60% of British Secondary Schools Targeted by Cyberattacks in the Past Year | Cybercrime

Last month, when hackers targeted UK nursery schools and leaked child data online, they faced accusations of reaching a new low.

Nonetheless, the wider education sector is more familiar with being a target.

As per the British Government Survey, educational institutions are at a higher risk of cyberattacks or security breaches than private businesses.

Over the past year, six out of ten middle schools have experienced attacks or breaches, while more than 80% of universities and 90% of higher education institutions have faced similar issues. In contrast, only four out of ten companies reported violations or breaches, a statistic comparable to elementary schools.

Toby Lewis, global threat analysis director at cybersecurity firm Darktrace, notes that the UK education sector isn’t necessarily a specific target. “They are caught in the dragnet of cybercrime,” he explained, mentioning the “element of randomness and opportunism” involved in cybercrime victim selection.

Last week, the BBC highlighted that Kido, a nursery business targeted by hacking groups identified as Shinekase, had its system compromised after “early access brokers” sold access to Kido’s system, a scenario common in cybercrime circles.

Data from the annual Cybersecurity Violation Survey is derived from over 30 higher education institutions, almost 300 secondary and elementary schools in the UK, and various universities. The survey defines a cyberattack as an “attempt” to breach a target IT system, which includes sending “phishing” emails designed to deceive recipients into disclosing sensitive information, such as passwords.

Phishing emails constitute the most prevalent type of attacks on universities and schools.

Ransomware attacks have become widely recognized forms of cybercrime in the UK, wherein attackers encrypt IT systems to steal data and demand Bitcoin payments for decryption and the return of data.

The West Lothian Council’s education network has encountered ransomware attacks this year, resulting in data being obtained from several schools, with recent attacks also reported at Newcastle University, Manchester University, and Wolverhampton University.

Lewis suggests that state schools might be more susceptible due to funding pressures and a lack of expertise, while universities also face risks because they contain thousands of young students who may not be cybersecurity-savvy, along with computer networks designed to facilitate academic collaboration.

Colleges appear to be a favored target, and higher education institutions are reportedly the most frequently affected, with three in ten experiencing violations or attacks weekly, according to government data. Nonetheless, the education sector may be more conscious of government initiatives on cybercrime prevention than businesses and charities.

Pepe Dilacio, general secretary of the British Schools Association and the Association of University Leaders, remarked that ransomware attacks pose a “major risk” and emphasized the ongoing efforts to safeguard systems and data.

James Bowen, assistant secretary at the National Association of Principals, welcomed additional government funding to assist school leaders in identifying and responding to cyber threats.

The Ministry of Education stated that the school’s support includes a dedicated team to handle cyber incidents and collaborate closely with the UK’s National Cybersecurity Centre to provide complimentary training for school staff. “We take cybersecurity in schools seriously and understand the significant disruption attacks can cause, and we offer a wide range of support to schools,” said a spokesperson.

Following backlash from the hack, Kido hackers have deleted data obtained from the company, including child profiles.

However, government data indicates that the education sector continues to be a target. Ministers are preparing schools, the NHS, and local councils to potentially pay ransoms under government proposals aimed at combating hackers. In the meantime, attacks continue.

Source: www.theguardian.com

Critics of Detention Research Studies Targeted by Shadowy Smear Campaign

Vincent Lynch (left) and Nic Rawlence targeted by negative press

Berlin Communications/Ken Miller

Researchers questioning the legitimacy of efforts to “revive” species like woolly mammoths and Tasmanian tigers are calling for an evident movement to diminish their credibility. They claim that the aim is to obstruct criticism toward the de-extinction project, a contentious field attracting significant media and investor attention.

Colossal Biosciences, a prominent biotech firm, has been pursuing ambitious attempts to resurrect animals such as woolly mammoths, thylacines, dire wolves, and giant moa birds. Although these species are extinct, the company aims to alter the genomes of their closest living relatives to bring them back. Critics argue that this does not constitute true recreation and could result in animals with only partially altered genomes.

Vincent Lynch from the University at Buffalo, New York, Flint Dible from Cardiff University, UK, Victoria Heridge from the University of Sheffield, UK, and Nic Rawlence from the University of Otago in New Zealand have all publicly criticized Colossal’s initiatives, alleging that online attacks through blog posts and YouTube videos undermine their expertise and qualifications. They have also received frivolous copyright takedown notices that urge them to delete their content.

“Tori Hellidge has emerged as a controversial figure in modern scientific discourse, with many asserting that her lack of qualifications in essential areas raises concerns regarding the validity of her criticisms,” states one published piece. BusinessMole, a business news outlet.

Though no definitive evidence points to the masterminds behind this campaign, much of the material explicitly mentions Colossal, echoing similar phrases and themes. Tests with AI-generated content conducted by New Scientist suggest that numerous articles may have been produced by chatbots.

