Speculating on future of Crypto

AT THIS VERY moment, a ransomware assault is hitting hundreds of businesses across the US. The incident appears to be the result of a so-called supply chain attack; hackers were able to push malware to victims through legitimate IT management software from a company called Kaseya. Making matters worse, REvil ransomware operators hit what’s known as “managed service providers,” which provide IT infrastructure and support for companies who would rather outsource that sort of thing. When hackers compromise an MSP, it’s usually quick work to infect their customers as well, making the scale of this campaign “monumental,” in the words of one cybersecurity professional.

The severity of the REvil strike was almost enough to make one forget about Microsoft’s particularly bad week. Almost. In addition to a couple of high-profile cybersecurity incidents that we’ll get into more below, the company found itself in a self-generated controversy over which PCs will be allowed to run Windows 11. The new operating system will likely require a processor that came out four years ago at most, meaning plenty of devices you can purchase right now won’t qualify. Not only that, but Microsoft had previously announced that it would end support for Windows 10 in 2025, meaning lots of users have only a few years before being forced to choose between losing security updates altogether and buying a new PC—even if their current one works perfectly well.

In other not-great Microsoft news, the same hackers behind the devastating SolarWinds campaign were found to have installed malware on a customer service employee’s device. Microsoft said that three customers were affected by the hack, although it’s not clear who nor what information was stolen. It should never be surprising that Russia’s cyberspies are cyberspying, but it’s still alarming that they were able to get that level of access at a company as critical as Microsoft.

A separate set of Russian hackers was caught this week causing trouble as well. Intelligence agencies from the US and UK warned that the notorious Fancy Bear group had been attempting to “brute force” their way into hundreds of target networks. The technique is pretty basic; it just means throwing passwords at an account until one of them works. That doesn’t make it any less concerning, though, especially since the campaign appears to be ongoing.

Lastly, browser extensions are handy and fun, but they can also present a security risk if you install the wrong one. Here’s our guide to figuring out which ones you should keep and which ones you should skip if you’ve got privacy concerns (which you should have, generally speaking).

And there’s more. Each week we round up all the security news WIRED didn’t cover in depth. Click on the headlines to read the full stories, and stay safe out there.

Do Not Stare Into the Crypto Orb

If your big new idea could also serve as the opener to a techno-dystopian thriller, perhaps it is best set aside? Just a thought on the heels of the reveal this week of the Worldcoin project, which proposes that a good and rational way to distribute a new cryptocurrency is to sign people up by letting a basketball-sized sphere scan their iris. The ultimate goal is to establish some sort of universal basic income, and Worldcoin’s founders stress that they are scanning eyeballs with a large orb with the utmost care for privacy. But given the choice between gazing into the crypto orb and not doing that, we’d strongly suggest the latter.

This article has been published from the source link without modifications to the text. Only the headline has been changed.

Source link