Thursday, February 27, 2020

The USA's leaked supergun!

The US Army began the development of its ‘Strategic Long-Range Cannon (SLRC) in late 2019, with the weapon expected to have a range of up to 1,850 km. The military expects a demonstration prototype to be created by 2023.
The Twitter account of the US Army’s Combat Capabilities Development Command Research Laboratory has shown what appear to be the first prototype images of the SLRC supergun, with a high-res photo of engineers speaking to US and British officers showing an image of the SLRC in the background, with its overall design and key capabilities clearly visible.
The @USArmy hosted a US-UK Modernization Demonstration Event Feb. 20 at @USAGAPG to identify capability collaboration to the British Army. Officials from @ArmyFutures
@USArmyCCDC , the centers and the lab, briefed interoperability to minimize risks of #modernization divergence. pic.twitter.com/Hw3V7xJFgA
— U.S. Army CCDC Army Research Laboratory (@ArmyResearchLab)
February 21, 2020
An image of the unit shows that it is transported by a conventional 14 wheel military hauler, possibly an Oshkosh M1070 of the kind used to carry tanks, with the gun attached to the transport via two separate pieces.
According to the poster printed out by Army Futures Command, the system is designed to penetrate and destroy “enemy A2/AD [anti-access/area denial] defences to create windows of opportunity for exploitation.” The system is expected to have a range “beyond 1,000 miles,” a crew of 8 personnel per platform, and 4 platforms per battery. The system is designed to be transportable by sea and air.
The photos of the SLRC were taken at a joint US-UK ‘Modernization Demonstration Event’ at the Aberdeen Proving Ground northeast of Baltimore, Maryland on February 20. US officials were said to have briefed their British comrades on interoperability “to minimize risks of #modernization divergence.”
The SLRC programme is designed in part to serve as a cost-effective alternative to more expensive munitions, with rounds for the system expected to cost “only $400,000 or $500,000” apiece compared to the multi-million dollar apiece missiles. Last year, Col. John Rafferty, director of the Army’s Long-Range Precision Fires Cross Functional Team, said that if the SLRC was adopted, it would complement the military’s hypersonic missiles in penetrating enemy territory at a “more affordable” price per shot.
Late last year, Russian aerospace and defence giant United Aircraft Corporation confirmed that new weapons systems designed especially for the Su-57 had been developed or were in active development, without elaborating.
A prototype hypersonic missile designed for use aboard Russia’s new Su-57 fifth-generation stealth fighter has been created, a defence sector source had told Russian media.
The source described the missile as a small, air-to-surface weapon designed to be carried inside the plane’s fuselage, and said it has yet to be tested aboard the plane.
No other details about the weapon’s characteristics or who developed it were made available, and the reports have yet to be commented on by anyone at UAC, Sukhoi or the military.
The defence sector first teased the possibility of deploying hypersonic missiles similar to the Kinzhal hypersonic, nuclear-capable missile in 2018. Kinzhal was deployed into service aboard the MiG-31K in December 2017, and a version of the missile for the Tu-160 ‘White Swan’ strategic bombers is also being developed. The weapon is believed to have an operational range of up to 3,000 km, and a flight speed of Mach 10-Mach 12 (12,250-14,700 km per hour).
Large-scale deliveries of the Su-57 into Russia’s aerospace forces are expected to begin later this year . The aircraft is a fifth-generation stealth superiority fighter created by the JSC Sukhoi Company. The planes are intended to eventually replace the MiG-29 and Su-27 in Russia’s Aerospace Force and Navy, and are equipped with advanced avionics, airborne active phased radar, ELINT and a variety of high-precision weaponry.

Russian first S-350 Vityaz medium-range air defence missile system

The first S-350 Vityaz medium-range air defence missile systems have been added to the Russian air force's arsenal, the Defence Ministry said on Wednesday.
"The first newest S-350 Vityaz air defence missile systems have been added to the Russian air force's arsenal. [The systems] have recently been deployed to the training centre of the anti-aircraft missile forces in Gatchina [a city in the Leningrad region]," the ministry said in a statement.
The ministry added that the centre had already run tests with the S-350 aimed at detecting and destroying conventional hostile aircraft.
Newest S-350 Vityaz Air Defence System

According to the ministry, the air defence missile systems will help make the air force two times more effective in countering cruise missile strikes and replace the older S-300PS system.
In mid-January, the ministry said that Russia's Leningrad region would be the first to host the air defence missile systems.
The S-350 was developed by the Almaz-Antey concern and first showcased at the International Military-Technical Forum Army-2019.

The Pentagon to hold a top secret meeting on the "Sino-Russian alignment " next week



The Pentagon will hold top-secret talks on the so-called "Sino-Russian alignment," a notice published in the Federal Register said on Wednesday.
"On March 3-4, 2020 the Defence Policy Board (DPB) will have classified discussions on national security implications related to Sino-Russian alignment," the notice said.
The top-secret talks will take place at the Pentagon, and the speakers will include senior intelligence community officers, Defence and Treasury Department officials, as well as experts, it added.
The participants will discuss their perspectives, views and insights and review classified information on relations between Russia and China, the notice said. They are also expected to provide recommendations to the Secretary of Defence.

