NSA's Payload for the 'Phuctorable' MikroTik Routers Found

Kaspersky Inc has published an analysis (archived) of a MS Windows rootkit, therein nicknamed "Slingshot".

The item exhibits the traditional smell of USG-authored shitware, e.g. validly-signed Windows drivers for the persistence layer. However the more interesting aspect is that it is spread via infected routers, of a type which, astonishingly even for consumer shitware, forces the execution of a x86 Windows binary for initial configuration.

An infected router dutifully augments this configurator with a rootkit installer; the rootkit, in turn, contains the typical keylogger and saved-password-collector, network topology probe, etc. components.

The more interesting and "unmentioned/unmentionable" aspect is however the identity of the router's manufacturer:

MikroTik. That very same Latvian USG shill company that's been deploying routers with nonfunctional RNGs and trivially-Phuctorable SSH keys for its entire existence. And dutifully spreads obfuscatory squid ink whenever the danger of public exposure seems acute.

US FBI And Canadian Mounties Kill Startup After Entrapment Campaign

The CEO of cellular phone hardware startup Phantom Secure was arrested following a joint entrapment campaign conducted by the US FBI and Canadian Mounties (archived). Phantom Secure specialized in reselling Blackberry phones that had been substantially improved through the removal of frivilous shit like cameras and microphones while loading the improved devices with a more mininalist operating system image.

Mining Rig Heist In Iceland: Arrests Made But No Material Recovered

Reports are emerging that allege 600 Bitcoin mining rigs and other supporting materials were stolen from a data center in Iceland between December 2017 and January 2018 (archived). No materials have been recovered and out of 11 arrests related to the investigation, local police are only keeping two suspects in custody.

Favorable electricity prices in Iceland have set the island up to be one of the first regions where power consumption for Bitcoin mining exceeds power consumption for other purposes.

Dublin Looters Destroy Grocery Store

lidlLooters in Dublin, Ireland appropriated a piece of construction equipment and removed structural material from a Lidl grocery store to achieve ingress and egress from the premises (archived). Reports out of Ireland and Airstrip One suggest a state of chaos amid routine winter weather self declared local authorities are apparently no longer capable of handling.

Apple Hands Over More Keys

Apple surrendered to Oriental Socialism and moved encryption keys for Chinese users to Chinese servers at the behest of Party officials. According to Reuters, 'Chinese authorities can now get a Chinese legal order and tell Apple to hand over user data. Apple will have no choice but to comply with the order." Apple already complies with U.S. Department of [in]Justice requests, and appears poised to work with "Party officials" worldwide. The Chinese just get preference for assembling the merchandise.

Acute Pantsuit Inconsistency Shows Internal Disregard For Their Illusion of "Franchise"

On February 12, 2018:

The United States warned the Democratic Republic of Congo on Monday against using an electronic voting system for a long-delayed presidential election in December this year because it has the potential to undermine the credibility of the poll. U.S. Ambassador to the United Nations Nikki Haley told an informal U.N. Security Council meeting on the Congolese electoral process that deploying "an unfamiliar technology for the first time during a crucial election is an enormous risk."

Two days later:

Congressional Democrats introduced legislation on Wednesday that would provide more than $1 billion to boost cyber security of U.S. voting systems, and Vice President Mike Pence defended the administration’s efforts to protect polls from hackers…. "We cannot let the Russians laugh about and take joy in the success they had in the last election," Nancy Pelosi, the Democratic leader in the House of Representatives, told a news conference. "Their goal is to undermine democracy."

The hidden gem, of course being:

The Democrats’ Election Security Act would allocate $1 billion in grants, overseen by the U.S. Election Commission, this year to help states buy voting machines that incorporate backup paper ballots, hire security staff and conduct risk assessments.

That is to say: a lightly-cloaked mandate for the installation of Diebold-style "user friendly" mechanisms for untraceable ballot-stuffing in place of the traditional paper-punch machines which were reintroduced in a number of U.S. states following the 2004 "hanging chads" e-voting election. And, naturally, a quite-undisguised mandate for the institution of a centralized bureaucracy which will centrally supply properly kosher voting machines, centrally networked, which are to produce properly kosher, per the DNC's lights, electoral outcomes.

It would seem that USG now pushes one voodoo in one of its Congoes, and a polar-opposite hoodoo in the other, without – unsurprisingly – much in the way of an explanation.

Malware Exploiting Intel CPU Hardware Vunerabilities Being Found In The Wild

A series of exploits in Intel CPUs at the hardware level which were publicly revealed last month are now being targeted by malware in the wild. Microcode patches which reduce without completely mitigating the vulnerabilities reduce compute performance on affected chips drastically as the vulnerabilities are a consequence of "optimizations" Intel chose to pursue. [Source](archived)

Russia Erupts In Nazi Rifle Monument Scandal

A scandal has emerged in Russia after visitors to a new monument to Mikhail Kalashnikov noticed the monument featured a plaque engraved with the blueprints for a Nazi rifle (archived). The engraved schematics featured the German Sturmgewehr 44 which predates any alternative assault rifle designed by Mikhail Kalashnikov which could have been featured on the Russian military monument. The director of the Russian Mulitary Historical Society (RVIO) offered:

following the sculptor’s blunder everybody can see the StG and Kalashnikov are two different weapons.