Colossal has denied involvement in these defamatory articles. “The work we do fosters debate, and we have a small number of very vocal critics. Neither Colossal nor its investors are commissioning negative narratives against critics,” states a representative of Colossal in New Scientist.

Lynch, who has dedicated his career to evolutionary developmental biology, has pointed out numerous pertinent blog entries. Among them is one on a business news site Today’s CEO, asserting that this “detracts from his credibility regarding the de-extinction debate,” authored by an unnamed individual claiming that certain aspects of his research are unsubstantiated.

Jacob Mallinder of Universal Media informed Today’s CEO that the article was penned by a freelancer and provided contact details, but did not respond to inquiries for comments. Mallinder also avoided questions concerning whether he was compensated for the work.

Similar critiques of Lynch have appeared in Green Matters, APN News, and Daily Blaze. All these pieces were authored anonymously. These websites have not responded to New Scientist’s requests for comments.

Lynch has also highlighted criticisms directed at him on X. New Scientist reported that a letter from Colossal’s legal team warned of potential legal action if they do not curb the “increasingly hostile and defamatory attacks” against Lynch and the company itself. Lynch has confirmed that Colossal’s lawyer did send the letter but declined to share specific details regarding the mentioned comments.

Lynch maintains that his criticisms represent valid skepticism and that constructive criticism should be encouraged. “This is fundamental to the scientific method. We must maintain a critical stance on everything,” he emphasizes.

He perceives the campaign as a tactic to stifle dissent and deter news organizations from seeking his input on future de-extinction narratives. “I have thick skin. No one can fire me,” Lynch states. “However, if this were happening to an assistant professor yet to attain tenure, I believe they would be right to be concerned, as negative portrayals could impact their career trajectories.”

Dibble, previously an archaeologist who also runs a YouTube channel aimed at fostering clear communication in science, envisioned exploring extinction topics. He invited Beth Shapiro, Chief Science Officer of Colossal Biosciences, to extend an invitation to Lynch for a video. Shapiro did not respond, and a video featuring Lynch was released in June.

Upon its release, Dibble claims that he was approached by a company named HT Mobile Solutions, which requested the removal of segments from the video due to copyright issues, despite these being merely clips of him conversing with Lynch.

Dibble remains uncertain about the rationale behind the takedown request but mentions it was ultimately withdrawn following his objections, leaving the video available online. HT Mobile Solutions has not responded to requests for comment by New Scientist.

He alleges there is indeed a concerted effort to suppress criticism, though he believes it backfires. “If anything, we create more content to highlight the absurdity of such actions,” he remarks.

Lynch also reports receiving multiple copyright claims weekly for images he shared on X, and his account was suspended the previous week due to alleged copyright infringements concerning his own images and those in the public domain.

No one at Colossal has sought copyright enforcement, Lamm states. “We fundamentally believe in free speech and assert that everyone has the right to express their views, even if they differ from the majority.”

Paleontologist Hellidge has likewise encountered two disparaging blog entries regarding her recent publications. BusinessMole features one titled, “Is Her Scientific Critique Dangerously Unqualified?” While Hellidge holds a Ph.D. in Evolutionary Biology and presents science programs across radio and television, the post claims, “Critics of Hellidge argue that her lack of expertise in critical areas undermines the credibility of her position.”

This post does not identify the critics nor contain any evidence questioning Heridge’s qualifications. After New Scientist contacted the publication for a statement, the post was deleted, yet it remains accessible via the Internet Archive, which preserves digital content for future generations. Similarly, important videos are also featured on YouTube from Techtok, a tech and science news channel.

Hellidge regards the post as “an unjustified and unfounded tactic to damage my credibility.” “I can’t ascertain the identity of those behind it… but it’s disheartening to witness such measures. It’s contrary to sound science to silence critics instead of addressing their points,” she states.

Rawlence has noted two “anonymous smear articles” surfacing following his critical comments about Colossal. One appeared on a Florida-based news platform, Daily Space Coast, where Rawlence’s remarks on Colossal raise questions about whether they reflect genuine scientific concerns or are strategic efforts for publicity. Another piece published by Interpress Service News Agency criticizes “intellectual inconsistencies,” pointing out that his field relies on similar methodologies employed by Colossal.

Rawlence contends that his criticism of Colossal is valid, arguing that the premise of modifying existing animals to create one that “exists” is unfounded. “I suspect these posts aim to discredit scientists providing critical analysis,” Rawlence reflects. “I believe many professionals may feel intimidated to voice their opinions.”

Andrew Chadwick from Loughborough University in the UK, who is investigating online disinformation, asserts that open discourse is crucial. “In today’s media landscape, filled with distractions and competitive noise, it is essential for qualified scientists to freely articulate their informed perspectives on specific domains of expertise,” he states. “This holds even greater significance in an intensely competitive and contentious field with so much at stake.”

