India Mandates Mobile Manufacturers to Preinstall State-Run Cyber Safety App on Devices | India Technology

India’s telecom ministry has officially requested smartphone manufacturers to pre-install state-owned cybersecurity applications on all new devices, which cannot be removed. This directive is likely to generate criticism from Apple and privacy advocates, according to a government order.

In light of the rising incidents of cybercrime and hacking, India is collaborating with international authorities, including those in Russia, to enforce new regulations that aim to prevent the misuse of stolen mobile phones for fraudulent activities or the promotion of government service applications.

Apple has historically been at odds with telecom regulators regarding the development of government anti-spam mobile applications; however, manufacturers such as Samsung, Vivo, Oppo, and Xiaomi are obliged to comply with the recent mandate.


According to the order issued on November 28, established smartphone brands have 90 days to ensure that the government’s Sanchar Saathi application is pre-installed on new devices, with users unable to disable the app.

For phones already present in the supply chain, manufacturers are required to roll out app updates to the devices, as stated in an unpublished order sent privately to certain companies.

However, a technology law expert expressed concerns regarding this development.

“The government has effectively stripped user consent of its significance,” stated Mishi Chaudhary, an advocate for internet rights.

Privacy advocates have criticized a similar request made by Russia in August, which mandates the pre-installation of the state-backed Max messaging app on mobile devices.

With over 1.2 billion subscribers, India stands as one of the largest smartphone markets. Since its launch in January, the app has reportedly helped recover more than 700,000 lost phones, including 50,000 in October alone, according to government data.

The government asserts that the app is vital in addressing “serious risks” to communication cybersecurity posed by duplicate or spoofed IMEI numbers, which facilitate fraud and network exploitation.

Counterpoint Research anticipates that by mid-2025, 4.5% of the expected 735 million smartphones in India will operate on Apple’s iOS, while the remaining devices will run Android.

Although Apple preinstalls its own applications, its internal policies bar the installation of government or third-party applications prior to sale, according to a source familiar with the situation.

“Apple has a history of denying such governmental requests,” remarked Tarun Pathak, a research director at Counterpoint.

Skip past newsletter promotions

“It’s probable that we will pursue a compromise. Instead of mandating pre-installation, we may opt to negotiate and encourage users to install the application voluntarily.”

Apple, Google, Samsung, and Xiaomi did not respond to inquiries for comment. Likewise, India’s Ministry of Telecommunications has not issued a response.

The International Mobile Equipment Identity (IMEI), a unique identifier consisting of 14 to 17 digits for each mobile device, is predominantly used to revoke network access for phones reported as stolen.

The Sanchar Saathi application is principally developed to assist users in blocking and tracking lost or stolen smartphones across various networks via a centralized registry. It also aids in identifying and disconnecting unauthorized mobile connections.

Since its launch, the app has achieved over 5 million downloads, successfully blocked more than 3.7 million stolen or lost phones, and prevented over 30 million unauthorized connections.

The government claims that the software will contribute to mitigating cyber threats, facilitate the tracking and blocking of lost or stolen mobile phones, assist law enforcement in device tracking, and help curtail the entry of counterfeit products into illicit markets.


Privacy Notice: Newsletters may include information about charities, online advertising, and content supported by external entities. If you do not have an account, you can create a guest account. TheGuardian.com will send this newsletter to you, and you can complete your full registration at any time. For more information on data usage, please review our Privacy Policy and Terms of Service.

Due to the shutdown, JLR estimates it has lost the production of 1,000 cars daily, resulting in an estimated loss of £72 million each day.

A group of hackers, believed to be responsible for other serious incidents involving major retailers such as Marks & Spencer, has claimed responsibility for the attacks on JLR. A screenshot purportedly from JLR’s internal IT system was shared on a Telegram channel associated with the hacker groups known as Scattered Spiders, Lapsus$, and Shiny Hunters.

This disruption comes at a time when JLR is already experiencing a downturn in profits, exacerbated by US tariffs and declining sales. The automaker reported a 49% drop in pre-tax profits to £351 million for the three months ending in June, which included a time when they temporarily halted exports to the US.

Last year, the company faced backlash regarding the Jaguar brand, and the launch of its new electric vehicle has been pushed back to next year.

Source: www.theguardian.com

Deceived and Defeated: The Struggles of African Job Seekers Exploited by Asian Cyber Scammers

WAfter arriving in Bangkok from Nairobi last December, Duncan Okindo sensed something was amiss as he began his job as a customer service agent. The 26-year-old had previously sold cattle, borrowed funds from a friend, and used his savings to pay the recruitment agency 200,000 Kenyan Shillings (£1,150).

“I thought it was a positive step to leave [the country] and seek opportunities to support my family,” Okindo recalls.

Unfortunately, when a van collected Okindo and six other Kenyans at the airport, the driver took their passports and falsely informed Thai officials that they were tourists. After several hours of travel, they were taken to a boat to cross a river, confused and exhausted.

They were then taken to Myanmar. Walled compounds guarded by rebel militias awaited them.

For the next three months, he was forced to send thousands of messages from fake social media accounts, posing as a wealthy American investor to defraud U.S. real estate agents through cryptocurrency scams.

When he failed to hit his daily targets, he faced beatings, confinement in a freezing room, and sometimes went without food for up to two days. He prayed for the safety of others who suffered at the hands of the Chinese gangsters operating the center, wishing they could avoid the electrocution and sexual torture he witnessed.

“It was hell on Earth,” says Okindo. “I felt completely shattered.”

Eventually, he was released from Myanmar’s KK Park, a compound reflecting the rising number of Kenyans, Ugandans, and Ethiopians trafficked to Southeast Asia as criminal organizations look to expand the East African labor pool.




KK Park is a rapidly growing fraud center located in Myawadi, along Myanmar’s border with Thailand. Photo: Jittrapon Kaicome/The Guardian

Since the 2021 coup in Myanmar, there’s been a surge in cyber slavery compounds, taking advantage of the country’s weakened governance and fostering illegal activities. The number of such centers along the Thai border has escalated from 11 to 26 in just four years.

The United Nations estimates that at least 120,000 individuals are trapped in cyberscam compounds, and human trafficking experts and rescue organizations in Myanmar have noted that crackdowns have yielded minimal results. These centers are often run by Chinese criminal gangs, with some colluding with Myanmar’s military along the borders.

Map of the Myanmar-Thai border along the Moei River, showing locations of the fraud centre

Okindo considers himself fortunate. The mission to find and free trafficked individuals involves coordination among multiple governments, militias, and police forces. Thai officials have successfully promoted the release of thousands of trafficking victims, while East African governments are increasingly collaborating with Thai authorities willing to engage with Myanmar’s junta and militia forces at the border.

Victims can only be released into Thai custody if their home country agrees to take responsibility for their repatriation and the associated costs.

Since 2020, the Southeast Asian cyberslavery industry has ensnared hundreds of thousands, forcing individuals into what is colloquially termed “slaughtering the pigs,” a brutal way to build trust with scam targets before executing fraud. Initially aimed at Chinese and Taiwanese victims, the industry has expanded to Southeast Asians, Indians, and now, Africans.




“Sometimes I’m afraid to talk about it,” Okindo reflects. Photo: Provided by Duncan Okindo

The criminal syndicate is shifting focus to fraudulent victims in the U.S. and Europe, with China working to prevent citizens from becoming targets, an expert informed The Guardian.

This has led various human trafficking networks to search for recruits with English and technical skills, including East Africans. Estimates now suggest thousands are trapped in Southeast Asian compounds, according to Benedict Hoffman, a representative of the United Nations Office on Drugs and Crime in Southeast Asia and the Pacific.

As awareness grows among citizens in various countries, recruitment becomes increasingly challenging. “It’s much harder these days to enlist large numbers of individuals from India,” Hoffmann notes. “This is why we’re observing a rise in victims from Africa.”

Between January and April, the Kenyan government successfully repatriated 175 citizens from Myanmar; Roseline Njogu, the Director of the Diaspora Issues Department in Kenya’s State Department, noted that a substantial group of Kenyans, about 150 individuals trafficked from across Southeast Asia, was rescued between 2022 and 2024. This issue also extends to Ethiopia and Uganda.

In Kenya, approximately 80% of the population is under 35, and the unemployment rate is alarmingly high. The government under President William Ruto has actively promoted labor exports. Investigations indicate that four in ten young Kenyans are considering moving abroad.

Recruiters exploiting modern slavery are capitalizing on government migration promotion, targeting Kenya through online job advertisements, social media, texts, and in-person visits to rural areas, states Mutuk Nguri, CEO of the Counter Human Traffic Trust.

Skip past newsletter promotions



Chinese, Vietnamese, and Ethiopians rescued in Misawadi, Myanmar. They are recognized as victims of human trafficking at fraud centers. Photo: Thanaphon Wuttison/AP

The government acknowledges its precarious position, according to Nguri. The Kenyan Ministry of Foreign Affairs and Diaspora Issues did not respond to requests for comments.

Thailand has aided thousands, but repatriation presents its own challenges and costs. Thai officials must establish that workers are indeed victims of human trafficking before releasing them to their home countries.


