ReHacked Newsletter logo

ReHacked Newsletter

Subscribe
Archives
March 3, 2025

ReHacked vol. 310: North Koreans laundering of more than $1 billion stolen from Bybit, GeoCities in 1995: Building a Home Page on the Internet and more

Support ReHacked newsletter with one time donation. Thank you very much!

North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News #blockchain #crime

Last week, the FBI attributed the attack on Bybit to a well-known North Korean group known as TraderTraitor or Lazarus, and urged the cryptocurrency community to help contain the $1.4 billion in cryptocurrency stolen from the exchange.

“TraderTraitor actors are proceeding rapidly and have converted some of the stolen assets to Bitcoin and other virtual assets dispersed across thousands of addresses on multiple blockchains,” the FBI alert said. “It is expected these assets will be further laundered and eventually converted to fiat currency.”


Make a donation - support Ukraine. Щира подяка. Разом до перемоги!


Get your discount at Hostinger and Support ReHacked


Don’t forget to share if you like what you read here, subscribe (if not yet) and leave a comment. Any form of your feedback is very important to me. Thanks!

Subscribe now

RSS feed available if you don’t want to clutter your inbox.


I'm excited to offer you an opportunity to support my work as the sole contributor to ReHacked. Your contribution will play a crucial role in covering server expenses. Rest assured, my commitment to keeping the primary content accessible to everyone remains unwavering.

As the sole contributor, your support is truly invaluable. Feel free to become a paid subscriber, and remember, you have the flexibility to cancel or switch to the "Free" option at any time.

Thank you for being an essential part of our community. Together, let's continue fostering a culture of knowledge-sharing and making a positive difference in the digital landscape.


Europe bets on RISC-V for homegrown supercomputing platform • The Register #technology #hardware

A 38-strong group of tech players have founded a project with the snappy name Digital Autonomy with RISC-V in Europe, aka DARE, that aims to develop processor units to power the continent’s supercomputers and other high-performance machines.

If you're having deja vu, you're not alone: Europe has been talking about and toying with using RISC-V for supercomputing for some years, even getting far as some silicon, though turned to Arm's architecture for its first exascale system. The continent hasn't given up on RISC-V, though, certainly not with America in the state it's in.

The DARE project is supported by the EuroHPC Joint Undertaking and coordinated by the Barcelona Supercomputing Center (BSC-CNS).


Kill your Feeds - Stop letting algorithms dictate how you think - usher.dev #information #internet

So what can we do?

  1. Go directly to the source - if you like a particular TikTok creator, Facebook page or YouTube channel, skip the feed and go directly to their pages. Consider bookmarking their profiles individually.
  2. Learn to find information and entertainment without a feed - try to find a creator making videos or writing about a topic of interest without having to stumble across them in a feed.
  3. Use platforms and platform features that let you control your experience - Instagram’s ‘Following’ feed, YouTube’s Subscriptions page, Bluesky, Mastodon and RSS feeds
  4. Be mindful of engagement traps - recognise how algorithmic feeds are designed to keep you engaged and scrolling. Take a breath and stop the cycle.
  5. Talk about it - if you’re reading this you a already know this is a problem. Your friends and family may not be aware of how their feeds are manipulating their attention and beliefs. Without intervention, the radicalisation of opinions, and the consequences we’re already seeing, will only escalate.


Undocumented "backdoor" found in Bluetooth chip used by a billion devices #privacy #security

The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented "backdoor" that could be leveraged for attacks.

The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.

This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their findings yesterday at RootedCON in Madrid.


GeoCities in 1995: Building a Home Page on the Internet | Cybercultural #internet #history

GeoCities had been started in late 1994 by David Bohnett and John Rezner. Initially it was a web hosting service named Beverly Hills Internet (www.bhi90210.com), because that’s where Bohnett lived and worked. After getting some local businesses up and running with their first webpage, he began to think of what he could offer beyond web hosting.


First Porn, Now Skin Cream? ‘Age Verification’ Bills Are Out of Control | Electronic Frontier Foundation #privacy

Age verification laws do far more than ‘protect children online’—they require the creation of a system that collects vast amounts of personal information from everyone. Instead of making the internet safer for children, these laws force all users—regardless of age—to verify their identity just to access basic content or products. This isn't a mistake; it's a deliberate strategy.


Buy European Made GoEuropean #software

We're excited to announce that "Buy European Made" is now "GoEuropean"! Our mission to support European-made products remains unchanged, as we continue to be a community-led directory of European products and services.
Discover European alternatives for all your needs.

