リーディングビュー

Hacker Steals 10 Petabytes of Data From China's Tianjin Supercomputer Center

✇Slashdot
著者: BeauHD

🤖 AI Summary

中国天津市国家超级计算机中心から、サイバー攻撃者が大量の機密データを窃取した事件が発生しました。CNNが報道しているところによると、この攻撃者は複数か月にわたって国営スーパーコンピュータから10ペタバイト以上の情報を取り出し、その一部を暗号通信チャンネル上で公表しました。

窃取されたデータには高度な防衛文書やミサイル設計図などが含まれており、「航空業界中国」「商用航空機会社中国」などの主要組織に関連していると主張しています。専門家はこの情報の漏洩が真実であると推測しており、一部の取引は仮想通貨で行われました。

CNNはこれらの主張を確認していないものの、攻撃者が複数の組織から比較的容易にアクセスし、大量データを盗み出したことについて専門家らからの評価が一致しているという点に注目しています。被窃データには「機密」マークが付いた文書や技術ファイル、防御装備(爆弾・ミサイル)のアニメーションシミュレーションなどが含まれていると指摘されています。

この事件は中国で最大規模となる可能性のある大規模な情報漏洩として注目を集めています。
An anonymous reader quotes a report from CNN: A hacker has allegedly stolen a massive trove of sensitive data -- including highly classified defense documents and missile schematics -- from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset, which allegedly contains more than 10 petabytes of sensitive information, is believed by experts to have been obtained from the National Supercomputing Center (NSCC) in Tianjin -- a centralized hub that provides infrastructure services for more than 6,000 clients across China, including advanced science and defense agencies. Cyber experts who have spoken to the alleged hacker and reviewed samples of the stolen data they posted online say they appeared to gain entry to the massive computer with comparative ease and were able to siphon out huge amounts of data over the course of multiple months without being detected. An account calling itself FlamingChina posted a sample of the alleged dataset on an anonymous Telegram channel on February 6, claiming it contained "research across various fields including aerospace engineering, military research, bioinformatics, fusion simulation and more." The group alleges the information is linked to "top organizations" including the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defense Technology. Cyber security experts who have reviewed the data say the group is offering a limited preview of the alleged dataset, for thousands of dollars, with full access priced at hundreds of thousands of dollars. Payment was requested in cryptocurrency. CNN cannot verify the origins of the alleged dataset and the claims made by FlamingChina, but spoke with multiple experts whose initial assessment of the leak indicated it was genuine. The alleged sample data appeared to include documents marked "secret" in Chinese, along with technical files, animated simulations and renderings of defense equipment including bombs and missiles.

Read more of this story at Slashdot.

  •  

Little Snitch Comes To Linux To Expose What Your Software Is Really Doing

✇Slashdot
著者: BeauHD

🤖 AI Summary

Little Snitch, a popular macOS tool that displays which applications are connecting to the internet, is now being developed for Linux. The project began after the developer experimented with Linux and found it strange not knowing about system connections. Unlike existing tools like OpenSnitch, Little Snitch offers a simple user experience by showing which process is making connections and allowing users to block them with a click.

The Linux version of Little Snitch uses eBPF for kernel-level traffic interception, with core components written in Rust and featuring a web-based interface that can monitor remote servers. Initial tests on Ubuntu revealed that the system was relatively quiet; only nine processes made internet connections over a week, compared to more than 100 on macOS.

The application behaves similarly across platforms: Firefox triggered telemetry and advertising-related connections while LibreOffice made no network connections during testing. The early release is intended as a transparency tool rather than a security firewall.

This development aims to provide users with insight into what their software is doing online, enhancing awareness about internet activity without relying solely on command-line utilities or other existing tools.
BrianFagioli writes: Little Snitch, the well known macOS tool that shows which applications are connecting to the internet, is now being developed for Linux. The developer says the project started after experimenting with Linux and realizing how strange it felt not knowing what connections the system was making. Existing tools like OpenSnitch and various command line utilities exist, but none provided the same simple experience of seeing which process is connecting where and blocking it with a click. The Linux version uses eBPF for kernel level traffic interception, with core components written in Rust and a web based interface that can even monitor remote Linux servers. During testing on Ubuntu, the developer noticed the system was relatively quiet on the network. Over the course of a week, only nine system processes made internet connections. By comparison, macOS reportedly showed more than one hundred processes communicating externally. Applications behave similarly across platforms though. Launching Firefox immediately triggered telemetry and advertising related connections, while LibreOffice made no network connections at all during testing. The early release is meant primarily as a transparency tool to show what software is doing on the network rather than a hardened security firewall.

Read more of this story at Slashdot.

  •  
❌