Normal view

There are new articles available, click to refresh the page.
Today — 26 June 2024Main stream

At the Edge of Empire by Edward Wong review – changing state

26 June 2024 at 06:00

A journalist merges family history with his own experience in Beijing to provide a fascinating insight into Chinese life and politics

It’s hard to think of a country that has changed as fundamentally as China without altering its basic political system. When I first visited Beijing, three weeks before the Tiananmen massacre in 1989, the main avenues of the city were rivers of bicycles. The very few cars you saw were official ones, with senior party figures sitting stiffly in the back. In the street, you’d be surrounded by staring, smiling people who had never seen a European before. When I jotted things in my notebook, they would crane their necks to see the strange, barbaric signs I was making. If you asked the students in Tiananmen Square what they wanted, they invariably said “democracy”; yet scarcely any of them had the slightest idea what that meant.

Deng Xiaoping, who ultimately gave the order to open fire on the demonstrators, was responsible for the extraordinary enrichment of ordinary Chinese people, eventually lifting hundreds of millions out of poverty. It’s conventional to say that modern China is based on a compromise: we’ll make you rich, if you don’t ask for political change. But that makes it sound as though it’s an open choice. In fact, the Chinese Communist party decided after 1989 that even the slightest letup in its fierce control over society might lead to a new Tiananmen, or to the kind of collapse which happened to the Soviet Union. There’s very little ideology in today’s Chinese system, as anyone who has had to plough through the basic documents of “Xi Jinping Thought” can attest. It’s all about keeping control.

Continue reading...

💾

© Photograph: Mark Avery/AP

💾

© Photograph: Mark Avery/AP

It doesn’t make sense: why US tariffs on Chinese cleantech risk the green transition | Jeffrey Frankel

26 June 2024 at 00:00

Global demand for renewable energy is surging so why make solar panels, wind turbines and EVs dearer for western consumers?

With historic heatwaves sweeping across the US and other parts of the northern hemisphere, June is expected to be the 13th consecutive month of record-breaking global temperatures. The primary cause, of course, is the enormous amount of greenhouse gases in the atmosphere. Despite the existential threat posed by rising atmospheric concentrations of greenhouse gases, emissions continue to increase at a faster pace than previously anticipated.

On one front, however, progress in the fight against the climate crisis has exceeded expectations. Amid the global shift from internal combustion engines to electric vehicles and the accelerated adoption of solar and wind power, demand for renewable energy is rapidly rising in the US and the EU.

Continue reading...

💾

© Photograph: Bloomberg/Getty Images

💾

© Photograph: Bloomberg/Getty Images

Yesterday — 25 June 2024Main stream

OpenAI To Pull Plug on 'Unsupported' Nations Like China From July 9

By: msmash
25 June 2024 at 16:52
ChatGPT developer OpenAI has sent out emails to users based in countries it considers "unsupported," saying it will block their access for good starting July 9. From a report: The email, reproduced on the OpenAI community forum here, includes a brief statement. "Our data shows that your organization has API traffic from a region that OpenAI does not currently support," it reads. "We will be taking additional measures to block API traffic from regions that are not on our supported countries and territories list starting on July 9." "To continue using OpenAI's services, you will need to access the service in a supported region," it concludes. Much of the world has access to OpenAI including virtually the entire West, most of Eastern Europe, South Asia, and about half of Africa. However, there are some notable absences on the list such as Russia, Iran, Saudi Arabia, and mainland China.

Read more of this story at Slashdot.

China Becomes First Country To Retrieve Rocks From the Moon's Far Side

By: msmash
25 June 2024 at 14:10
China brought a capsule full of lunar soil [non-paywalled link] from the far side of the moon down to Earth on Tuesday, achieving the latest success in an ambitious schedule to explore the moon and other parts of the solar system. From a report: The sample, retrieved by the China National Space Administration's Chang'e-6 lander after a 53-day mission, highlights China's growing capabilities in space and notches another win in a series of lunar missions that started in 2007 and have so far been executed almost without flaw. "Chang'e-6 is the first mission in human history to return samples from the far side of the moon," Long Xiao, a planetary geologist at China University of Geosciences, wrote in an email. "This is a major event for scientists worldwide," he added, and "a cause for celebration for all humanity." Such sentiments and the prospects of international lunar sample exchanges highlighted the hope that China's robotic missions to the moon and Mars will serve to advance scientific understanding of the solar system. Those possibilities are contrasted by views in Washington and elsewhere that Tuesday's achievement is the latest milestone in a 21st-century space race with geopolitical overtones. In February, a privately operated American spacecraft landed on the moon. NASA is also pursuing the Artemis campaign to return Americans to the lunar surface, although its next mission, a flight by astronauts around the moon, has been delayed because of technical issues. China, too, is looking to expand its presence on the moon, landing more robots there, and eventually human astronauts, in the years to come.

Read more of this story at Slashdot.

Rocks from the far side of the Moon landed in Mongolia on Tuesday

25 June 2024 at 08:59
This photo taken on June 25, 2024, shows the retrieval site of the return capsule of the Chang'e-6 probe in Siziwang Banner, north China's Inner Mongolia Autonomous Region.

Enlarge / This photo taken on June 25, 2024, shows the retrieval site of the return capsule of the Chang'e-6 probe in Siziwang Banner, north China's Inner Mongolia Autonomous Region. (credit: Xinhua/Lian Zhen)

A small spacecraft landed in Inner Mongolia on Tuesday, bringing samples from the far side of the Moon back to Earth.

This was not China's first robotic mission to return a few pounds of dust and pebbles from the lunar surface—that came with the Chang'e 5 mission in December 2020. However, this was the first time any space program in the world returned material from the Moon's far side.

The successful conclusion of this mission, which launched from Earth nearly two months ago, marked another significant achievement for China's space program as the country sets its sights on landing humans on the Moon by the year 2030.

Read 7 remaining paragraphs | Comments

US Probing China Telecom, China Mobile Over Internet, Cloud Risks

By: msmash
25 June 2024 at 10:46
The Biden administration is investigating China Mobile, China Telecom and China Unicom over concerns the firms could exploit access to American data through their U.S. cloud and internet businesses by providing it to Beijing, Reuters reported Tuesday, citing sources familiar with the matter. From the report: The companies still have a small presence in the United States, for example, providing cloud services and routing wholesale U.S. internet traffic. That gives them access to Americans' data even after telecom regulators barred them from providing telephone and retail internet services in the United States. Reuters found no evidence the companies intentionally provided sensitive U.S. data to the Chinese government or committed any other type of wrongdoing. The investigation is the latest effort by Washington to prevent Beijing from exploiting Chinese firms' access to U.S. data to harm companies, Americans or national security, as part of a deepening tech war between the geopolitical rivals. It shows the administration is trying to shut down all remaining avenues for Chinese companies already targeted by Washington to obtain U.S. data.