When Susan Wahura* was rescued from a Myanmar romance scam operation in 2022, she spent a month moving between four Thai detention centers before realizing she was trafficked and initiating legal steps to obtain freedom.

“I spent time in a solitary cell before accepting my status as a trafficking victim which ultimately led to my freedom,” shares 32-year-old Wahura.

Neither Uganda nor Ethiopia maintain embassies in Thailand, complicating their ability to identify victims in Myanmar, currently engulfed in civil conflict. Earlier this year, several Ugandans and Ethiopians found themselves stranded at the Myanmar-Thai border as repatriation efforts stalled.




Duncan Okindo has created a TikTok video detailing his trafficking experiences in Myanmar, aiming to raise awareness about predatory agencies and bogus job offers. Photo: Carlos Mureithi/The Guardian

The fraud syndicate is exploiting vulnerabilities in East Africa’s diplomatic representation to deter victims from seeking help, asserts Jason Tower, a global initiative against transnational organized crime.

“Ultimately, that’s the objective of the scam syndicate—to transform individuals into profit-generating machines, acting as high-capacity con artists,” states Tower.


Nevertheless, despite repatriation efforts by East African nations, deceptive recruitment agencies keep advertising fake job opportunities. Both Okindo and Wahura continue to share guardian messages with Kenyans contemplating moves to Southeast Asia.

In May, Okindo, who holds a mass communication diploma, filed a lawsuit against the recruitment agency and its staff, accusing them of conscription into slavery and human trafficking. A Nairobi court has issued a temporary injunction preventing the overseas employment of labor.

Since his return, Okindo has spoken publicly about his experiences through television, TikTok, and other social media outlets, connecting stranded victims with legal support, aid organizations, and ambassadors for their recovery.

His aim is to raise awareness about malicious institutions and false job opportunities while encouraging victims to seek justice.

“I’ve enlightened many individuals,” he asserts. “Though I sometimes feel scared discussing it, I share my story, knowing that speaking out could help save others.”

*Name changed to protect identity

Source: www.theguardian.com

China’s Cyber Abuse Scandal: Is the Government Taking Action Against Online Exploitation of Women?

wHeng Min* discovered a concealed camera in her bedroom, initially hoping for a benign explanation, suspecting her boyfriend might have set it up to capture memories of their “happy life” together. However, that hope quickly morphed into fear as she realized her boyfriend had been secretly taking sexually exploitative photos of her and her female friends, as well as other women in various locations. They even used AI technology to create pornographic images of them.

When Ming confronted him, he begged for forgiveness but became angered when she refused to reconcile. I said to a Chinese news outlet, Jimu News.

Ming is not alone; many women in China have fallen victim to voyeuristic filming in both private and public spaces, including restrooms. Such images are often shared or sold online without consent. Sexually explicit photos, frequently captured via pinhole cameras hidden in everyday objects, are disseminated in large online groups.

This scandal has stirred unrest in China, raising concerns about the government’s capability and willingness to address such misconduct.


A notable group on Telegram, an encrypted messaging app, is the “Maskpark Tree Hole Forum,” which reportedly boasted over 100,000 members, mostly male.

“The Mask Park incident highlights the extreme vulnerability of Chinese women in the digital realm,” stated Li Maizi, a prominent Chinese feminist based in New York, to the Guardian.

“What’s more disturbing is the frequency of perpetrators who are known to their victims: committing sexual violence against partners, boyfriends, and even minors.”

The scandal ignited outrage on Chinese social media, stirring discussions about the difficulties of combating online harassment in the nation. While Chinese regulators are equipped to impose stricter measures against online sexual harassment and abuse, their current focus appears to prioritize suppressing politically sensitive information, according to Eric Liu, a former content moderator for Chinese social media platforms and present editor of the Digital Times based in the US.

Since the scandal emerged, Li has observed “widespread” censorship concerning the Mask Park incident on Chinese internet. Posts with potential social impact, especially those related to feminism, are frequently subject to censorship.

“If the Chinese government had the will, they could undoubtedly shut down the group,” Li noted. “The scale of [MaskPark] is significant. Cases of this magnitude have not gone unchecked in recent years.”

Nevertheless, Li expressed that he is not surprised. “Such content has always existed on the Chinese internet.”

In China, individuals found guilty of disseminating pornographic material can face up to two years in prison, while those who capture images without consent may be detained for up to ten days and fined. The country also has laws designed to protect against sexual harassment, domestic violence, and cyberbullying.

However, advocates argue that the existing legal framework falls short. Victims often find themselves needing to gather evidence to substantiate their claims, as explained by Xirui*, a Beijing-based lawyer specializing in gender-based violence cases.

“Certain elements must be met for an action to be classified as a crime, such as a specific number of clicks and subjective intent,” Xirui elaborated.

“Additionally, there’s a limitation on public safety lawsuits where the statute of limitations is only six months, after which the police typically will not pursue the case.”

Skip past newsletter promotions

The Guardian contacted China’s Foreign Ministry for a statement.


Beyond legal constraints, victims of sexual offenses often grapple with shame, which hinders many from coming forward.

“There have been similar cases where landlords set up cameras to spy on female tenants. Typically, these situations are treated as privacy violations, which may lead to controlled detention, while victims seek civil compensation,” explained Xirui.

To address these issues, the government could strengthen specialized laws, enhance gender-based training for law enforcement personnel, and encourage courts to provide guidance with examples of pertinent cases, as recommended by legal experts.

For Li, the recent occurrences reflect a pervasive tolerance for and lack of effective law enforcement regarding these issues in China. Instead of prioritizing the fight against sexist and abusive content online, authorities seem more focused on detaining female writers involved in homoerotic fiction and censoring victims of digital abuse.

“The rise of deepfake technology and the swift online distribution of poorly filmed content have rendered women’s bodies digitally accessible on an unparalleled scale,” stated Li. “However, if authorities truly wish to address these crimes, it is entirely feasible to track and prosecute them, provided they invest the necessary resources and hold the Chinese government accountable.”

*Name changed

Additional research by Lillian Yang and Jason Tang Lu

Source: www.theguardian.com

Cyber Attacks Could Target Home Solar Panels to Disrupt Power Grids

A third of Australian homes feature rooftop solar panels

ZSTOCKPHOTOS/ISTOCKPHOTO/GETTY IMAGES

Power grids across the globe face an increasing risk of cyberattacks, primarily due to the vulnerabilities inherent in home solar equipment.

With the rise of distributed energy resources like rooftop solar, grids are leaning more heavily on smart inverters that control connections to local power networks.

“While these technologies provide numerous advantages, they also bring forth new operational and cybersecurity hurdles,” says Sid Chau, a researcher at CSIRO, the Australian government’s research institute.

Smart inverters convert the direct current generated by solar panels into the alternating current required by electrical devices. They also optimize energy storage and enable remote monitoring via the Internet.

This web connectivity means that they not only jeopardize home solar installations but can also threaten larger power generation networks, warn Chau and his team.


The team has pinpointed various methods through which smart inverters can be compromised, including exploiting hardware and software vulnerabilities. Hackers can deceive users into granting excessive permissions on connected inverter applications or collaborate with manufacturers to embed malicious code directly into hardware.

Chau and his team modeled the threats stemming solely from Australian inverters, where roughly one-third of residences possess rooftop solar systems. This scenario mirrors certain power grids worldwide where civilian solar installations are becoming increasingly prevalent.

Although such attacks necessitate careful planning and coordination, researchers have discovered that a relatively small number of compromised solar smart inverters can create significant disruptions when vulnerabilities align.

Once a smart inverter is infiltrated, hackers can execute synchronized attacks targeting the broader power grid.

Of particular concern are assaults aimed at the frequency control of the power grid. In regions like Australia and Europe, the grid frequency must maintain around 50 HERTZ. Though safeguards exist, deviations can lead to cascading failures within the power system.

The risk is heightened further by the long lifespan of many inverters, often exceeding 15 years, which allows cybersecurity measures to quickly become outdated.

Chau emphasizes the need for improved monitoring of private inverters so that authorities can promptly address any suspicious activities that arise.

He also advocates for enhanced long-term support for inverter owners and regular compliance checks to guarantee adherence to cybersecurity and maintenance standards.

Zubair Baig from Deakin University in Melbourne stresses the importance of security validation for all imported inverters.

“Since these devices are often not produced domestically, there exists a risk that they might be configured with malware during manufacturing, leading to potential current fluctuations, permanent equipment damage, and even grid failure,” states Baig.

Ernest Foo from Griffith University in Brisbane highlights that Australia’s critical infrastructure is particularly susceptible to cyber threats due to its outdated design and components.

“The increasing integration of distributed solar energy heightens the likelihood of cyberattacks, especially with the evolving use of machine learning and AI,” he adds.

Topic:

Source: www.newscientist.com

Spy Ships, Cyber Attacks, and the Shadow Fleet: Global Security Teams Respond to Maritime Threats

Scenario crafted in Hollywood now reflects a genuine threat: the potential for hackers to seize control of vessels remotely and instigate crashes. Yet, in the security operations hub in Oslo, maritime cyber specialists situated mere meters from the luminous fjords and their tourist boats, floating saunas, and wet bathers assert that such occurrences are not only feasible, but imminent.