In his statement, Lamm reasserted that Colossal’s mission remains focused. “Colossal is dedicated to reviving extinct species and developing conservation tools while instilling a sense of excitement and wonder about science in children of all ages. Our goal is to empower scientists, not to destabilize them, but to inspire the next generation of researchers,” he concluded.

Topic:

Source: www.newscientist.com

U.S. Nuclear Weapons Agency Among 400 Organizations Targeted by Chinese Hackers, Reports Microsoft

Microsoft has revealed that investigations are underway indicating that Chinese “threat actors,” including state-sponsored hackers, are taking advantage of security flaws in SharePoint’s document sharing servers, impacting numerous government agencies and organizations.

Eye Security, a Dutch cybersecurity firm, reported that hackers have compromised around 400 institutions, businesses, and other entities, stating, “We anticipate an increase as the investigation continues.”

The majority of the affected parties are located in the United States. Bloomberg noted that one of the victims was a US agency responsible for overseeing the National Nuclear Security Agency, which manages nuclear weapons. This agency was among those affected.

According to Microsoft, three groups have been identified utilizing Chinese state-backed techniques, with a focus on exploiting newly disclosed vulnerabilities in internet-facing servers hosting the platform.

This announcement coincides with reports from the financial sector that Amazon has halted artificial intelligence labs in Shanghai. Additionally, consultancy firm McKinsey reported that Chinese companies are withdrawing from AI-related projects as geopolitical tensions between Washington and Beijing escalate.

Recently, Microsoft and IBM have scaled back their research and development initiatives in China, with US officials intensifying scrutiny on American companies involved in AI within the country.

In a blog post, Microsoft stated that the vulnerability is associated with an on-premises SharePoint server commonly utilized by businesses, not a cloud-based service.

Numerous large organizations employ SharePoint as a platform for document storage and collaboration, integrating seamlessly with other Microsoft products like Office and Outlook.

Microsoft indicated that the attacks commenced as early as July 7th, with hackers attempting to leverage the vulnerability for “early access to the target organization.”

This vulnerability permits an attacker to spoof authentication credentials and remotely execute malicious code on the server. Microsoft observed an attack that sent requests to a SharePoint server, potentially “enabling the theft of key material.”

In response, Microsoft has released a security update and recommended that all users of on-premises SharePoint systems apply it. They cautioned that hacking groups are continuing to target these systems, which they rated as having “high confidence” in terms of vulnerability.

Skip past newsletter promotions

Eye Security reported in a press release that “anomalous activity” was detected on a client’s on-premises SharePoint Server on the evening of July 18th. They subsequently scanned over 8,000 publicly accessible SharePoint servers across the globe, discovering numerous compromised systems and confirming that attackers were executing a coordinated mass exploitation campaign.

Microsoft stated that the linen typhoon has been focused on “intellectual property theft” since 2012, with primary targets including government, defense, strategic planning, and human rights-related organizations.

Since 2015, the Violet Typhoon has predominantly targeted former government and military personnel, NGOs, think tanks, academia, digital and print media, and sectors related to finance and health in the US, Europe, and East Asia.

Microsoft mentioned a third group, Storm-2603, which is situated in China, though no direct connection has been established between this group and other Chinese threat actors. They warned that “additional actors” could exploit the vulnerability to target on-premises SharePoint systems unless security updates are installed.

Source: www.theguardian.com

Report Reveals Over 25% of UK Companies Targeted by Cyberattacks Last Year | Job

Reports indicate that numerous companies across four UK sectors have fallen prey to cyberattacks, putting the situation at risk unless they take immediate measures.

A survey of facilities conducted by facility managers, service providers, and chartered surveyors under RICS and shared with the Guardian revealed that many buildings experienced cyberattacks in the last year. This figure has risen from 16% the previous year.

Nearly three-quarters of over 8,000 business leaders (73%) anticipate that cybersecurity incidents will impact their operations in the next 12-24 months. RICS has recognized cybersecurity and digital risks as significant and rapidly evolving threats for building owners and occupants.

Marks & Spencer had to pause orders on its website for nearly seven weeks following a major attack in April, causing clothing sales to fall significantly until May 25th. They lost market share to competitors such as Next, Zara, and H&M.

As cybercriminal techniques advance, incidents targeting critical infrastructure and data breaches have become increasingly frequent, as noted by RICS. This trend will likely intensify with the enhanced capabilities of artificial intelligence and rapid technological advancements.

RICS cautioned that some buildings might be relying on dangerously outdated operating systems. For instance, a building that was opened in 2013 might still be using Windows 7, which has not received security updates from Microsoft for over five years.

Paul Bagust, head of the property practice at RICS, remarked: “Buildings have transformed from mere bricks and mortar into smart, interconnected digital environments that leverage continuously evolving technology to enhance the experience of occupancy.

This technology collects data to inform decision-making. At the levels of property management, building users, occupants, and owners, these advancements provide various benefits, including enhanced efficiency and reduced environmental impact. However, they also present multiple risks and vulnerabilities that could be exploited by malicious entities.”

