Weekly Axis Of Easy #379
Last Week’s Quote was: “You must learn to be disliked or you’ll find yourself stuck in a prison of other people’s desires.” By Codie Sanchez. No winner 🙁
This Week’s Quote: “To the mind that is still, the whole universe surrenders.” By ???
THE RULES: No searching up the answer, must be posted at the bottom of the blog post, in the comments section.
The Prize: First person to post the correct answer gets their next domain or hosting renewal on us.
This is your easyDNS #AxisOfEasy Briefing for the week of December 2nd, 2024 our Technology Correspondent Joann L Barnes and easyCEO Mark E. Jeftovic send out a short briefing on the state of the ‘net and how it affects your business, security and privacy.
To Listen/watch this podcast edition with commentary and insight from Joey and Len the Lengend click here.
In this issue:
- China Hacks US Telecom Giants in Massive Espionage Operation
- Bluesky Gains Traction Amid Political Shifts
- Matrix Exposed in Europol’s Operation Against Encrypted Platforms
- Cyberespionage Targets C-Suite
- Stephen Jurvetson Maps 128 Years of Moore’s Law and AI’s Future
Elsewhere Online:
- Antivirus Alert – Corrupted Files Used in New Phishing Campaign
- Cybercriminals Leverage Venom Spider’s MaaS Platform for New Attacks
- Elevate Your BlueSky Presence with a Personalized Domain Name
- Cisco Warns of Active Exploits Targeting 10-Year-Old Vulnerability
- Russian Hackers Steal from Pakistani Hackers in Espionage Game
China Hacks US Telecom Giants in Massive Espionage Operation
The “Salt Typhoon” hacking campaign, attributed to China, has infiltrated major U.S. telecommunications companies AT&T, Verizon, and Lumen Technologies in one of the largest intelligence breaches in American history. Hackers accessed call metadata, live phone conversations, and CALEA compliance systems—used for lawful surveillance, sometimes involving classified Foreign Intelligence Surveillance Court orders. Despite the breach’s scope, the FBI will not notify those affected or confirm if classified materials were accessed. Targets included political entities such as Donald Trump’s and Kamala Harris’s campaigns and Senate Majority Leader Chuck Schumer’s office.
U.S. officials recommend encrypted messaging apps like Signal and WhatsApp, alongside robust cybersecurity practices such as timely updates and phishing-resistant multi-factor authentication, to safeguard communications. Encryption, as emphasized by Jeff Greene of CISA, remains critical: intercepted data becomes unreadable when encrypted. The FBI describes the campaign as traditional espionage focused on intelligence collection, particularly in Washington, D.C., dismissing links to election interference.
Critics, including Senator Ron Wyden, have decried reliance on CALEA, arguing it exposes sensitive communications to hacking. Privacy advocates stress end-to-end encryption as essential. The breach’s resolution remains elusive, with officials unable to predict when compromised systems will be secured, reflecting the scale of China’s intelligence operation targeting U.S. infrastructure.
Read: https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694
Bluesky Gains Traction Amid Political Shifts
Bluesky, a microblogging platform spun off from Twitter in 2022 after Elon Musk’s acquisition, is gaining attention as a refuge for those disenchanted with Musk’s X and Trump’s re-election. Originating within Twitter in 2019 with Jack Dorsey’s involvement until May 2023, Bluesky operates as a public benefit corporation under CEO Jay Garber. High-profile figures, including EU Commission President Ursula von der Leyen, academics, journalists, and left-leaning politicians, have joined, bolstering its profile despite legal and regulatory ambiguities.
Bluesky does not yet qualify as a Very Large Online Platform (VLOP) under the EU Digital Services Act (DSA), lacking the 45 million monthly users required for stricter oversight. However, EU rules mandate platforms disclose their EU user base, a step Bluesky has yet to implement. EU spokesperson Thomas Regnier indicated preliminary plans to contact Bluesky while member states attempt to trace its legal presence. Meanwhile, Bluesky’s legal team is reportedly consulting to ensure compliance.
Media coverage amplifies Bluesky’s visibility, framing it as a counterpoint to X’s dominance and a response to political tensions. Yet its future hinges on regulatory clarity and user growth, particularly as VLOPs like X, Meta, and TikTok face potential DSA penalties of up to 6% of global revenue.
Read: https://reclaimthenet.org/eu-censors-set-their-sights-on-bluesky
Matrix Exposed in Europol’s Operation Against Encrypted Platforms
Europol, alongside police in France, Germany, the Netherlands, Italy, Lithuania, and Spain, dismantled Matrix, an encrypted messaging platform also branded as Mactrix, Totalsec, Q-safe, and X-quantum. Matrix, an invitation-only service charging €1,300–€1,600 for a phone and six-month subscription, claimed to offer secure end-to-end encryption. Its infrastructure included over 40 servers across Europe, notably in France and Germany. Investigators hacked Matrix, intercepting messages in real time for three months, uncovering 2.3 million communications in 33 languages. The platform’s global user base of 8,000 engaged in crimes like drug trafficking, arms dealing, and money laundering.