Read more of this story at Slashdot.

Chinese Rocket Seen Falling On a Village Spewing Highly Toxic Chemicals

By: BeauHD
25 June 2024 at 06:00
Passant Rabie reports via Gizmodo: A video circulating online appears to show debris from a Chinese rocket falling above a populated area, with residents running for cover as a heavy cloud of dark yellow smoke trails across the sky in a frightening scene. The suspected debris may have come from China's Long March 2C rocket, which launched on Saturday, June 22, carrying a joint mission by China and France to study Gamma-ray bursts. The launch was declared a success, but its aftermath was captured by videos posted to Chinese social media sites. The videos show what appears to be the first stage rocket booster of the Long March 2C rocket tumbling uncontrollably over a village in southwest China, while local residents cover their ears and run for shelter from the falling debris. There are no reports of injuries or damage to property. That said, unverified video and images show a gigantic cloud erupting at the site of the crashed rocket, and the booster itself seemingly next to a roadway. The first stage of the rocket can be seen leaking fuel, the color of which is consistent with nitrogen tetroxide. The chemical compound is a strong oxidizing agent that is used for rocket propulsion but it can be fatally toxic, according to Jonathan McDowell, astrophysicist at the Harvard-Smithsonian Center. "It's known in the rocket industry as BFRC, a big fucking red cloud," McDowell told Gizmodo. "And when you see a BFRC, you run for your life." Nitrogen tetroxide was accepted as the rocket propellant oxidizer of choice in the early 1950s by the U.S.S.R. and the United States, however it became less commonly used over the years because it is extremely toxic, according to NASA (PDF). If it comes in contact with skin, eyes, or respiratory system, it can destroy human tissue, and if inhaled through the lungs, it can lead to a build up of fluids or, in extreme cases, death. "It's pretty scary, but this is just how the Chinese do business," McDowell told Gizmodo. "They have a different level of acceptable public risk." "I think over a 10 year period, we may see the older rockets phased out but they're not in any hurry to do so," added McDowell. "They're still launching one a week or something like that, and they are really quite dangerous."

Read more of this story at Slashdot.

China Becomes First Country to Retrieve Rocks From Moon’s Far Side With Chang’e-6

25 June 2024 at 07:01
The Chang’e-6 mission’s sample, which might hold clues about the origins of the moon and Earth, is the latest achievement of China’s lunar exploration program.

© Agence France-Presse — Getty Images

Officials prepared to recover the landing module of the Chang’e-6 moon probe after it landed in Inner Mongolia, in northern China, on Tuesday.
Before yesterdayMain stream

Chinese Hackers Have Stepped Up Attacks on Taiwanese Organizations, Cybersecurity Firm Says

24 June 2024 at 14:09

A suspected Chinese state-sponsored hacking group has stepped up its targeting of Taiwanese organizations, particularly those in sectors such as government, education, technology and diplomacy.

The post Chinese Hackers Have Stepped Up Attacks on Taiwanese Organizations, Cybersecurity Firm Says appeared first on SecurityWeek.

Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud

24 June 2024 at 11:10

Last week I was reviewing a publication by the United Nation Office on Drugs and Crime published in January 2024, titled "Casinos, Money Laundering, Underground Banking, and Transnational Organized Crime in East and Southeast Asia: A Hidden and Accelerating Threat."

(URL to the UNODC report: UNODC: Casinos, Money Laundering, Underground Banking ... full report)

(URL to the USIP report: https://www.usip.org/node/160386 )


The reason I was looking into the report is that this 106 page report is about how Chinese organized crime has planted themselves in Casino complexes across Cambodia, Indonesia, Lao PDR, the Philippine, Thailand, and Viet Nam. The same modus operandi that we associate with the crypto investment scams that use the horrible name "pig butchering" to describe the financial grooming that leads to the complete financial devastation of so many Americans. In fact, I discovered the UN report, only by seeing it quoted in he report by the United States Institute of Peace, "Transnational Crime in Southeast Asia: A Growing Threat to Global Peace and Security" where it was mentioned in a footnote.

Examining Chinese Ministry of Public Security reports

The UNODC report shares statistics from a Ministry of Public Security of China note, without providing a URL, that "between January to November 2023, authorities in the country successfully resolved 391,000 cases related to telecommunications and network fraud, totaling the arrest of 79,000 suspects, including 263 'backbone members or paymasters' of cyberfraud groups" (in the countries mentioned above.) This included:

  • interception of 2.75 BILLION fraud calls
  • interception of 2.28 BILLION fraud messages
  • the removal of 8.36 million fraud-related domain names
  • and 328.8 billion yuan (US $46 billion) in funds related to fraud cases.

Since I am working on a project that we call "Twenty Targets for Takedown" that is attempting to shut own illicit websites by terminating their domain registrations and hosting arrangements, the number "8.36 million fraud-related domains" made me shudder.
I am fortunate to count among my network some of the leading experts in domain-name related fraud and abuse, the number seemed overwhelmingly high, and I asked my colleagues from CAUCE, the Coalition Against Unsolicited Commercial Email, for assistance in looking into it. One quick opinion was that this could include a definition of domain name that would be more akin to a hostname, similar to what we have on Blogspot. "garwarner.blogspot.com" is a hostname on the domain "blogspot.com" ... but some would call it a "fully qualified domain name" and consider it a separate FQDN than other xyz.blogspot.com or abc.blogspot.com "domains."

John Levine helped me solve the "did they really mean millions, or is this possibly a bad translation" by helping me find the Ministry of Public Security site where the article was coming from and share several updated versions of these statistics.



18 Million Websites! 

The latest article we can find, dated 31MAY2024, quotes Li Guozhong ( 李国中 ) the Spokesman for China's Ministry of Pubic Security describing their successes over the past five years.  In 2021, they established a National Anti-Fraud Center which sent out 660 million notices and were able to help stop fraud against 18.44 million people. This most recent article, which is focused on fraud and doesn't mention gambling at all, says that they have "handled 18 million domain names and websites."  That's a machine translation of ( 处置涉案域名网址1800万个 ).  I can confirm the 18 million ... written as 1800 ten thousands - 1800万个.  Handled is perhaps better rendered "disposed of" 处置  (Chǔzhì).  Still unsure how to interpret 域名 ( Yùmíng - Domain name) 网址 (Wǎngzhǐ - website), but I think for now, I'm going to assume it means "URLs" or "FQDNs" as opposed to only registered domains 

The Anti-Fraud Center has intercepted 6.99 billion fraud calls and 6.84 billion text messages and intercepted 1.1 trillion yuan of funds. At current exchange rates, that would be around $151 Billion US Dollars!   

