XD

What the hell is going on?!?!?

news.ycombinator Pluralistic Krebs Proton Foundation Blog Bellingcat 100r Wired 404media Diaries KyberTurva

news.Ycombinator

Back to top

430k-year-old well-preserved wooden tools are the oldest ever found
Comments

SoundCloud Data Breach Now on HaveIBeenPwned
Comments

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Comments

Xfwl4 – The Roadmap for a Xfce Wayland Compositor
Comments

I made my own Git
Comments

A simulation where life unfolds in real time
Comments

Flexible use of a multi-purpose tool by a cow
Comments

Cloudflare claimed they implemented Matrix on Cloudflare workers. They didn't
Comments

Artie (YC S23) Is Hiring a Founding Recruiter
Comments

A first look at Aperture by Tailscale (private alpha)
Comments

Heathrow scraps liquid container limit
Comments

Two Twisty Shapes Resolve a Centuries-Old Topology Puzzle
Comments

Snow Simulation Toy
Comments

Amazon to shut down Go and Fresh stores
Comments

Show HN: LemonSlice – Upgrade your voice agents to real-time video
Comments

TikTok users can't upload anti-ICE videos. The company blames tech issues
Comments

Management as AI superpower: Thriving in a world of agentic AI
Comments

Velox: A Port of Tauri to Swift by Miguel de Icaza
Comments

The Enchiridion by Epictetus
Comments

A list of fun destinations for telnet
Comments

The age of Pump and Dump software
Comments

Handling Long Branches
Comments

A few random notes from Claude coding quite a bit last few weeks
Comments

Kimi Released Kimi K2.5, Open-Source Visual SOTA-Agentic Model
Comments

Apple introduces new AirTag with longer range and improved findability
Comments

ChatGPT Containers can now run bash, pip/npm install packages and download files
Comments