“We’re certain this will eventually happen, hence our vigilance,” states Øystein Brekke-Sanderud, Senior Analyst at the Nordic Maritime Cyber Resilience Centre (Norma Cyber). Behind him, a dynamic map displays the fleet they monitor, accompanied by a screen brimming with graphs and codes. Two small rubber ducks observe the passing minutes.

In an unstable global landscape, transportation networks, ports, and terminals have garnered heightened strategic significance as potential targets for infrastructure disruption and espionage—especially pertinent in Scandinavian nations that share maritime boundaries with Russia.

Finland and Sweden are NATO members now, with all countries enhancing their defensive postures amid escalating concerns over hybrid threats and warfare.




A digital map that tracks ship locations globally via Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

As ships become increasingly digitalized, the opportunities for cyber breaches expand, indicating an urgent need to mitigate the complexities of AI tools and intricate systems.




Oslo Harbor serves as the command center where maritime cyber specialists assess global ship threats. Photo: Carl Hendon/Getty Images

“These vessel systems are incredibly intricate, making them tough to manipulate. However, AI accelerates everything,” explains Brekke-Sanderud. “How does this part function? Can I locate a password amidst this dense manual?”

Stationed at the Norwegian Shipowner Association’s headquarters along the quay of the Norwegian capital, Norma Cyber collaborates with the Norwegian Shipowner’s Risk Insurance Association (DNK).

Two years ago, these organizations united to create a Maritime Security and Resilience Centre, which surveys global threats ranging from warfare and terrorism to intellectual property violations—both physical and digital. They also conduct this work on behalf of the Norwegian government.




Norma Cyber Staff, featuring Managing Director Lars Benjamin Vold, Analyst Øystein Brekke-Sanderud, and Chief Technology Officer Øyvind Berget. Photo: Sara Aarøen Lien/The Guardian

While it is technically feasible to crash a vessel from afar, hackers aiming to sow chaos don’t necessarily need such extreme measures. According to Norma Cyber Managing Director Lars Benjamin Vold, merely halting the vessel’s operations could result in significant system failures.

Emerging evidence suggests that nations may exploit these vulnerabilities against maritime adversaries.




Oil tanker discharging ballast water is one of the vulnerabilities targeted in cyber attacks. Photo: Island Stock/Aramie

Reports indicate that Iran is investigating methods to deploy cyber assaults to disrupt ballast systems—a threat to both ships and satellite networks. An unprecedented hack occurred in April, targeting 116 Iranian VSAT modems used for satellite communications across vessels.

“When discussing nation-states, it is about their willingness to act,” Vold states. Potential “threat actors” such as Russia and China possess substantial capabilities, though these depend on their strategic objectives, which may shift rapidly.

Consequently, while threat levels remain relatively stable, maritime vulnerabilities are on the rise. “The avenues for potential exploitation are multiplying as the sector grows more digital,” Vold remarks.

Norma Cyber has also pinpointed civilian vessels, including fishing boats, research ships, and cargo carriers, used for espionage within the Baltic, North Atlantic, and Arctic regions. China-linked threat actors are reportedly using USB devices to infiltrate maritime systems, such as those from Mustang Panda.

Last year, Norma Cyber documented 239 significant cyber attacks within the maritime sector, attributing the majority to the pro-Russian group NonAME057 (16).

Skip past newsletter promotions



Svein Ringbakken, managing director of DNK’s Oslo office. Photo: Sara Aarøen Lien/The Guardian

Curiously, the rising dependence on digital technology creates a greater demand for traditional navigation skills. Following disruptions to the Baltic satellite navigation system, Finland accused Russia of being the instigator. “An experienced sailor serves as the best protection,” Vold asserts.

Yet, alongside the unseen threats of the digital realm, the maritime industry grapples with unprecedented physical challenges. Vladimir Putin’s shadow fleet, comprised of hundreds of unregulated vessels, poses a growing risk to environmental safety and the global shipping framework as it transports sanctioned crude oil primarily to China and India.

This Shadow Fleet consists of aging oil tankers obscuring their identities to evade Western sanctions. Estimates of its size range between 600 to 900 vessels according to various sources.




Finnish authorities scrutinized the Russian Shadow Fleet Oil Tanker Eagle in December 2024 due to suspected interference with power cables. Photo: Finland Border Guard/AFP/Getty

Internal threats to ships can also arise from within. Engines, elevators, and water purification systems are all vulnerable targets on board vessels. Moreover, 15% of the global crew consist of either Ukrainian or Russian members. The composition of both crews has taken on new significance since the onset of Russia’s invasion of Ukraine.

“The presence of a Russian captain on a ship delivering aid to Ukraine certainly raises concerns,” says Svein Ringbakken, managing director of DNK. “These are sensitive issues that the industry is currently addressing.”




Rhine Falkenberg Orstad, an advisor to the Norwegian Shipowner Association and an expert on the Russian Shadow Fleet. Photo: Sara Aarøen Lien/The Guardian

Rhine Falkenberg Orstad expresses concern that the increasing presence of the Shadow Fleet could foster a “parallel fleet” comprised of crew members uninformed about the intentions at sea.

If one of these vessels experiences an environmental mishap, it poses a risk to Norway’s coastline, she warns. Some ships noted as sanctioned by the US remain operational, with many being at least 15 years old. “Our apprehension is that the situation is deteriorating.”


Another significant query remains: has the entire situation permanently shifted?

“Is the shadow fleet operating outside of Western jurisdiction a new norm? Or can this trend be reversed?” Ollestad ponders. “The answer remains elusive.”




The rubber ducks maintain a vigilant watch over the security operations room at Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

Source: www.theguardian.com

Defending Against the Threat: How UK Banks Combat Cyber Attacks

For bank leaders, it’s their worst nightmare. Urgent communications have rapidly unleashed turmoil across the UK’s financial sector, as cyberattacks incapacitate IT infrastructures.

Bank executives recognize that their stakes are particularly high, especially as family names in other sectors, like Marks & Spencer, grapple with the repercussions of such breaches.

Within hours of a bank breach, millions of direct debits might fail, jeopardizing rent, mortgages, and salaries. Online banking access may be blocked, cash withdrawals denied, and commuters stranded as buses and gas stations refuse payments. News of such an attack often incites panic, prompting rival banks to react and customers to withdraw their funds in anticipation of disruptions.

While this may seem extreme, a well-executed cyberattack on a major UK bank is not far removed from the government’s “rational worst-case scenario.” The financial sector, categorized as one of the 14 “critical national infrastructure” sectors, is particularly vulnerable. Highlighted in the National Risk Register, it models the most significant threats confronting the UK.

This spring, billions of pounds were invested to prevent catastrophic incidents involving major retailers like Harrods, The Co-op, and M&S.

“The financial commitment will be substantial,” Ian Stuart, CEO of UK HSBC, mentioned to MPs last month. “We are under constant attack,” he added.


Following the cyberattack, M&S was compelled to halt online orders for six weeks. Photo: Yui Mok/Pa

According to Stuart, HSBC alone needs to invest hundreds of millions to bolster their security. “This represents our largest expenditure.”

Globally, banks are projected to dedicate 11% of their IT budgets to cybersecurity by 2025, as indicated by an EY survey. This budget is expected to reach $290 billion (about £21.4 billion). By December, banks may invest $32 billion in cybersecurity, according to Celent’s research.

Cybercriminals represent a new kind of threat in the banking sector, evolving from masked robbers targeting physical branches to state-sponsored hackers and independent cybercriminals aiming for ransom or widespread chaos.

“Banks likely comprehend risk more profoundly than many other industries, investing significantly more in security,” states Stuart McKenzie, managing director at Mandiant Consulting, a Google-owned cybersecurity firm that collaborates closely with various UK lenders.

Last month, the Governor of the Bank of England shared with the BBC that cybersecurity risks remain ever-evolving. “We are contending with adversaries who continually enhance their methods of attack, which I must remind the agency to prioritize,” said Andrew Bailey.

However, safeguarding systems is complex. Many high street banks operate on multi-layered IT architectures with numerous updates and add-ons. Incorporating third-party software and cloud services complicates matters further, leading to a convoluted system.

“We refer to it as the offensive side,” remarked Alan Woodward, a cybersecurity expert and professor at the University of Surrey. “The attack surface is expanding, resulting in more chances for attackers to exploit vulnerabilities.”

Historically, successful bank hacks have not been destructive enough to halt the economy completely. Instead, hackers typically target customer data and account information.

In 2021, a hacker from Morgan Stanley accessed personal information belonging to a corporate client by breaching a server operated by third-party consultancy firms.

Earlier, at the onset of the COVID-19 pandemic, an attacker compromised a staff email for the Italian bank Monte Dei Paschi, sending a client a voicemail with malicious attachments.