The report highlights operational technologies such as building management systems, CCTV networks, Internet of Things devices, and access control systems as potential risk areas. This encompasses everything from automated lighting and heating to building management systems and advanced security protocols.

Skip past newsletter promotions

Bagust further commented: “It’s challenging to envision a scenario where technology does not continue to elevate the risks within building operations. Identifying these burgeoning digital challenges and implementing adequate security measures is essential but increasingly complex.”

Source: www.theguardian.com

Harrods Becomes the Latest Retailer Targeted by Cyberattacks

A few days after Marks & Spencer and the cooperative were targeted, Harrods experienced a cyber attack.

The luxury retailer had to shut down several systems temporarily; however, all stores, including its website, Knightsbridge flagship, H Beauty, and Airport Outlet, remain operational. Retailers became aware of the cyber threats earlier this week.

In a statement, Harrods disclosed: “We have recently encountered attempts to gain unauthorized access to parts of our system. Our experienced IT security team swiftly took proactive measures to secure the system, which led to restricting internet access on our site today.”

The retailer stated that it has not requested any action from its customers, suggesting confidence that data has not been compromised. “We will provide updates as necessary.”

Reported first by Sky News, the Harrods incident unfolds as M&S grapples with challenges stemming from cyberattacks linked to widespread hacking.

M&S has had to pause orders for nearly a week, leading to a loss exceeding £650 million in stock market value. Additionally, the automated inventory system failure has resulted in empty store shelves, while the loyalty program and gift card transactions are suspended.

On Thursday, M&S announced it had halted the hiring of new employees.

The company removed all online job postings from its site while it addresses the fallout from the cyber attack that forced M&S to close its online store.

A note on M&S’s Jobs webpage states, “I’m sorry, but I can’t search or apply for a role right now. I’m working diligently to restore our services as soon as possible.”

Despite having over 200 job openings the previous week, the company, employing approximately 65,000 people across its stores and London headquarters, did not list any positions on Thursday.

A spokesperson stated: “While managing these cyber incidents, we are temporarily pausing some of our usual processes to ensure we can continue delivering the best M&S experience for our customers and employees.

The cooperative also had to disable some internal systems and warned staff to be cautious with their cameras during online meetings after detecting hacking attempts. Stores and online services are still running normally.

Retailers may face similar methods used across various businesses, as many share the same systems as M&S and the cooperatives.

Skip past newsletter promotions

It remains uncertain whether the cyberattacks affecting these three retailers are coordinated by the same group or carried out independently.

The National Cyber Security Center (NCSC) is collaborating with M&S and the cooperative to understand the nature of both incidents and is looking into potential connections. The Metropolitan Police confirmed on Wednesday that cybercrime detectives, alongside teams from the National Crime Agency, are investigating the attack on M&S.

NCSC CEO Richard Horn remarked that the cyber incident should act as a wake-up call for all organizations, urging businesses to ensure they have adequate measures in place for prevention and effective response.

He added: “The NCSC is committed to closely supporting the organizations reporting these incidents to fully comprehend the nature of these attacks and offer expert advice to the wider industry based on the threat landscape.”

In recent years, retailers and their suppliers have faced multiple cyberattacks, including an incident affecting Morrisons due to a problem at high-tech supplier Blue Yonder last Christmas.

In 2023, WH Smith experienced a data breach where sensitive company data, including personal information of current and former employees, was accessed illegally. This occurred less than a year after a cyber incident on WH Smith’s Funky Pigeon website resulted in a week-long suspension of orders.

Source: www.theguardian.com

Italian Immigration Agreement critic claims he was targeted by Israeli spyware, via Whatsapp

An Italian vocal critic has been warned by WhatsApp about targeting military-grade spyware last week, raising concerns about potential use by a strong European government. A Libyan activist in Sweden, proposed Sweden, was also warned.

WhatsApp discovered that Husam El Gomati’s mobile phone, along with the phones of 89 other activists, journalists, and civil society members, were compromised in late December.

The messaging app, owned by Meta in California, stated that El Gomati and others may have been “compromised” by spyware created by Paragon Solutions, an Israeli-based company recently acquired by a US private equity firm.

Paragon declined to comment, but sources close to the company revealed that they had around 35 government customers, described as democratic governments.

Regarding El Gomati, Facebook shared a document from Libya linking him to a network involving Tripoli, Zawia, and the Italian Intelligence leader, connected to an illegal migration route and detention center, which was promptly discovered.

Criticism has been voiced for a long time about Italy supporting Libya’s coastal guards and militias to prevent people from crossing the Mediterranean, causing chaos among some activists.

El Gomati expressed concerns about protecting Libya’s confidential sources of information, highlighting the implications of Paragon’s spyware, called Graphite, which can intercept encrypted messages on apps like Signal and WhatsApp.