The hidden engineering of runways
Comments

The Universal Pattern Popping Up in Math, Physics and Biology (2013)
Comments

We Do Not Support Opt-Out Forms (2025)
Comments

Windows 11's Patch Tuesday nightmare gets worse
Comments



Back to top



Pluralistic

Back to top

Pluralistic: Carney isn't a hero (and that's OK) (27 Jan 2026)
Today's links Carney isn't a hero (and that's OK): There is nothing harder to stop than an idea whose time has come to pass. Hey look at this: Delights to delectate. Object permanence: Things My Girlfriend and I Have Argued About; AnarchistU; "Monopolized"; All bets are off. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. Carney isn't a hero (and that's OK) (permalink) I blame novelists: it's only in prose that we get the illusion of telepathy, of being inside the mind of another. No wonder novelistic tales of political transformation focus on the moral fortitude of individual leaders. The problem is, it's a destructive lie. Sure, leaders sometimes exhibit moral fortitude and courage. But we can't rely on our leaders to be perfect – or even pretty good. The only reliable way to get the leadership we deserve is to force our leaders to follow us, by organizing in political blocs that mete out severe punishments when they betray us. Say what you will about the Tea Party, but boy, did they understand this. During the Obama years, any Republican that wavered from the party line was mercilessly tormented by Tea Party activists, who flooded their offices with calls and emails, showed up at their town halls, and at restaurants when they were trying to have dinner, and then they backed their primary opponents. The Tea Party years were a winnowing function for the GOP, and the only Republican politicians who survived were the ones who refused to compromise. This worked for them in world-historic ways. It was thanks to the Tea Party that the GOP was able to steal two Supreme Court seats, for example. Corporate Democrats use the Tea Party as an example of why we can't let the public into progressive politics. After all, corporate Dems already have control over Democratic politicians, and so any organized rank-and-file bloc threatens their ability to push elected politicians to pursue grotesque policies like supporting genocide in Gaza or showering billions on ICE: https://www.msn.com/en-us/news/politics/seven-democrats-just-voted-to-approve-ice-funding-full-list/ar-AA1ULAn7 The seven Dems who voted to fund ICE knew that they were doing something that would be wildly unpopular with the voters who sent them to DC, but they did it anyway, because they aren't afraid of those voters. They treat their voters as ambulatory wallets to be terrorized into donating small sums via relentless text messages about the impending end of democracy in America, even as they vote for the impending end of democracy in America. These seven lawmakers don't just need to be primaried: they need to be made an example of. Their names must be a curse. They must be confronted in public – long after they are out of office – by voters brandishing pictures of the people ICE murdered after receiving the funds they voted for. They must be haunted for this decision for the rest of their days. As Voltaire said, "Sometimes you must execute an admiral to encourage the others." Here are their names: Tom Suozzi (New York) Henry Cuellar (Texas) Don Davis (North Carolina) Laura Gillen (New York) Jared Golden (Maine) Vicente Gonzalez (Texas) Marie Glusenkamp Perez (Washington) https://www.msn.com/en-us/news/politics/seven-democrats-just-voted-to-approve-ice-funding-full-list/ar-AA1ULAn7 Politicians – even the most unhinged and narcissistic ones – go through life attuned to public rage. Even Trump. Why else would Trump have ordered ICE Obergruppenführer Gregory Bovino "home with his tail between his legs"? https://prospect.org/2026/01/27/ice-greg-bovino-minneapolis-one-battle-after-another-sean-penn/ Counting on politicians to do the right thing out of principle is a loser's bet. Far more reliable is to bet on them doing the right thing because they're afraid of being cursed and humiliated and haunted by their betrayal to the end of their days. Don't be fooled by politicians and pearl-clutchers insisting that the norms fairy and "comity" are the only way to get things done. We are not in an era of reaching across the aisle in a spirit of public service. We are in the era of fascist goons murdering our neighbors in the street and then dancing a celebratory jig. We arrived at this juncture in large part because we accepted glaring bullshit about "comity": https://pluralistic.net/2021/01/30/meme-stocks/#comity This isn't merely frustrated militancy on my part. I'm hoping that you will join me in this understanding of politics: that good leadership is downstream of politicians being terrified of betraying their duty to the public, and we need not rely on moral perfection to make progress. Take the EU's energy transition. For decades, the EU's leaders – like leaders everywhere – were in thrall to the fossil fuel industry. They were fully paid-up members of the most extreme wing of the capitalist death cult, determined to render the only planet in the known universe capable of sustaining human life uninhabitable in order to enrich a tiny coterie of already ultrawealthy climate criminals. Then came the Russian invasion of Ukraine, and with it, a continent shivering in the dark, bereft of Russian gas and oil. Suddenly, the most powerful lobbyists in the history of civilization – fossil fuel pushers – lost their grip on Europe's leaders. In a few short years, Europe went from a decade behind its energy transition to a decade ahead: https://pluralistic.net/2025/09/23/our-friend-the-electron/#to-every-man-his-castle European politicians didn't just trip and find their spines. A continent full of frozen, furious people made yielding to the fossil fuel lobby unthinkable. Once the penalties for betraying the public inarguably exceeded any conceivable benefits from selling out to Big Oil, Big Oil ate shit. Which brings me to Canadian Prime Minister Mark Carney, a man who didn't so much win office as fail to lose it, after his Conservative opponent Pierre Poilievre saw a 