In 2016, hackers guessed bank card details from over 9,000 Tesco Bank accounts, managing to steal nearly £2.5 million. Photo: Murdo Macleod/The Guardian

Notably, one of the worst hacking incidents in UK banking occurred in 2016, where criminals speculated on card details, leading to the theft of approximately £2.5 million from Tesco Bank accounts. In the aftermath, Tesco had to stop all online and contactless transactions to mitigate fraudulent activity occurring globally, including in Spain and Brazil.

In the end, Tesco Bank fully refunded its customers.

The National Cyber Security Center advises customers who suspect a breach to reach out to their banks through official websites or social media channels, avoiding any links or contact details shared in suspicious communications. Organizations should be able to confirm the status of the breach and provide guidance on next steps.

Since 2013, the Bank of England has actively recognized cybersecurity as a financial stability risk and initiated supervision of cyber resilience standards for all regulated banks and insurance firms.

Skip past newsletter promotions

The initiative includes the launch of CBEST, the first global program where ethical hackers evaluate the potential vulnerabilities of banks using advanced attack techniques.

“Nothing is absolutely secure,” emphasized Woodward, but he noted that the UK banking system is nearing that goal. “Much of this stems from oversight,” particularly by the central bank, which gathers intelligence from MI5, GCHQ, and NCSC, and conducts real-world scenarios to assess bank resilience.

Every two years, the central bank orchestrates the Multiday Cyberwar game as part of the Simex-Simulation Exercise program, assessing the security of businesses in London.

Additionally, authorities have been scrutinized, with banks, financial regulatory bodies, the Treasury, and the National Cybersecurity Centre evaluating their preparedness for various catastrophic incidents.

Regulators don’t just review bank defenses; they also encourage banks to develop response and recovery plans to mitigate long-lasting disruptions caused by potential cyberattacks, as it’s crucial for their success.

The Cross Market Business Continuity Group, connecting regulators with representatives from UK Finance in the banking sector, boasts the capability to convene approximately 100 firms for emergency discussions within an hour during potential threats.

Avoiding breaches is deemed essential for safeguarding industries that ultimately rely on trust. Customers expect banks to protect their data, incomes, and life savings from outside threats.

“If anyone can breach that security and execute a fraudulent transaction… you will lose trust in that bank, right?” remarked Woodward.

Banks have already faced backlash from mere IT disruptions, even without malicious intent aiming to undermine the banking system or steal sensitive information.

TSB has spent years rehabilitating its image after the IT collapse in 2018, caused by a failed separation from Lloyds’ internal systems, which led to millions of customers being locked out of their accounts for weeks. The bank was subsequently fined £48 million for “serious and widespread” failures.


TSB has been diligently working for several years to restore its standing following the 2018 IT crisis. Photo: Andrew Matthews/PA

Data gathered by the Parliamentary Treasury Committee indicates that the repercussions continue to affect some of the UK’s largest banks and their client bases, with significant IT failures over an extended period between January 2023 and February 2025.

“Customer money and data security are paramount for banks, not only due to regulatory demands but also as a cornerstone of their business model.”

“While I don’t dismiss the potential for cyber incidents, I remain confident in the level of cyber defense we maintain.”

Source: www.theguardian.com

Will You Face a Cyber Attack? 7 Essential Protection Tips | Consumer Concerns

Keep an eye on your inbox

Cyberattack notifications flood our inboxes weekly, sparking concern over the personal data that may have been compromised.

Recently, Adidas disclosed that some personal information of customers was breached, including passwords and credit card details, although their payment data was secure.

Another incident involved unauthorized access to personal data of thousands of legal aid applicants from England and Wales, dating back to 2010, which followed significant disruptions caused by a cyberattack on Marks & Spencer.

If you see news about a cybersecurity incident affecting a company you’ve interacted with, stay vigilant regarding your email. Companies typically reach out to affected customers with details on what occurred and suggested actions.

Sometimes, only specific customer segments or users from particular regions may be impacted.

In Adidas’ case, it appears that those who contacted customer service recently are primarily affected, which may exclude many others. Occasionally, communication will confirm that you are unaffected.

If your information could be compromised, you’ll usually receive guidance on corrective measures or a link to a FAQs page. In some instances, firms may offer free access to support services from cybersecurity experts or credit monitoring.

In Adidas’ case, it seems to affect customers who contacted the service desk previously. Photo: Odd Andersen/AFP/Getty Images

Change Your Password

If you’ve conducted transactions with an organization that faced a cyber incident, change your password for that account immediately.

Ensure your password is robust and not used across multiple accounts.

Experts recommend creating passwords that are at least 12 characters long, including a mix of numbers, capital and lowercase letters, and symbols. Avoid easily guessed information like pet names, birthdays, or favorite teams.

“A great strategy to enhance password security is to combine three random words into one.” says the National Cybersecurity Centre in the UK. For example, consider something like Hippo! PizzaRocket1.

“Consider using a password manager to generate and securely store unique, strong passwords,” advises online security firm Nordvpn.

Utilize Two-Step Authentication

Two-step verification adds an extra security layer to your email and other key online accounts.

This generally involves receiving a code via the Authenticator app or sent to your registered mobile number to grant access.

Enable two-step verification on all services that provide this feature.

The second factor may include codes sent via SMS. Photo: Prostock-Studio/Alamy

Beware of Unsolicited Emails

Phishing emails often cite recent cyber events to lure unsuspecting targets who may be customers of the affected company.

Scammers might leverage personal information they’ve acquired to appear credible.

Avoid clicking on any link or attachment in emails, text messages, or social media posts unless you’re entirely certain of their legitimacy. These links can lead to phishing sites or include malware designed to steal your identity.

M&S advises potentially impacted customers that they “may receive emails, calls, or texts that appear to be from us.” “We will never reach out for your personal account details, such as your username or password.”

If an email claims to be from a business you interact with and you’re uncertain of its authenticity, ignore it or verify it through official contact channels.

Be cautious about links or attachments in emails unless you are completely sure they are legitimate. Photo: Tero Vesalainen/Alamy

Monitor Your Credit Record

If your personal data has been compromised, keep an eye on your credit report, which details your financial history and is used by lenders to judge your creditworthiness, in case someone attempts to open accounts in your name.

For instance, if a financial entity endures a cyber breach, the accessed data could include sensitive information such as your name, address, national insurance number, date of birth, bank account details, salary, and potentially your passport.

This information can be misused for identity fraud.

In the UK, the main credit reference agencies are Equifax, Experian, and Transunion, all providing various options to check your credit report for free or via subscription.

Credit Karma and Clear Score offer free lifetime access to your credit reports.

Experian provides an ID monitoring service, which checks your personal, financial, and credit information for suspicious activity. It’s a paid service, but if your data becomes compromised, they may cover the costs.

Be cautious if you suddenly find your applications for credit cards or loans being denied, or if you cease receiving bank statements for no clear reason despite a healthy credit score, as it may indicate identity theft.

More significantly, you may start receiving letters regarding debts that are not yours, or seeing transactions on your bank statements for items you didn’t purchase.

Many instances of financial fraud begin on social media and tech platforms, so remain vigilant, as scammers may possess details about you that can lend credibility to their deception.


The so-called “High Mama” scams have risen in recent years, where scammers impersonate relatives on platforms like WhatsApp, often pleading for urgent money transfers upon claiming to be locked out of their online banking.

Even with a sense of urgency, take the necessary time to verify the identity of anyone requesting funds.

Opt Out of Registration

When shopping online, retailers frequently prompt you to save payment card details for quicker checkout, but this may store your information with third-party services rather than just the retailer.

If you can avoid storing payment details across multiple sites, you reduce the risk of unauthorized access to your card information.

Source: www.theguardian.com

Data Insights: Are Electric Vehicles at Risk from Cyber Espionage and Hacking?

Mobile phones and desktop computers have long been targets of cyber espionage, but how vulnerable are electric vehicles?

On Monday, a newspaper reported that a British defense company, engaged with the UK government, advised its staff against connecting mobile devices with Chinese-made electric vehicles due to concerns over potential data extraction by Beijing.

This article examines the security issues related to electric vehicles.


Can an electric car snoop on you?

Security experts quoted by the Guardian suggest that electric vehicles, being the most advanced vehicles on the market, could be vulnerable to hacking.

Rafe Pilling, director of threat intelligence at cybersecurity firm SecureWorks, notes that electric vehicles can produce a wealth of data that could interest a hostile state.

“There are numerous opportunities to compromise these vehicles as they collect data,” he states.

He further explains that WiFi or mobile connectivity can enhance data access for manufacturers through the “over-the-air” software update feature.

“Modern vehicles equipped with over-the-air updates, various sensors, and external cameras could potentially be repurposed as surveillance tools,” he adds.

A mobile phone connected to a car via a charging cable or Bluetooth is another significant data source, he mentions.


Should all car drivers be worried?

Experts indicate that individuals in sensitive sectors, such as government or defense, should exercise caution.

“If you’re working on a sixth-generation fighter jet and connect your work phone to your personal vehicle, be mindful that this connection could compromise your mobile data,” states a researcher at the Royal United Services Institute Think Tank.

