Author: ProHoster

The backdoor and the Buhtrap encoder were distributed using Yandex.Direct

To target a cyberattack on accountants, you can use work papers that they search for on the web. This is how a cybergroup has been operating in the past few months, distributing the well-known Buhtrap and RTM backdoors, as well as encryption and software for stealing cryptocurrencies. Most targets are located in Russia. The attack was implemented by placing malicious ads in Yandex.Direct. Potential victims went to a website where […]

[Translation] Envoy threading model

Translation of the article: Envoy threading model - https://blog.envoyproxy.io/envoy-threading-model-a8d44b922310 This article seemed quite interesting to me, and since Envoy is most often used as part of "istio" or simply as "ingress controller" kubernetes, so most people don't have the same direct interaction with it as they would with typical Nginx or Haproxy installations. However, if something breaks, it would be good […]

Release of the TeX distribution TeX Live 2019

The release of the TeX Live 2019 distribution kit, created in 1996 based on the teTeX project, has been prepared. TeX Live is the easiest way to deploy a scientific documentation infrastructure, regardless of the operating system you are using. For downloading, a DVD assembly (2,8 GB) of TeX Live 2019 has been generated, which contains a working Live environment, a complete set of installation files for various operating systems, a copy of the CTAN repository […]

Video: Mi.Mu wireless music gloves make music out of thin air

Imogen Heap, an award-winning, including two Grammy Award-winning, master of recording and electronic music show production, begins her performance. She joins her hands in a certain gesture, which apparently starts the program, then brings an invisible microphone to her lips, setting the repetition intervals with her free hand, after which, with equally invisible sticks, she beats the rhythm on illusory drums. […]

New Article: ASUS ROG Zephyrus S (GX701GX) Review: GeForce RTX 2080 Gaming Laptop on a Diet

In 2017, a review of the ASUS ROG ZEPHYRUS (GX501) laptop was published on our website - it was one of the first models equipped with NVIDIA graphics in the Max-Q design. The laptop received a GeForce GTX 1080 graphics processor and a 4-core Core i7-7700HQ chip, but was thinner than two centimeters. Then I called the appearance of such mobile computers a long-awaited evolution, because [...]

The US Federal Communications Commission has approved SpaceX's plans to launch Internet satellites

Network sources report that the Federal Communications Commission has approved SpaceX's request to launch a large number of Internet satellites into space, which should operate in a lower orbit than previously planned. Without receiving official approval, SpaceX could not begin sending the first satellites into outer space. Now the company will be able to begin launches next month, [...]

A short gameplay demo of Borderlands 3 has appeared on the Internet

Gearbox Software will hold a live broadcast tomorrow, where they will show the gameplay of Borderlands 3 for the first time. Previously, the authors tested the Echocast function, which will allow viewers to look at the characters’ equipment. The developers recorded a short video and quickly deleted it, but curious users managed to download the video and post it online. A 25-second demo has already been analyzed on the ResetEra forum. Borderlands 3 features an expanded […]

Attackers use sophisticated malware to attack Russian businesses

Since the end of last year, we began tracking a new malicious campaign to distribute a banking Trojan. The attackers focused on compromising Russian companies, i.e. corporate users. The malicious campaign was active for at least a year and, in addition to the banking Trojan, the attackers resorted to using various other software tools. These include a special bootloader packaged using NSIS and spyware […]

Uploading a PostgreSQL log from the AWS cloud

Or a little applied tetrisology. Everything new is well forgotten old. Epigraphs. Problem Statement It is necessary to periodically download the current PostgreSQL log file from the AWS cloud to a local Linux host. Not in real time, but, let's say, with a slight delay. The log file update download period is 5 minutes. The log file in AWS is rotated every hour. Tools Used To upload the log file to the host […]

Cyber ​​group RTM specializes in stealing funds from Russian companies

There are several known cyber groups that specialize in stealing funds from Russian companies. We have seen attacks using security loopholes that allow access to the target's network. Once they gain access, attackers study the organization's network structure and deploy their own tools to steal funds. A classic example of this trend is the hacker groups Buhtrap, Cobalt and Corkow. The RTM group to which this […]

Operating Systems: Three Easy Pieces. Part 5: Planning: Multi-Level Feedback Queue (translation)

Introduction to operating systems Hi, Habr! I would like to bring to your attention a series of articles-translations of one interesting literature in my opinion - OSTEP. This material discusses quite deeply the work of unix-like operating systems, namely, work with processes, various schedulers, memory, and other similar components that make up a modern OS. You can see the original of all materials here. […]

Do teams survive after a hackathon?

The benefits of participating in a hackathon are one of those topics that will always be discussed. Each side has its own arguments. Collaboration, hype, team spirit - some say. "And what?" - others answer gloomily and economically. Participation in hackathons, in its cyclical structure, is very similar to one-time acquaintances on Tinder: people get to know each other, find common interests, do business, […]