Calendar.txt Keep your calendar in a plain text file. #lifehack #productivity

Calendar.txt is versionable, supports all operating systems and easily syncs with Android mobile phone.


Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2 #security

The recent campaign targeting the Albion Online gaming community underscores the evolving tactics of cyber adversaries. By impersonating reputable organizations like the Electronic Frontier Foundation (EFF), attackers disseminated phishing messages that directed users to malicious infrastructures hosting both decoy documents and malware.

This strategy not only exploits the trust users place in well-known entities but also leverages the immersive nature of gaming environments to increase the likelihood of successful compromises.​


NASA Shuts Off Voyager Science Instrument, More Power Cuts Ahead to Keep Both Probes Going #engineering #space

The Voyager spacecraft have been cruising through interstellar space for more than 47 years, collecting precious data on the vast cosmos. All that traveling has taken a toll on the farthest human-made objects, and the spacecraft’s days are numbered. NASA engineers are resorting to shutting off science instruments on both Voyager probes to keep the two iconic missions alive.


DHS says CISA will not stop monitoring Russian cyber threats #security

"CISA's mission is to defend against all cyber threats to U.S. Critical Infrastructure, including from Russia," the US cyber agency posted to X.

"There has been no change in our posture. Any reporting to the contrary is fake and undermines our national security."

This comes after The Guardian reported on Saturday that the Trump administration no longer sees Russia as a cyber threat against US critical infrastructure and its interests.


NASA Successfully Acquires GPS Signals on Moon  - NASA #space #technology

NASA and the Italian Space Agency made history on March 3 when the Lunar GNSS Receiver Experiment (LuGRE) became the first technology demonstration to acquire and track Earth-based navigation signals on the Moon’s surface.

The LuGRE payload’s success in lunar orbit and on the surface indicates that signals from the GNSS (Global Navigation Satellite System) can be received and tracked at the Moon. These results mean NASA’s Artemis missions, or other exploration missions, could benefit from these signals to accurately and autonomously determine their position, velocity, and time. This represents a steppingstone to advanced navigation systems and services for the Moon and Mars.


Brother accused of locking down third-party printer ink cartridges via forced firmware updates, removing older firmware versions from support portals | Tom's Hardware #hardware #copyrights

Fabled RepairTuber and right to repair crusader Louis Rossmann has shared a new video encapsulating his surprise, and disappointment, that Brother has morphed into an “anti-consumer printer company.” More information about Brother’s embrace of the dark side are shared on Rossmann’s wiki, with the major two issues being new firmware disabling third party toner, and preventing (on color devices) color registration functionality.


How are clouds’ shapes made? A scientist explains the different cloud types and how they help forecast weather #nature

All clouds form as a result of saturation – that’s when the air contains so much water vapor that it begins producing liquid or ice. Once you understand how certain clouds develop their shapes, you can learn to forecast the weather.


The Golden Age of Japanese Pencils, 1952-1967 #history #design #longread

Although HOMO was the first Japanese pencil with a modern core, Tombow wasn't the first pencil manufacturer in Japan. That was Jinroku Masaki's pencil factory, which delivered three grades of writing pencils to the Japanese Ministry of Communication in 1901. Masaki had been introduced to the pencil at the Paris Expo of 1878, and he was one of a few Japanese industrialists to learn about the new technology in depth.

Masaki established a small pencil manufacturing firm in 1887, and just four years later, he had improved his products enough to land a government contract. To commemmorate the three grades of his "ministry pencil," Masaki had the idea to register a three-diamond trademark, along with the "Mitsubishi" name, which means 'three diamonds.' (It may surprise you to learn that this was ten years before the much better-known Mitsubishi Group of heavy industry companies registered its name and identical mark. Mitsubishi Pencil has no connection to the numerous other Mitsubishi companies in Japan; it is and has always been a manufacturer of writing and drawing supplies.)


If you would like to propose any interesting article for the next ReHacked issue, just hit reply or push this sexy “Leave a comment” (if not subscribed yet) button below. It’s a nice way to start a discussion.

Leave a comment

Thanks for reading this digest and remember: we can make it better together, just leave your opinion or suggestions after pressing this button above or simply hit the reply in your e-mail and don’t forget - sharing is caring ;) Have a great week!

Dainius

Don't miss what's next. Subscribe to ReHacked Newsletter:
Start the conversation:
Powered by Buttondown, the easiest way to start and grow your newsletter.