Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

disquieting images that just feel 'off'

By: Rhaomi
30 May 2024 at 16:30
If you're not careful and you noclip out of reality in the wrong areas, you'll end up in the Backrooms, where it's nothing but the stink of old moist carpet, the madness of mono-yellow, the endless background noise of fluorescent lights at maximum hum-buzz, and approximately six hundred million square miles of randomly segmented empty rooms to be trapped in. God save you if you hear something wandering around nearby, because it sure as hell has heard you.
So stated an anonymous 2019 thread on 4chan's /x/ imageboard -- a potent encapsulation of liminal-space horror that gave rise to a complex mythos, exploratory video games, and an acclaimed web series (previously; soon to become a major motion picture from A24!). In the five years since, the evolving "Backrooms" fandom has canonized a number of other dreamlike settings, from CGI creations like The Poolrooms and a darkened suburb with wrong stars to real places like the interior atrium of Heathrow's Terminal 4 Holliday Inn and a shuttered Borders bookstore. But the image that inspired the founding text -- an anonymous photo of a vaguely unnerving yellow room -- remained a mystery... until now.

...turns out it's from a 2003 blog post about renovating for an RC car race track in Oshkosh! Not quite as fun a reveal as for certain other longstanding internet mysteries, but still satisfying, especially since it includes another equally-unsettling photo (and serendipitously refers to a "back room"). Also, due credit to Black August, the SomethingAwful goon who quietly claims to have written the original Backrooms text. Liminal spaces previously on MeFi:
Discussing the Kane Pixels production (plus an inspired-by series, A-Sync Research). Note that as the Backrooms movie takes shape, Kane is continuing work on an intriguing spiritual successor: The Oldest View The Eerie Comfort of Liminal Spaces A Twitter thread on being lost in a real-life Backrooms space Inside the world's largest underground shopping complex A 2010 post about Hondo, an enigmatic Half-Life map designer who incorporated "enormous hidden areas that in some cases dwarfed the actual level" MyHouse.WAD, a sprawling, reality-warping Doom mod that went viral last year AskMe: Seeking fiction books with labyrinths and other interminable buildings
My personal favorite liminal space: the unnervingly cheerful indoor playground KidsFun from '90s-era Tampa -- if only because I've actually been there as a kid (and talked about its eeriness on the blue before). Do you have any liminal spaces that have left an impression on you?

‘Operation Endgame’ Hits Malware Delivery Platforms

30 May 2024 at 11:19

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed “the largest ever operation against botnets,” the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware “droppers” or “loaders” like IcedID, Smokeloader and Trickbot.

A frame from one of three animated videos released today in connection with Operation Endgame.

Operation Endgame targets the cybercrime ecosystem supporting droppers/loaders, slang terms used to describe tiny, custom-made programs designed to surreptitiously install malware onto a target system. Droppers are typically used in the initial stages of a breach, and they allow cybercriminals to bypass security measures and deploy additional harmful programs, including viruses, ransomware, or spyware.

Droppers like IcedID are most often deployed through email attachments, hacked websites, or bundled with legitimate software. For example, cybercriminals have long used paid ads on Google to trick people into installing malware disguised as popular free software, such as Microsoft Teams, Adobe Reader and Discord. In those cases, the dropper is the hidden component bundled with the legitimate software that quietly loads malware onto the user’s system.

Droppers remain such a critical, human-intensive component of nearly all major cybercrime enterprises that the most popular have turned into full-fledged cybercrime services of their own. By targeting the individuals who develop and maintain dropper services and their supporting infrastructure, authorities are hoping to disrupt multiple cybercriminal operations simultaneously.

According to a statement from the European police agency Europol, between May 27 and May 29, 2024 authorities arrested four suspects (one in Armenia and three in Ukraine), and disrupted or took down more than 100 Internet servers in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom, United States and Ukraine. Authorities say they also seized more than 2,000 domain names that supported dropper infrastructure online.

In addition, Europol released information on eight fugitives suspected of involvement in dropper services and who are wanted by Germany; their names and photos were added to Europol’s “Most Wanted” list on 30 May 2024.

