
Articles from www.theregister.com
Updated: 7 min 16 sec ago
Fri, 24/04/2026 - 15:46
A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and their UK counterparts – neither of which disclosed the agency's name. FederalCivilianExecutiveBranch(FCEB)agencies include NASA; Homeland Security itself (cyberworkers at CISA are part of an operational unit in Homeland Security); the FBI; the DoJ; the IRS; the Department of Veteran Affairs; the Department of Health and Human Services (HHS); and more. Described as a backdoor with remote access capabilities, Firestarter was named after Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD), the two products the malware targeted. The CISA advisory states that only one FCEB agency was attacked with the malware, although it is suspected of being part of a wider campaign targeting government and critical national infrastructure networks in particular. Further, the lone incident CISA investigated so far involved a Cisco Firepower device running ASA software, although Secure Firewall devices are also thought to be susceptible to attack. Despite the perceived focus on government and critical national infrastructure, all organizations in the US and UK are advised to take preventative measures. CISA said Firestarter was especially sophisticated in that it maintained persistent access to compromised networking devices even after they were updated, allowing attackers to re-enter victims' networks without needing to exploit any new vulnerabilities. The malware was detected following routine continuous network monitoring. All organizations are advised to use YARA rules while carrying out memory analysis from device core dumps or disk images. Both CISA and its British counterparts at the National Cyber Security Centre (NCSC) want any organization that gets hit to collate all the evidence and submit it to them for intelligence-gathering purposes. The findings this week are an update to CISA's earlier advisory, warning of other attacks on Cisco products, ones that exploited CVE-2025-20333 (9.9) and CVE-2025-20362 (6.5). Likewise, Cisco is attributing the latest attacks to the same group it suspects was behind others from last year. Switchzilla tracks the group with the UAT-4356 identifier, but has consistently refused to attribute it to a nation-state, including any of the US's four primary geopolitical adversaries (China, Russia, Iran, North Korea), although it has said the group appears to be government-backed. The news of the federal agency's compromise comes just hours after intelligence agencies collectively issued a second warning this month about Chia's offensive cyber operations. Ten countries, including those in the Five Eyes alliance, were involved in the second warning of its kind in recent weeks, once again claiming that China was building covert networks, such as recruiting consumer-grade SOHO routers, to launch cyberattacks on adversaries. ®
Fri, 24/04/2026 - 15:46
Latest in long-running pwning of Cisco kit found in mystery Fed agency
A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and their UK counterparts – neither of which disclosed the agency's name.…
Fri, 24/04/2026 - 15:15
One way to deal with bug hunting LLMs: ditch the old drivers
One tactic to deal with LLM-powered vulnerability detection is simple – just speed up the removal of old code. If it's gone, it no longer matters if it's buggy.…
Fri, 24/04/2026 - 13:50
Intel is betting on AI to reverse its fortunes, wagering that inference and agentic workloads will restore the CPU to the center of compute - even as its chip manufacturing struggles persist. Speaking to analysts on its Q1 2026 earnings call, CEO Lip-Bu Tan said AI is pushing the total addressable chip market towards $1 trillion, and he reckons Intel is well placed to capture share. "For the last few years, the story around high-performance computing was almost exclusively about GPU and other accelerators. In recent months, we have seen clear signs that the CPU is reinserting itself as the indispensable foundation of the AI era," Lip-Bu said. AI is moving out of the data center and into the physical world, he added, with inference and learning workloads increasingly running on agents, robots, and edge devices. "I think the inference is going to be a much bigger market and the physical AI is another big market. So I think that's an opportunity for us... This is not just our wishful thinking, it is what we hear from our customers, and it is evident in the demand profile for our products." However, Intel needs to build the products in order to deliver on the promises, and the past several years have seen the chipmaker suffer delays to key chips and the cancellation of others, notably its most recent effort to build a credible GPU to challenge AMD and Nvidia in the AI training stakes. Lip-Bu says Chipzilla is making progress with its Intel 14A process node, one that it hopes will turn Intel's Foundry biz into a commercial success by producing chips for other companies as well as its own products. "We expect to see earlier design commitments emerge beginning in the second half of 2026 and expanding into the first half of 2027," he said, echoing comments by chief financial officer David Zinsner last month. Zinsner reported Q1 revenue of $13.6 billion, beating expectations, with AI-driven business lines accounting for 60 percent of that figure, up 40 percent year-on-year. He pointed to recent wins including Xeon 6 being selected as the host CPU for NVidia's DGX Rubin NVL8 systems as evidence that Intel is resurgent in the AI arena. Lip-Bu also referenced a recent long-term deal with Google for co-development of infrastructure processing units (IPUs) to offload networking and other tasks, saying: "This is a good example of how we win in AI infrastructure build-out. And then stay tuned - at the right time, we will announce other contracts." Zinsner added: "One statistic we look at is the ratio of CPUs to GPUs. And if you look at training solutions, they're generally running at 8 GPUs to 1 CPU. As we look into inference, it's probably getting into the 3 or 4 to 1 kind of level. And as you get into agentic and multi-agent, it's one potentially even flip in the other direction a little bit." Another potential AI win is with Elon Musk and his "Terafab" project, which aims to produce large volumes of AI chips - a terawatt's worth of computing power each year, in fact. Although Musk himself talked about this during Tesla's own earnings call this week, Lip-Bu was more tight-lipped when asked about it by an analyst. "Clearly, Elon and I believe that [the] global supply chain is not keeping pace with the rapid acceleration in the demand. And so we both share the vision that we're going to learn a lot together, exploring the innovative way in the process of the manufacturing," he said. "We'll update you when can." Whether you believe the AI hype or not, the stock market liked what it heard, and Intel's share price rose by as much as 20 per cent in after-hours trading, reaching a five year plus high. ®
Fri, 24/04/2026 - 13:50
Chipzilla hopes agents, robots, and edge devices make CPUs cool again... now it has to build the chips
Intel is betting on AI to reverse its fortunes, wagering that inference and agentic workloads will restore the CPU to the center of compute - even as its chip manufacturing struggles persist.…
Fri, 24/04/2026 - 12:47
Ailing scaling blamed by Windows-maker for unreadable missives
Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open a Remote Desktop (.rdp) file, they should now see a warning listing all requested connection settings - or they would if it was displaying correctly.…
Fri, 24/04/2026 - 12:41
BLACK HAT ASIA Open source models can find bugs as effectively as Anthropic's Mythos, according to Ari Herbert-Voss, CEO of AI-powered security startup RunSybil and OpenAI's first security hire. Speaking at the Black Hat Asia conference in Singapore today, Herbert-Voss said Mythos excels at finding both "shallow" bugs - well-described flaws that are and easy to validate - and more complex vulnerabilities. In his talk, he attributed this to "supralinear scaling": where researchers assumed LLM capability would improve linearly, evidence now suggests a model trained on twice the data, compute, and time produces something four times more capable. He hinted supralinear scaling might produce even better multipliers but could not say more due to a non-disclosure agreement. Anthropic has kept access to Mythos tghtly restricted, citing fears of misuse. However Herbert-Voss argues attackers and defenders alike can achieve comparable results with open source models by building "scaffolding" to run several of them in harness. That approach also improves defense in depth, as different models tend to catch different flaws — a useful hedge against any single model's blind spots. Cost is another driver. Mythos is expensive to build and run, and may never be publicly available, making open source alternatives not just viable but necessary for many organizations. Herbert-Voss feels human expertise is still needed to orchestrate open source models so they together deliver Mythos-grade performance, and to assess the bug reports AI generates. He then noted that fuzzing, the testing technique which injects random or near-random data into software to see if doing so produces bugs, also creates so many warnings that it can make extra work for humans. AI bug-hunters already produce the same problem, and he expects it will persist. Herbert-Voss therefore thinks infosec workers will have plenty on their plates for the foreseeable future, and the economic incentive to use AI – someone's got to use services that pay for all those GPUs and datacenters – will act as a forcing function that makes infosec teams adopt AI and as a result improve their proactive and defensive work. ®
Fri, 24/04/2026 - 12:41
OpenAI's first security hire, Ari Herbert-Voss, thinks more automated bug finding will improve security without costing jobs
Black Hat Asia Open source models can find bugs as effectively as Anthropic's Mythos, according to Ari Herbert-Voss, CEO of AI-powered security startup RunSybil and OpenAI's first security hire.…
Fri, 24/04/2026 - 10:15
Greece is taking a flexible approach to introducing the European Union's biometric Entry/Exit System (EES), after some British passport holders missed flights home following the system's implementation on 10 April. On 20 April, the Hellenic Police said it had started to fully deploy EES and Greece will use all necessary measures to manage traffic at border crossings in accordance with the regulations. The UK government updated its travel advice on the same day: "Greek authorities have indicated that they will not collect biometric data (fingerprints and photos) for UK travellers as part of EES" although passengers should "follow the advice of authorities on the ground". The Independent's travel correspondent Simon Calder said EES regulations allow flexibility to suspend biometric data collection at specific places for limited periods of time, yet the European Commission does not expect blanket exemptions for citizens of specific countries for extended periods. EES went live in October last year, causing launch-day queues at Prague's international airport. Many countries phased it in, but its use became compulsory