, system information, as well as AMD passwords.” The website points out a caveat, though — whether the source of information has actually been extracted from AMD or one of its subcontractors is another question entirely.

In any case, RansomHouse said that AMD relied on extremely straightforward passwords such as, well, “password,” which is one of the ways it managed to gain access to its networks.

The semiconductor and GPU company’s network was compromised on January 5, 2022, according to the group’s statement.

However, RansomHouse told Bleeping Computer that its “partners” breached and gained access to AMD’s network around a year ago. January 5, 2022, is when the hackers ultimately lost that access.

A depiction of a hacker breaking into a system via the use of code.
Getty Images

AMD was not contacted by the group as it prefers to sell the data due to the perceived high value. It says that among the 450GB of stolen data is research and financial information. Such data is currently being analyzed so they can calculate an exact monetary value.

“No, we haven’t reached out to AMD as our partners consider it to be a waste of time: it will be more worth it to sell the data rather than wait for AMD representatives to react with a lot of bureaucracy involved,” a RansomHouse representative told Bleeping Computer.

Although ransomware was reportedly not involved in the breach, a leaked CSV shows a list of over 70,000 devices that are seemingly connected to AMD’s internal network, in addition to a purported list of AMD corporate credentials. As well as ‘password’, other weak passwords that were reportedly used by AMD employees also included “P@ssw0rd,” “amd!23,” and “Welcome1.”

Nvidia, Microsoft, Facebook, and other large corporations were all infiltrated throughout 2022 by the hacking group LAPSUS$, who also claimed to have breached all these firms predominantly via weak passwords.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Computing

A huge 16TB SSD is coming soon, but there’s a catch

There’s been a lot of excitement surrounding what would likely be the first 2.5-inch, 16TB SATA enterprise solid-state drive (SSD), but some manufacturing-related problems have been causing a delay in bringing the product to market.

As reported by TechRadar, Sabrent has confirmed that it has overcome these issues and a launch for its first 16TB SATA enterprise SSD should arrive in the coming months.

Bdavid32/Shutterstock

When the SSD was announced in December 2020, Phison uncovered problems related to the controller required and subsequently canceled the entire project, a spokesperson explained to TechRadar.

“The good news is the issues have been fixed and we expect to see engineering sample SSD’s very soon,” the spokesperson continued. “So, in short, it will be produced soon, in the following months, if all goes well after testing the samples.”

The drive itself is expected to utilize Micron’s 96-layer QLC packages, accompanied by a Phison E12S controller.

As for the price of the 16TB SSD, the exact cost was not revealed, but for reference, a Samsung 870 QVO 8TB SSD can be purchased for around $749. As such, TechRadar expects Sabrent to set the price at a maximum of $1,500.

A 16TB SSD like this will be aimed toward the enterprise market that wants to upgrade 2.5-inch hard disk drives to an SSD with much more capacity.

However, while there will be a market for a 16TB SSD (especially in the enterprise space), and it’s exciting to see such an SSD with such a huge capacity set to be available soon, TechRadar highlights how an M.2 class version of such a product could be a ways off.

Granted, Micron unveiled a 232-layer NAND chip during 2022. That represents double the capacity of the 96-layer NAND that is currently utilized by Sabrent for its Rocket Q SSD. A 19.2TB M2-based SSD is therefore theoretically possible to manufacture.

TechRadar also notes how controllers shouldn’t pose too much of a problem due to the lack of a hard cap in regard to storage capacity.

There’s an important caveat to consider here, though: The website also points toward the concerns surrounding power requirements for such a large M2-based SSD without the need for an external power source.

In any case, while an M2-based SSD approaching 20TB could be on the horizon, it may be at least a few years before an M2-powered 200TB SSD arrives.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Game

Razer Black Friday deals include huge discounts for Kishi phone controllers

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.

A ton of Razer accessories for Black Friday, including mice, headsets, keyboards and a gaming chair. There are all-time lows on a bunch of products too. One of the better deals is for the wireless mouse. The price has dropped to $90, which is $60 off the regular price. The Viper Wireless is available in both and . It’s an ambidextrous mouse that has Razer’s optical switches, a 20K DPI optical sensor and low-latency HyperSpeed wireless tech.

Buy Viper Ultimate (Black) at Amazon – $90
Buy Viper Ultimate (White) at Amazon – $90

Another wireless mouse worth checking out in the sale is the . It too has a 20K DPI Optical Sensor and optical switches. You’ll get up to 120 hours of battery life over Bluetooth or 70 hours via HyperSpeed, according to Razer. It’s available for at the moment, which is the lowest price we’ve seen to date. The mouse typically costs $130.

Buy DeathAdder v2 Pro at Amazon – $70

Also hitting all-time-low prices are the iOS and Android versions of the Kishi controller. It’s a gamepad that you can clip your phone into. Along with playing native mobile games, you can use it with the likes of Xbox Game Pass Ultimate, Google Stadia, Amazon Luna and GeForce Now for cloud gaming, as well as games streamed from your console or PC. The Android version of the controller is ($35 off) and the iPhone model is currently (down $40).

Buy Razer Kishi (Android) at Amazon – $45
Buy Razer Kishi (iPhone) at Amazon – $60

Elsewhere, the Kraken X Ultralight wired gaming headset is worthy of attention. It has a bendable, noise-canceling mic and is compatible with PC and all consoles. The classic black verison of the headset, which is typically $50, currently costs , another all-time low.

Buy Razer Kraken X Ultralight at Amazon – $30

Get the latest Black Friday and Cyber Monday offers by visiting our deals homepage and following @EngadgetDeals on Twitter.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.



Repost: Original Source and Author Link

Categories
Game

Unity Acquires Weta, and It’s a Huge Deal for the Metaverse

Digital Trends may earn a commission when you buy through links on our site.

Unity, the 3D development platform used to create video games, has entered an agreement to acquire Weta Digital, the visual effects studio behind films like Avatar, Lord of the Rings, and more. The $1.625 billion purchase is a massive move with serious metaverse implications.

The two companies have entered a “definitive agreement,” which will see Unity acquiring Weta’s “tools, pipeline, technology, and engineering talent.” Unity will gain proprietary graphics and VFX tools that have been used to make some of Hollywood’s biggest movies, and it plans to make them available to creators down the line.

While Unity will gain the tools, Weta’s VFX teams will continue to operate as a standalone entity called WetaFX. Lord of the Rings director Peter Jackson will retain majority ownership of WetaFX alongside CEO Prem Akkaraju.

A press release about the deal sheds some light on Unity’s long-term goal here: Shaping the “future of the metaverse.” The metaverse has been a hot topic in recent weeks thanks to Facebook — or Meta, as it’s now known. The company changed its name to emphasize its focus on building the metaverse, a more lived-in digital space. While Meta fired a very public shot, the concept of the metaverse has already existed for years in the video game world. Companies like Epic Games have led the charge, using games like Fortnite to get players used to spending more time in a virtual space with its own currency, events, and more.

Unity’s power-play is another key example of how serious the video game world is about creating the metaverse. The acquisition will give Unity users access to more powerful 3D tools that can be used to make more sophisticated video games, but the potential stretches far beyond entertainment. Weta’s tools could be used to create powerful digital experiences that accelerate metaverse efforts by giving creators the power to shape it.

Unity and Weta have only entered an agreement, so the final acquisition still needs to go through. That means it’ll be a while until we see the full effects of the deal. But it’s a major move that’s likely going to impact video games, movies, and just about every digital space.

Editors’ Choice




Repost: Original Source and Author Link