Wednesday, February 26, 2020

Be aware of the proton VPN you are using.Your internet activities are not secure

Hackers used fake ProtonVPN installers to infect users with nasty Azorult malware.
One of the easiest ways to lure users to install malware on their computers is to imitate legitimate websites. This is exactly what certain attackers have done as recently investigated by researchers at Kaspersky by targeting ProtonVPN.
For the unfamiliar, ProtonVPN is a Swiss-based product by the very same company that operates the very famous ProtonMail. Currently, ProtonVPN has more than 2 million users around the world and that makes it a lucrative target for cybercriminals.
According to Kaspersky, hackers have cloned the design of ProtonVPN’s official website (protonvpn[.]com) to drop AZORult malware through its installer file.
Snapshot of the fake ProtonVPN website:
For your information, Azorult is a RAT (remote access Trojan) that can infect any computer successfully. Azorult was previously found targeting thousands of Magneto sites and spreading PayPal themed banking malware. The same malware was caught last month spreading itself using Drake’s “kiki do you love me” song.
According to Kaspersky’s blog post, to clone the website successfully, hackers made use of a program named HTTrack which made the fake website look similar in its design to the real one.
Fake ProtonVPN installers infect users with malware
A comment indicating the user of HTTrack for the site’s clone.
Therefore, if a user did not know of the original site’s exact domain, they would naturally believe that the site they are visiting is indeed legitimate and hence proceed to download the ProtonVPN installer.
However, instead, they would get AZORult malware in the form of a file named ProtonVPN_win_v1.10.0[.]exe which then can collect highly sensitive information such as one’s passwords, financial information, browsing history, cookies & much more once installed.
The data collected is then relayed to the attackers through their C2 server, also located on their fake website at accounts[.]protonvpn[.]store.
To take things a step further, the AZORult can also steal your cryptocurrencies from any wallets that are locally installed on your computers such as Electrum along with “credentials for WinSCP, Pidgin messenger, and others.”
Fake ProtonVPN installers infect users with malware
A snapshot of an analysis being done by Kaspersky of the malware.
To add to this, the fake domain was registered in November 2019 through a Russian registrar service. Since then, the attackers have also started targeting users through malicious advertising campaigns, more specifically “affiliation banners networks.”
To conclude, there have been several similar incidents in the past and we can expect them to keep occurring. An example was when we saw fake sites claiming to be official Fortnite distributors spring up prompting users to download malware in actuality. Last year, hackers used similar tactics by cloning the NordVPN website to drop banking trojan.

Tuesday, February 18, 2020

Iranian hackers targeting Israel!


The new report claims that Iranian hackers have been targeting Israel and other countries with this campaign.

According to the findings of the UK-based cybersecurity firm ClearSky, an Iranian APT group has been running a widespread hacking campaign to compromise VPN servers and install backdoors or bugs to access networks of different organizations across the globe. 
Dubbed Fox Kitten; the campaign was launched three years back (2017) to target “dozens of companies and organizations in Israel around the world,” the company stated in its official statement.
The attackers successfully infiltrated networks of many organizations across diverse sectors from IT, oil and gas, telecom, security, and government. The organizations have footprints throughout the world, which makes this campaign a global scam.
Irani hackers hacked vpn
Image credit: ClearSky
The alarming fact is that during this operation, Iranian hackers not only gained access to the networks of so many organizations around the world but made sure that they were able to hijack the device for as long as they wanted to.
Using the campaign, hackers could develop and maintain access routes to their target companies and obtain sensitive data.
“Hackers maintained a long-lasting foothold at the targeted organizations and breach additional companies through supply-chain attacks,” researchers said in their blog post.
To pull off the attack, hackers used different tools, a majority of which were open-source software while some were self-enveloped. As per previous research, the most successful attack vector that Iranian hackers have used so far is the exploitation of systems vulnerabilities encouraged by unpatched RDP and VPN services.
Irani hackers hacked vpn
Image credit: ClearSky
Once they are able to access the organizational networks, they tend to create more access points to reach the core corporate network. This is why closing one access point doesn’t affect their capability of monitoring company networks.
In fact, ClearSky claims that Iranian APT groups can exploit VPN flaws in a few hours, as soon as the bug is disclosed. ZDNet reports that Fortinet, Pulse Secure, Citrix VPNs, and Palo Alto Networks are some of the targets of Iranian hacker groups.

Monday, February 17, 2020


United States on Sunday successfully tested an unarmed life-extended Trident II (D5LE) ballistic missile capable of carrying a nuclear warhead, the US Navy said.

United States on Sunday successfully tested an unarmed life-extended Trident II (D5LE) ballistic missile capable of carrying a nuclear warhead, the US Navy said.
According to the statement, the missile was launched from the Ohio-class ballistic missile submarine USS Maine (SSBN-741) off the coast of San Diego, California.
"Today's scheduled test validated performance expectations of the life-extended Trident II (D5LE) Strategic Weapon System (SWS) and gathered additional data on the SWS' reliability, accuracy, and performance factors. This launch marks 178 successful missile launches of the Trident II (D5 &D5LE) strategic weapon system", the statement said.
The Ground-based Midcourse Defense (GMD) element of the U.S. ballistic missile defense system launches during a flight test from Vandenberg Air Force Base, California, U.SThe Trident II strategic weapon system, originally designed with a life span to 2024, recently underwent a life extension that will keep it operational through the late 2040s, according to the US Navy.
Submarine-launched ballistic missiles Trident II comprise about 70 percent of the US nuclear deterrent, which also includes the US Air Force's intercontinental ballistic missiles and nuclear-capable bombers.