50-point collapse in his poll numbers the instant Donald Trump (whom Poilievre had repeatedly associated himself with during the campaign) promised to turn Canada into "the 51st state." Carney is hardly an avatar of progressive politics. As Governor of the Bank of England, he oversaw a program of crushing austerity after the crash of 2008. As Canadian PM, he has fired tens of thousands of civil servants while promising billions to build out national AI so that our government handed over to hallucinating chatbots running on processors and software that we can only buy from companies that will do Trump's bidding. Having won office with an "elbows up" mandate to resist Trump, Carney proceeded to cave to Trump's demands on even modest measures, such as a plan to end rampant tax cheating by the US tech giants. And yet, earlier this month, Carney travelled to the World Economic Forum in Davos to deliver an extraordinary speech that declared a "rupture" in the "international rules-based order," an order that he simultaneously declared to have been a sham all along: https://www.programmablemutter.com/p/davos-is-a-rational-ritual This is an incredibly weird (but good!) speech for Carney to have made. Carney is the epitome of "Davos Man," a technocrat with a long history of using his office and power to inflict real suffering on working people in the name of abstract economic stability. This contradiction has been the source of much opnionating about whether a) Carney is sincere about this, and b) Carney can be trusted to follow through on it. The answers to this are obvious (to me, at least): a) Who cares if he's sincere, because b) He's shown that if he's frightened enough of the public's fury at his capitulation, he will locate his spine. Which means that the future of Carney's ambitious program of "rupture" and bold effort to isolate Trump and the USA will depend on our ability to force him to make good on his promises. That means that we have to "stand on guard" – to give no ground to Canadian "moderates" who counsel against bold action to defend the country from Trump, lest this make Trump mad. The idea that we can strike a bargain with Trump is indisputably, profoundly stupid. Yet for the past year a sizable fraction of Canada's great and good have been able to insist, in public, that Trump will bargain with us in good faith. Trump undeniably, provably treats any concession as weakness. He will break his word in a heartbeat. The more we appease him, the more he will demand of us. Any Canadian politician or opinion-former who even hints that we can "make a deal" with Trump should be treated as a dangerous lunatic to be isolated and shunned (the only exception being that any time they show their faces in public, they should be relentlessly bollocked for their nation-risking program of appeasement to a fascist madman). Give Trump a centimetre and he'll take a mile. Give him two centimetres and he'll take Greenland. Give him three centimetres and he'll grab Alberta, too. Anyone who insists that Canada should confine itself to ornamental gestures of resistance to Trump (because anything that truly matters will make him mad) is a danger to themselves and the country. This all goes double for people aligned with other national parties: the way we get Carney to live up to his Davos speech is by pouncing any time he even hints that he might go back on his word, poaching his voters by campaigning on a promise to live up the Carney Doctrine (even if Carney won't). Promising to live up to Carney's Davos speech (even if Carney won't) must be the central issue in every by-election and provincial race between now and the next federal election. When we talk about politics and especially political change, there's often talk of "political will." Politicians who break with their own record of weakness and compromise are said to be propelled by "political will." It's all very abstract sounding, but at root, political will is something quite tangible – it's merely invisible until something gets in its way. Think of political will as something like the wind. You can't tell how windy it is outside unless there's something in the path of the wind, and then it's obvious. For the past decade, there has been a growing worldwide political will blowing for an end to corporate and billionaire power: https://pluralistic.net/2025/06/28/mamdani/#trustbusting It's easy to feel like the project of taking our world back from oligarchs has been becalmed for decades. The political will is like the wind: we only see it when something gets in its path. After generations of Davos-style oligarch worship, there are damned few politicians who dare to unfurl a sail and aim the tiller for a world that works for working people. But every time some politician does, that sail bellies out with the wind with an audible snap. These politicians are lionized and lauded for their bravery, and any betrayal is met with bitter recriminations that go on and on and on. Any ship rigged for a better future is propelled by a wind that is a fiercer gale than any we've seen for generations. That's where we all fit in. I'm not asking you to credulously accept Carney's conversion on face value. Rather, I'm asking that you celebrate the vision that Carney articulated while threatening to destroy his political life if he breaks his word. Let every politician know that there is glory in standing up for us – and let them know that betrayal will see them tossed overboard, to drown in our wake. Hey look at this (permalink) Deaths, detentions and deportations of American citizens in the second Trump administration (h/t Molly White) https://en.wikipedia.org/wiki/Deaths,_detentions_and_deportations_of_American_citizens_in_the_second_Trump_administration Hate Has to Scatter When Minneapolis Arises https://www.hamiltonnolan.com/p/hate-has-to-scatter-when-minneapolis Trump Is Proving Democratic Presidents Weren’t Powerless https://jacobin.com/2026/01/trump-obama-biden-executive-power Charter accused of backdoor attack against fixed wireless (h/t Mitch Wagner) https://www.fierce-network.com/broadband/cables-future-dims-charter-plotting-backdoor-attack-against-fixed-wireless The New Satanic Panic Is Here