Just since July 2023, 49,000 cyber fraud suspects have been transferred to China from northern Myanmar. 82,000 criminal suspect have been arrested, including 426 key "financial backers" behind the fraud groups.  


Several maps help to demonstrate what's going on in Southeast Asia: 
(Source: Figure 1 from the afore-mentioned USIP report) 

Source: afore-mentioned UNODC report -- note the Myanmar/China border, which is where most of the Chinese rescues and raids have been conducted.


How Much Fraud? $64 Billion to $157 Billion per year!


The US Institute of Peace report estimates that there are as many as 500,000 scammers deployed in the region, earning potentially $64 Billion per year in fraud. The methodology they used for this calculation came from the UNODC report above. On p. 55 of that report, the UN said that they estimated each scammer was earning between $300 and 400 per day, and that they believed there were 80,000 to 100,000 scammers working six days per week in one unnamed Mekong country.  Using that estimate, they gave a "range" of $7.5 Billion to $12.5 billion in scam revenue for that country.  These numbers were calculated consistently with a Chinese MPS report about an initiative they called "Operation Chain Break" which estimated that scam compounds, including gambling and cyber scams, were generating $157 Billion per year. 

China's Ministry of Public Security is actively conducting military style raids to help recover these fraud suspects from northern Myanmar, where China shares a long border with the country, which remains deeply embroiled in a state of civil war. MPS is also working collectively with other Southeast Asian countries and says it has "destroyed 37 overseas fraud dens." 

China Launches Month of National Anti-Fraud Action

Today (24JUN2024) China launched a new month-long "National Anti-Fraud Action" with a nation-wide campaign that declares "Beware of new fraud methods and don't be a tool for telecom fraud."  The campaign uses what China calls a "Five-In" approach, meaning that Chinese citizens will see and spread anti-fraud messages in Communities, Rural Areas, Families, Schools, and Businesses.  Students will be provided materials to share with their families, Employees will be encouraged to share anti-fraud messages and materials with their families and communities, and Chinese Communist Party offices in rural areas and civic organizations will make sure the message is spread in those areas as well. The materials being prepared will be written separately to address the awareness needs of merchants, accounting personnel, minors, and the elderly, describing each fraud typology and helping to describe methods to safeguard from these typologies. A major objective will also be to help understand how to avoid becoming a "tool" or an "accomplice" of these fraud rings, who prey on the financially vulnerable to help them launder the proceeds of their crime.  The Ministry of Public Security will jointly publish the "Overseas Telecom Network Fraud Prevention Handbook with the Ministry of Foreign Affairs and the Ministry of Education to help improve prevention awareness especially for overseas students and diaspora Chinese communities. Major news media and new media platforms will continuously feature anti-fraud reports to strengthen and educate the public on fraud prevention and "continue to set off a new wave of anti-fraud among the whole people the whole society." 

Gee, doesn't that sound like REACT's Erin West and Operation Shamrock -- but with the full cooperation of the Government and Society? 


The announcement of the month of National Anti-Fraud Action concludes with some more recent statistics about the work of the National Anti-Fraud Center.  Just since 2023, today's report says that they have: 
  • pushed out 420 million warning and dissuasion instructions
  • met with 14.77 million people face-to-face to give warnings 
  • made 310 million phone calls to warn vitims 
  • sent 230 million dissuasion text messages
  • intercepted 3.7 billion fraud calls 
  • intercepted 2.96 billion fraud-related text messages
  • blocked 11.619 million fraud-related domain names -- BLOCKED - this may mean "prevented access via Chinese Internet -- which may mean the sites are still available to victimize foreigners
  • intercepted 452.9 billion yuan of funds ($62 Billion USD) 
What does this mean to those of us in the United States?  If China is doing an all-hands "Five-In" awareness campaign and deploying police for face-to-face dissuasion, the fraudsters may very realistically need to INCREASE their targeting of overseas victims to make up for the projected revenue hit this new effort may create. 

To quote Director Easterly at CISA: SHIELDS UP! 

The post Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud appeared first on Security Boulevard.

Two poems, four years in detention: the Chinese dissident who smuggled his writing out of prison – podcast

My poems were written in anger after Tiananmen Square. But what motivates most prison writing is a fear of forgetting. Today I am free, but the regime has never stopped its war on words. By Liao Yiwu

Continue reading...

💾

© Photograph: Yoan Valat/EPA-EFE

💾

© Photograph: Yoan Valat/EPA-EFE

Launch of Chinese-French Satellite Scattered Debris Over Populated Area

23 June 2024 at 00:34
"A Chinese launch of the joint Sino-French SVOM mission to study Gamma-ray bursts early Saturday saw toxic rocket debris fall over a populated area..." writes Space News: SVOM is a collaboration between the China National Space Administration (CNSA) and France's Centre national d'études spatiales (CNES). The mission will look for high-energy electromagnetic radiation from these events in the X-ray and gamma-ray ranges using two French and two Chinese-developed science payloads... Studying gamma-ray bursts, thought to be caused by the death of massive stars or collisions between stars, could provide answers to key questions in astrophysics. This includes the death of stars and the creation of black holes. However the launch of SVOM also created an explosion of its own closer to home.A video posted on Chinese social media site Sina Weibo appears to show a rocket booster falling on a populated area with people running for cover. The booster fell to Earth near Guiding County, Qiandongnan Prefecture in Guizhou province, according to another post... A number of comments on the video noted the danger posed by the hypergolic propellant from the Long March rocket... The Long March 2C uses a toxic, hypergolic mix of nitrogen tetroxide and unsymmetrical dimethylhydrazine (UDMH). Reddish-brown gas or smoke from the booster could be indicative of nitrogen tetroxide, while a yellowish gas could be caused by hydrazine fuel mixing with air. Contact with either remaining fuel or oxidizer from the rocket stage could be very harmful to individuals. "Falling rocket debris is a common issue with China's launches from its three inland launch sites..." the article points out. "Authorities are understood to issue warnings and evacuation notices for areas calculated to be at risk from launch debris, reducing the risk of injuries.