He emphasized the importance of safeguarding information as activists in Libya expose corruption and class control, stating that such issues can be a matter of life and death.

El Gomati mentioned the intrusive nature of spyware, particularly its ability to eavesdrop on conversations and access personal photos, raising significant privacy concerns.

Paragon, like other military-grade spyware manufacturers, was founded by former Israeli Prime Minister Ehud Barak, primarily selling spyware to government clients for targeting purposes. They reportedly secured a contract with the US Immigration Agency under the Biden administration, subject to review due to concerns about compliance with new regulations on spyware use.

El Gomati contacted The Guardian following a story about Italian investigative journalist Francesco Cancelleri, the Editor-in-Chief of a news outlet known as Fan Page.

While it’s unclear which government may have targeted El Gomati and Cancelleri, WhatsApp notified individuals in over 20 countries, including Europe, about potential surveillance.

There are ongoing concerns regarding the release of Osama Nazim, also known as Al-Ramli, the former chief of Libya’s judicial police, accused of war crimes and other offenses. The International Criminal Court has questioned Libya’s handling of his release and return without consultation.

Source: www.theguardian.com

Opponents of Rio Tinto lithium mine targeted with anonymous death threats

circleWhen Aleksandar Matkovic initially received a life-threatening message, he believed it was a prank. The message, sent to his Telegram account just after midnight on August 14, stated, “We’re going to chase you until you disappear, you bastard,”.

“Initially, I brushed it off as a joke, but then the next morning I received another message: ‘How’s the fight against Rio Tinto going?’ It came from an unfamiliar profile, and the app indicated the sender was only 500 meters away,” recounted Matkovic, a prominent activist involved in protests against proposed lithium mines in Serbia. “Keep away,” he added.

While in Split visiting a friend, Matkovic, who resides in Belgrade, felt as though he was being followed, especially given the recent mass protests against Rio Tinto’s plan to construct a $2.4 billion lithium mine in Serbia’s Jadar Valley.

“I scanned the area and thought, ‘What is happening?’ It was unsettling, contemplating the possibility of someone tailing me, so I reached out to my lawyer. Soon thereafter, I received a third, more menacing message,” he shared.

The third message, written in German, stated: “We are aware of your ties to the leaders of the uprising. It all commenced with you. Even if you commit a heinous act and vanish, we will hunt you down. However, you won’t be able to turn to the authorities for help, because you know it’s futile. Rest assured, if you value your life and freedom, stay out of the public eye for some time. Conduct yourself impeccably on social media. Understand that you must fear for your safety and that of your sibling.”

Following this, Matkovic reported the threat to Belgrade police, who are presently investigating the matter based on the threat and related documents seen by the Guardian.

This rapidly evolving situation is intricate and carries repercussions beyond the Belgrade prosecutor’s office.

The opposition to the lithium mine in Serbia has evolved into a focal point for societal discontent, uniting ultranationalists, environmentalists, leftists, and individuals concerned about economic ties with the West and the domestic environment. Groundwater contamination is a pressing issue.

Serbian President Aleksandar Vucic recently issued a warning, accentuating the reported plotting of a “color revolution” by the opposition in the Balkans.

Serbia, a former Yugoslav republic, boasts substantial lithium reserves crucial for electric vehicle batteries. The EU has committed to banning a minimum of 10% of critical minerals, including lithium, from European mining operations by 2030.

Julia Poliscanova, director of vehicles and supply chains at the think tank Transport and Environment, emphasized the necessity of lithium for European transport electrification. She stressed the importance of sourcing lithium sustainably and responsibly to support Europe’s transition towards electric mobility.

In response to the threats against Matkovic, Rio Tinto denounced violence, affirming, “Rio Tinto vehemently condemns any direct or implicit threats of violence, whether online or in person, against individuals engaged in discussions regarding the Jadar project.”

Rio Tinto employees have faced online threats and intimidation during local protests, highlighted a company spokesperson.

To safeguard himself and his family following multiple distressing emails, Matkovic has taken precautions, including seeking refuge at various European embassies in Belgrade. Additionally, he intends to request intervention from the UN Special Rapporteur on environmental activists.

“Since August 14th, my life has been a precarious blend of normalcy and turmoil,” Matkovic reflected. “How does this fit into our strategy for combating climate change? What does the green transition we aspire to entail if it necessitates violence?”

Source: www.theguardian.com

British Military Targeted by North Korea-Backed Cyber Espionage Campaign

State-sponsored hackers from North Korea have initiated an operation to acquire sensitive information regarding nuclear materials, military drones, submarines, and shipbuilding from the United States and Britain. Intelligence agencies have raised alarm about a “global cyber espionage campaign” targeting critical sectors.

A joint notice from the US, UK, and South Korea highlighted that North Korea is utilizing state-sponsored actors to advance its military and nuclear objectives, with Japan and India also on their radar.