Thursday, February 13, 2020

What is wrong at Facebook????????
Between 1969 and 1971, the US National Reconnaissance Office deployed its state-of-the-art unmanned aerial vehicles over China in a bid to surreptitiously keep a watchful eye on a Beijing's nuclear programme.
In his article for The National Interest, the US magazine’s defence editor David Axe focused on declassified records which documented “[...] termination of the [US] ‘Tagboard’ drone system” which was tasked with spying on China in the late 1960s.
The US National Reconnaissance Office (NRO) released the documents on 21 March, 2019, fifty years after the Tagboard system, also known as the Lockheed-made D-21 unmanned aerial vehicle (UAV), entered service with the US Army.
Axe recalls that the 19-feet-wingspan D-21 was made of titanium and weighed 12 tons [10 tonnes], and that “in its early forms launched from atop a special variant of the A-12 reconnaissance plane, the CIA [Central Intelligence Agency]'s version of the Mach-3 [long-range, high-altitude strategic reconnaissance aircraft] SR-71.”
“The A-12, in essence, was the booster for the drone, climbing to 80,000 feet in altitude and accelerating to Mach 3.3 before separating from the pilotless vehicle”, the author notes.
The hope was that the D-21 would help the US military to spy on strategic targets, including those in China, “more reliably than a satellite could do at the time, and without risking a human pilot”.
There were also experiments with using the airplane to launch the D-21 drone, but these were abandoned when a crewmember was killed on the 4th test flight
pic.twitter.com/G8Bx6Bh3Fg
— Mike Hankins (@Hankinstien) January 26, 2020
"The Tagboard drone provides a unique technical capability to satisfy national requirements to conduct imagery reconnaissance operations against targets hostile or potentially hostile to the United States," the country’s Joint Chiefs of Staff claimed in a September 1969 memo.
Axe recalled that Tagbaord was a “complex and costly system”, with a price tag for two A-12 launch planes and 20 drones amounting to $440 million in 2019 dollars.
“A fatal crash during July 1966 abruptly ended the effort to combine the A-12 and D-21. The NRO added a rocket booster to the D-21 and migrated the system to a small fleet of lightly-modified B-52H bombers”, he noted.
Between 1969 and 1971, the NRO oversaw what it described as four “unsuccessful” D-21 missions over China, including the one on 4 March 4, 1971, when a drone failed to safely eject its film capsule.
“Although the main parachute canopy lowered the payload to the water surface, a subsequent pickup attempt by a Navy vessel was unsuccessful due to procedural errors, and the payload sank”, the NRO reported to the Defence Department at the time.
The D-21 drone on top the M-21, a variant of the A-12. During the fourth flight the D-21 hit the tail of the 21 and both planes and a pilot were lost. #aviation #AvGeek
#history #speed#USAF #CIA pic.twitter.com/ZbIkxhH0ry
— The Shadow of the Eagle (@clemente3000) December 23, 2019
In this context, Axe cited then-NRO director John McLucas as saying in an April 1971 memo that he had “become increasingly convinced” that the US military “should be expending our efforts on upgrading our satellite activities, rather than trying to continue with air-breathing vehicles”.
With the NRO concluding that “unsafe and unreliable drones” were unnecessary for strategic overhead reconnaissance , McLucas predicted the UAVs’ comeback in a different mission in the future.
"I believe that there is a weapons-carrying role for drones which ought to be exploited”, he was cited by Axe as saying.
The author concluded by recalling that a number of surviving D-21s are currently showcased at several US museums, with the wreck of another such UAV now on display in Beijing.

Wednesday, February 12, 2020

The new system is expected to add a fourth layer of air defence in Israel, which often suffers from aerial attacks by its enemies, such as the Hamas movement. Israel currently has separate defence systems to neutralise short-, medium- and long-range missile threats.
Israeli company Rafael Advanced Defence Systems has published a video showing its latest development, the Drone Dome system armed with a laser, in action, downing several unmanned aerial vehicles (UAVs) flying as a swarm. According to Rafael, the system, mounted on an all-road vehicle, is capable of detecting nearby drones, identifying those who are not friendly, and performing a "hard kill" on hostile targets using its powerful laser.

In the video, the Drone Dome first downs a single flying drone and later turns to a swarm of three UAVs downing them one by one. Rafael noted that the system requires just one person to operate properly.
Rafael presented the Drone Dome system for the first time in 2016 , but back then it looked completely different. It was a set of equipment that could be set up in any spot, instead of being mounted on a vehicle. That model also used a "soft kill" method by jamming or interfering with the drone's command signal , forcing it to land or to switch off, instead of burning through it with a laser beam.