Nate Drier, tech lead at cybersecurity firm Sophos, highlights the option to select “don’t trust” when connecting a phone charger to a car; however, this would forfeit many functionalities, such as music streaming or messaging.

“Most people tend to maintain that connection for the convenience it brings,” he acknowledges.

Pilling adds that even rental car users should remain vigilant.

“Generally, individuals may leave copies of their contacts and sensitive information in their car’s entertainment and navigation system, often forgetting to remove them before relinquishing the vehicle, making phone synchronization a risky move,” he advises.


Why are Chinese vehicles the focus of concern?

China is a significant producer of electric vehicles (EVs) through brands like BYD and XPENG. Coupled with the Chinese state’s practices in cyber espionage, this raises concerns. For instance, China’s National Intelligence Act of 2017 mandates all organizations and citizens to “support, assist, and cooperate” with national intelligence efforts.

“Chinese law compels companies to align with national security, so one must consider the possibility of surveillance capabilities in their vehicles,” he notes, albeit admitting that there is “no evidence” currently linking Chinese vehicles to espionage.

Experts believe that while electric vehicles are a concern, devices like mobile phones, smartwatches, and other wearables are more likely targets for spying.


What does the UK government say?

A government representative refrained from commenting on specific security protocols but affirmed that “protecting national security is our utmost priority, and strict procedures are in place to ensure government sites and information are adequately safeguarded.”

A more detailed statement released last month by Defence Minister Koker, indicated that the Ministry of Defence (MOD) is collaborating with other government bodies to understand and mitigate potential security threats from all types of vehicles, not just those manufactured in China.

Further reports state that while there are no overarching policy prohibitions on the movement of Chinese-made vehicles, EVs incorporating Chinese components have been banned from sensitive military locations.

Nevertheless, individual defense entities may impose stricter requirements for vehicles in particular settings.

BYD was reached for commentary, while Xpeng stated it is “committed to upholding and complying with applicable UK and EU privacy laws and regulations.”

SMMT, a trade association representing British automakers, responded:

“Our industry is dedicated to maintaining a high standard of customer data protection, which includes the responsible use of data. Features such as apps and paired phones can be removed from vehicles based on individual manufacturers’ guidelines, ensuring drivers feel secure.”

Source: www.theguardian.com

Former UK Cyber Chief believes it is “unrealistic” to demand Apple to break encryption

Apple withdraws one of its crypto services from its UK customers

Slandstock / Alamy

The former cybersecurity chief called the UK government “naive” for Apple’s request to add a backdoor to its software. This allows the UK Intelligence Agency to search customer data.

Ciaran Martin He is the head of cybersecurity at the UK Government Communications Headquarters (GCHQ), and was the first CEO of the National Cybersecurity Centre (NCSC) before joining Oxford University in 2020. New Scientist On reports that the UK government has made an unprecedented request to grant Apple access to data stored anywhere in the world, even if it is encrypted.

Such an order, made under the Investigation Powers Act of 2016, is intended to be made in secret, but Martin says it’s not surprising that details appear to have been leaked. “I think the idea that this type of order for companies like Apple would work secretly was probably naive,” he says.

Neither the Home Office nor Apple has confirmed the existence of requests. However, in February, Apple announced that it would do so. No longer provide advanced data protection servicesIt is designed to securely encrypt cloud data to new users in the UK. “As I’ve said many times before, we’ve never built a backdoor or a master key for our products or services and never would,” Apple said at the time. The same goes for the company Reportedly challenges British orders in legal cases that are likely to be heard secretly.

Martin says that while it’s not uncommon for governments and industries to collide with security issues, he is “not cumbersome, but susceptible to some form of compromise.” He says several times during his career at Intelligence Reporting Agency, technology companies have requested that malicious actors remove features used to harm national security or criminal enterprises. He refused to give details But they often said these are small specialized technology providers.

“They’ll have a new app or something, and it will become a criminal favourite for certain features, and you just say, ‘Look, you can’t do this,'” says Martin. “They are little niche technology, they are widely used. They are more misused than they are used.

At the end of the day, he says, the government must accept that non-crackable encryption will remain here. “The ship sailed,” says Martin. “I think the government has to agree to this in the end, and I think in the long run, I’m trying to force a global Titan. [US] The West Coast is not going well. ”

topic:

Source: www.newscientist.com

US national security at risk as Trump administration fails to effectively address Russia’s cyber threat

The Trump administration has publicly stated that Russia is not considered a cyber threat to US national security or critical infrastructure, marking a significant departure from previous assessments.

Experts warn that this policy shift could leave the US vulnerable to Russian hacking attacks and may signal warming relations between President Donald Trump and Russian President Vladimir Putin.

Recent incidents indicate that the US no longer views Russia as a cybersecurity threat.

Liesyl Franz, the State Department’s deputy director of international cybersecurity, did not mention Russia as a threat in her recent speech before the UN Working Group on Cybersecurity. This contrasts with statements from European Union and UK officials who highlighted the threat posed by Moscow.

US policy changes regarding cybersecurity have been made behind closed doors, with new directives focusing on China and neglecting to mention Russia.

Anonymous sources familiar with the matter have expressed concern that the US is ignoring the Russian cyber threat, which was previously a primary focus for agencies like the Cybersecurity and Infrastructure Security Agency (CISA).

Reports indicate that CISA officials have been reassigned, raising questions about the US government’s approach to protecting against cyber threats from Russia.

The New York Times reported that CISA officials tasked with safeguarding elections from cyberattacks have also been reassigned.

Concerns have been raised about the shift in US policy towards Russia, as many believe that Russia remains a significant cyber threat to US interests.

The CISA and State Department have not provided comments on these developments.

The change in US policy regarding Russia’s cyber threat is seen as a departure from previous assessments and has raised concerns among experts.

For over a quarter-century, Putin’s Russia has been active in cyberattacks and disinformation campaigns, posing a challenge to the international order.

If you have any tips about this story, you can reach out to us at +1 646 886 8761 on Signal

Source: www.theguardian.com

International Reports on Artificial Intelligence (AI) Cover Work, Climate, Cyber Warfare, and More


  • 1. work

    In the section on “Labor Market Risks”, the report indicates that the impact on jobs will be “serious”, particularly with highly capable AI agents (tools that can perform tasks without human intervention). Caution is advised.

    “General-purpose AI has the ability to automate a wide range of tasks, potentially leading to significant impact on the labor market. This could result in job loss.”

    The report also mentions that while some economists believe that job losses due to automation may be offset by new job creation in non-automated sectors.

    According to the International Monetary Fund, about 60% of jobs in advanced economies like the US and UK are at risk of automation, with half of those jobs being potentially impacted negatively. The Tony Blair Institute suggests that AI could displace up to 3 million jobs in the UK, but also create new roles in industries transitioning to AI, which could bring in hundreds of thousands of jobs.

    The report mentions that if autonomous AI agents can complete tasks over extended periods without human supervision, the consequences could be particularly severe.

    It cites Some experts who have raised concerns about a future where work is mostly eliminated. In 2023, Elon Musk predicted that AI could eventually render human work obsolete, but the report acknowledges uncertainty about how AI will impact the labor market.


  • 2. environment

    The report discusses AI’s environmental impact due to its electricity consumption during training, labeling it as a “moderate but growing contributor” through data centers, which are crucial for AI model operation.

    Data centers and data transmission contribute about 1% to energy-related greenhouse gas emissions, with AI accounting for up to 28% of data center energy consumption.

    The report also raises concerns about the increasing energy consumption as models become more advanced, noting that a significant portion of global model training relies on high-carbon energy sources such as coal and natural gas. It points out that without the use of renewable energy and efficiency improvements, AI development could hinder progress towards environmental goals by adding to energy demand.

    Furthermore, the report highlights the potential threat to human rights and the environment posed by AI’s water consumption for cooling data center devices. However, it acknowledges that AI’s environmental impact is not yet fully understood.


  • 3. Control loss

    The report addresses concerns about the emergence of superintelligent AI systems that could surpass human control, raising fears about the disappearance of humanity. While these concerns are acknowledged, opinions vary on the likelihood of such events.

    Bengio stated that AI systems capable of autonomously carrying out tasks are still in development, preventing these systems from executing the long-term planning necessary for widespread job displacement. He emphasized that without the ability to plan long-term, AI would remain under human control.


  • 4. Bioweapons

    The report mentions the potential of AI models in creating step-by-step instructions for developing pathogens and toxins beyond the expertise of PhD-level professionals. However, it raises concerns about the possibility of misuse by inexperienced individuals.

    Progress has been observed in developing models capable of supporting professionals in reproducing known biological threats, according to experts.


  • 5. Cyber security

    From a cybersecurity perspective, AI’s rapid growth includes autonomous bots capable of identifying vulnerabilities in open-source software and generating code that can be freely downloaded and adapted. However, the current limitation is that AI technology cannot autonomously plan or execute cyber attacks.


  • 6. Deep fake

    The report highlights instances where AI-generated deep fakes have been maliciously used. However, it notes a lack of data to fully quantify the extent of deep fake manipulation.