https://www.usermag.co/p/the-new-satanic-panic-is-here Object permanence (permalink) #25yrsago Things My Girlfriend and I Have Argued About https://web.archive.org/web/20010604131027/http://homepage.ntlworld.com/mil.millington/things.html #20yrsago Law enforcement professionals against the war on drugs https://web.archive.org/web/20060202103138/http://leap.cc/ #20yrsago How DRM tries to resist uninstalling https://blog.citp.princeton.edu/2006/01/29/cd-drm-unauthorized-deactivation-attacks/ #15yrsago EFF: FBI may have committed more than 40K intelligence violations since 9/11 https://www.eff.org/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence #15yrsago AnarchistU Toronto: free school classes for February https://web.archive.org/web/20110126075027/https://anarchistu.org/ #10yrsago Florida climate survivors travel to New Hampshire to confront Marco Rubio https://web.archive.org/web/20160201193104/https://act.climatetruth.org/sign/climatevoices2016_videoandpetition/?source=BB #10yrsago Elizabeth Warren’s new 1%: the percentage of fraudulent profits companies pay in fines https://web.archive.org/web/20160129113016/https://theintercept.com/2016/01/29/elizabeth-warren-challenges-clinton-sanders-to-prosecute-corporate-crime-better-than-obama/ #5yrsago David Dayen's MONOPOLIZED https://pluralistic.net/2021/01/29/fractal-bullshit/#dayenu #1yrago All bets are off https://pluralistic.net/2025/01/29/which-side-are-you-on-2/#strike-three-yer-out Upcoming appearances (permalink) Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Salt Lake City: Enshittification at the Utah Museum of Fine Arts (Tanner Humanities Center), Feb 18 https://tanner.utah.edu/center-events/cory-doctorow/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berkeley: Bioneers keynote, Mar 27 https://conference.bioneers.org/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) How the Internet Got Worse (Masters in Business) https://www.youtube.com/watch?v=auXlkuVhxMo Enshittification (Jon Favreau/Offline): https://crooked.com/podcast/the-enshittification-of-the-internet-with-cory-doctorow/ Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1004 words today, 15484 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: Trump and the unmighty dollar (26 Jan 2026)
Today's links Trump and the unmighty dollar: "Flipping the table over in a poker game rigged in your favor because you resent having to pretend to play the game at all." Hey look at this: Delights to delectate. Object permanence: H2G2 v BBC; Anti-capitalist bank rave; Narrative and magic; It's still censorship; Boss politics antitrust; Game library; Gamers 6-65; Google Cache; "Probiotics" aren't; "Starve"; Uptown Funk mashup; Not a crime if we do it with an app; Gibson on Stuxnet; Gates sells Tank Man pic to China; Paul Allen's yacht destroys a reef; Mass surveillance in Anaheim. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. Trump and the unmighty dollar (permalink) The best summary of Trump's trade "philosophy" comes from Trashfuture's November Kelly, who said that Trump is flipping over the table in a poker game that's rigged in his favor because he resents having to pretend to play the game at all. After all, the global system of trade was designed and enforced by American officials, especially the US Trade Representative. The US created a world whose most important commodities (food, oil, etc) were priced in dollars, meaning that anyone who wanted to buy these things from any country would first have to get US dollars, which they could only get by shipping their valuable stuff to the US, which sends them dollars in return. Think about this trade for a minute: to get US dollars, people outside of the US would have to dig up or chop down or manufacture real things that were in finite supply. Meanwhile, to get the US dollars to pay for these real, finite things, the US just had to type zeros into a spreadsheet at the Federal Reserve: https://www.youtube.com/watch?v=54fg-A1gCrM The technical term political scientists use for this arrangement is "fucking sweet." Two of my favorite political scientists are Henry Farrell and Dan Davies, whose new paper, "The US dollar system as a source of international disorder," was just published by The British Academy as part of its "Global (Dis)Order international policy programme": https://www.thebritishacademy.ac.uk/documents/6018/Global_Disorder_-_The_US_Dollar_System_as_a_Source_of_International_Disorder.pdf Farrell and Davies explore the history of the weaponization of "dollar centrality" (their term for the arrangement where the whole world agreed to treat the dollar as a neutral trade instrument), and show how Trump's incontinent belligerence fits into it, and lay out some shrewd possibilities for where this could all end up. Farrell is one of the leading experts on how these boring, invisible, complex systems of financial settlement, fiber optic connections and other plumbing of the post-war era have been increasingly weaponized by successive US administrations. In 2023, he and Abraham Newman published The Underground Empire, an excellent book on the subject (really, the definitive book on the subject): https://pluralistic.net/2023/10/10/weaponized-interdependence/#the-other-swifties Davies, meanwhile, is a brilliant scholar (and explainer) of complex systems. Last year, he published The Unaccountability Machine, about the way that the feedback mechanisms in the systems that keep the world running are badly broken, leading to much of our modern dysfunction: https://en.wikipedia.org/wiki/The_Unaccountability_Machine Their paper represents a fusion of both of their approaches, and makes for fascinating reading. They start by characterizing the post-war global system as broadly "homeostatic," meaning that it can maintain stability in the face of shocks. Homeostasis requires a feedback mechanism so that it can constantly adjust itself – think of your home thermostat, which needs a thermometer so it can figure out when to run your furnace/air conditioner and when to stop. Political scientists have identified many of these feedback systems. For example, KN Waltz describes how, when one "great power" starts to dominate the world, the weaker states in its orbit will switch their alliances