A “wanted” poster including the names and photos of eight suspects wanted by Germany and now on Europol’s “Most Wanted” list.

“It has been discovered through the investigations so far that one of the main suspects has earned at least EUR 69 million in cryptocurrency by renting out criminal infrastructure sites to deploy ransomware,” Europol wrote. “The suspect’s transactions are constantly being monitored and legal permission to seize these assets upon future actions has already been obtained.”

There have been numerous such coordinated malware takedown efforts in the past, and yet often the substantial amount of coordination required between law enforcement agencies and cybersecurity firms involved is not sustained after the initial disruption and/or arrests.

But a new website erected to detail today’s action — operation-endgame.com — makes the case that this time is different, and that more takedowns and arrests are coming. “Operation Endgame does not end today,” the site promises. “New actions will be announced on this website.”

A message on operation-endgame.com promises more law enforcement and disruption actions.

Perhaps in recognition that many of today’s top cybercriminals reside in countries that are effectively beyond the reach of international law enforcement, actions like Operation Endgame seem increasingly focused on mind games — i.e., trolling the hackers.

Writing in this month’s issue of Wired, Matt Burgess makes the case that Western law enforcement officials have turned to psychological measures as an added way to slow down Russian hackers and cut to the heart of the sweeping cybercrime ecosystem.

“These nascent psyops include efforts to erode the limited trust the criminals have in each other, driving subtle wedges between fragile hacker egos, and sending offenders personalized messages showing they’re being watched,” Burgess wrote.

When authorities in the U.S. and U.K. announced in February 2024 that they’d infiltrated and seized the infrastructure used by the infamous LockBit ransomware gang, they borrowed the existing design of LockBit’s victim shaming website to link instead to press releases about the takedown, and included a countdown timer that was eventually replaced with the personal details of LockBit’s alleged leader.

The feds used the existing design on LockBit’s victim shaming website to feature press releases and free decryption tools.

The Operation Endgame website also includes a countdown timer, which serves to tease the release of several animated videos that mimic the same sort of flashy, short advertisements that established cybercriminals often produce to promote their services online. At least two of the videos include a substantial amount of text written in Russian.

The coordinated takedown comes on the heels of another law enforcement action this week against what the director of the FBI called “likely the world’s largest botnet ever.” On Wednesday U.S. Department of Justice (DOJ) announced the arrest of YunHe Wang, the alleged operator of the ten-year-old online anonymity service 911 S5. The government also seized 911 S5’s domains and online infrastructure, which allegedly turned computers running various “free VPN” products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime.

Operation Endgame – Largest Ever Operation Against Multiple Botnets Used to Deliver Ransomware

Operation Endgame

In a joint international law enforcement action dubbed “Operation Endgame,” the agencies and judicial authorities dismantled major botnet infrastructure, targeting notorious malware droppers like IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee and TrickBot. In a Thursday announcement Europol said that between May 27 and 29, Operation Endgame led to four arrests and the takedown of over 100 servers worldwide.
“This is the largest ever operation against botnets, which play a major role in the deployment of ransomware,” Europol said.
Botnets are used for different types of cybercrime including ransomware, identity theft, credit card scams, and several other financial crimes. “The dismantled botnets consisted of millions of infected computer systems,” a joint press statement from the Operation Endgame team said. Led by France, Germany, and the Netherlands, and supported by Eurojust, the operation involved countries including Denmark, the United Kingdom, the United States, Armenia, Bulgaria, Lithuania, Portugal, Romania, Switzerland, and Ukraine. Operation Endgame resulted in:
  • 4 arrests - 1 in Armenia and 3 in Ukraine.
  • 16 location searches - 1 in Armenia, 1 in the Netherlands, 3 in Portugal, and 11 in Ukraine.
  • Over 100 servers dismantled or disrupted in countries such as Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the UK, the US, and Ukraine.
  • Over 2,000 domains seized and brought under law enforcement control.
  • 8 summons were also served against other suspects.