Pacific Light Cable Network (PLCN) cable and why it delayed

There's been a lot of press about delayed approval for the
Pacific Light Cable Network (PLCN) cable, which is due to connect Hong Kong, Taiwan, and the Philippines to the United States.
You can understand why this cable has gotten extra attention. Backers include Google, Facebook, and Pacific Light Data Communication (PLDC), which is owned by Chinese ISP Dr. Peng Telecom & Media Group.
While the whole system is awaiting approval from U.S. authorities, Google and Facebook have requested that the FCC allow activation of the Taiwan and Philippines portions of the cable.
There are many regulatory and political issues at play, but I felt a bit of background on the trans-Pacific cable market is warranted amid these headlines.
As you read more about the PLCN, keep these four facts in mind.
Several submarine cables already connect China and the United States
PLCN would not be the first cable to link Hong Kong, or even mainland China, to the U.S. Existing cables include:
Trans Pacific Express (TPE): this cable entered service in 2008
Asia-America Gateway (AAG) : activated in 2009, this cable links many southeast Asian countries to the U.S. with landings in Hong Kong, Guam, Hawaii, and American West Cost.
New Cross Pacific (NCP) : the most recent cable to enter service in the Pacific, this cable connects China, South Korea, Taiwan, and Japan to the U.S.
Direct cables are not the only way data can travel between China and the United States
While cables that offer a direct path between countries is preferable in many cases, data can traverse any number of cables en route to its final destination.
Even though there several cables that link China and the United States directly, there's certainly a substantial amount of traffic that travels on an intra-Asian cables, like the Southeast Asia-Japan Cable or Asia Pacific Gateway, from China to Japan.
In Japan, this traffic can transfer to a trans-Pacific cable, such as FASTER or Unity , to reach the U.S.
PLCN is not the only planned cable between Hong Kong and the United States
PLCN is just one of several planned submarine cables that intend to link Hong Kong to the United States (or U.S. territories). These include:
Hong Kong-Americas (HKA) : this consortium cable involves several parties including Facebook, China Telecom, and China Unicom.
Hong Kong-Guam: Google is an investor in this cable alongside RTI
Bay to Bay Express (BtoBE) : this system is backed by Facebook, Amazon, and China Mobile
Content providers are investing in many new cables
Google and Facebook’s involvement in PLCN is one of many investments made by these two companies. And other content providers are following suit.

Chinese advances in space technology worrying NATO as expressed by Norway's intelligence

As we all know,Norway plays an important role in space exploration for key military space facilities used by the US, including the Globus II radar in Finnmark County, sometimes referred to as the world's most advanced radar for tracking satellites.
In recent years, the Chinese intelligence service has succeeded in obtaining advanced Norwegian technology several times, the Scandinavian country's intelligence service has stressed, warning that China is en route to becoming “a military superpower in Norway's neighbourhood”.
“With growing interest in the Arctic, we believe that China will continue to influence the situation, even in our proximity”, the head of the intelligence service, Lieutenant General Morten Haga Lunde, said, as quoted by national broadcaster NRK.
According to Haga Lunde, advanced technology with military application is especially sought after.
For instance, the Andøya Space Centre at Andenes in Nordland County, which is vying to become the first in Europe to launch satellites, has admittedly noticed penetration attempts.
“We notice that the interest and awareness of our sector is only getting bigger, even when it comes to penetration attempts”, Odd Roger Enoksen, Managing Director of the Andøya Space Centre, told High North News.
Focus 2020, the new threat assessment by the Intelligence Service (E-Tjenesten), also lists Norwegian space research facilities among the main targets for the Chinese intelligence service, which, it claims, has shown a high interest in dual-use technology . According to Focus 2020, Chinese intelligence has on several occasions succeeded in obtaining this type of advanced technology.
A report by the US Congress raised suspicions about China hacking US satellites via the Svalsat ground station on the Svalbard archipelago as early as 2007 and 2008.
Norway's Intelligence Service stressed that only a few of China's satellites are referred to as military, whereas civilian polar satellites are used for both intelligence and military purposes. Last year, China surpassed the US in the number of satellites launched, Focus 2020 stressed.
The Andøya Space Centre, formerly named Andøya Rocket Range, is a rocket launch site and spaceport on the island of Andøya (the northernmost in the Vesterålen archipelago) in Nordland County, Norway. Since 1962, over 1,200 sounding and suborbital rockets of various configurations have been launched from the site. It has about 100 employees and is considered one of Norway's most technologically advanced facilities.
To place Norway's concerns into a broader picture, the Scandinavian nation plays a key role in space exploration owing to important military space facilities used by the US, including the radar Globus II in Finnmark County, which is often labelled the world's most advanced radar for tracking satellites and has become the bone of contention in Norway's relations with Russia, who sees it as a spying tool. The radar is now being upgraded.