Read more of this story at Slashdot.

Well Beyond the U.S., Heat and Climate Extremes Are Hitting Billions

21 June 2024 at 10:06
People all over the world are facing severe heat, floods and fire, aggravated by the use of fossil fuels. The year isn’t halfway done.

© Fadel Senna/Agence France-Presse — Getty Images

Rescuers carried a heat-stricken patient during the hajj pilgrimage in Saudi Arabia on Sunday.

TikTok Lays Out Past Efforts to Address U.S. Concerns Over Potential Ban

20 June 2024 at 16:43
The company said the disclosures support its argument that a law signed by President Biden in May is unconstitutional.

© Haiyun Jiang for The New York Times

TikTok creators gathered for a news conference with members of Congress in March. TikTok has said that a ban of the app would violate the First Amendment.

Everything we have is going to go to Ukraine until their needs are met.

20 June 2024 at 14:02
A round-up of links inside on the Russia-Ukraine war. Today is day 848 of the invasion.

Russia: Russia wages a scorched-earth war in Ukraine with retrofitted bombs and new airstrips (AP) Fire at drone-hit Russian oil depot rages for second day (Reuters) Putin accuses NATO of creating a security threat for Russia in Asia (Reuters) China: Outgoing NATO chief says China should face consequences for backing Russia's war on Ukraine (CBC) Ukraine peace summit is a 'success', China key to ending war: ambassador to Singapore (South China Morning Post) China lobbying for its alternative peace plan ahead of Ukraine's summit, Reuters reports (Kyiv Independent) EU: EU passes 14th sanctions package in first major move against Russian gas (Kyiv Independent) Romania to send Patriot defense system to Ukraine (Kyiv Independent) EU envoys agree on more Russia sanctions. LNG imports are among the targets. (AP) Japan: Signing of the Accord on Support for Ukraine and Cooperation between the Government of Japan and Ukraine (Ministry of Foreign Affairs of Japan) Japan to finance US$188 million technology transfer to Ukrainian business (MSN) North & South Korea: Russia and North Korea sign mutual defence pact: Vladimir Putin and Kim Jong-un's agreement raises western alarm about possible Russian help for nuclear programme (Guardian) What's known, and not known, about the partnership agreement signed by Russia and North Korea (AP) Putin says South Korea would be making 'a big mistake' if it supplies arms to Ukraine (Reuters) Ukraine: Russian troops fail to advance as Ukraine garners military, financial aid (Al Jazeera) Ukraine, Russia targeting each other's energy infrastructure (NHK World Japan) Ukraine launches a national sexual assault registry for victims of Russian forces (CTV) USA: US to focus on deepening ties with Vietnam after Putin's Hanoi visit (Reuters) Exclusive: Biden to ban US sales of Kaspersky software over Russia ties, source says (Reuters) White House confirms Ukraine to get priority on air defense missile deliveries (Kyiv Independent; post title is a Biden quote from this article) Aid: Fidelity Charitable list of organizations; UNICEF; Support Sellers in Ukraine

New Threat Group Void Arachne Targets Chinese-Speaking Audience; Promotes AI Deepfake and Misuse

By: Alan J
19 June 2024 at 16:35

Void Arachne Targets Chinese-Speaking Deepfake Deepfakes

A new threat actor group called Void Arachne is conducting a malware campaign targeting Chinese-speaking users. The group is distributing malicious MSI installer files bundled with legitimate software like AI tools, Chinese language packs, and virtual private network (VPN) clients. During installation, these files also covertly install the Winos 4.0 backdoor, which can fully compromise systems.

Void Arachne Tactics

Researchers from Trend Micro discovered that the Void Arachne group employs multiple techniques to distribute malicious installers, including search engine optimization (SEO) poisoning and posting links on Chinese-language Telegram channels.
  • SEO Poisoning: The group set up websites posing as legitimate software download sites. Through SEO poisoning, they pushed these sites to rank highly on search engines for common Chinese software keywords. The sites host MSI installer files containing Winos malware bundled with software like Chrome, language packs, and VPNs. Victims unintentionally infect themselves with Winos, while believing that they are only installing intended software.
  • Targeting VPNs: Void Arachne frequently targets Chinese VPN software in their installers and Telegram posts. Exploiting interest in VPNs is an effective infection tactic, as VPN usage is high among Chinese internet users due to government censorship. [caption id="attachment_77950" align="alignnone" width="917"]Void Arachne Chinese VPN Source: trendmicro.com[/caption]
  • Telegram Channels: In addition to SEO poisoning, Void Arachne shared malicious installers in Telegram channels focused on Chinese language and VPN topics. Channels with tens of thousands of users pinned posts with infected language packs and AI software installers, increasing exposure.
  • Deepfake Pornography: A concerning discovery was the group promoting nudifier apps generating nonconsensual deepfake pornography. They advertised the ability to undress photos of classmates and colleagues, encouraging harassment and sextortion. Infected nudifier installers were pinned prominently in their Telegram channels.
  • Face/Voice Swapping Apps: Void Arachne also advertised voice changing and face swapping apps enabling deception campaigns like virtual kidnappings. Attackers can use these apps to impersonate victims and pressure their families for ransom. As with nudifiers, infected voice/face swapper installers were shared widely on Telegram.

Winos 4.0 C&C Framework

The threat actors behind the campaign ultimately aim to install the Winos backdoor on compromised systems. Winos is a sophisticated Windows backdoor written in C++ that can fully take over infected machines. The initial infection begins with a stager module that decrypts malware configurations and downloads the main Winos payload. Campaign operations involve encrypted C&C communications that use generated session keys and a rolling XOR algorithm. The stager module then stores the full Winos module in the Windows registry and executes shellcode to launch it on affected systems. [caption id="attachment_77949" align="alignnone" width="699"]Void Arachne Winos Source: trendmicro.com[/caption] Winos grants remote access, keylogging, webcam control, microphone recording, and distributed denial of service (DDoS) capabilities. It also performs system reconnaissance like registry checks, file searches, and process injection. The malware connects to a command and control server to receive further modules/plugins that expand functionality. Several of these external plugins were observed providing functions such as collecting saved passwords from programs like Chrome and QQ, deleting antivirus software and attaching themselves to startup folders.