on 10 April. Since then some Brits have missed flights due to border control delays caused by the system, including around 100 passengers due to take an Easyjet flight from Milan Linate to Manchester on 12 April and a smaller number trying to travel with Ryanair from Milan Bergamo to Manchester on 16 April. "The issues some passengers have experienced are unacceptable and so we continue to urge border authorities to ensure they make full and effective use of the permitted flexibilities for as long as needed, so our customers' travel plans are not impacted," Easyjet said in a statement. The airline will transfer passengers delayed by EES to other flights it provides for free, something it offered to a Register staffer and his family when they were delayed trying to fly from Paris to London Gatwick on 10 April. As replacement flights were not available until 15 days later, our vulture decided to catch a Eurostar instead. Airport operator group ACI Europe and Airlines for Europe, which includes Easyjet, Ryanair and British Airways parent company International Airlines Group, said some passengers have waited two to three hours due to the system. "Border control authorities must be allowed to fully suspend the EES when waiting times become excessive," said the heads of the two organizations. "This is essential not only in the coming weeks, but throughout the peak summer travel season." As of 10 April, the European Commission said that EES had registered more than 52 million entries and exits, refused entry to more than 27,000 individuals (about 0.1 percent of those trying to enter) and identified more than 700 as security risks. The EU has built a Travel to Europe app allowing those required to use EES to undertake some of the process in advance. However, so far only Sweden and Portugal are accepting its use. ®
Fri, 24/04/2026 - 10:15
Missed flights and more means something has got to give at the border
Greece is taking a flexible approach to introducing the European Union's biometric Entry/Exit System (EES), after some British passport holders missed flights home following the system's implementation on 10 April.…
Fri, 24/04/2026 - 09:30
Nothing says 'We want honest opinions' like a 36,000-letter mailshot with no awkward questions allowed
Members of the UK government’s People’s Panel on Digital ID will spend two weekends in Birmingham and three evenings on Zoom discussing how Britain should build a national digital identity system, earning £550 plus expenses for their trouble.…
Fri, 24/04/2026 - 07:56
BLACK HAT ASIA Infosec outfit SentinelOne found malware that tries to induce errors in engineering and physics simulation software and therefore represents an attempt at sabotage, and suggests it was created years before the Stuxnet worm that aimed to destroy Iran’s uranium enrichment centrifuges. The company’s Vitaly Kamluk discussed the malware in a talk at the Black Hat Asia conference today. SentinelOne has also published a blog post about the malware. Kamluk told the conference the discovery came about after he wondered if known nation-state-espionage tools like Flame, Animal Farm, and Project Sauron were the first of their kind. All three shared use of the Lua language and virtual machine, so he went looking for similar software. That search led to a malware sample uploaded to VirusTotal in 2016 that includes a reference to “fast16”. Kamluk’s analysis of the sample suggested the techniques its developers employed were not typical of 2016-era malware. SentinelOne researchers also recalled that the infamous ShadowBroker malware trove that appeared in 2016 and which was later linked to the United States National Security Agency, contained a reference to fast16. SentinelOne thinks fast16 came into existence around 2005, based on clues in the code and the fact it won’t run on anything more recent than Windows XP – and even then only on a single-core CPU. Intel shipped its first multi-core consumer CPUs in 2006. The researchers analyzed the sample and found it tries to install a worm and deploy a driver called fast16.sys. The driver includes a routine that alters the output of floating-point calculations and also goes looking for “precision calculation tools in specialised domains such as civil engineering, physics and physical process simulations.” The researchers think fast16 targeted three high-precision engineering and simulation suites that were used in the mid-2000s: “LS-DYNA 970, PKPM, and the MOHID hydrodynamic modeling platform, all used for scenarios like crash testing, structural analysis, and environmental modeling.” Iran is thought to have used LS-DYNA in its nuclear weapons program. Kamluk hypothesized that fast16’s purpose was to cause errors in calculations run by engineering simulation software, perhaps leading to real-world problems. And he asserted that fast16 was a cyberweapon that preceded Stuxnet by five years. “In the broader picture of APT evolution, fast16 bridges the gap between early, largely invisible development programs and later, more widely documented Lua‑ and LuaJIT‑based toolkits,” Kamluk wrote with SentinelOne colleague Juan Andrés Guerrero-Saade. “It is a reference point for understanding how advanced actors think about long‑term implants, sabotage, and a state’s ability to reshape the physical world through software. fast16 was the silent harbinger of a new form of statecraft, successful in its covertness until today.” In his talk, Kamluk said he’s disclosed his work to the vendors of the engineering applications fast16 targets, because he feels they may want to check the output of their products for evidence that the malware produced incorrect calculations. “Maybe there are more discoveries to come?” he concluded. Kamluk tearfully dedicated his talk to friend and colleague Sergey Mineev, who he said was responsible for finding many enormously significant APTs, without seeking attention for the significance of his work, and passed away in March. ®