    The report suggests that addressing issues like digital watermark deletion in AI-generated content is a fundamental task in combatting deep fake content.

  • Source: www.theguardian.com

    Nao Warns of Serious and Immediate Threat of Cyber Attacks in White Hall

    The British government faces a potentially catastrophic threat that is described as “serious and advanced,” leaving it vulnerable to significant cyber attacks that could impact dozens of critical IT systems. The minister has been alerted to this threat.

    According to the National Audit Office (NAO), there are 58 crucial government IT systems that have been identified with “significant cybersecurity gaps.” Additionally, at least 228 government IT systems are outdated and potentially vulnerable to cyber attacks. NAO did not disclose the specific systems to prevent revealing potential targets to attackers.

    The data evaluated from the Cabinet Office reveals that multiple government organizations, such as HMRC and the Department for Work and Pensions, are at risk due to weak cybersecurity measures.

    The warning about these vulnerabilities came after two recent cyber attacks, including one on the British Library by Criminal Ransomware Groups.

    In May 2024, suspected Chinese hackers infiltrated military payment networks. The following month, a NHS foundation trust in South East London had to postpone thousands of appointments due to a cyber attack.

    NAO expressed concerns that senior civil servants did not fully comprehend the importance of cybersecurity resilience due to inadequate investment and staffing. The government aims to significantly improve its cybersecurity by 2025.

    The report by the expenditure watchdog highlights the need for bolstering UK resilience post-COVID-19 pandemic, focusing on various threats like floods and extreme weather events.

    The National Cyber Security Center of GCHQ warned about the increasing complexity of cyber threats and the UK’s lagging defense capabilities to safeguard critical national infrastructure.

    Notable ransomware threats come from China, Russia, Iran, and North Korea. Various cyber groups, including Bolt, Typhoon, Reborn, and Islamic State Hacking, pose significant threats to UK cybersecurity.

    Jeffrey Clifton Brown, a member of the Conservative Party, emphasized the need for heightened government coordination, improved cyber skills, and updated IT systems to protect public services from cyber threats.

    The government spokesperson acknowledged the past neglect of cybersecurity and announced new laws and projects to enhance national infrastructure resilience and cybersecurity skills.

    NAO reported in April 2024 that 58 important IT systems were at high risk, indicating a pressing need for improved cybersecurity measures to prevent potentially catastrophic cyber attacks.

    The increasing digitalization of government services makes it easier for malicious actors to disrupt critical services, emphasizing the urgency of enhancing cybersecurity defenses.

    Gareth Davis of NAO warned that the threat of cyber attacks on public services is severe and ongoing, urging the government to prioritize cybersecurity resilience and protection of critical operations.

    Nao highlighted the importance of addressing the long-standing shortage of cyber skills, improving accountability for cyber risks, and effectively managing risks associated with legacy IT systems.

    The government’s efforts to address cybersecurity challenges were hindered by temporary staff shortages and outdated recruitment practices. NAO recommended addressing these issues to strengthen cybersecurity defenses.

    Source: www.theguardian.com

    Donald Trump criticizes Biden for strengthening US cyber defenses against Russian and Chinese threats

    The Biden administration is taking final steps to strengthen U.S. cyber defenses against increasing threats from China and Russia. They will address vulnerabilities across various sectors, including space and consumer electronics, just days before the administration changes hands. An extensive cybersecurity executive order has been issued as part of this effort.

    This directive is expected to be the administration’s last major policy initiative before President Donald Trump takes over. The order aims to combat cyberattacks that have cost the country billions of dollars and caused significant damage to government offices.

    A senior administration official stated, “The objective is to make hacking by China, Russia, Iran, and ransomware criminals more challenging and costly, demonstrating that the United States is committed to safeguarding our companies and citizens.” The order follows recent China-linked cyberattacks, including a breach of the U.S. Treasury and communication systems.

    Key provisions of the order include the implementation of end-to-end encryption for email and video communications, as well as new requirements for AI-powered cyber defense systems and quantum computing safeguards. It also expands the authority of the Cybersecurity and Infrastructure Security Agency (CISA) to detect threats across federal networks.

    The order mandates that by 2027, federal agencies must only purchase internet-connected devices carrying the “Cybertrust Mark,” encouraging manufacturers to enhance security standards for products like baby monitors and home security systems. Additionally, stronger cybersecurity measures for space systems are called for in response to Russia’s targeting of Ukrainian satellite communications.

    Amid uncertainties about the order’s longevity, Vice National Security Adviser Ann Neuberger, who led the initiative, plans to resign on January 17th, with the incoming Trump administration’s cyber team yet to be named. The order sets 53 deadlines for government agencies, ranging from 30 days to three years.

    Despite the transition, administration officials remain hopeful about the order’s impact, describing it as an urgent response to a growing threat. The official stated, “Enhancing the defensibility of our national infrastructure and strengthening our ability to counter cyber attackers are bipartisan goals.”

    Source: www.theguardian.com

    Cao Fei: Illuminating China’s Past and Future Through Neon Cities, Cyber Nightmares, and Dim Sum

    WWhen contemporary Chinese artist Cao Fei was negotiating a solo show at Nara Badu, the contemporary art department of the Art Gallery of New South Wales, she said it would be a traditional “white rectangular box illuminated.” He firmly insisted that there would be no such attempt.

    The Guangzhou-born artist has strong ties to Sydney (the vast Chinese port city’s sister city) and wanted to capture the sass and hustle and bustle of bustling malls and markets in her show.

    As a result, in “Cao Fei: My City is Yours”, gallery walls are abandoned for scaffolding, and music and sound effects from her various installations, including theaters, restaurants, and factories, play into each other. They blend together and compete for the viewer’s charm. Note.




    Cao Fei’s My City is Yours includes key works from her 20-year career. Photo: Diana Panuccio

    “This is not a criticism of European countries.” [style]But usually I watch a lot of video shows. [installed] Inside the white cube…you’ll see the curator turn down the volume. Quieter or cleaner,” Mr Cao told Guardian Australia.

    “But I want my exhibition to reflect my personality and experience. There is always a lot of construction, demolition and reconstruction going on in my city. This is my material.”

    ‘My City is Yours’ is the Beijing-based artist’s first major solo exhibition in Australia, featuring major works from his 20-year career including film, photography, metaverse experiments and large-scale interactive installations at AGNSW and Sydney It is on display at the Museum of Contemporary Art.

    Much of Cao’s career has been spent investigating the incredible technological and social transformations that have taken place in China over the past quarter century. She has held solo exhibitions in Beijing, London, Paris, and New York, and last year was in the world’s top 10. ArtReview’s Power 100 listwhere she was described as “a key figure in envisioning our metaverse-colored future.”




    “Konatsu Foyer” is a reproduction of the foyer of the currently demolished Hong Summer Theater, which was used by artists as a studio space for six years before it was demolished. Photo: Cao Fei

    Source: www.theguardian.com

    Canada’s spy agency alleges that India is using cyber technology to monitor Sikh separatists

    Canada’s spy agency claims that India is using cyber technology to monitor separatists abroad, following accusations from the Indian government that senior Indian officials authorized violent acts, including the killing of a Sikh activist in Vancouver.

    The Canada Communications Security Establishment (CSE) reported that India is utilizing cyber capabilities to surveil activists and dissidents living overseas, including increasing cyberattacks on Canadian government networks.

    Canada is home to a large Sikh community outside of India, which includes advocates for an independent Sikh nation.

    Ottawa is currently investigating the case of Hardeep Singh Nijjar, a Canadian citizen and prominent campaigner for Khalistan, a separatist movement seeking independence for Sikhs in India’s Punjab province. The murder of Nijjar in Vancouver in 2023 is believed to have been orchestrated by India.

    CSE Commissioner Caroline Xavier stated, “India poses a growing cyber threat to Canada,” during a press conference.

    The report attributes the strain in Canada-India relations to India’s surveillance activities and cyberattacks.

    Following Canada’s accusations, a pro-Indian hacktivist group launched DDoS attacks on Canadian websites, disrupting their operations.

    Officials revealed that Canada was monitoring a campaign targeting Khalistani activists, linking it to senior Indian government officials, including Home Affairs Minister Amit Shah.

    Canadian Prime Minister Scott Morrison confirmed Shah’s involvement in intelligence gathering and violent attacks, including Nijjar’s murder in 2023.

    Prime Minister Justin Trudeau and the national police suspect India’s involvement in the killing and other forms of intimidation against Khalistani activists.

    India denied the allegations, leading to the expulsion of ambassadors and diplomats between Delhi and Ottawa.

    Four Indian nationals have been arrested in connection with Nijjar’s murder.

    Source: www.theguardian.com

    British Military Targeted by North Korea-Backed Cyber Espionage Campaign

    State-sponsored hackers from North Korea have initiated an operation to acquire sensitive information regarding nuclear materials, military drones, submarines, and shipbuilding from the United States and Britain. Intelligence agencies have raised alarm about a “global cyber espionage campaign” targeting critical sectors.