Facebook under fire from UK's government


Facebook and some other social media companies have recently come under fire for failing to remove allegedly misleading and harmful content from their platforms. Now, British regulatory authority Ofcom is reportedly set to be given a role in policing social media companies.
Britain’s media watchdog Ofcom will have more power in regulating social media companies in the UK, such as Facebook, Twitter, YouTube or Snapchat, and will make them accountable for harmful content, the BBC reported citing Digital Secretary Baroness Nicky Morgan.
Social media companies have long defended their rights to control unacceptable content on their platforms related to violence, terrorism or child abuse, but according to reports, this is now going to change in the UK.
"There are many platforms who ideally would not have wanted regulation, but I think that's changing”, Nicky Morgan, Baroness Morgan of Cotes, was quoted as saying. “I think they understand now that actually regulation is coming”.
The information has not been confirmed by the UK’s Department for Digital, Culture, Media and Sport but it was reported that on Wednesday the government will present a draft of the new legislation related to online harm and will announce Ofcom’s new powers. So far, the authority has only been entitled to regulate British media, not social media platforms or internet safety. The news could cause some concerns among the public about potential censorship over online content.
Facebook has long been criticised for failing to take responsibility for content on its platform, including its refusal to remove political ads that may contain misinformation, citing its monitoring, rather than regulatory role.
Mark Zuckerberg , Facebook’s CEO, has maintained that the company was still accountable for removing harmful content related to child exploitation, terrorism, or violence from the its platform. However, in relation to political ads, he cited the policy of free speech and insisted that social media users were still able to make up their own minds about the political agenda.

This is why Trump has been too unfriendly to Huawei company

The Trump administration has long maintained that Chinese tech giant Huawei poses a threat to the national security of its allies and thus should not be granted access to their 5G networks. These warnings, however, have not stopped Great Britain from allowing Huawei to participate in building its next-generation infrastructure across the country.
US officials claim that Huawei has a secret capability to extract data from mobile networks globally through “back door” mechanisms that have been used for more than ten years, The Wall Street Journal first revealed. According to their report, this information remained highly classified until Washington decided to share the intelligence with its Western allies, including the UK and Germany, last year.
Some officials, including US National Security Adviser Robert C. O’Brien, maintain the US has evidence and can prove to its allies that Huawei can secretly retrieve “sensitive and personal” information in wireless 5G networks if granted access to the building of the necessary infrastructure.
“This is alarming because Chinese companies, by law, must comply with directives of the Chinese Communist Party”, O’Brien said on Tuesday, as quoted by The New York Times. “Strategically, we see a company that can use its position in the market to advance the aims of the Chinese Communist Party”.
According to US officials, the Chinese company has long had access to the “back doors” initially designed for use by law enforcement officials, but has been able to use them even without the knowledge or permission of national operators in countries where it has built its systems. Huawei officials have denied all these allegations.
The news comes after several American officials, including US Secretary of State Mike Pompeo, Treasury Secretary Steve Mnuchin, and a number of other high-ranking representatives of the Trump administration travelled to London throughout January to warn its transatlantic partner about the dangers Huawei could pose to UK national security if allowed to take part in the building of its 5G infrastructure.
Despite the warnings, Boris Johnson’s government still
allowed the Chinese company into Britain’s 5G networks, although in a limited capacity. Germany is also currently deciding on whether to work with the world’s leading 5G provider and according to reports, Berlin is inclined to grant Huawei access to its next-generation networks, despite Washington’s concerns.
So far, the Trump administration has maintained that it did not need to present any evidence about Huawei posing a threat to its allies and has just repeatedly argued that Huawei was required by Chinese law to provide Beijing with access to all of its data and information upon request. In May 2019, Washington blacklisted Huawei and 68 of its subsidiaries from working with American companies and called upon its allies to follow suit.
Both Beijing and Huawei officials have denied the accusations that the company has ever spied or intends to spy on foreign corporations and countries on behalf of the Chinese government.

What with the much thought of UK cabinet reshaffle


The structural reshuffle has been on everyone’s lips since Johnson’s overwhelming win in December, but the scale of it has been played down following speculation of a much wider Cabinet transformation after the general election.
Boris Johnson is expected to add the finishing touches to his updated Cabinet on Thursday, with sources cited by The Telegraph insisting it will be no “revolution” in terms of scale. The reshuffle will reportedly see a number of Remainers promoted at Leavers’ expense, like Geoffrey Cox, Andrea Leadsom, and Theresa Villiers.
For instance, Remain-supporting Chloe Smith has reportedly been tipped for a wider role as Minister for the Union at the Cabinet Office, while Oliver Dowden is expected to run the Digital, Culture, Media and Sport department.
Michael Gove, the Chancellor to the Duchy of Lancaster, is believed, per the British edition, to be in general control of post-Brexit trade talks with the EU at a reshuffled Cabinet Office.
Meanwhile, Environment Secretary Theresa Villiers, is also expected to be sacked, with Home Secretary Priti Patel purportedly remaining the only member of the Cabinet who consistently voted against Theresa May's Brexit deal.
Devoted Brexiteers including Boris Johnson, Foreign Secretary Dominic Raab, and Commons’ Leader Jacob Rees-Mogg, all backed her deal at the so-called third Meaningful Vote stage last March."The labels of 'Leave' and 'Remain' were binned as soon as we got Brexit done - no one mentions them now", one source was cited by The Telegraph as saying.
Defence Secretary Ben Wallace and Ms Leadsom, the Business Secretary, are both tipped to quit their roles, Liz Truss, the International Trade Secretary, has strengthened her position after she was repeatedly mentioned and quoted by Johnson in his trade speech last week.
The Cabinet reshuffle has been rumoured ever since Johnson won by a landslide in the 12 December general vote.
As the UK braces for stiff trade talks during its 11-month transition period, Michael Gove instructed businesses to prepare for “inevitable” border checks.
He insisted there is no way they can be avoided, as the UK is facing a “significant change", and stressed the country has enough time to handle it.