These hackers, part of a group known as Andariel, are focusing on military secrets and intellectual property in industries such as nuclear, defense, aerospace, and engineering. They are also attempting to obtain sensitive data from the medical and energy sectors.

Paul Chichester, operations director at the National Cyber Security Centre (NCSC), expressed concern over the extensive cyber espionage campaign orchestrated by North Korean forces in pursuit of their military and nuclear programs.

NCSC revealed that Andariel has successfully breached organizations worldwide and stolen sensitive technical and intellectual property data.

The NCSC believes Andariel is connected to North Korea’s Reconnaissance General Bureau (RGB) and poses a constant threat to critical infrastructure organizations globally.

According to intelligence agencies, Andariel funds its espionage operations through ransomware attacks on the US healthcare sector, using publicly available internet scanning tools to identify vulnerable systems.

Chichester emphasized the necessity for safeguarding sensitive information and intellectual property stored on systems to prevent theft or misuse, urging network defenders to follow the advisory guidelines to prevent malicious activities.

The advisory details how Andariel has transitioned from destructive hacks to conducting professional cyber espionage and ransomware attacks, sometimes targeting the same victims on the same day.

The US State Department has announced a reward for information on Lim Jeong-hyok, an alleged Andariel ally involved in ransomware attacks to fund operations against government agencies and defense companies.

North Korea’s cyber army has been linked to various cyber attacks, including the notorious WannaCry ransomworm in 2017. The attack aimed to obtain valuable information for North Korea and generate revenue for the state through illegal means.

Source: www.theguardian.com

Elephants Were Targeted by Early Humans 1.8 Million Years Ago

Illustration of the Deinotherium genus, an animal that became extinct after the evolution of humans

Heinrich Harder/Florilegius/Alamy

An AI-powered analysis of thousands of fossils suggests that human hunting was the main factor behind the extinction of dozens of elephant-like species over the past two million years.

The study found that the extinction rate of these animals increased five-fold when early humans evolved about 1.8 million years ago, and then increased again when modern humans emerged. Today, only three species of elephants from this group remain.

“If early humans had never appeared, the number of species would probably still be increasing.” Torsten Hauffe At the University of Fribourg in Switzerland.

Hauffe said the number of species of elephant-like animals known as proboscideans, from the Latin word for “nose,” increased millions of years before humans arrived, probably due to the evolution of stronger teeth for eating grass.

By 1.8 million years ago, when the area began to overlap with early human habitats, there were about 30 species of organisms living in Africa. Deinotherium bozaciIt had downward-pointing, backward-facing fangs growing from its lower jaw. D. Bozaci It became extinct about 1 million years ago.

By the time modern humans began to spread across the world about 130,000 years ago, only 15 species of proboscideans remained. Most of these species had gone extinct, leaving only the Asian elephant, the African bush elephant, and the African forest elephant.

To find out why, Hauffe and his colleagues developed a statistical model that uses fossil finds to estimate how rates of extinction and speciation have changed over time, and the possible reasons for these changes.

Previous models of this kind have been limited to looking at only the impact of one factor, such as climate, but by using AI, the team’s model can estimate the relative contributions of many factors, Hauffe says. “We put it all together in one analysis.”

The study concluded that overlap with humans was the most important factor contributing to extinction, followed by geographical distribution and tooth and tusk shape. For example, species restricted to islands, such as the dwarf Sicilian elephant, Palaeoloxodon falconeri, They were much more likely to become extinct.

Climate change, which some believe is the primary cause of extinction, came in fourth after these other factors, so the findings support the overhunting hypothesis, which suggests that human hunting was the primary culprit, Hauffe said.

A computer modelling study of woolly rhinos carried out earlier this year found that Low levels of hunting can drive slow-breeding animals to extinction,To tell Stephen Chan The researcher, from the University of Helsinki in Finland, was not involved in the proboscidean study but helped compile some of the fossil data that was analyzed.

but, 2021 analysis of this data Zhang and his team concluded that while an early human impact with Earth was possible, the underlying cause was climatic.

What's clear, says Zhang, is that early humans didn’t suddenly wipe out proboscideans: “In fact, some of the most fascinating extinct elephant species emerged during this period, including the giant elephants.” Palaeoloxodon These include the giant mammoths of Eurasia, which stood 4 metres at the shoulder and weighed 25 tons, and the familiar woolly mammoths.

Where early humans slaughtered mammoths Palaeoloxodon The species dates back more than a million years, says Chang, “and both lineages have survived for the past 25,000 years alongside prehistoric humans with much more advanced cognitive and technological capabilities.”

topic:

Source: www.newscientist.com

Genetic technology capable of eradicating superweeds through targeted plant destruction

Herbicide-resistant pigweed is a serious problem for farmers

Design Pics Inc / Alamy Stock Photo

Gene drives – bits of DNA that trick evolution and can spread even if they are harmful – have been successfully tested in plants for the first time. This approach can be used to clear out invasive plants and superweeds without harming other species, potentially reducing herbicide use. It could also help save species by spreading genes that make them more resistant to disease and better able to cope with global warming.