Concerning Trend of AI Misuse and Deepfakes

Void Arachne demonstrates technical sophistication and knowledge of effective infection tactics through their usage of SEO poisoning, Telegram channels, AI deepfakes, and voice/face swapping apps. One particularly concerning trend observed in the Void Arachne campaign is the mass proliferation of nudifier applications that use AI to create nonconsensual deepfake pornography. These images and videos are often used in sextortion schemes for further abuse, victim harassment, and financial gain. An English translation of a message advertising the usage of the nudifier AI uses the word "classmate," suggesting that one target market is minors:
Just have appropriate entertainment and satisfy your own lustful desires. Do not send it to the other party or harass the other party. Once you call the police, you will be in constant trouble! AI takes off clothes, you give me photos and I will make pictures for you. Do you want to see the female classmate you yearn for, the female colleague you have a crush on, the relatives and friends you eat and live with at home? Do you want to see them naked? Now you can realize your dream, you can see them naked and lustful for a pack of cigarette money.
[caption id="attachment_77953" align="alignnone" width="437"] Source: trendmicro.com[/caption] Additionally, the threat actors have advertised AI technologies that could be used for virtual kidnapping, a novel deception campaign that leverages AI voice-alternating technology to pressure victims into paying ransom. The promotion of this technology for deepfake nudes and virtual kidnapping is the latest example of the danger of AI misuse.  

Chinese Hackers Compromised Large Organization’s F5 BIG-IP Systems for 3 Years

By: Alan J
18 June 2024 at 14:35

Velvet Ant Campaign Chinese Hackers

Researchers that were called to investigate a cyberattack on a large organization in late 2023 have traced the activity to a sophisticated Chinese-linked threat actor group dubbed 'Velvet Ant,' based on tactics and infrastructure. The investigation found that Velvet Ant infiltrated the company’s network at least three years prior to the incident using the remote access trojan PlugX, which granted the threat actors access to sensitive systems across the enterprise environment.

Velvet Ant Campaign Used Evasive Tactics

Researchers from Sygnia disclosed that the attack began with the compromise of the organization's internet-facing F5 BIG-IP appliances, which were running on vulnerable OS versions. These appliances usually occupy a trusted position within network architecture, allowing potential attackers significant control over network traffic while evading most forms of detection. These appliances were used within the organization to manage its firewall, WAF (web application firewall), load balancing, and local traffic . [caption id="attachment_77649" align="alignnone" width="1802"]Velvet Ant China F5 Source: sygnia.co[/caption] The attackers used known remote code execution flaws to install custom malware on the compromised F5 appliances. To obscure the execution chain, the attackers manipulated file-creation times and used three different files (‘iviewers.exe’, ‘iviewers.dll’ and ‘iviewers.dll.ui’) for deployment of the PlugX malware on affected systems. Once installed, PlugX harvested credentials and executed reconnaissance commands to map the internal network. The hackers then used the open-source tool Impacket for lateral movement across the network. [caption id="attachment_77647" align="alignnone" width="1872"]Velvet Ant Chinese Hackers Source: sygnia.co[/caption] During the initial compromise, the threat actor compromised both modern workstations and legacy Windows Server 2003 systems. On modern endpoints, the hackers routinely tampered with the installed antivirus prior to deploying additional tools. This careful targeting of security controls demonstrates Velvet Ant’s operational maturity. However, the focus on legacy platforms ultimately assisted the hackers in evading detection. The researchers identified the placement of 4 additional malware programs on compromised F5 appliances:
  • VELVETSTING - This program was configured to connect to a remote server located in China to check for encoded commands on an hourly basis. Once commands were received, the program would execute them via a Unix shell.
  • VELVETTAP - Malware seems to have been monitoring and capturing data from the F5 internal network interface.
  • SAMRID - This software has been identified as a publicly available tunneling program that had previously been utilized by Chinese state-sponsored groups. While dormant during the researcher's investigation, it may have provided the attackers remote access.
  • ESRDE - This backdoor works similarly to VELVETSTING, running commands delivered from an external server. It was also inactive at the time of analysis.
The VELVET programs were set up to restart upon reboot of compromised F5 appliances. These additional malware payloads were likely intended to provide attackers with multiple backdoors even after the discovery and removal of the initial malware. Each infection had been carefully established to resist removal various and facilitate additional infiltration.

Organizations Systems Were Reinfected Upon Malware Removal

After an extensive incident response operation apparently eliminated the threat actor’s access, researchers detected a PlugX reinfection on clean hosts again a few days later. Further analysis found that the new version of PlugX lacked an external command and control server. Instead, the malware was configured to use an internal file server for command and control. This adaptation blended malicious traffic with normal internal communications, helping Velvet Ant operate undetected. While the attack was eventually contained, its sophistication and persistence highlight the challenges defenders face against advanced persistent threats (APTs). The researchers stated that they could not rule out the possibility of the campaign being a ‘false-flag’ operation by a different APT group. However, the PlugX malware has previously been associated with other China-linked APTs. The researchers have shared several recommendations as well as indicators of compromise (IOCs) on their blog. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

A Tale of Two Nearly Extinct Giant Salamanders

17 June 2024 at 08:48
While trying to save large amphibians native to Japan, herpetologists in the country unexpectedly found a way to potentially save an even bigger species in China.

© Chang W. Lee/The New York Times

Parliamentarians helped foreign interference in Canadian elections

15 June 2024 at 15:20
On March 8, 2024, the Canadian National Security and Intelligence Committee of Parliamentarians (NSICOP) provided Prime Minister Justin Trudeau with the Special Report on Foreign Interference in Canada's Democratic Processes and Institutions (redacted pdf). On June 3, NSICOP tabled the report in Parliament. The document alleges that while "parliamentarians were unaware they were the target of foreign interference", others have been "wittingly assisting foreign state actors," though maybe not anybody currently in Parliament.