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.
Initially identified in 2014, Emotet is a banking trojan that has been used in various malicious campaigns in the past for gaining financial data. An example is of 2017 when it infected Mcafee’s ClickProtect service to trick users by making them download a legitimate-looking Word document which in actuality contained the malware.
Now, it is back albeit with a new way to spread its infection. Featuring a new WiFi module; the trojan now focuses on compromising machines on the same WiFi network. Simply put: Emotet trojan can now spread through nearby wireless networks if the networks use insecure passwords.
To carry the entire operation out, it firstly uses wlanAPI.dll
calls to find wireless networks surrounding it excluding the current computer system it has infected.
Commenting on the reason wlanAPI.dll calls are used, researchers at BinaryDefence state that,
Once it finds such a network, it would connect to it automatically and by using brute-force techniques if it is password protected. Therefore, it searches for Windows-based devices and tries to find its way into user accounts through brute-forcing once again. If successful, it proceeds by adding malicious files for different purposes.
The first one is named “service.exe” which installs an additional service by the name of “Windows Defender System Service.” This helps the attacker maintain access to the system and in a very unsuspicious way indeed in the eyes of a layman.
An interesting thing here is that “although the connection to the server uses port 443, which is normally used for Transport Layer Security (TLS) encrypted communications, the connection is unencrypted HTTP.”

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.
Initially identified in 2014, Emotet is a banking trojan that has been used in various malicious campaigns in the past for gaining financial data. An example is of 2017 when it infected Mcafee’s ClickProtect service to trick users by making them download a legitimate-looking Word document which in actuality contained the malware.
Now, it is back albeit with a new way to spread its infection. Featuring a new WiFi module; the trojan now focuses on compromising machines on the same WiFi network. Simply put: Emotet trojan can now spread through nearby wireless networks if the networks use insecure passwords.
To carry the entire operation out, it firstly uses wlanAPI.dll
calls to find wireless networks surrounding it excluding the current computer system it has infected.
See: Hackers using Coronavirus emergency to spread Emotet malware
Commenting on the reason wlanAPI.dll calls are used, researchers at BinaryDefence state that,
Once it finds such a network, it would connect to it automatically and by using brute-force techniques if it is password protected. Therefore, it searches for Windows-based devices and tries to find its way into user accounts through brute-forcing once again. If successful, it proceeds by adding malicious files for different purposes.
The first one is named “service.exe” which installs an additional service by the name of “Windows Defender System Service.” This helps the attacker maintain access to the system and in a very unsuspicious way indeed in the eyes of a layman.
An interesting thing here is that “although the connection to the server uses port 443, which is normally used for Transport Layer Security (TLS) encrypted communications, the connection is unencrypted HTTP.”
Second is “worm.exe” with a timestamp of ” 04/16/2018 ” and containing a hard-coded IP address to its C2 server. Explaining this, BinaryDefence states how “this hints that this Wi-Fi spreading behavior has been running unnoticed for close to two years. This may be in part due to how infrequently the binary is dropped.”
A reason that could be attributed to it not being discovered despite the more-than-1-year-old timestamp is that when analyzed on a virtual machine, it does not show any spreading behavior without a WiFi card.
To sum up, both of these help the malware gain access to computers in such a way, particularly those that use weak passwords as brute-forcing them would become much easier this way too. These can then be used for hurting the victim through various ways such as data theft and even ransomware. Hence, we would recommend a range of precautions to guard against such attacks:
1. Add passwords to your user accounts even if you do not share your computer system with someone else. This at least gives you a shot to fight anyone trying to get in through such methods.
2. Use strong passwords, one that particularly could withstand a large number of attempts per second, a trillion if you’re an Edward Snowden fan and live near the NSA.
3. Try to monitor the processes running on your computer to see for suspicious ones. This could be easily done using Window’s in-built task manager.
4. Install a good anti-malware software that could also help in network monitoring and recognize “patterns that identify the malware message content.”
5. Last but not least avoid using public Wi-Fi spots.
Second is “worm.exe” with a timestamp of ” 04/16/2018 ” and containing a hard-coded IP address to its C2 server. Explaining this, BinaryDefence states how “this hints that this Wi-Fi spreading behavior has been running unnoticed for close to two years. This may be in part due to how infrequently the binary is dropped.”