to rival powers, in order to "balance" power between the big beasts. Smaller, poorer, and/or weaker countries that have looked to the US for trade and military alliances might switch to China if it looks like the US is getting too powerful – not necessarily because China offers a better deal than the US, but because a decisive global victory by the US would give it the power to squeeze these countries, because they'd have nowhere else to go. Waltz's work is especially relevant this month, with Canada inking a Chinese trade deal and Canadian Prime Minister Mark Carney publicly declaring a "rupture" with the US-dominated order: https://www.programmablemutter.com/p/davos-is-a-rational-ritual When great powers ignore the feedback of these systems, the result is a collapse in global homeostasis, and radical shifts in the global order. Farrell and Davies argue that this is what's happening with the weaponization of the dollar, which has prompted many countries to take action that should have caused the US to back off, but which the US has ignored as it doubled down on the weaponized dollar: https://www.bloomberg.com/news/articles/2025-10-20/ethiopia-in-talks-with-china-to-convert-dollar-loans-into-yuan Even when the US has a "rational" case for weaponizing the dollar – for example, by forcing the world to join in a global financial surveillance project aimed at stemming financing for terrorism – it runs the risk of making things worse. If the US's anti-terror financial demands are so onerous that they provoke other countries into setting up multiple, independent, fragmented global financial schemes, then terrorists and their backers will have their pick of ways to move money around. Even where the US has had limited success with financial sanctions (by isolating North Korea, or by targeting specific individuals rather than countries), it has undermined those successes by peddling and formalizing cryptocurrencies that evade those sanctions. With Trump's crypto project, America gets the worst of both worlds: ineffective financial sanctions that nevertheless weaken the dollar's centrality to the world, and the power that confers upon America. The world relies on the dollar because it has to rely on something. There are hundreds of currencies in the world, and it's prohibitively expensive for exchange brokers to maintain deep reserves of all of those currencies so that any currency can be swapped for any other. Likewise, it is cumbersome and risky for transactions to rely on a chain of exchanges: if someone in Thailand can only buy oil from Norway by first trading Thai baht for Japanese yen, and then Australian dollars, and then euros, and then Norwegian kroner, they'll be bedeviled by shifting exchange rates, transaction fees, and, possibly, shady brokers who just take the money and run. After WWII, when the great powers and middle powers were hammering out the global financial system, economists like John Maynard Keynes proposed an international supercurrency that would only be used to facilitate exchanges, but he was outmaneuvered by America's chief negotiator, Harry Dexter White, who insisted that the US dollar will fill that role: https://profstevekeen.substack.com/p/this-is-the-end-of-the-us-global So everyone uses the dollar, and because everyone uses the dollar, everyone has to use the dollar: the dollar enjoys "network effects," where the more parties there are who will accept it, the more valuable it becomes and the harder it is to find an alternative. In my theory of enshittification, network effects are a powerful temptation to make a service worse. If you own a system with strong network effects, you can make it worse for all its users (and better for you) without risking your users' departure, because they are all holding each other hostage: https://www.eff.org/deeplinks/2021/08/facebooks-secret-war-switching-costs So it is with dollar weaponization. In order to use the dollar to settle transactions, parties must have access to systems that are directly under US government control (like a dollar account at the Federal Reserve), or are, practically speaking controlled by America (like the SWIFT system for moving money across borders). The fact that you have to use dollars, and you can't use dollars without the US government's say-so, means that the US can impose onerous terms on dollar users and not have to worry that they'll switch to another currency. Farrell and Davies describe how, during the "high era" of globalization, US Treasury officials fought to insulate the dollar from control by the US security apparatus. Treasury officials understood that the dollar was a source of enormous US power and advantage, and they didn't want to risk all those benefits by beating up dollar users and tempting them to look elsewhere. But ultimately, Treasury lost. This, too, is in accord with my theory of enshittification: once an institution locks in its users, the factions that want to make things worse will start winning the argument. This is exactly what happened to Google, when, having locked in search users, the company fell under control of its enshittifying faction, who oversaw a program that made search worse, so that you'd have to search repeatedly (and look at multiple screens' worth of ads) to get the answers you sought: https://pluralistic.net/2024/04/24/naming-names/#prabhakar-raghavan Google's anti-enshittification faction argued that making search worse was a betrayal of the company's mission. The pro-enshittification faction pointed out that lock-in meant that Google could make more money by betraying its mission without losing users, and they won the day. It's a lot easier to live your principles if you suffer when you betray them, and it's a lot easier to hold an institution to its principles if betraying those principles results in immediate penalties. After 9/11, the US security apparatus demanded dollar weaponization: the Office of Foreign Asset Control bigfooted the international finance system, forcing them to spy on, report and block transactions the US disliked. The threat of being excluded from the dollar system was powerful: when one bank refused to stop doing business with North Korea, the US "designated" the bank