Targeting the Cybercrime Infrastructure

Operation Endgame focused on high-value targets, their criminal infrastructure behind various malware and the freezing of illicit proceeds. “The malware, whose infrastructure was taken down during the action days, facilitated attacks with ransomware and other malicious software,” according to Europol. One primary suspect, the Europol said, earned at least €69 million in cryptocurrency by renting out sites for ransomware deployment. Authorities are closely monitoring these transactions and have secured permissions to seize the assets. The infrastructure and financial seizures had a global impact on the dropper ecosystem, the authorities believe.

Key Dropper Malware Dismantled in Operation Endgame

- SystemBC: Facilitated anonymous communication between infected systems and command-and-control servers. - Bumblebee: Delivered via phishing campaigns or compromised websites, enabling further payload execution. - Smokeloader: Used primarily to download and install additional malicious software. - IcedID (BokBot): Evolved from a banking trojan to a multi-purpose tool for various cybercrimes. - Pikabot: Enabled ransomware deployment, remote takeovers, and data theft through initial system access.
“All of them are now being used to deploy ransomware and are seen as the main threat in the infection chain,” Europol said.
[caption id="attachment_72953" align="aligncenter" width="1920"]Operation Endgame Operation Endgame seizure notice (Credit: Europol)[/caption]

The Role of Dropper Malware in Cyberattacks

Droppers are essential tools in cyberattacks, acting as the initial vector to bypass security and install harmful software such as ransomware and spyware. They facilitate further malicious activities by enabling the deployment of additional malware on compromised systems.

How Droppers Operate

  1. Infiltration: Enter systems through email attachments, compromised websites, or bundled with legitimate software.
  2. Execution: Install additional malware on the victim's computer without the user's knowledge.
  3. Evasion: Avoid detection by security software through methods like code obfuscation and running in memory.
  4. Payload Delivery: Deploy additional malware, potentially becoming inactive or removing itself to evade detection.
The success of the operation was bolstered by private partners such as Bitdefender, Sekoia, Shadowserver, Proofpoint, and Fox-IT, among others. Their support was crucial in disrupting the criminal networks and infrastructure, the authorities said.

Wait for Operation Endgame Season 2

Operation Endgame signifies a major victory, but this is not really the end of it. Taking cue from the Marvel cinematic movie ‘Avengers – Endgame,’ the law enforcement is set to to release a part two of this operation in a few hours from now as they said their efforts continue.
“This is Season 1 of operation Endgame. Stay tuned. It sure will be exciting. Maybe not for everyone though. Some results can be found here, others will come to you in different and unexpected ways,” the authorities said.
“Feel free to get in touch, you might need us. Surely, we could both benefit from an openhearted dialogue. You would not be the first one, nor will you be the last. Think about (y)our next move.” Future actions will be announced on the Operation Endgame website, possibly targeting suspects and users, and ensuring accountability. The news of this massive botnet takedown operation comes a day after the announcement of the dismantling of “likely the world’s largest botnet ever” – the 911 S5 botnet. The botnet’s alleged administrator Yunhe Wang, was arrested last week and a subsequent seizure of infrastructure and assets was announced by the FBI. The recent law enforcement actions represent a historic milestone in combating cybercrime, dealing a significant blow to the dropper malware ecosystem that supports ransomware and other malicious activities. The operation's success underscores the importance of international cooperation and the need for robust cybersecurity measures to tackle evolving threats.

Utopia Must Fall

29 May 2024 at 10:35
Utopia Must Fall is a browser game (for mobile too) that evokes the days of 1970s and 80s vector scan arcade games. There are nods to Asteroids, Gravitar, Tac-Scan, Space Fury and other more modern titles like Geometry Wars, with gameplay reminiscent of Missile Command but with a research and upgrade upgrade system. The password is CEASEFIRE if it asks.

A Quest Gone Awry: Hackers Disrupt Bring Me The Horizon’s Hidden M8 Artificial Reality Game

By: Alan J
29 May 2024 at 05:55

M8 Artificial Reality Game Hack

Fans of Bring Me The Horizon have been fervently searching for secrets and clues hidden within an 'M8 Artificial Reality game' subtly teased in a recent music video by the band. Near the video's conclusion, a character emerges, briefly greets viewers, and then abruptly instructs them to search for a specific code. Although the discovery of the hidden game thrilled many, excitement was momentarily dampened when the game's website was swapped out for a warning urging visitors not to hack into the system.