Monday, February 10, 2020

Uganda people defense forces airforce airlifts pesticides to fight the locusts

UPDF airforce has airlifted pesticides to fight the locusts



US soldiers have already started withdrawing from 15 Iraqi military bases and leaving the country,

US soldiers have already started withdrawing from 15 Iraqi military bases and leaving the country, member of the parliamentary Security and Defence Commission, Ali al-Qameni, was quoted as saying by the daily Baghdad Today.
The lawmaker reportedly added that Washington is still insisting on building up forces in the Ayn al-Asad and Erbil military bases, but noted that the Iraqi Parliament opposes this notion.
U.S. Soldiers and journalists stand near a crater caused by Iranian bombing at Ain al-Asad air base, in Anbar, Iraq, Monday, Jan. 13, 2020
© AP PHOTO / ALI ABDUL HASSAN
U.S. Soldiers and journalists stand near a crater caused by Iranian bombing at Ain al-Asad air base, in Anbar, Iraq, Monday, Jan. 13, 2020
Iraqi lawmakers voted for a non-binding motion to end all foreign military deployments in the country, including the American contingent, on 5 January following a US airstrike that killed major Iranian General, Qasem Soleimani, without discussing or clearing the operation with the country's authorities. The general was visiting the country to pass on the suggestion for normalising relations to Saudi Arabia, with which Tehran currently has no diplomatic ties.  
Washington's reaction to the news was mixed: while the US State Department said it was not intending to negotiate the withdrawal of forces, US Secretary of State Mike Pompeo stated three days later that the two countries would discuss the reduction of American troops in Iraq. Additionally, US Defence Secretary Mark Esper revealed that American troops will not be stationed in in Iraq "interminably", but failed to clarify when they will leave.
The US also defended the actions that led to Soleimani's killing on 3 January and resulted in an escalation of tensions with Iran and the latter's retaliatory missile strikes on bases hosting American forces in Iraq. Washington believes that the airstrike was legitimate, while Iraqi lawmakers disagreed.

Twenty-seven foreigners in China have been infected with the coronavirus, two of them have diede


Since a new strain of coronavirus was first detected in the Chinese city of Wuhan in December of 2019, it has spread to over 25 countries across the globe.
As of 10 February, twenty-seven foreigners in China have been infected with the coronavirus, two of them have died, the country's foreign ministry said. 
An American died on 6 February and a Japanese individual died on 8 February, ministry spokesman Geng Shuang said during a daily news briefing in Beijing.
He added that three people have been discharged from the hospital.
An outbreak of pneumonia caused by a new strain of coronavirus started in the Chinese city of Wuhan last December and has since spread to more than 25 countries around the world.
A member of staff outside the Shanghai Disney Resort in Shanghai, China
© REUTERS / ALY SONG
A member of staff outside the Shanghai Disney Resort in Shanghai, China
The death toll from the new coronavirus in China currently stands at 908 people with more than 40,000 other confirmed cases.  
In late January, the World Health Organisation (WHO) declared the coronavirus outbreak a global health emergency.

Trump approved the sale of a multi billion anti ship missile to Australia


The Trump administration has approved the sale of 200 anti-ship missiles to Australia for $990 million, the Defence Security Cooperation Agency (DSCA) said in a press release.
"The State Department has made a determination approving a possible Foreign Military Sale to Australia of up to 200 AGM-158C, Long Range Anti-Ship Missiles (LRASM) and related equipment for an estimated cost of $990 million", the release said on Friday.
The sale will also include up to eleven ATM-158C LRASM Telemetry systems, DATM-158C LRASM, Captive Air Training Missiles (CATM-158C LRASM) and other equipment, with Lockheed Martin being the prime contractor, the DSCA said.
The Trump administration has been expanding its military cooperation with Australia and Japan in the Indo-Pacific region.

NATO general complained about Russian kosmos satellite claiming it is spying on their military intelligence satellites

Last month, a Purdue University graduate student specializing in astrodynamics reported that Russia’s Kosmos-2542 satellite had begun shadowing USA-245, an American reconnaissance satellite. Kosmos-2542’s mystery mission quickly sparked hysteria among the US media, with some observers suggesting it could be preparing to “attack” its US counterpart.
Russian and Chinese satellites maneuvering near Western powers’ satellites in space are a threat to the NATO alliance, Allied Command Transformation Commander Gen. Andre Lanata has said.
“Of course, it is a threat to our allies,” Lanata said , speaking to The Washington Examiner. “Until now, space was considered by everybody as a safe haven. It’s not the case anymore,” he added.
According to the commander, the danger posed by Russia and China in this area is “a key question,” and NATO “need[s] to be sure that we give to our forces this space asset support.” Lanata clarified that NATO as an organization would not “own any space assets,” and that it was not the bloc’s responsibility “to take specific measures to protect such or such national assets.” The problem will have to be addressed by the bloc’s individual members, he indicated.
Recently, US media have reported on the activities of Russian inspector satellite Kosmos-2542, indicating that the satellite was stalking USA-245, a spy satellite used by American intelligence agencies. According to amateur satellite observer and Purdue graduate student Michael Thompson, the Russian spacecraft has come to within 150 and 300 km of its US counterpart, and viewed it from various angles. The researcher avoided jumping to any conclusions, saying that although Kosmos-2542’s behaviour might seem suspicious, he could not prove any malign intent.
However, US media rushed to alarming conclusions, suggesting the Russian satellite’s behaviour may be “some kind of preparation for an attack,” and that Kosmos-2542 may actually be a “killer satellite”
getting ready to ram or shoot lasers at USA-245.
Kosmos-2542 was launched from the Plesetsk Cosmodrome in November 2019, with the stated mission of inspecting the condition of other Russian satellites orbiting the planet.
Last month, observers reported that the Kosmos-2491, another Russian satellite capable of maneuvering and inspecting other satellites in orbit, appeared to have broken up. Amateur observers suggested that that satellite, believed to have been dead for several years, may have deliberately self-destructed .
Russia isn’t the only country thought to engage in clandestine inspections of foreign satellites in orbit. In 2019, the Secure World Foundation reported that the US used its own secretive ‘Geosynchronous Space Situational Awareness Program’ to approach and inspect Russian, Chinese, Pakistani and Nigerian satellites, both civilian and military.
In late 2019, President Trump formally ordered the Pentagon to establish Space Force, the sixth branch of the US armed forces. Observers have expressed fears that the force’s creation could lead to the militarization of space.
Iran has unsuccessfully launched it fourth satellite, called Zafar ("Victory" in Farsi), into orbit on 9 February. It was preceded by two unsuccessful launch attempts in 2019 and is expected to be followed by the delivery of four more satellites.
The launch, however, was denounced by the US, which claims the carrier rocket can be used to deliver nuclear warheads and that the whole project was cover for a long-range ballistic missile test.

