The New Democracy party is indicated to have won Greece’s second election in five weeks, gaining enough parliamentary seats to form a government.
It’s always exciting when a new anime becomes the talk of the town, and one of last year’s hits in that regard was Spy x Family. The adaptation of Tetsuya Endo’s action series quickly became a fan favorite, and it’s returning later this year in the form of both season two and its first-ever movie.
If you had hoped to play Diablo IV this weekend, it appears someone is intent on ruining those plans. Since at least the early hours of Sunday morning, Blizzard’s Battle.net online service has been the target of an apparent DDoS attack, making it difficult, if not impossible, to play Diablo IV,World of Warcraft and other Blizzard titles. “We continue to actively monitor an ongoing DDoS attack which is affecting latency/connections to our games,” Blizzard’s customer support account tweeted at 10:24AM after it originally said it was investigating an authentication issue.
As of 12:30PM ET, the issue appears to be unresolved. “We are currently experiencing a DDoS attack, which may result in high latency and disconnections for some players,” states a notification that appears when you launch Battle.net on PC. “We are actively working to mitigate this issue.” When I tried to log into Diablo IV, I was briefly able to play the game before I was disconnected. Over on Reddit, some players report they haven’t been able to play Blizzard’s latest for at least 10 to 12 hours. At the very least, you can bet this incident will likely renew calls for Blizzard to add an offline mode to Diablo IV.
[#Bnet] We continue to actively monitor an ongoing DDOS attack which is affecting latency/connections to our games.
— Blizzard CS – The Americas (@BlizzardCS) June 25, 2023
This article originally appeared on Engadget at https://www.engadget.com/diablo-iv-and-other-blizzard-games-are-down-due-to-a-ddos-attack-164231957.html?src=rss
If you’re looking for something lightweight and very portable, these cooler bags from Target are perfect.
The team at Hacksmith Industries constructed a unique battle axe that can be carried around in the form of a small pool cue-style case. When swung, the battle axe expands from its business end, revealing two blades of destruction. Awesome, now I just need an expanding shield, and I’ll be ready to hit the battlefield at a moment’s notice.
The team first reverse-engineered an existing single-bladed switch axe to see how it operates, then used those principles to develop the expanding battle axe. The first version they made leaves something to be desired (it breaks on the first attempted brick break), but the second iteration is a much more solid unit. One I wouldn’t mind having in my own arsenal. But does it have to be won in combat, Darksaber style?
Obviously, all I want for my next birthday is this thing and a pallet of watermelons. Best birthday ever! I mean, provided it doesn’t end with a trip to the hospital. It probably will, though. Maybe even two if it’s anything like last year’s birthday.
[via GeeksAreSexy]
When Engadget Senior Editor Devindra Hardawar previewed the Vision Pro in early June, the prototype unit he tried featured an extra velcro strap not seen in any of Apple’s promotional material. At the time, a company spokesperson told him that the handset would support additional straps if necessary.
According to Bloomberg’s Mark Gurman, Apple created the strap, which goes over the wearer’s head, after some employees complained the Vision Pro felt “too heavy” after a couple of hours of use. In a move that feels reminiscent of the company’s decision to sell the Pro Display XDR’s stand as a separate $999 purchase, Apple is reportedly considering selling the strap as an optional accessory rather than including it in the box.
Perhaps that shouldn’t come as a surprise seeing as Apple said Vision Pro would “start” at $3,499 when it arrives in 2024, but considering most previews mentioned the headset’s weight as a potential concern, it feels strange to hear the company won’t go out of its way to ensure consumers have a comfortable experience out of the box.
Given the Vision Pro’s hefty price, you might think the company will market the device only to developers, but Apple seems intent on selling it to consumers as well. Gurman reports the company plans to create dedicated areas within its retail stores where people will have the chance to demo the device. He adds Apple has developed an iPhone app that its retail workers will use to scan a customer’s face so that they can ensure the person leaves the store with the correctly sized bands and light seal for their headset.
With the Vision Pro not slated to go on sale until early next year, the headset could arrive as late as May 2024, giving Apple almost a year to alter its plans. In the meantime, Gurman says the company has already reassigned some employees to work on a more affordable headset and a second-generation Vision Pro.
This article originally appeared on Engadget at https://www.engadget.com/apples-vision-pro-headset-may-not-come-with-a-top-strap-in-the-box-160601556.html?src=rss
‘The Results Are In’: Maury Povich Announces At-Home Paternity Test Kit Company
Posted in: Today's ChiliPovich, who retired from his talk show “Maury” last year, said the company’s at-home tests “can unite families after a long period of time.”