Bring Me The Horizon Hidden M8 Artificial Reality Game

Bring Me the Horizon, a British rock band formed in Sheffield in 2004, is celebrated for embedding hidden meanings, easter eggs, and clues in their music. With the release of their latest album, 'POST HUMAN: NeX GEn,' the band has notably deepened this practice, incorporating even more intricate layers of secrets into their songs. In one of the music videos from this album, a character named 'M8' appears and begins to greet the viewer but is abruptly stopped by a 'fatal-error'. M8 then directs the viewer to find the 'serial number' located on the side of its head. A curious listener appeared to have further analyzed the video segment in the video and discovered a hidden spectrogram containing a QR Code, sharing an image file on the rock band's subreddit. Fans further discovered that the QR code led to the URL domain of a hidden clandestine hacking-themed website, containing the M8 Artificial Reality Game. [caption id="attachment_72429" align="alignnone" width="233"]Hidden M8 Artifical Reality Game QR Code Source: /r/BringMeTheHorizon subreddit[/caption] The M8 Artificial Reality domain then instructed users to enter a hidden serial code, which fans discovered through the use of several other clues. The site contained unreleased tracks, password-protected files, and various mysteries for fans to uncover. [caption id="attachment_72432" align="alignnone" width="2800"]Hidden M8 Artificial Reality Game Rock Band Source: multidimensionalnavigator8.help[/caption] As news of the hidden website spread, fans swiftly set up a dedicated Discord server and collaborated using a Google Doc to unearth all the site’s secrets. However, their excitement was brief. Hackers soon tried to extract further secrets from the website using unconventional methods, leading developers to temporarily shut down the site and issue a warning to fans.

Warnings Over Hacking Attempts

After the hacking attempts, cautionary messages from M8, the album's virtual guide, expressed dismay at the intrusion, stressing on how such actions undermined the spirit of collective exploration. These messages were delivered through both the website which was temporarily replaced with the warning for 2 hours as well as through email. [caption id="attachment_72445" align="alignnone" width="2800"]Bring Me The Horizon M8 Hacking Game Source: archive.org[/caption] [caption id="attachment_72448" align="alignnone" width="276"]Artificial Reality AR M8 Hacking Warning Email Source: BringMeTheHorizon ARG Discord[/caption] The developers appeared to indirectly condemn these attempts through the creative  use of the M8 character, without specifying the nature of the intrusion or identifying the perpetrators. Some fans however, upon receiving the email after their explorations, found the message warnings unexpected for what they believed were legitimate interactions. The community believed that these selective few hackers ruined the experience for others, with it's discord server noting the downtime in it's FAQ. 0M8 Artificial Reality Bring Me the Horizon Discord Bring Me The Horizon's foray into alternate reality gaming showcases the creative potential of digital media in music and album promotion. As fans continue to work together to unravel the remaining mysteries and solve the puzzles within the ARG, it remains to be seen what other surprises await them on the hidden website. The hacking attempts and the subsequent warnings serves as a reminder that while ARGs can be an engaging and immersive experience, it is essential to respect the developers' intentions and play fair to ensure everyone can enjoy the journey together. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Rwanda’s top UK diplomat oversaw use of Interpol to target regime opponents

28 May 2024 at 12:00

Exclusive: Johnston Busingye formally appointed days after UK agreed Rwanda asylum deal with Paul Kagame in 2022

Rwanda’s top diplomat in the UK oversaw the use of the international justice system to target opponents of the country’s rulers around the world, the Guardian can reveal.

New details of the Rwandan government’s suppression of opposition beyond its borders add to concerns about the regime at the heart of Rishi Sunak’s asylum policy.

Continue reading...