NSICOP is a cross-party group of MPs and Senators with the highest level of security clearance, chaired by Liberal MP David J. McGuinty and with members: 3 Senators (the Honourables Patricia Duncan, Marty Klyne, and Frances Lankin) and Bloc Québécois MP Stéphane Bergeron, NDP MP Don Davies, Liberal MP Patricia Lattanzio, Conservative MPs Rob Morrison and Alex Ruff, and two Liberal MPs who ceased membership on Sept 17, 2023, Iqra Khalid and James Maloney. Some background: In 2021 and 2022, the Conservative Party blamed Chinese influence campaigns for the defeat in the 2021 federal election of as many as 9 Conservative candidates, with another 4 also targeted who weren't in competitive ridings. Media reported on a vast, orchestrated disinformation campaign by the People's Republic of China which included funding some federal candidates. At the time, CSIS said they "saw attempts at foreign interference, but not enough to have met the threshold of impacting electoral integrity". In March 2023, the Prime Minister asked the National Security and Intelligence Review Agency (NSIRA) to conduct a review. NSIRA submitted its Review of the dissemination of intelligence on People's Republic of China political foreign interference, 2018-2023 to the Prime Minister a year later on March 5, 2024 and released a declassified version April 26 (pdf). Also in March 2023, Trudeau appointed an independent special rapporteur, former governor general David Johnston, to investigate. In June 2023, opposition MPs teamed up to pass an NDP motion to remove Johnston because he recommended against holding a public inquiry. In September 2023, the Government of Canada announced a public inquiry centering on "China, Russia and other foreign states or nonstate actors" interfering in the 43rd and 44th general elections. Public hearings began in January 2024. In April 2024, media reported that the People's Republic of China allegedly clandestinely paid "threat actors" in late 2018 or early 2019, who targeted 7 Liberal Party candidates and 4 Conservative Party candidates, with some apparently willing to co-operate in foreign interference and others apparently unaware of it. Additionally, international students may have been coerced by the PRC to vote for Independent (formerly Liberal) MP Han Dong, possibly without Dong's knowledge. P. 31 of the NSICOP redacted report talks about "a CSIS assessment on the degree to which an individual was implicated in these activities" but is silent on Dong's knowledge of them. India allegedly interfered in one race for the leadership of the Conservative Party of Canada, and the People's Republic of China allegedly interfered in two. Details were redacted from the NSICOP report. Former Conservative leader Erin O'Toole believes interference played a role in his 2022 ouster as party leader. Trudeau told the inquiry that allegations that China would prefer a Liberal minority government is "very improbable," as Canada-China relations have soured due to the Huawei and Two Michaels incidents. Canada doesn't have a foreign influence registry, a tool used by the US to remove PRC "police stations" like the ones in Toronto and Vancouver. Trudeau wants to ensure such a registry not target diaspora groups. Bill C-70, dubbed the "Countering Foreign Interference Act," was introduced in early May, though universties say it could chill research partnerships. Back to the NSICOP report: The declassified, redacted version of the NSICOP Special Report mentions:
  • "members of Parliament who worked to influence their colleagues on India's behalf and proactively provided confidential information to Indian officials." (p.24)
  • a PRC "network had some contact with at least 11 candidates and 13 campaign staffers, some of whom appeared to be wittingly working for the PRC" (p. 26)
  • "Member of Parliament wittingly provided information *** to a foreign state . . . a particularly concerning case of a then-member of Parliament maintaining a relationship with a foreign intelligence officer" (p.26)
  • "an example of the PRC using intermediaries to provide funds likely to support candidates in the 2019 federal election, including two transfers of funds approximating $250,000 through a prominent community leader, a political staffer and then an Ontario member of Provincial Parliament. CSIS could not confirm that the funds reached any candidate." (pp.28-29).
Redacted are specific names. The classified version has now been read by the Prime Minister, Green Party Leader Elizabeth May, and NDP Leader Jagmeet Singh, who all have top security clearances. Conservative Leader Pierre Poilievre is refusing to go through the security clearance process to view the unredacted report, apparently so he won't be bound by the Security of Information Act. Bloc Québécois MP Jean-Denis Garon Mirabel said in debate that, "Agreeing to this security briefing means getting the information and the names. However, those who obtain the names are not allowed to disclose them, not allowed to talk about it and not allowed to act on this information. We are effectively being shut down." May said she was "vastly relieved" not to see disloyalty from current MPs, while Singh called those involved "traitors to the country," though he wouldn't confirm if he was referring to serving MPs, and slammed Trudeau for being "slow to act" and Conservative Party Leader Pierre Poilievre for ignoring claims of foreign interference within his party. Singh said the report named him as a target of interference, and that no NDP MPs are participants. Conservatives are calling for the names to be released but Public Safety Minister Dominic LeBlanc says that, in some cases, allegations are based on "uncorroborated or unverified" intelligence information. NSICOP chair McGuinty says the committee has revealed as much as they can without breaching the Security of Information Act, and it's the RCMP's responsibility to investigate the allegations. The Foreign Interference Commission public hearings will resume this autumn.

Thanks.

14 June 2024 at 13:56
Reuters: Pentagon ran secret anti-vax campaign to undermine China during pandemic 'The U.S. military launched a clandestine program [that started under former President Donald Trump and continued months into Joe Biden's presidency] amid the COVID crisis to discredit China's Sinovac inoculation – payback for Beijing's efforts to blame Washington for the pandemic. One target: the Filipino public. Health experts say the gambit was indefensible and put innocent lives at risk.' (ungated)

CUHK Data Breach: Hacked Server Impacts Over 20,000 Students and Staff at Hong Kong University

CUHK Data Breach

The Chinese University of Hong Kong (CUHK) has been confronted by a massive data breach that has compromised personal information of precisely 20,870 students, staff and past graduates. The CUHK data breach was initially identified on June 3, 2024, prompting swift action by the institution. An investigation is currently underway to trace the culprits and to take corrective measures.

Understanding the CUHK Data Breach

The CUHK is one of the premier institutes in China which was established in 1963 and is the first research university in Hong Kong. The cyberattack on CUHK reportedly took place on June 1 at its School of Continuing and Professional Studies (CUSCS). In a statement put out by the school on June 13, CUSCS said that it had undertaken an investigation into the breach on June 3. An information technology security consultant was appointed by the college to assess the breach. The investigation revealed that the school’s “Moodle learning management system” was hacked. Moodle is an open-source learning management system designed. It allows educators, administrators and learners to create personalized learning environments for online projects in schools, colleges and workplaces. Moodle can be used to create custom websites with online courses and allows for community-sourced plugins. [caption id="attachment_77266" align="alignnone" width="1196"]CUHK Data Breach Source: CUSCS Website[/caption] According to the CUSCS, the leaked data included the names, email addresses, and student numbers of 20,870 Moodle accounts of tutors, students, graduates, and visitors. This personal data was reportedly stolen after a server at one of the institution’s schools was hacked. Despite the university management stating that the sensitive data was not leaked on any public platforms, the breached information was found to be readily available on the dark web domain BreachForums. A Threat Actor (TA), who goes by the alias “Valerie”, put up a post on dark web stating that the hacker was willing to sell the data. The TA noted that, “75 per cent of the stolen data was sold to a private party, which financed the breach.  The rest of the data was not shared. So upon multiple offers, we decided to make a public sell.” CUHK Data Breach To claim that the data was credible, the TA provided samples, which included the username, first name, last name, institution, department, mobile number and city of the victims of the data breach. CUHK Data Breach

Investigation Status of CUHK Data Breach

The CUSCS stated that as soon as its investigation revealed a massive data breach, it had deactivated the relevant account and reset the password. It added that, apart from the relevant server, the online learning platform has been moved, and security measures have been strengthened to block any account after three unsuccessful login attempts. CUHK has also been notified of the incident. The college has also established a crisis management team composed of the dean, deputy dean, information technology services director, administrative director and communications and public relations director to assess the risks,” CUSCS said. The college also had filed a complaint over the data breach to the local police. The university, too, has notified the city’s privacy watchdog-Office of the Privacy Commissioner for Personal Data (PCPD), in accordance with established procedures. The PCPD acknowledged receipt of the complaint on June 13.