as noncompliant, provoking a bank run. The rest of the world's banks fell into line. The fact that the US could punish banks for actions that harmed American interests, even if the bank followed all the procedures required of it, encouraged banks to adopt a "zero risk" policy, where they made up policies that went well beyond America's rules, conducting even more surveillance, blocking even more transactions, and reporting even more activities than was required of them. All of this made participating in the dollar system steadily more costly, as dollar users had to pay for expensive compliance measures or risk the failure of key transactions, or exclusion from the dollar altogether. Late in Obama's second term, officials sounded the alarm about the dollar becoming increasingly unattractive for international finance, and counseled a relaxation of the post-9/11 ratchet of ever-tighter rules for dollar users. But Trump's officials were totally disinterested in the long-term health of the dollar system, and pursued an even more aggressive policy of dollar weaponization during Trump's first term. During Trump I, major blocs such as the EU began to formally prepare dollar alternatives and to formulate an "anti-coercion instrument." The anti-coercion instrument is an agreement among EU states to retaliate together in the event that the US (or some other country) used the dollar (or some other currency) to interfere in internal EU matters: https://en.wikipedia.org/wiki/Anti-Coercion_Instrument (The anti-coercion instrument has never been used, but it was almost invoked last week over Trump's threat to steal Greenland): https://www.independent.co.uk/news/world/americas/us-politics/eu-anti-coercion-instrument-greenland-trump-b2903998.html The Biden years seemed to signal a return to normalcy – the US might continue to weaponize the dollar, but they would at least pretend that they were playing fair. In Kelly's formulation, they'd actually play the rigged poker-game, rather than just taking everyone's chips and flipping over the table, the way Trump liked to do. But Biden also seemingly couldn't help himself, and his administration pursued a much blunter program of dollar weaponization than pre-Trump presidents. In particular, Biden's sanctions on Putin, his aligned oligarchs, and the Russian state were far more aggressive than anything any president (including Trump I) had ever done with the dollar. Farrell and Davies write that: Informal conversations with Biden officials suggest that they had noticed that, despite Trump’s actions, other countries had not moved away from the US dollar. Therefore, the Biden administration felt the US had greater leeway to use sanctions. In other words, the fact that enshittification produced no downside for the institution meant that its pro-enshittification factions kept winning the argument, and engaged in ever more severe forms of enshittification. The EU wasn't alone in worrying about US financial coercion. While China maintains much of its own transaction processing infrastructure, it is still very exposed to the dollar system, prompting it to take measures for retaliation and alternatives if the US overstepped. Meanwhile, the increasing controls and costs of using the dollar drove many parties to cryptocurrencies. Some were criminals whom dollar weaponization was supposed to harass, but many were just innocent bystanders, dolphins caught in the tuna net (think of American relatives of Russians who wanted to send their families money for food, rent, or even a plane ticket out of Russia). Biden responded to the growing use of crypto to evade dollar rules with regulations to bring crypto under tighter control, for example, by classing crypto as a security and subjecting it to financial regulation. The Biden administration's rules for banks that offered crypto services and trading made handling crypto so expensive that most banks just gave up on it altogether. Crypto boosters used this response to campaign against Biden and for Trump, accusing Biden of "strangling" crypto and "debanking" its users. Trump won a second presidency, in part thanks to billions in dark money from crypto insiders (many of whom Trump went on to pardon for money-laundering convictions carrying heavy fines and long prison sentences). At the outset of the second Trump presidency, Trump relied on tariffs, rather than dollar weaponization, to push the world around. As Farrell and Davies write, Trump gave speeches where he recognized the danger of squeezing dollar users too hard: The problem with … sanctions … [is that] ultimately it kills your dollar and it kills everything the dollar represents. … So I use sanctions very powerfully against countries that deserve it, and then I take them off. Because, look, you’re losing Iran. You’re losing Russia. China is out there trying to get their currency to be the dominant currency as you know better than anybody. … So I want to use sanctions as little as possible. Trump thinks that using sanctions is fine, provided that then he "take[s] them off." This has resulted in the trademark Trump chaos of announced and rescinded and reimposed sanctions – against Chinese refineries, a Yemeni bank, the International Criminal Court, and the nation of Colombia. It's possible that this is less onerous than permanent (or at least, long-term) sanctions, but not by much. If no one can be sure that they'll be able to use the dollar tomorrow – even if they might be able to use it again the day after – there's far more pressure to find dollar alternatives. Meanwhile, Farrell and Davies observe that: [Trump is] more willing to impose sanctions on allies, since they are less able to defect from the dollar than neutrals and rivals, and less likely to act against crypto even though it facilitates sanctions evasion. In other words, Trump's reserving his most destructive punishments for his friends, because his enemies are more likely to flee to China if he uses his most devastating attacks on them. This is a very interesting observation, especially in light of Canada's announcement that it is leaving the American sphere of influence to become a neutral party with many alliances, including with China. If Farrell and Davies