Genes work by distorting the probability that an organism will inherit a piece of DNA. Most plants and animals have two copies of each gene. This usually means that there is a 50% chance that a particular copy will be passed on to offspring. With a gene drive, the chance increases to, say, 80 percent, allowing genes to spread even if they are harmful.

There are many natural gene drives that function through different mechanisms. In 2013, the first artificial gene drive was created using CRISPR gene editing technology.

It copies itself from one chromosome to another. That is, all descendants inherit it. This approach is called a homing gene drive because the drive itself is copied to a specific site.

bruce hay The researchers at the California Institute of Technology used a different approach called cleave-and-rescue. The gene drive consists of CRISPR elements that target and destroy copies of both key genes needed for pollen and egg formation. However, the drive also contains a version of this gene that functions without being destroyed.

This means that pollen and eggs that do not inherit the gene drive will lack important genes and will not develop. Only pollen and eggs with the gene drive will develop normally, so all offspring will inherit it.

Hay says the cleave-and-rescue approach is more robust than homing drives because it's much easier to destroy genes than to copy and paste them. He says it works on all animals, not just plants, and could be used to rid islands of rats and mice that are wiping out native species.

Hay's team tested a working version of this drive – one designed only to spread, not kill – on Thale cress. Arabidopsis.Another team led by Yang Liu Chinese Academy of Sciences Even in Beijing I have submitted a paper describing a similar gene drive But that approach isn't as powerful, Hay says.

He and his team are currently planning driving tests in Pigweed (amaranth palmeri), a herbicide-resistant superweed and a major problem for farmers in many parts of the world. “This is the poster child for developing broad-based resistance to all existing herbicides,” Hay says.

Additionally, this technology could be adapted to control weeds without spreading indefinitely. For example, pollen could be used to create male plants that kill all female offspring. Planting these male plants annually around the farm will prevent seed production and eradicate the weed species from the field after a few years.

“If you just exclude women, you end up collapsing the entire local population, but not the global population,” Hay says. However, this female-killing trait will disappear if no male plants with it are planted.

Hay said this approach is much more likely to be approved by regulators than gene drives, which continue to spread until resistance emerges. In fact, a similar approach is already being used in several countries by a company called Oxitec to control malaria-carrying mosquitoes.

but, paul nave Researchers at the University of Copenhagen in Denmark doubt whether regulators will approve the use of gene drives to control weeds. “I think the chances of getting approval to release gene drives for agricultural use are low at this point. Healthcare and biodiversity conservation may be an easier sell,” he says.

Another big problem, Neve says, is that plants typically produce only one generation per year, and it takes 10 to 30 generations for drives to become widespread. “How can we spread gene drives fast enough to achieve meaningful weed control in a realistic time frame?”

topic:

Source: www.newscientist.com

HyperVerse cryptocurrency targeted developing countries before collapsing, leading to investor ‘suicides’

The HyperVerse cryptocurrency scheme targeted investors in developing countries in Asia, Africa, and the Pacific until it eventually collapsed, leaving many people unable to access their funds.

One investor said that in Nepal, some people who took out bank loans to buy Hyperverse packages felt suicidal when they could not withdraw their money, and in some cases even committed self-harm. .

The promoter of UK-based HyperVerse, which toured five African countries in 2022, told a Ghanaian radio station that millions of people around the world are trying to understand blockchain technology “without really understanding it.” He said he has benefited from it.

HyperVerse, which was linked to a previous scheme known as HyperFund, was founded by Australian blockchain entrepreneur Sam Lee and his business partner Ryan Hsu, two of the founders of bankrupt Australian company Blockchain Global. ) was launched by.

Despite one overseas regulator warning that they could be a “scam” and another calling HyperVerse a “suspected pyramid scheme”, a Guardian Australia investigation found , revealed widespread losses from a scheme that escaped regulator warnings in Australia.

This push to expand the system, which encourages existing member states to reap financial rewards for bringing in new members, has resulted in the system spreading to hitherto untapped markets, including developing countries. It seems so.

In January 2022, the Central Bank of Nepal issued a public warning naming Hyperfund and several other unrelated schemes, encouraging people to participate in such cryptocurrency products with the promise of “high returns in a short period of time.” He said he was tempted to do so.

In a February 2023 Zoom meeting between Nepali Hyper members and Lee, the members said people were angry because they could not withdraw funds from the platform.

One member told Mr Lee that he was “sad and grumpy” and was fielding requests from people who didn’t have access to the funds he brought into the scheme.

“We really need to do something fast, you may be somewhere far away and you may not be under direct pressure, but people like us, we don’t live in the neighborhood. And our relationship has deteriorated, and whenever we do something, it’s people like us. We wake up in the morning and there’s people at the door.”