CUHK Data Breach: Institutions in Hong Kong Under Scanner

In what is becoming a trend, CUHK has become the third educational institute in Hong Kong this year to fall victim to cyberattacks. In May, the Hong Kong Institute of Contemporary Culture, Lee Shau Kee School of Creativity, fell victim to a ransomware attack where the data of over 600 people was leaked. Similarly, in April, a private medical facility, Union Hospital, suffered a ransomware attack affecting its servers, which allegedly resulted in operational paralysis. The Hong Kong College of Technology too suffered a ransomware attack in February, which led to the data of around 8,100 students being breached.

Microsoft in damage-control mode, says it will prioritize security over AI

13 June 2024 at 16:38
Brad Smith, vice chairman and president of Microsoft, is sworn in before testifying about Microsoft's cybersecurity work during a House Committee on Homeland Security hearing on Capitol Hill in Washington, DC, on June 13, 2024.

Enlarge / Brad Smith, vice chairman and president of Microsoft, is sworn in before testifying about Microsoft's cybersecurity work during a House Committee on Homeland Security hearing on Capitol Hill in Washington, DC, on June 13, 2024. (credit: SAUL LOEB / Contributor | AFP)

Microsoft is pivoting its company culture to make security a top priority, President Brad Smith testified to Congress on Thursday, promising that security will be "more important even than the company’s work on artificial intelligence."

Satya Nadella, Microsoft's CEO, "has taken on the responsibility personally to serve as the senior executive with overall accountability for Microsoft’s security," Smith told Congress.

His testimony comes after Microsoft admitted that it could have taken steps to prevent two aggressive nation-state cyberattacks from China and Russia.

Read 30 remaining paragraphs | Comments

Lawmakers Question Brad Smith About Microsoft’s China Business

13 June 2024 at 16:03
Brad Smith testified before a House committee a year after Chinese hackers infiltrated Microsoft’s technology and penetrated government networks.

© Eric Lee/The New York Times

Microsoft’s president, Brad Smith, told the House Committee on Homeland Security that his company’s presence in China served American interests.

Lawmakers Question Brad Smith About Microsoft’s China Business

13 June 2024 at 16:03
Brad Smith testified before a House committee a year after Chinese hackers infiltrated Microsoft’s technology and penetrated government networks.

© Eric Lee/The New York Times

Microsoft’s president, Brad Smith, told the House Committee on Homeland Security that his company’s presence in China served American interests.

What to Know About Europe’s Extra Tariffs on Chinese Electric Cars

12 June 2024 at 14:09
The tariffs had been expected for months, but many European automakers warned that they would drive up prices for consumers and set off a trade war with China.

© Agence France-Presse — Getty Images

Electric cars made by BYD waiting to be loaded at a port in eastern China. Competition in Europe for E.V.s made in China has led to lower prices.

E.U. Hits Electric Vehicles From China With Higher Tariffs

12 June 2024 at 14:01
Leaders in Brussels, Washington and beyond are trying to curb China’s automobile ambitions amid rising trade tensions and fears of a glut of Chinese cars flooding global markets.

© Felix Schmitt for The New York Times

A Chinese-made BYD electric vehicle in Frankfurt.

22 Chinese Nationals Sentenced to Long Prison Terms in Zambia for Multinational Cybercrimes

10 June 2024 at 06:38

A Zambian court has sentenced 22 Chinese nationals to long prison terms for cybercrimes that included internet fraud and online scams targeting Zambians and other people.

The post 22 Chinese Nationals Sentenced to Long Prison Terms in Zambia for Multinational Cybercrimes appeared first on SecurityWeek.

Hacker Claims Cyberattack on China’s Massive Power Grid SGCC, Selling Stolen Data

SGCC Cyberattack

A threat actor known as Desec0x has claimed to possess a database allegedly stolen from the State Grid Corporation of China (SGCC), offering it for sale on the nuovo BreachForums. In the post, Desec0x claimed a cyberattack on SGCC and stated to have gained access through a third-party network, allowing them to exfiltrate sensitive data. The threat actor claimed that multiple databases containing user account information, user details, department information, and roles were accessed. The employee information allegedly includes headers such as eID, username, phone number, email, employee number, username, and password. The database is allegedly available in SQL and XLSX formats for US$1,000. Cyberattack on SGCC

Potential Implications of Cyberattack on SGCC

Established on December 29, 2002, SGCC is the largest utility company in the world and consistently ranks second on the Fortune Global 500 list. SGCC operates as a group with RMB 536.3 billion in registered capital and employs 1.72 million people. It provides power to over 1.1 billion people across 26 provinces, autonomous regions, and municipalities, covering 88% of China's national territory. Additionally, SGCC owns and operates overseas assets in countries such as the Philippines, Brazil, Portugal, Australia, and Italy. If the claims of the cyberattack on SGCC made by Desec0x are proven to be true, the implications could be far-reaching. The sensitive nature of the data allegedly stolen, including personal and departmental information of SGCC employees, could have serious consequences for the company and its stakeholders. However, upon accessing the official SGCC website, no signs of foul play were detected, and the website appeared to be functioning normally.