are right, this might mean that Canada will be less likely to face sanctions in the future than it risked when it was formally allied with the USA. Meanwhile, Trump's indiscriminate use of tariffs is steadily worsening the American domestic situation, driving up prices: https://fortune.com/2026/01/21/amazon-price-hikes-tariffs-2026-andy-jassy-davos/ Farrell and Davies predict that this will drive Trump to switch from using tariffs to using sanctions (after all, Trump's executive function has always been terrible, and it's only declined as his white matter disease has progressed). The EU is getting ready for this by finalizing the "Digital Euro." If Trump responds to this with more sanctions, it will only hasten the world's switch away from the dollar. The authors call this a "positive feedback loop" (despite the word "positive," that's not a good thing – a positive feedback loop causes a system to keep on speeding up until it is shaken to pieces). The EU has good reasons to escape the dollar. The US has good reasons to fight the EU's escape. Everything the US does to punish the EU for trying to escape the dollar will make the EU want to escape the dollar even more. The post-American era is being born around us, but when it comes to US "platforms" like the dollar (or even the transoceanic fiber links that all make landfall and interchange in the US), the expense and lock-in have left the world without any obvious and ready alternatives: https://pluralistic.net/2025/11/26/difficult-multipolarism/#eurostack But there's one post-American platform that's right there for the taking: a global collaboration to develop open, auditable, trustworthy alternatives to US tech, from administrative tools like Office365 to the firmware in tractors, cars, and medical equipment: https://pluralistic.net/2026/01/01/39c3/#the-new-coalition It's a project that the EU is actively pursuing: https://finance.yahoo.com/news/big-bazooka-europe-could-hit-100000361.html But I don't think they've yet grasped how crucial the project of getting off US tech is – not just because it's urgent, but because it's also tractable. While replacing the dollar is hamstrung by network effects, building a global software commons benefits from network effects. It starts strong, and gets better every time someone else joins it. What's more: I suspect that a world that is already bound together with a common tech stack would have a much easier time coordinating resistance to dollar weaponization. Hey look at this (permalink) Kyle Crutcher pottery http://www.brandbeorn.com/Sci-Fi.html Avi Lewis endorsed by authors Gabor Maté, Cory Doctorow, Yann Martel, Astra Taylor, Carmen Aguirre, and Ann Douglas https://bsky.app/profile/avilewis.ca/post/3mcxh2jmd622x AI hasn't delivered the profits it was hyped for, says Deloitte https://www.theregister.com/2026/01/21/deloitte_enterprises_adopting_ai_revenue_lift/ Zack Polanski to hand in NHS contract termination notice to Palantir https://www.thecanary.co/uk/news/2026/01/22/zack-polanski-to-hand-in-nhs-contract-termination-notice-to-palantir/ Minneapolis church has delivered more than 12,000 boxes of groceries to families in hiding https://www.mprnews.org/episode/2026/01/15/minneapolis-church-has-delivered-more-than-12000-boxes-of-groceries-to-families-in-hiding Object permanence (permalink) #20yrsago Universal DRM dystopia https://tarmle.livejournal.com/80182.html #20yrsago Library’s one-year anniversary of lending video-games https://www.gamingtarget.com/article.php?artid=4941 #20yrsago UK music industry execs can’t talk straight about DRM https://web.archive.org/web/20060203090643/http://rock.thepodcastnetwork.com/2006/01/25/digital-music-the-industry-answers/ #20yrsago BBC report on UK gamers from 6-65 https://web.archive.org/web/20060207060943/http://crystaltips.typepad.com/wonderland/files/bbc_uk_games_research_2005.pdf #20yrsago Norwegian ombudsman to review iTunes terms of service https://web.archive.org/web/20070208163427/http://forbrukerportalen.no/Artikler/2006/1138119849.71 #20yrsago Google Cache is legal https://web.archive.org/web/20060130212935/https://www.eff.org/deeplinks/archives/004344.php #20yrsago NSA’s licensable patent portfolio https://web.archive.org/web/20060116103440/https://www.nsa.gov/techtrans/techt00002.cfm #20yrsago Senators figure out the Broadcast Flag, curse it as an abomination! https://web.archive.org/web/20060130212403/https://www.eff.org/deeplinks/archives/004343.php #20yrsago HOWTO turn a disposable camera into an RFID-killer https://events.ccc.de/congress/2005/wiki/RFID-Zapper(EN) #20yrsago World of Warcraft: Don’t tell anyone you’re queer https://web.archive.org/web/20060131191638/http://www.innewsweekly.com/innews/?class_code=Ga&article_code=1172 #15yrsago PirateBox: anonymous, stand-alone wireless filesharing node https://web.archive.org/web/20110129205033/http://wiki.daviddarts.com/PirateBox #15yrsago Where antibiotic resistant superbugs come from: biology explained at a “3d grade reading level” https://www.slideshare.net/slideshow/development-of-resistant-staphylococcus-aureus-over-time-v8-web/6712973 #15yrsago Provocative metaphor for the Irish bailout https://memex.naughtons.org/how-a-bail-out-works/12877/ #15yrsago Douglas Adams’ online encylopedia tries to buy itself back from the BBC https://web.archive.org/web/20110127104628/https://www.bbc.co.uk/dna/h2g2/brunel/A80173361 #15yrsago Ebert: 3D movies suck https://web.archive.org/web/20110131232913/http://blogs.suntimes.com/ebert/2011/01/post_4.html #15yrsago Anti-capitalist rumba rave in a Spanish bank https://www.youtube.com/watch?v=Wv5dh8v7mDs #15yrsago Meet Obama’s new Solicitor General: the copyright industry’s Donald Verrilli Jr https://arstechnica.com/tech-policy/2011/01/obama-nominates-former-riaa-lawyer-for-solicitor-general-spot/ #10yrsago The story of magic: how narrative destroys conjurers’ effects, or elevates them to transcendence https://www.thejerx.com/blog/2016/1/23/dqwn4rocxdovl0dqcqymdhekzmuzq4 #10yrsago Majority of UK booze-industry revenues come from problem drinkers https://www.theguardian.com/society/2016/jan/22/problem-drinkers-alcohol-industry-most-sales-figures-reveal #10yrsago Oklahoma’s repeat-offender Republican Creationist