• 14 Posts
  • 945 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle

  • Once upon a time we thought that inviting people to join the Information Superhighway would bring them together and herald an age of unity and shared purpose.

    We didn’t realize that we were opening the noosphere to subversion and attack.

    It wasn’t long before weaponized memes were deployed to deepen societal divisions. Old antagonists brought their wars to the digital frontier. Commercial entities outcompeted their FOSS forefathers and to reshape discourse. Engorged vectors emulated human creativity and threatened to forge new underclasses.

    Was the utopian dream wrong? Were we naive to believe technology could unleash humanity’s potential? Or are these mere birth pains of the future we were promised?






  • We had a couple decades of slow acclimatization: crappy black and white scans, weird CGA scans, glorious 16 colors, all of which had to be painstakingly downloaded at 2400 baud or less, then finally lifelike 256 color images. And then tiny gifs or videos that would take all night. In the semi modern era, there was crappy filesharing where you could type search strings in and hope for the best (and enough seeds).

    But these poor bastards are going from zero straight to pornhub.










  • The campaign is ongoing and Microsoft tracked emails “sent to thousands of targets in over 100 organizations.” The emails contained configuration files for Remote Desktop Protocol (RDP) that are connected to servers controlled by the hackers.

    Even security keys and point of sale devices could be affected by opening the RDP attachment. The access would allow hackers to install malware, map the victim’s network, install other tools and gain access to credentials.

    The campaign was particularly noteworthy because the use of RDP configuration files was a novel advancement in Midnight Blizzard’s tactics. Microsoft noted that both Amazon and the Government Computer Emergency Response Team of Ukraine have seen similar activity.

    I’m surprised that using RDP is novel for spear phishing, but Microsoft knows more about it than I do.