    A joint notice from the US, UK, and South Korea highlighted that North Korea is utilizing state-sponsored actors to advance its military and nuclear objectives, with Japan and India also on their radar.

    These hackers, part of a group known as Andariel, are focusing on military secrets and intellectual property in industries such as nuclear, defense, aerospace, and engineering. They are also attempting to obtain sensitive data from the medical and energy sectors.

    Paul Chichester, operations director at the National Cyber Security Centre (NCSC), expressed concern over the extensive cyber espionage campaign orchestrated by North Korean forces in pursuit of their military and nuclear programs.

    NCSC revealed that Andariel has successfully breached organizations worldwide and stolen sensitive technical and intellectual property data.

    The NCSC believes Andariel is connected to North Korea’s Reconnaissance General Bureau (RGB) and poses a constant threat to critical infrastructure organizations globally.

    According to intelligence agencies, Andariel funds its espionage operations through ransomware attacks on the US healthcare sector, using publicly available internet scanning tools to identify vulnerable systems.

    Chichester emphasized the necessity for safeguarding sensitive information and intellectual property stored on systems to prevent theft or misuse, urging network defenders to follow the advisory guidelines to prevent malicious activities.

    The advisory details how Andariel has transitioned from destructive hacks to conducting professional cyber espionage and ransomware attacks, sometimes targeting the same victims on the same day.

    The US State Department has announced a reward for information on Lim Jeong-hyok, an alleged Andariel ally involved in ransomware attacks to fund operations against government agencies and defense companies.

    North Korea’s cyber army has been linked to various cyber attacks, including the notorious WannaCry ransomworm in 2017. The attack aimed to obtain valuable information for North Korea and generate revenue for the state through illegal means.

    Source: www.theguardian.com

    Russian Criminal Group Believed to Be Responsible for Cyber Attack on London Hospital, According to Experts

    According to the former chief executive of the National Cyber Security Centre, a Russian cybercriminal group is responsible for a ransomware attack that disrupted operations and testing at a major NHS hospital in London.

    The attack on pathology services firm Synovis resulted in a significant capacity impairment and was deemed a very serious incident.

    Following the attack, the affected hospital declared a critical situation, halted operations and tests, and was unable to conduct blood transfusions.

    A memo sent to NHS staff at multiple London hospitals and primary care services described the incident as a “major IT incident”.

    During a BBC Radio 4 interview, Ciarán Martin confirmed that a group of Russian cybercriminals known as Kirin was behind the Synovis attack. These groups operate within Russia, targeting organizations globally for financial gain.

    The cybercriminals, who have a history of attacks on various entities, inadvertently caused severe disruption to primary care with their ransomware attack.

    While the government’s policy is to refrain from paying ransoms, companies affected by such attacks have the option to do so.

    The National Cyber Security Centre is collaborating with NHS authorities to investigate the repercussions of the cyber attack.

    Synovis has reported the incident to the police and the Information Commissioner.

    Health Secretary Victoria Atkins assured that patient safety is the top priority and efforts are underway to resume services safely.

    Synovis CEO Mark Darragh mentioned that a taskforce of Synovis and NHS IT experts is evaluating the impact and necessary measures.

    It may take “weeks rather than days” to receive pathology results due to the severity of the attack, as per a senior source cited by the Health Service Journal.

    Source: www.theguardian.com

    TikTok hackers focusing on Paris Hilton, CNN, and other prominent users in cyber attacks | TikTok

    TikTok has taken action to address a cyberattack that targeted the accounts of various celebrities and brands, such as Paris Hilton and CNN.

    The social video app has confirmed that CNN was one of the high-profile accounts affected after its security team discovered malicious actors targeting US news media.

    A TikTok spokesperson stated, “We have collaborated with CNN to restore access to the account and have implemented stronger security measures to safeguard the account from future attacks.”

    While Hilton was also targeted, TikTok clarified that her account remained uncompromised.

    The platform disclosed that the attack exploited the app’s direct messaging feature but did not provide additional specifics. The company is currently investigating the incident and assisting affected account owners in regaining access.

    Owned by ByteDance, a Chinese technology company, TikTok faces potential bans in the US due to national security concerns. President Joe Biden enacted a bill in April that will prohibit the app nationwide if ByteDance fails to sell it to non-Chinese entities by mid-January.

    With approximately 170 million users in the US, TikTok previously announced its intention to legally challenge the ban, citing it as unconstitutional and a violation of freedom of speech.

    Recent reports revealed that former President Donald Trump, who had previously banned TikTok over ties to Beijing in 2020, joined the platform. Trump has since reversed his stance, no longer supporting a ban on TikTok despite concerns about national security risks.

    The cyberattack on TikTok is the latest in a string of hacking incidents targeting social media platforms. One of the most notable incidents occurred in July 2020 when Twitter accounts, including those of Biden, Obama, Musk, Gates, Bezos, and Apple, were compromised.

    Skip Newsletter Promotions

    The NHS confirmed on Tuesday that it fell victim to a cyberattack, declaring it a “major incident.”

    Seven hospitals managed by two NHS trusts, including Guy’s, St Thomas’, and King’s College London, experienced significant disruptions in services due to a ransomware attack on a private company responsible for analyzing blood tests.

    Source: www.theguardian.com

    Students Implicated in Cyber Fraud After Police Discover Involvement in Massive Phishing Site

    Police have uncovered a disturbing trend among university students, who are resorting to cyber fraud to boost their income. They have managed to infiltrate a large phishing site on the dark web that has defrauded tens of thousands of individuals.

    The site, known as LabHost, has been operational since 2021 and serves as a hub for cyber fraud, enabling users to create realistic-looking websites mimicking reputable companies like major banks. It has ensnared 70,000 users globally, including 70,000 individuals in the UK.

    Victims unknowingly provided sensitive information, which was then used to siphon money from their accounts. The perpetrators behind the site profited by selling this stolen data on the dark web to other fraudsters.

    According to the Metropolitan Police, the primary victims fall within the 25-44 age bracket, with a significant portion of their activities carried out online.

    Law enforcement authorities have apprehended one of the alleged masterminds behind the site, along with 36 other suspects detained in the UK and abroad. The arrests were made at various airports in Manchester, Luton, Essex, and London.

    British police are facing mounting pressure to demonstrate their effectiveness in combating the rising tide of cyber fraud.

    Despite the relatively small impact of dismantling this particular site, the police intend to dismantle additional cyber fraud operations to undermine the confidence of criminals who believe they can act with impunity.

    While fraud and cybercrime present considerable challenges for law enforcement agencies, they often compete for resources with other policing priorities, such as safeguarding children and enhancing women’s safety.

    LabHost managed to amass significant amounts of sensitive data, including 480,000 debit or credit card numbers and 64,000 PIN numbers, generating over £1 million in membership fees from 2,000 individuals who paid in cryptocurrency.

    The company lured users with tutorial videos on committing crimes using the site and on utilizing new consumer products. It promised quick installation of software in five minutes and offered “customer service” in case of any issues.

    DI Oliver Richter noted the shift in cyber fraud from requiring technical skills like coding to now being accessible to individuals ranging from late teens to late 20s, many of whom are college students.

    He expressed concern that these users may not fully grasp the risks and consequences of their actions, assuming anonymity and ease of operation.

    Following the dismantling of the site, 800 users received warnings that the police were aware of their activities.

    Detective Inspector Helen Rance, head of the Metropolitan Police’s cybercrime unit, described the LabHost bust as a sophisticated operation targeting those who have commercialized fraudulent activities. She highlighted collaboration with 17 factions globally, both in the public and private sectors.

    She emphasized the success of penetrating the service, identifying the perpetrators, and understanding the scale of their illicit operations.

    Source: www.theguardian.com

    US and UK impose sanctions on Chinese state-sponsored hackers for alleged ‘malicious’ cyber attacks

    Accusations have been made against hackers supported by Chinese government spy agencies by the United States and Britain for executing a prolonged cyberattack campaign aimed at politicians, journalists, and businesses.

    The US disclosed that the operation was directed at political dissidents and critics of China through sophisticated phishing campaigns, leading to the compromise of certain email systems and networks.

    Sanctions were imposed by the US government on the suspected hackers behind the scheme on Monday. The UK has sanctioned two individuals and a front company associated with APT31, a cyber espionage group connected to China’s Ministry of State Security.

    On Tuesday, New Zealand’s government conveyed concerns to the Chinese government regarding its involvement in attacks targeting the country’s parliamentary institutions in 2021.

    The US Treasury Department’s Office of Foreign Assets Control announced sanctions against Wuhan Xiaoruizhi Technology Co., described as a front for China’s Ministry of National Security, for being involved in multiple malicious cyber operations.

    In a press release and an unsealed indictment, the US government accused China of running an extensive state-sponsored hacking program dating back over a decade. US Attorney General Merrick Garland mentioned that the hacking operation revealed the Chinese government’s intention to target and intimidate its critics.

    The Treasury Department identified two Chinese nationals affiliated with a Wuhan company, Zhao Guangzong and Ni Gaobin, for engaging in cyber operations targeting critical US infrastructure sectors. These threats were attributed to the cyber hacking group APT 31, known as “Advanced Persistent Threat” and comprising state-sponsored contract hackers and operatives.