If you were a kid back in the late 90s, you were likely aware of Furbys. Much like Pokémon, Power Rangers, Barbie, etc., they were something of a sensation, and have existed off and on for nearly 30 years now. (And if you didn’t have one, you surely heard about how creepy they are at some point in your life.) With…
As anyone who regularly games online can attest, DDoS (dedicated denial of service) attacks are an irritatingly common occurrence on the internet. Drawing on the combined digital might of a geographically diffuse legion of zombified PCs, hackers are able to swamp game servers and prevent players from logging on for hours or days at a time. The problem has metastasized in recent years as enterprising hackers have begun to package their botnets and spamming tools into commercial offerings, allowing any Tom, Dick, and Script-kiddie rental access to the same power.
It’s a big internet out there, and bad actors are plentiful. There are worse things than spammers and scammers swimming in the depths of the Dark Web. In his new book, Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks, Dr. Scott J Shapiro, Professor of Law and Philosophy at Yale Law School traces the internet’s illicit history through five of the biggest attacks on digital infrastructure ever recorded.
FANCY BEAR GOES PHISHING: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro. Published by Farrar, Straus and Giroux. Copyright © 2023 by Scott J. Shapiro. All rights reserved.
Crime as a Service
Not all Denial of Service attacks use botnets. In 2013, the Syrian Electronic Army (SEA)—the online propaganda arm of the brutal Bashar al-Assad regime—hacked into Melbourne IT, the registrar that sold the nytimes.com domain name to The New York Times. The SEA altered the DNS records so that nytimes.com pointed to SEA’s website instead. Because Melbourne IT contained the authoritative records for the Times’ website, the unauthorized changes quickly propagated around the world. When users typed in the normal New York Times domain name, they ended up at a murderous organization’s website.
Conversely, not all botnets launch Denial of Service attacks. Botnets are, after all, a collection of many hacked devices governed by the attacker remotely, and those bots can be used for many purposes. Originally, botnets were used for spam. The Viagra and Nigerian Prince emails that used to clutter inboxes were sent from thousands of geographically distributed zombie computers. In these cases, the attacker reaches out to their army of bots, commanding them to send tens of thousands of emails a day. In 2012, for example, the Russian Grum botnet sent over 18 billion spam emails a day from 120,000 infected computers, netting its botmaster $2.7 million over three years. Botnets are excellent spam infrastructure because it’s hard to defend against them. Networks usually use “block lists”: lists of addresses that they will not let in. To block a botnet, however, one would have to add the addresses of thousands of geographically disbursed servers to the list. That takes time and money.
Because the malware we have seen up till now — worms, viruses, vorms, and wiruses.— could not work together, it was not useful for financially motivated crime. Botnet malware, on the other hand, is because the botnets it creates are controllable. Botmasters are capable of issuing orders to each bot, enabling them to collaborate. Indeed, botnet malware is the Swiss Army knife of cybercrime because botmasters can tell bots in their thrall to implant malware on vulnerable machines, send phishing emails, or engage in click fraud allowing botnets to profit from directing bots to click pay-per-click ads. Click fraud is especially lucrative, as Paras Jha would later discover. In 2018, the ZeroAccess botnet could earn $100,000 a day in click fraud. It commanded a million infected PCs spanning 198 countries, including the island nation of Kiribati and the Himalayan Kingdom of Bhutan.
Botnets are great DDoS weapons because they can be trained on a target. One day in February 2000, the hacker MafiaBoy knocked out Fifa.com, Amazon.com, Dell, E*TRADE, eBay, CNN, as well as Yahoo!, then the largest search engine on the internet. He overpowered these web servers by commandeering computers in forty-eight different universities and joining them together into a primitive botnet. When each sent requests to the same IP address at the same time, the collective weight of the requests crashed the website.
After taking so many major websites off-line, MafiaBoy was deemed a national security threat. President Clinton ordered a countrywide manhunt to find him. In April 2000, MafiaBoy was arrested and charged, and in January 2001 he pled guilty to fifty-eight charges of Denial of Service attacks. Law enforcement did not reveal MafiaBoy’s real name, as this national security threat was only fifteen years old. MafiaBoy later revealed himself to be Michael Calce. “You know I’m a pretty calm, collected, cool person,” Calce reported. “But when you have the president of the United States and attorney general basically calling you out and saying, ‘We’re going to find you’ . . . at that point I was a little bit worried.” Calce now works in the cybersecurity industry as a white hat — a good hacker, as opposed to a black hat, after serving five months in juvenile detention.