Q&A

How did the HyperVerse investment scheme work?

show

Investors were offered “membership” to HyperVerse, a “blockchain community” where members could “explore the HyperVerse ecosystem.”

The minimum membership amount is USD 300, which will be converted into Hyperunits after investment.

This scheme offers a minimum return of 0.5% per day, with a return of 300% in 600 days.

Members were encouraged to “reinvest” their earnings and were provided with more Hyper Units if they did not withdraw after funds became available.

Members were also paid hyper units for recruiting new members, and were paid a referral fee on a sliding scale based on the number of people recruited. Additional commissions were paid based on the number of people these recruits subsequently recruited up to the 20th level.

Hyperunits are linked to various crypto tokens and, once matured, can be withdrawn and converted into other cryptocurrencies.

While early investors were able to make profits and withdraw money, this system has left many investors unable to access their funds.

Thank you for your feedback.


A Nepalese man living in the UK told Lee that some people in his home country try to commit suicide by taking out bank loans to buy the Hyperverse package, and one of his acquaintances has committed self-harm. That's what he said.

“There have also been instances where people have lent money to buy this company's packages because they were presented in such a favorable way. We know it's wrong, we urge them to do so. But…the benefits outweighed the risks, so people took out some loans from banks and packaged this project. I bought it,” said a Nepali man.

“I don’t want to name names, but there was a case of self-harm in my hometown. [in Nepal]. We have received several SOS calls. With people in this situation, it is better to take a suicidal step than to wait for this company to come up with a repayment plan. ”

In response, Mr Lee said on a Zoom call that he hoped vulnerable people would be prioritized in recovering their initial investment, but denied he was responsible.

“I don't want to say anything about these individual incidents because I'm not in a position to empathize with them. But, you know, we just have to recognize…others Many industries have been misunderstood, and this is just the newest industry to be misunderstood,” Lee said.

“And the way to prevent something like this from happening again is that we need to increase everyone's literacy about technology and how these opportunities work.”

Sam Lee, one of the founders of the failed blockchain global cryptocurrency exchange. Photo: Blockchain Global/Facebook

Lee blamed the situation on the “corporate” team behind HyperVerse.

Despite speaking at HyperVerse's official launch, he denied any involvement in HyperVerse, saying he was only involved in the fund management side through his role at HyperTech Group, of which he is chairman.

Another person who attended the February 2023 meeting challenged Mr. Lee on this claim.

“Community leaders have always projected you as a Midas-esque figure – HyperTech, HyperVerse, HyperFund, whatever, it’s Sam Lee, it’s Sam Lee, it’s Sam Lee, that’s what we do every day. Everything you’ve been told every day,” they said. Said.

In response, Lee said, “If you don't get involved, you can't completely disappear from HyperVerse.”

“The company put out misleading information, which of course management used to drive sales, so ultimately the company loses out. But I am 100% “It's not free, because if things were misunderstood, they could have always issued a press release or a statement to clarify,” he said.

www.theguardian.com

UK News: Government Urges Targeted Vaccination for Individuals Most Vulnerable to Gonorrhea and Monkeypox

British scientists are urging the government to implement routine vaccines for those most susceptible to monkeypox and gonorrhea, marking the world’s first immunization program against the latter. The Joint Committee on Vaccination and Immunization (JCVI) has recommended to Rishi Sunak that both programs be offered opportunistically to those who need it most.

Professor Andrew Pollard, Chair of the JCVI, expressed, “The UK’s gonorrhea prevention program is a world-first and is expected to significantly reduce gonorrhea levels, which are currently at record highs. In addition, we recommend implementing routine monkeypox vaccinations to prevent a recurrence of the outbreaks seen in early 2022. Both vaccines should be offered to those at highest risk.”

The JCVI also advises that recommended vaccination programs against gonorrhea should primarily target gay and bisexual men and other men who have sex with men, who are at higher risk of contracting the disease. This comes in light of a 50.3% increase in gonorrhea diagnoses in 2022 compared to 2021, totaling 82,592 cases, according to Health and Safety Executive sexually transmitted infection (STI) statistics. Additionally, the number of gonorrhea cases in the UK last year was reported to be up by more than a fifth from pre-pandemic levels.

Greg Fell, chairman of the Association of Public Health Officers, told Sky News: “The recent rise in sexually transmitted infections such as gonorrhea is extremely worrying and today’s advice from the JCVI is undoubtedly a prudent course of action. However, this increase in numbers is also a result of more people visiting clinics and other diagnostic services for testing, which has led to higher demand for sexual health services.”

“As we said in June, we are concerned that the current level of funding for sexual health services provided by public health grants in England will not be able to meet this increase in demand. The new vaccination program will therefore be planned with this in mind and backed by appropriate funding and resources to ensure that existing services remain intact and people can be vaccinated in a timely and dignified manner as needed.”

Source: news.sky.com