Global Context of Cyberattacks in the Energy Sector

The energy sector has been increasingly targeted by cyberattacks, often involving third-party data breaches. According to Security Intelligence, 90% of the world’s top energy companies suffered from third-party data breaches in 2023. Additionally, nearly 60% of cyberattacks in the energy sector are attributed to state-affiliated actors. In late 2023, 22 energy firms were targeted in a large-scale coordinated attack on Danish infrastructure. In April 2024, a group called Cyber Army Russia claimed responsibility for a cyberattack on Consol Energy, a prominent American energy company headquartered in Cecil Township, Pennsylvania. This cyberattack reportedly disrupted the company's website accessibility, causing issues for users outside the United States. In March 2024, a dark web actor was reportedly selling access to an Indonesian energy company, believed to be the same threat actor who targeted an American manufacturer. In 2023, a suspected cyberattack on Petro-Canada was officially confirmed. Suncor Energy, the holding company of Petro-Canada, acknowledged that an IT outage over the weekend was indeed a cyberattack. The company stated that it took immediate action upon discovering the attack, collaborating with third-party experts to investigate and address the situation. This incident caused significant disruptions to Petro-Canada's operations, affecting gas stations and preventing customers from accessing the Petro-Canada app and website. In the case of the State Grid Corporation of China, the claims made by Desec0x remain unverified until an official statement is released by SGCC. Without confirmation from the company, the alleged cyberattack on SGCC and data breach cannot be substantiated. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

China’s plan to dominate EV sales around the world

5 June 2024 at 10:41
China’s plan to dominate EV sales around the world

Enlarge (credit: FT montage/Getty Images)

The resurrection of a car plant in Brazil’s poor northeast stands as a symbol of China’s global advance—and the West’s retreat.

BYD, the Shenzhen-based conglomerate, has taken over an old Ford factory in Camaçari, which was abandoned by the American automaker nearly a century after Henry Ford first set up operations in Brazil.

When Luiz Inácio Lula da Silva, Brazil’s president, visited China last year, he met BYD’s billionaire founder and chair, Wang Chuanfu. After that meeting, BYD picked the country for its first carmaking hub outside of Asia.

Read 52 remaining paragraphs | Comments

OpenAI Says Russia and China Used Its A.I. in Covert Campaigns

By: Cade Metz
30 May 2024 at 13:24
Iran and an Israeli company also exploited the tools in online influence efforts, but none gained much traction, an OpenAI report said.

© Jason Henry for The New York Times

The OpenAI offices in San Francisco.

Are These Drones Too Chinese to Pass U.S. Muster in an Anti-China Moment?

24 May 2024 at 16:15
U.S.-based Anzu Robotics is selling drones using technology from DJI, a Chinese firm that is the target of efforts by lawmakers to limit Chinese technology in America.

© Niki Chan Wylie for The New York Times

Randall Warnas, chief executive of Anzu Robotics, with a Raptor drone outside a warehouse in Lindon, Utah, earlier this month.

The Taiwanese civilians training for a Chinese invasion – video

Kuo Chiu, known as KC to his friends, teaches urban design at Tunghai University in Taiwan. He’s also one of many of the country's citizens who practises rifle skills in his spare time, in case of a Chinese invasion.

The population of Taiwan has long grown familiar with Beijing’s pledge to one day ‘unify’ what it claims is a breakaway province. But recently, there has been a significant increase in aggressive and intimidatory acts.

Taiwan’s 160,000 active military personnel are vastly outnumbered by China’s 2 million-member armed forces, leading many civilians to turn to voluntary medical and combat training to protect themselves.

The Guardian's video team spent time with KC to see how he is preparing

Continue reading...

💾

© Photograph: The Guardian

💾

© Photograph: The Guardian

New Star Wars Plan: Pentagon Rushes to Counter Threats in Orbit

17 May 2024 at 18:31
Citing rapid advances by China and Russia, the United States is building an extensive capacity to fight battles in space.

© Craig Bailey/Florida Today, via Associated Press

A rocket carrying the Pentagon’s secretive X-37B crewless space plane launching last year from the Kennedy Space Center in Cape Canaveral, Fla.

Taiwan, on China’s Doorstep, Is Dealing With TikTok Its Own Way

The island democracy was early to ban TikTok on government phones, and the ruling party refuses to use it. But a U.S.-style ban is not under consideration.

© An Rong Xu for The New York Times

For years, Taiwan has been one of the world’s top targets of online disinformation, much of it originating in China.

Biden Bans Chinese Bitcoin Mine Near U.S. Nuclear Missile Base

An investigation identified national security risks posed by a crypto facility in Wyoming. It is near an Air Force base and a data center doing work for the Pentagon.

© Stephen Speranza for The New York Times

The bitcoin mine in Cheyenne, Wyo., has been ordered to cease operations immediately.

TikTok Sues US Government Over Potential Ban

The social media company and its Chinese parent, ByteDance, sued to challenge the new law, saying it violated users’ First Amendment rights.

© Rozette Rago for The New York Times

TikTok’s office in Culver City, Calif. The company has said a new U.S. law requiring its sale is essentially a ban.

A New Diplomatic Strategy Emerges as Artificial Intelligence Grows

6 May 2024 at 20:32
The new U.S. approach to cyberthreats comes as early optimism about a “global internet” connecting the world has been shattered.

© Jeff Chiu/Associated Press

Secretary of State Antony J. Blinken at the RSA Conference in San Francisco on Monday. He has described an increasingly zero-sum competition, in which countries will be forced to choose between signing up for a Western-dominated “stack” of technologies or a Chinese-dominated one.

Apple Reports Decline in Sales and Profit Amid iPhone Struggles in China

2 May 2024 at 18:18
The company continues to lean on customers’ appetite for apps and services, as demand for its devices weakens.

© Qilai Shen for The New York Times

Apple’s sales were down 8 percent in China over the three months that ended in March.

Campus Protests Give Russia, China and Iran Fuel to Exploit U.S. Divide

America’s adversaries have mounted online campaigns to amplify the social and political conflicts over Gaza flaring at universities, researchers say.

© Amir Hamja/The New York Times

A protester with a Palestinian flag on a Columbia University building on Monday. So far, there is little evidence that U.S. adversaries have provided material or organizational support to the protests.

Republicans Step Up Attacks on Scientist at Heart of Covid Lab Leak Theory

1 May 2024 at 18:54
A heated hearing produced no new evidence that Peter Daszak or his nonprofit, EcoHealth Alliance, were implicated in the Covid outbreak.

© Ting Shen for The New York Times

Peter Daszak, president of EcoHealth Alliance, testifying during a hearing on Capitol Hill on Wednesday.

Key Solar Panel Ingredient Is Made in the U.S.A. Again

By: Ivan Penn
25 April 2024 at 13:57
REC Silicon says it will soon start shipping polysilicon, which has come mostly from China, reviving a Washington State factory that shut down in 2019.

© Ruth Fremson/The New York Times

REC Silicon is preparing to fulfill its first shipment of polysilicon granules, which are used in the production of solar panels, at its factory in Moses Lake, Wash.
❌
❌