💾

© Photograph: Leon Neal/Getty Images

💾

© Photograph: Leon Neal/Getty Images

For when "Crusader Kings" is a bit much

By: Rhaomi
25 May 2024 at 14:56
Sort the Court is a charmingly addictive "kingdombuilder" of sorts that's perfect for a lazy Saturday. Designed and written by Graeme Borland in just 72 hours for Ludum Dare 34, the game casts you as a new monarch who must judiciously grow your realm's wealth, population, and happiness with an eye toward joining the illustrious Council of Crowns... all by giving flat yes-or-no answers to an endless parade of requests from dozens of whimsical subjects. It's possible to lose, and the more common asks can get a bit repetitive, but with hundreds of scenarios and a number of longer-term storylines, the game can be won in an hour or two while remaining funny and fresh. See the forum or the wiki for help, enjoy the original art of Amy "amymja" Gerardy and the soundtrack by Bogdan Rybak, or check out some other fantasy decisionmaking games in this vein: Borland's spiritual prequel A Crown of My Own - the somewhat darker card-based REIGNS - the more expansive and story-driven pixel drama Yes, Your Grace (reviews), which has a sequel due out this year

Songs of Conquest is the Heroes of Might & Magic rebirth we all deserve

20 May 2024 at 12:00
Hexagonal battlefield covered in fire and magma.

Enlarge / Battles get a wee bit involved as you go on in Songs of Conquest. (credit: Coffee Stain Publishing)

There are games for which I have great admiration, pleasant memories, and an entirely dreadful set of skills and outcomes. Heroes of Might & Magic III (or HoMM 3) has long been one of those games.

I have played it on just about every PC I've owned, ever since it chipped away at my college GPA. I love being tasked with managing not only heroes, armies, resources, villages, and battlefield positioning but also time itself. If you run around the map clicking to discover every single power-up and resource pile, using up turn after turn, you will almost certainly let your enemy grow strong enough to conquer you. But I do this, without fail. I get halfway into a campaign and the (horse cart) wheels fall off, so I set the game aside until the click-to-move-the-horsey impulse comes back.

With the release of Songs of Conquest in 1.0 form on PC today (Steam, GOG, Epic), I feel freed from this loop of recurrent humbling. This title from Lavapotion and Coffee Stain Publishing very much hits the same pleasure points of discovery and choice as HoMM 3. But Songs of Conquest has much easier onboarding, modern resolutions, interfaces that aren't too taxing (to the point of being Verified on Steam Deck), and granular difficulty customization. More importantly for most, it has its own stories and ideas. If you love fiddling with stuff turn by turn, it's hard to imagine you won't find something in Songs of Conquest to hook you.

Read 4 remaining paragraphs | Comments

This is not a post about lying in fiction or games

19 May 2024 at 09:20
Some say that lying non-player characters can motivate player characters, at the cost of paranoia. Some say that characters in crime fiction may be justified in their dishonesty. Marvel comic books are full of liars. Psychology experts have advice for you about how to spot liars. Some recent research has addressed factors associated with designing video games with falsehoods. A relevant previous Ask.

About the "research" link: "Lying and deception are important parts of social interaction; when applied to storytelling mediums such as video games, such elements can add complexity and intrigue. We developed a game, "AlphaBetaCity", in which non-playable characters (NPCs) made various false statements, and used this game to investigate perceptions of deceptive behaviour. We used a mix of human-written dialogue incorporating deliberate falsehoods and LLM-written scripts with (human-approved) hallucinated responses. The degree of falsehoods varied between believable but untrue statements to outright fabrications. 29 participants played the game and were interviewed about their experiences. Participants discussed methods for developing trust and gauging NPC truthfulness. Whereas perceived intentional false statements were often attributed towards narrative and gameplay effects, seemingly unintentional false statements generally mismatched participants' mental models and lacked inherent meaning. We discuss how the perception of intentionality, the audience demographic, and the desire for meaning are major considerations when designing video games with falsehoods." Yin, M., Wang, E., Ng, C., & Xiao, R. (2024, May). Lies, Deceit, and Hallucinations: Player Perception and Expectations Regarding Trust and Deception in Games. In Proceedings of the CHI Conference on Human Factors in Computing Systems (pp. 1-15).
❌
❌