Iranian flag fluttering in front of Iran's Safir Omid rocket, which is capable of carrying a satellite into orbit, before it's launch in a space station at an undisclosed location in the Islamic republic
Tehran denies that the rocket carrier is intended for military use, indicating that the satellite's mission will be to take ground photos and collect data needed to study earthquakes and deal with other natural disasters. Iran has also long denied pursuing the goal of producing nuclear weapons, insisting that their use
goes against Islam . The Islamic Republic's authorities have also repeatedly pointed out that its nuclear sites are monitored by the International Atomic Energy Agency (IAEA).

© AP PHOTO / DONALD J. TRUMP TWITTER ACCOUNT
Image of Iran's Rocket Failure Tweeted by Trump Claimed to be Taken by US Top-Secretive Spy Satellite
The US and Israel, however, have refused to retract their accusations. Instead, in 2018 the Trump Administration withdrew from the Iran nuclear deal, which had limited the country's nuclear programme's development, and imposed sanctions against the Islamic Republic. The imposition of sanctions has led Tehran to stop adhering to the deal's provisions, almost two years after Trump first called the accord's existence into question.


The Russian Defence Ministry stated on 7 February that a civilian Airbus-320 with 172 passengers on board was nearly destroyed amid Israeli airstrikes near Damascus in the early hours of 6 February.
An Airbus-320 has been captured on video when landing at the Russian-operated Hmeymim Airbase in northwestern Syria while trying to avoid Israeli shelling.
Russian TV channel Zvezda has published camera recordings at the Hmeymim Airbase, showing how the Airbus-320 successfully lands , and after the end of the strikes, takes off again in the direction of Damascus International Airport.
On 6 February, four Israeli F-16 fighters fired eight air-to-surface missiles in the suburbs of Damascus, according to the Russian Defence Ministry.
The Syrian air defence systems that were on alert responded to the attack while a civilian Airbus-320 with 172 passengers was almost caught in the cross-fire. The plane managed to leave the area and successfully land at Russia’s Hmeymim base, the closest alternative airfield.
Syrian diplomats slammed Israel for "taking advantage of the fact that Syria is busily engaged in its war against the terrorist groups in Idlib, and taking cover behind civilian flights, with complete disregard for the lives of civilians".
The Israeli Defence Forces (IDF) have declined to comment on the situation .
Russia and Syria have already accused the Israeli air force of using other aircraft as a shield and putting the lives of innocent people at risk. In September 2018, the Russian military held Israel responsible for an Il-20 plane crash in Syria , which claimed the lives of 15 Russian servicemen. The plane was accidentally downed by a missile launched via Syria's air defence system at Israeli F-16 jets that were carrying out airstrikes in Latakia Province.
The Emergency Services Telecommunications Authority (ESTA) in Victoria, Australia has decided to use artificial intelligence (AI) to help
Triple Zero call takers (000) identify the incidence of a heart attack on the phone without wasting much time.
According to Health Minister Jenny Mikakos, the state government’s coffers will grant $1.36m to Ambulance Victoria for designing and implementing the Cardiac Arrest Project in collaboration with Monash University.

Furthermore, an additional $350,000 will be given to Ambulance Victoria from the safer care Victoria innovation fund to start offering SMS and video calling facility under the project Tele-HELP for mental health-related emergency callers.
As per the details shared by the ministry, the AI technology will run in the background all the time and monitor every incoming emergency call to identify similar patterns of sound, keywords, and language for detecting cardiac arrest symptoms.
The government states that the system will instantly alert the ESTA triple zero call takers after which a high-priority ambulance will be dispatched and “talk bystanders through CPR or defibrillation.”

Through this project, the government aims to save 185 more lives per year. In incidents involving heart attacks “every second counts,” Mikakos explained, and AI will help paramedics provide medical help quickly to reduce the likelihood of brain damage and death.