Month: August 2024

Blue Origin targets mid-October for New Glenn’s inaugural flight and launch of NASA’s Escapade Mars mission

Blue Origin’s New Glenn heavy-lift rocket and its Mars-bound NASA payload now have a tentative launch date. The company said on Friday that the inaugural flight will take place no earlier than October 13, carrying two probes built by Rocket Lab to help NASA study the effects of solar wind on Mars’ atmosphere. This will be the first time New Glenn flies after years of delays in its development, and the date cuts well into the window of opportunity for travel to Mars, which occurs roughly every two years based on the planetary alignments. That launch period opens on September 29 and extends to mid-October, per Ars Technica.
We’re going to Mars! 🤩 https://t.co/5OHNy7QETX pic.twitter.com/3hRbseLPEo— Rocket Lab (@RocketLab) August 23, 2024

The mission will lift off from Space Launch Complex 36 at Cape Canaveral Space Force Station in Florida. The twin spacecraft of NASA’s Escape and Plasma Acceleration and Dynamics Explorers mission (Escapade) arrived in Florida on August 19 to begin preparations and integration with the launch vehicle. 
Now, the pressure is really on for Jeff Bezos-founded Blue Origin to get New Glenn ready in time. Bloomberg reported on Wednesday that the company recently suffered two failures at its factory that resulted in damage to hardware for its second and third New Glenn flights. But, a spokesperson told the publication that it’s still on track for this year’s inaugural launch.This article originally appeared on Engadget at https://www.engadget.com/science/space/blue-origin-targets-mid-october-for-new-glenns-inaugural-flight-and-launch-of-nasas-escapade-mars-mission-224611923.html?src=rss

Blue Origin’s New Glenn heavy-lift rocket and its Mars-bound NASA payload now have a tentative launch date. The company said on Friday that the inaugural flight will take place no earlier than October 13, carrying two probes built by Rocket Lab to help NASA study the effects of solar wind on Mars’ atmosphere. This will be the first time New Glenn flies after years of delays in its development, and the date cuts well into the window of opportunity for travel to Mars, which occurs roughly every two years based on the planetary alignments. That launch period opens on September 29 and extends to mid-October, per Ars Technica.

We’re going to Mars! 🤩 https://t.co/5OHNy7QETX pic.twitter.com/3hRbseLPEo

— Rocket Lab (@RocketLab) August 23, 2024

The mission will lift off from Space Launch Complex 36 at Cape Canaveral Space Force Station in Florida. The twin spacecraft of NASA’s Escape and Plasma Acceleration and Dynamics Explorers mission (Escapade) arrived in Florida on August 19 to begin preparations and integration with the launch vehicle. 

Now, the pressure is really on for Jeff Bezos-founded Blue Origin to get New Glenn ready in time. Bloomberg reported on Wednesday that the company recently suffered two failures at its factory that resulted in damage to hardware for its second and third New Glenn flights. But, a spokesperson told the publication that it’s still on track for this year’s inaugural launch.

This article originally appeared on Engadget at https://www.engadget.com/science/space/blue-origin-targets-mid-october-for-new-glenns-inaugural-flight-and-launch-of-nasas-escapade-mars-mission-224611923.html?src=rss

Read More 

Hackers Have Found an Entirely New Way To Backdoor Into Microsoft Windows

A university in Taiwan was breached with “a previously unseen backdoor (Backdoor.Msupedge) utilizing an infrequently seen technique,” Symantec reports.

The most notable feature of this backdoor is that it communicates with a command-and-control server via DNS traffic… The code for the DNS tunneling tool is based on the publicly available dnscat2 tool. It receives commands by performing name resolution… Msupedge not only receives commands via DNS traffic but also uses the resolved IP address of the C&C server (ctl.msedeapi[.]net) as a command. The third octet of the resolved IP address is a switch case. The behavior of the backdoor will change based on the value of the third octet of the resolved IP address minus seven…

The initial intrusion was likely through the exploit of a recently patched PHP vulnerability (CVE-2024-4577). The vulnerability is a CGI argument injection flaw affecting all versions of PHP installed on the Windows operating system. Successful exploitation of the vulnerability can lead to remote code execution.
Symantec has seen multiple threat actors scanning for vulnerable systems in recent weeks. To date, we have found no evidence allowing us to attribute this threat and the motive behind the attack remains unknown.

More from The Record:
Compared to more obvious methods like HTTP or HTTPS tunneling, this technique can be harder to detect because DNS traffic is generally considered benign and is often overlooked by security tools.
Earlier in June, researchers discovered a campaign by suspected Chinese state-sponsored hackers, known as RedJuliett, targeting dozens of organizations in Taiwan, including universities, state agencies, electronics manufacturers, and religious organizations. Like many other Chinese threat actors, the group likely targeted vulnerabilities in internet-facing devices such as firewalls and enterprise VPNs for initial access because these devices often have limited visibility and security solutions, researchers said.
Additional coverage at The Hacker News.

Thanks to Slashdot reader joshuark for sharing the article.

Read more of this story at Slashdot.

A university in Taiwan was breached with “a previously unseen backdoor (Backdoor.Msupedge) utilizing an infrequently seen technique,” Symantec reports.

The most notable feature of this backdoor is that it communicates with a command-and-control server via DNS traffic… The code for the DNS tunneling tool is based on the publicly available dnscat2 tool. It receives commands by performing name resolution… Msupedge not only receives commands via DNS traffic but also uses the resolved IP address of the C&C server (ctl.msedeapi[.]net) as a command. The third octet of the resolved IP address is a switch case. The behavior of the backdoor will change based on the value of the third octet of the resolved IP address minus seven…

The initial intrusion was likely through the exploit of a recently patched PHP vulnerability (CVE-2024-4577). The vulnerability is a CGI argument injection flaw affecting all versions of PHP installed on the Windows operating system. Successful exploitation of the vulnerability can lead to remote code execution.
Symantec has seen multiple threat actors scanning for vulnerable systems in recent weeks. To date, we have found no evidence allowing us to attribute this threat and the motive behind the attack remains unknown.

More from The Record:
Compared to more obvious methods like HTTP or HTTPS tunneling, this technique can be harder to detect because DNS traffic is generally considered benign and is often overlooked by security tools.
Earlier in June, researchers discovered a campaign by suspected Chinese state-sponsored hackers, known as RedJuliett, targeting dozens of organizations in Taiwan, including universities, state agencies, electronics manufacturers, and religious organizations. Like many other Chinese threat actors, the group likely targeted vulnerabilities in internet-facing devices such as firewalls and enterprise VPNs for initial access because these devices often have limited visibility and security solutions, researchers said.
Additional coverage at The Hacker News.

Thanks to Slashdot reader joshuark for sharing the article.

Read more of this story at Slashdot.

Read More 

Scroll to top
Generated by Feedzy