Both MafiaBoy and the VDoS crew were adolescent boys who crashed servers. But whereas MafiaBoy did it for the lulz, VDoS did it for the money. Indeed, these teenage Israeli kids were pioneering tech entrepreneurs. They helped launch a new form of cybercrime: DDoS as a service. DDoS as a service is a subscription-based model that gives subscribers access to a botnet to launch either a daily quota or unlimited attacks, depending on the price. DDoS providers are known as booter services or stressor services. They come with user-friendly websites that enable customers to choose the type of account, pay for subscriptions, check status of service, launch attacks, and receive tech support.
VDoS advertised their booter service on Hack Forums, the same site on which, according to Coelho, Paras Jha spent hours. On their website, www.vdos-s.com, VDoS offered the following subscription services: Bronze ($19.99/month), Silver ($29.99/month), Gold ($39.99/month), and VIP ($199.99/month) accounts. The higher the price, the more attack time and volume. At its peak in 2015, VDoS had 1,781 subscribers. The gang had a customer service department and, for a time, accepted PayPal. From 2014 to 2016, VDoS earned $597,862, and it launched 915,287 DDoS attacks in one year.
VDoS democratized DDoS. Even the most inexperienced user could subscribe to one of these accounts, type in a domain name, and attack its website. “The problem is that this kind of firepower is available to literally anyone willing to pay thirty dollars a month,” Allison Nixon, director of security research at business-risk-intelligence firm Flashpoint, explained. “Basically what this means is that you must have DDoS protection to participate on the internet. Otherwise, any angry young teenager is going to be able to take you off-line in a heartbeat.” Even booter services need DDoS protection. VDoS hired Cloudflare, one of the largest DDoS mitigation companies in the world.
DDoS as a service was following a trend in cybercrime known as “malware as a service.” Where users had once bought information about software vulnerabilities and tried to figure out how to exploit those vulnerabilities themselves, or had bought malicious software and tried to figure out how to install and execute it, they could now simply pay for the use of malware and hack with the click of a button, no technical knowledge required.
Because customers who use DDoS as a service are inexperienced, they are particularly vulnerable to scams. Fraudsters often advertise booter services on public discussion boards and accept orders and payment, but do not launch the promised attacks. Even VDoS, which did provide DDoS service, did so less aggressively than advertised. When tested by Flashpoint, VDoS botnet never hit the promised fifty gigabits/second maximum, ranging instead from six to fourteen gigabits/second.
The boards that advertise booter services, as Hack Forums once did, are accessible to anyone with a standard browser and internet connection. They exist on the Clear Web, not on the so-called Dark Web. To access sites on the Dark Web you must use a special network, known as Tor, typically using a special browser known as the Tor Browser. When a user tries to access a website on the Dark Web, the Tor Browser does not request web pages directly. It chooses three random sites—known as nodes—through which to route the request. The first node knows the original sender, but not the ultimate destination. The second node knows neither the original source nor the ultimate destination—it recognizes only the first node and the third node. The third node knows the ultimate destination, but not the original sender. In this way, the sender and receiver can communicate with each other without either knowing the other’s identity.
The Dark Web is doubly anonymous. No one but the website owner knows its IP address. No one but the visitor knows that they are accessing the website. The Dark Web, therefore, tends to be used by political dissidents and cybercriminals—anyone who needs total anonymity. The Dark Web is legal to browse, but many of its websites offer services that are illegal to use. (Fun fact: the U.S. Navy created the Dark Web in the mid-1990s to enable their intelligence agents to communicate confidentially.)
It might be surprising that DDoS providers could advertise on the Clear Web. After all, DDoS-ing another website is illegal everywhere. In the United States, one violates the Computer Fraud and Abuse Act if one “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization,” where damage includes “any impairment to the . . . availability of data, a program, a system, or information.” To get around this, booter services have long argued they perform a legitimate “stressor” function, providing those who set up web pages a means to stress test websites. Indeed, booter services routinely include terms of service that prohibit attacks on unauthorized sites and disclaim all responsibility for any such attacks.
In theory, stressor sites play an important function. But only in theory. Private chats between VDoS and its customers indicated that they were not stressing their own websites. As a booter service provider admitted to Cambridge University researchers, “We do try to market these services towards a more legitimate user base, but we know where the money comes from.”
This article originally appeared on Engadget at https://www.engadget.com/hitting-the-books-how-hackers-turned-cybercrime-into-a-commercial-service-153050866.html?src=rss
Russian troops deployed to protect the capital have withdrawn after mercenary forces headed toward Moscow retreated.