    The department stated, “APT 31 targets a wide range of US government officials and their advisors crucial to US national security.”

    Zhao, Ni, and five other hackers have been charged by the US Department of Justice with computer intrusion and conspiracy to commit wire fraud for their involvement in a 14-year cyber operation targeting US and foreign critics, businesses, and political officials.

    Assistant Secretary Matthew G. Olsen highlighted the necessity to remain vigilant against cybersecurity threats and cyber-enabled foreign influence activities, especially as the 2024 election cycle approaches.

    The hacking campaign entailed sending over 10,000 malicious emails containing hidden tracking links allowing APT 31 access to information about the target, including location and IP address. Emails were focused on government officials worldwide critical of China’s policy.

    UK authorities also impose sanctions

    British officials indicated that those sanctioned by the state had raised concerns about threats from China and a hack that potentially accessed data on tens of millions of British voters held by the Electoral Commission. They mentioned being responsible for a cyber espionage operation targeting members of Congress.

    The Ministry of Foreign Affairs clarified that the hacking of the electoral register did not impact the electoral process, rights of individuals, or electoral registration access.

    British cybersecurity officials accused hackers linked to the Chinese government of conducting reconnaissance on British MPs critical of the Chinese government in 2021, with no successful infections reported among the MPs.

    Additionally, three MPs, including former Conservative Party leader Iain Duncan Smith, disclosed being subjected to harassment, impersonation, and attempted hacking from China. They are part of the Inter-Parliamentary Union on China, focused on countering Beijing’s influence.

    Source: www.theguardian.com

    Global Coalition Formed by the US to Combat Foreign Government Disinformation and Cyber Warfare

    The US special envoy addressing the issue announced the formation of a global coalition of democracies to defend against disinformation campaigns by foreign governments.

    James Rubin, special envoy for combating non-state propaganda and disinformation at the US Department of State’s Global Engagement Center (GEC), mentioned that the coalition aims to establish a clear understanding of information operations and the rights of other governments. He also highlighted the importance of reaching a consensus on defining common opinion even in moments of disagreement.

    The US, UK, and Canada have already signed a formal framework agreement, and there are expectations of more countries joining the coalition. The GEC primarily focuses on countering disinformation campaigns by foreign powers and has been working towards developing a global strategy while uncovering covert disinformation operations, like Russia’s activities in Africa discrediting US health services.

    A framework signed between the United States, United Kingdom, and Canada aims to counter foreign manipulation of states by addressing disinformation as a national security threat, requiring a coordinated response from governments and civil society. This emphasizes the need for a collective approach to enhance resilience and response to foreign intelligence threats through information sharing and collaborative data analysis tools.

    James Rubin, a seasoned US government official and journalist, serving as a special envoy, acknowledged the complexity of the issue of disinformation and its intellectual challenges. He emphasized the importance of distinguishing between hostile opinion and disinformation to determine the appropriate government interventions.

    James Rubin wants to promote more fact-based information. Photo: Tayfun Salcı/ZUMA Press Wire/REX/Shutterstock

    He emphasized the need for fact-based information promotion while also finding ways to label information operations originating from foreign governments like China and Russia. He stressed the importance of identifying the sources of covert disinformation without censoring thoughts or opinions.

    This challenging issue raises questions about the dynamics between the government and social media companies, particularly in countries like the United States with constitutional guarantees of free speech. In contrast, the European Union has taken more interventionist measures with laws regulating digital services and social media content.

    Rubin underscored that it is essential to expose foreign disinformation operations without dictating social media companies’ behavior. He advocated for the enforcement of terms of service by these platforms in combatting disinformation efforts.

    Addressing the asymmetry in information space access, Rubin highlighted the challenges posed by closed-off information environments of countries like Russia and China.

    Source: www.theguardian.com

    Insights from China’s Huge Cyber Breach: The Market for Hackers

    A significant data breach from a Chinese cybersecurity company has offered a rare glimpse into the inner workings of Beijing-linked hackers.

    Analysts suggest that the breach contains valuable information about the day-to-day operations of China’s hacking program, which the FBI claims is the largest globally. I-Soon has not yet verified the authenticity of the leak and has not responded to requests for comment. As of Friday, the leaked data has been taken down from GitHub, where it was originally posted.

    From staff complaints about salaries and office rumors to claims of infiltrating foreign governments, here are some key insights gathered from the leak.

    Who was targeted in the hack?

    Icesun employees were actively seeking high-profile targets on a daily basis.

    The leak exposed that government entities in neighboring countries of China, such as Kyrgyzstan, Thailand, Cambodia, Mongolia, and Vietnam, had their websites and email servers breached. The targets ranged from British government departments to Thai ministries. I-Soon staff also claimed to have gained access to communication service providers in various countries. They specifically mentioned targeting the Indian government, viewed as Beijing’s geopolitical rival, and accessing educational institutions in Hong Kong and Taiwan. However, they acknowledged difficulty in accessing data seized from government agencies in Myanmar and South Korea.

    Additional targets included domestic entities from Xinjiang to Tibet, covering topics from illegal activities to gambling establishments.

    Who were the clients of Yi Seung?

    Based on the leaks, most of Icesun’s customers were local police departments and state security agencies responsible for safeguarding the Communist Party against perceived threats to its authority. The company offered assistance in securing devices and communications with many contracts listed as non-confidential.

    There were indications of official corruption, with discussions of kickbacks in sales to law enforcement agencies. Complaints about business challenges in regions like Xinjiang were also highlighted.

    The leak mentioned the company’s focus on creating Trojans, compiling personal information databases, and developing technology for various hacking purposes.

    Who are the hackers?

    The leak sheds light on the daily operations at mid-sized Chinese cybersecurity firms, revealing internal issues like office politics, technical shortcomings, low pay, and customer retention challenges.

    Employee conversations included complaints about management decisions, such as extravagant purchases and salary disputes.

    The leak illustrates a less flattering side of the operations at these companies, showcasing a mix of competence and ethical concerns.

    Source: www.theguardian.com

    British Library starts process of reinstating digital services following cyber attack

    After enduring a severe cyber attack, the British Library is now in the process of restoring its main catalog online. This is a significant milestone as the catalog contains 36 million records of printed and rare books, maps, magazines, and sheet music.

    Despite this progress, access is currently limited to a “read-only” format, and it may take until the end of the year for the National Library’s services to be fully restored.

    Sir Rory Keating, the library’s chief executive, confirmed that the full restoration of all services will be a gradual process. This has been particularly challenging for researchers who rely on the library’s collections for their work and livelihood.

    The devastating cyber attack, which occurred on October 31st and was claimed by the ransomware group Rhysida, caused the main catalog to be inaccessible online and led to the theft of some employee data.

    Upon restoring the online catalog, users will have the ability to search for materials. However, the process for checking inventory and ordering materials for use in the library reading room will differ from before. Users will also need to visit the library in person to view offline versions of the specialized catalog.

    The library has also acknowledged the financial impact of the attack, stating that significant spending will be required to rebuild its digital services and complete the technological recovery. Additionally, concerns have been raised about the impact of the attack on payments to authors through the UK’s public lending rights system.

    Despite the challenges ahead, the library is committed to restoring its services to their full capacity and continues to work with cybersecurity experts to address the aftermath of the attack.

    Source: www.theguardian.com

    National Amusements, owner of CBS and Paramount, alleges they were the victims of a cyber attack

    National Amusements, the movie theater chain and parent company of media giants Paramount and CBS, acknowledged that it had experienced a data breach in which hackers stole the personal information of tens of thousands of people.

    The private media conglomerate said: Legally required filings with the Maine Attorney General Hackers allegedly stole the personal information of 82,128 people in a data breach in December 2022.

    Details of the December 2022 breach were finally revealed a year after the company began notifying those affected last week.

    The company discovered the breach several months later, in August 2023, according to Mayne’s notice, but did not specify what personal information was stolen. The hackers also stole financial information, such as bank account numbers and credit card numbers, in combination with associated security codes, passwords and confidential information, according to a data breach notification filed in the state of Maine.

    The data breach notification was submitted by the company’s human resources director, so the stolen data may relate to the company’s employees.

    But the media giant has said little else about the breach or whether the personal information of its customers and users is also affected. It is not clear what type of cyberattack the company suffered, or if it received a ransom demand or subsequently paid the hackers.

    National Amusement spokeswoman Rachel Luray did not respond to a request for comment Tuesday. Spokespeople for CBS and Paramount also had no comment.

    National Amusements owns more than 1,500 movie theaters across the United States, but the company is best known for its control of Paramount and CBS following the Viacom-CBS merger in 2019.

    Paramount disclosed another security incident in August, according to Filings with Massachusetts Attorney General, an incident in which a hacker stole the personal information of an unspecified number of customers. The hackers also stole Paramount customers’ names and dates of birth, as well as Social Security numbers and other government-issued identification numbers, according to the notice.

    Disclosure: Zack Whitaker worked at CBS before August 2018.

    Source: techcrunch.com