The takedown occurred on December 3, marked by arrests and searches in France, Spain, and Lithuania. Users were notified of the breach via messages displayed on their phones. Matrix’s technically advanced system, more complex than predecessors like EncroChat and Sky ECC, highlights evolving challenges for law enforcement. Europol noted Matrix’s involvement in investigations, such as the 2021 murder of a Dutch journalist, where the app was found on the convicted murderer’s phone.
Read: https://www.securityweek.com/law-enforcement-read-criminals-messages-after-hacking-matrix-service/
Cyberespionage Targets C-Suite
A prominent business executive has fallen victim to a sophisticated cyberattack, underscoring the escalating threat of corporate espionage. The individual’s iPhone was compromised by Pegasus spyware, a powerful surveillance tool often wielded by nation-state actors. This incident highlights the increasing vulnerability of high-profile individuals to cyberattacks, even when using the latest technology.
The attack, detected by cybersecurity firm iVerify, reveals the evolving tactics of cybercriminals. The compromised iPhones, some running the latest iOS version, demonstrate the ability of attackers to bypass traditional security measures. This trend is mirrored by other high-profile cases, such as the hacking of Amazon founder Jeff Bezos’s phone.
Read: https://techcrunch.com/2024/12/04/business-leaders-among-pegasus-spyware-victims-says-security-firm/
Stephen Jurvetson Maps 128 Years of Moore’s Law and AI’s Future
Stephen Jurvetson, founder of Future Ventures and investor in transformative companies like Tesla, SpaceX, and Skype, charted over 128 years of Moore’s Law, highlighting exponential advancements in computational power. His color-coded graph tracks transitions across computational architectures: from mechanical systems to relays, vacuum tubes, transistors, and integrated circuits. Most recently, computational leadership shifted from GPUs (green dots) to ASICs (yellow and orange), with NVIDIA’s Hopper architecture representing a hybrid optimized for 8-bit AI model performance.
Jurvetson forecasts that Moore’s Law, despite skepticism, will persist for at least 20 years, driving exponential reductions in cost and increases in computational efficiency. This projection underpins the development of custom ASIC chips and analog in-memory computing, which mimic human brain structures and propel AI innovation. He also emphasizes the broader implications, noting Moore’s Law’s role in fields like biotech, medical imaging, and autonomous systems, where computational advances enable simulation-based innovation, replacing trial-and-error methods.
Jurvetson notes Intel’s leadership waned 15 years ago, ceded to NVIDIA, reflecting the dynamic competitive shifts inherent to Moore’s Law. He calls Moore’s Law the “most important graph ever conceived,” asserting it not only drives technology but also economic growth, entrepreneurial disruption, and the transformation of all industries into information-centric enterprises.
Read: https://www.zerohedge.com/technology/vc-head-reveals-most-important-graph-ever-conceived
Elsewhere Online:
Antivirus Alert – Corrupted Files Used in New Phishing Campaign
Read: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html
Cybercriminals Leverage Venom Spider’s MaaS Platform for New Attacks
Read: https://www.darkreading.com/cyberattacks-data-breaches/venom-spider-malware-maas-platform
Elevate Your BlueSky Presence with a Personalized Domain Name
Read: https://easydns.com/blog/2024/12/03/set-your-bluesky-handle-to-your-own-domain-name-using-dns/
Cisco Warns of Active Exploits Targeting 10-Year-Old Vulnerability
Read: https://hackread.com/cisco-patch-decade-old-webvpn-vulnerability/
Russian Hackers Steal from Pakistani Hackers in Espionage Game
Read: https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/
If you missed the previous issues, they can be read online here:
-
-
-
-
-
-
-
-
-
-
- November 25th, 2024: Justice Department Targets Google Monopoly With Breakup Proposal
- November 18th, 2024: The Rising Cost Of Ransomware Payouts Predicted To Reach 113 Million
- November 11th, 2024: Hot Topic Data Breach: Millions Exposed, Hacker Demands Ransom Amid Retailer Silence
- November 4th, 2024: Canada’s Bill S-210 Sparks Concerns Over Digital ID Age Verification
- October 28th, 2024: Google and Microsoft Clash Escalates: Allegations of Shadow Campaigns, Cloud Wars, and Regulatory Maneuvers
-
-
-
-
-
-
-
-
-
“To the mind that is still, the whole universe surrenders.” By Lao Tzu
Quote is by Lao Tzu.