Fri, 24/04/2026 - 07:56
FAST16 could be the first cyberweapon, and its effects could be with us today
Black Hat Asia Infosec outfit SentinelOne found malware that tries to induce errors in engineering and physics simulation software and therefore represents an attempt at sabotage, and suggests it was created years before the Stuxnet worm that aimed to destroy Iran’s uranium enrichment centrifuges.…
Fri, 24/04/2026 - 05:10
BLACK HAT ASIA Developers of rented internet of things infrastructure – stuff like public EV chargers and shared e-bikes – are prioritizing user convenience over security, and leaving themselves exposed to wide-scale denial of service attacks on their services. That frightening thesis was the subject of a Friday talk at the Black Hat Asia conference, delivered by Hetian Shi, a hardware and IoT security researcher at China’s Tsinghua University. Shi told the conference the very nature of rented IoT services means they have a unique security problem: Anyone can access devices and examine them for vulnerabilities. The researcher conducted his probes with permission, and disclosed the results ethically – for which we should all be thankful because he discovered that some rentable devices include either a debugging port or a UART connector that makes examining their operations an uncomplicated task for an educated attacker. His own efforts yielded evidence of shared authentication keys in device firmware, and backend services that don’t properly authenticate users. The researcher also investigated the apps that rentable IoT providers publish so consumers can access their services and again found weak security that allowed him to do things like create phantom clients that rentable IoT services could not distinguish from actual customers. Using phantom clients makes it possible for an attacker to charge cars or rent scooters at zero cost. Shi said the techniques he’s developed can also compromise personal information by exposing rentable IoT services’ back ends. He’s created a tool called “IDScope” that makes it possible to exploit many of the flaws he found and during his talk demonstrated it by running the iOS app for a Chinese provider of public electric vehicle charging stations. Shi asked the audience to nominate a Chinese city – Shanghai was the popular choice – and then looked up available chargers in People’s Square, a major shopping and recreation district. The app produced a list of chargers and which ones were available to use. Shi asked the audience to choose which of the available chargers he should attack, noted the ID number for that charger listed in the app, entered that number into a script. A second or two later, the icon in the app for that charger changed color from green – which denotes availability for charging – to the grey hue that indicates a disabled port. The app was in Chinese and your correspondent can’t read that language so I can’t say with certainty what I witnessed, but the demo drew spontaneous applause from others in the audience – and plenty of people here at Black Hat have come from the Chinese-speaking world. Shi thinks the techniques he created also make it possible to deny service, and do so at scale – creating the possibility of taking out an entire city’s network of EV chargers. And not just in China: The researcher tested 11 apps published by European providers of shared bikes and scooters, and found similar problems - suggesting his findings will be applicable elsewhere. He theorized that the flaws he found are the result of developers trying to build services that users find convenient, at the expense of security. ®
Fri, 24/04/2026 - 05:10
Demonstrated in China, probably applicable elsewhere
Black Hat Asia Developers of rented internet of things infrastructure – stuff like public EV chargers and shared e-bikes – are prioritizing user convenience over security, and leaving themselves exposed to wide-scale denial of service attacks on their services.…
Thu, 23/04/2026 - 22:38
Legit-looking website, camera-on interviews, jokes about backdoors ... it worked
EXCLUSIVE It all started with a LinkedIn message, as so many employment scams do these days.…
Thu, 23/04/2026 - 20:25
All the Typhoons, everywhere, all at once
A majority of China-linked threat actors are using compromised routers and IoT devices worldwide, turning this gear into proxy networks to carry out further intrusions, steal sensitive data, and disrupt victim organizations’ operations, according to a joint 10-country advisory.…
Thu, 23/04/2026 - 17:20
Push to protect minors risks hitting everyone online
Proton's boss has waded into the age verification fight with a warning that sounds less like child safety and more like an identity checkpoint for the entire internet.…
Thu, 23/04/2026 - 14:26
Wins $300M deal over Salesforce, IBM because of 'integration with existing USDA systems,' among other things
Palantir has won a $300 million contract from the US Department of Agriculture (USDA) to support the National Farm Security Action Plan (NFSAP) and modernize how USDA delivers services to America's farmers.…
Thu, 23/04/2026 - 13:34
World's largest biomedical dataset lifted and shifted on Chinese mega marketplace
Breaking Details of volunteers of UK-based Biobank, which describes itself as the custodian of the world's most comprehensive biomedical dataset, are for sale on Chinese ecommerce site Alibaba.…
Pages