lawmakers take another run at science education https://arstechnica.com/science/2016/01/this-years-first-batch-of-anti-science-education-bills-surface-in-oklahoma/ #10yrsago You can’t “boost” your immune system with “health food,” nor would you want to https://www.theguardian.com/science/2016/jan/24/health-foods-immune-system-colds-vitamins #10yrsago Stop taking “probiotics” https://www.statnews.com/2016/01/21/probiotics-shaky-science/ #10yrsago Swiss pro-privacy email provider forces a referendum on mass surveillance https://web.archive.org/web/20160125153009/https://theintercept.com/2016/01/25/how-a-small-company-in-switzerland-is-fighting-a-surveillance-law-and-winning/ #10yrsago Howto social-engineer someone’s address and other sensitive info from Amazon https://medium.com/@espringe/amazon-s-customer-service-backdoor-be375b3428c4#.jkx7fwbqv #10yrsago Uptown Funk as a mashup of 66 classic movie dance routines https://www.youtube.com/watch?v=M1F0lBnsnkE #10yrsago Starve: the best, meanest new graphic novel debut since Transmetropolitan https://memex.craphound.com/2016/01/25/starve-the-best-meanest-new-graphic-novel-debut-since-transmetropolitan/ #10yrsago Fury Road is still comprehensible at 12x speed https://vashivisuals.com/the-fastest_cut/ #10yrsago Police sergeant: 16 year old girl probably saw penises before I showed her mine, NBD https://www.wcvb.com/article/bpd-sergeant-may-plead-guilty-job-on-the-line/8230846 #10yrsago Chinese snatch-squads roam the globe, kidnapping dissidents and critics https://web.archive.org/web/20160416214222/https://www.washingtonpost.com/world/asia_pacific/pursuing-critics-china-reaches-across-borders-and-nobody-is-stopping-it/2016/01/26/cd4959dc-6793-473f-8b74-6cbac3f46422_story.html?postshare=7221453857631693&tid=ss_tw #10yrsago Shootout in Oregon: one terrorist killed, eight arrested https://www.cnn.com/2016/01/26/us/oregon-wildlife-refuge-siege-arrests/index.html #10yrsago Health insurer loses 1m customers’ health records https://web.archive.org/web/20170224042328/http://phx.corporate-ir.net/phoenix.zhtml?c=130443&p=irol-newsArticle_Print&ID=2132066 #10yrsago All your booze comes from a handful of titanic global corporations https://www.eater.com/drinks/2016/1/26/10830410/liquor-brands-hierarchy-diageo-beam-suntory-pernod-ricard #10yrsago Man gasps dying words into officer’s bodycam: “They’re killing me right now… I can’t breathe.” https://arstechnica.com/tech-policy/2016/01/body-cam-captures-mans-final-words-begging-the-cops-to-get-off-of-him/ #10yrsago Help wanted: Burning Man’s Chief Fed https://web.archive.org/web/20160205123132/https://www.usajobs.gov/GetJob/ViewDetails/426715200 #5yrsago Goldman CEO gets $17.5m reward for $4.5b fraud https://pluralistic.net/2021/01/27/viral-colonialism/#failing-up #5yrsago Facebook champions (its own) privacy https://pluralistic.net/2021/01/27/viral-colonialism/#ico-schtum #5yrsago Casino mogul steals First Nation's vaccine https://pluralistic.net/2021/01/27/viral-colonialism/#seriously-fuck-that-guy #5yrsago Plute buys mayor's house and serves eviction papers https://pluralistic.net/2021/01/25/money-is-power/#money-is-power #5yrsago Trump's swamp gators find corporate refuge https://pluralistic.net/2021/01/24/1a/#gator-park #5yrsago Stop saying "it's not censorship if it's not the government" https://pluralistic.net/2021/01/24/1a/#talk-hard #1yrago The first days of Boss Politics Antitrust https://pluralistic.net/2025/01/24/enforcement-priorities/#enemies-lists #1yrago It's not a crime if we do it with an app pluralistic.net/2025/01/25/potatotrac/#carbo-loading #1yrago It's pretty easy to cut $2 trillion from the federal budget, actually https://pluralistic.net/2025/01/27/beltway-bandits/#henhouse-foxes #20yrsago Danny O’Brien’s Open Source con presentation on Evil https://www.spesh.com/danny/talks/evil/ #20yrsago Can DRM be future-proof? https://blog.citp.princeton.edu/2006/01/28/cd-drm-compatibility-and-software-updates/ #15yrsago Francis Ford Coppola, copyfighter https://web.archive.org/web/20110125035605/http://the99percent.com/articles/6973/Francis-Ford-Coppola-On-Risk-Money-Craft-Collaboration #15yrsago HOWTO make health-care cheaper by spending more on patients who need it https://web.archive.org/web/20140727223819/https://www.newyorker.com/magazine/2011/01/24/the-hot-spotters?currentPage=all #15yrsago William Gibson on Stuxnet https://www.nytimes.com/2011/01/27/opinion/27Gibson.html?_r=2&adxnnl=1&adxnnlx=1296233597-MyRiudJI0Nso7Tm/YIw4yw #10yrsago Guess who donated all the money to Black Americans for a Better Future Super PAC? Rich white men. https://web.archive.org/web/20160129001243/https://theintercept.com/2016/01/28/black-americans-for-a-better-future-super-pac-100-funded-by-rich-white-guys/ #10yrsago Bill Gates sold rights to the Tiananmen 1989 pictures to a Chinese company https://qz.com/601830/bill-gates-has-sold-a-set-of-iconic-images-to-a-beijing-firm-including-of-tiananmen-in-1989 #10yrsago Michael Moore: Flint needs a revolution, not bottled water https://web.archive.org/web/20160128161328/https://michaelmoore.com/DontSendBottledWater #10yrsago The surveillance business model goes to war against the FTC https://thehill.com/blogs/congress-blog/technology/267070-businesses-are-invading-your-privacy/ #10yrsago Florida mayors write to GOP presidential hopefuls demanding action on climate change https://arstechnica.com/science/2016/01/florida-mayors-to-rubio-were-going-under-take-climate-change-seriously/ #10yrsago The Onion’s new owner is Hillary Clinton’s most lavish financial backer https://web.archive.org/web/20160126213016/https://theintercept.com/2016/01/26/ha-ha-hillary-clintons-top-financial-supporter-now-controls-the-onion/ #10yrsago Microsoft billionaire Paul Allen wipes out coral reef with his superyacht https://caymannewsservice.com/2016/01/billionaire-boater-destroys-wb-reef/ #10yrsago Head of NSA’s hacker squad explains how to armor networks against the likes of him https://www.wired.com/2016/01/nsa-hacker-chief-explains-how-to-keep-him-out-of-your-system/ #10yrsago Anaheim: the happiest surveillance state on earth https://arstechnica.com/tech-policy/2016/01/city-cops-in-disneylands-backyard-have-had-stingray-on-steriods-for-years/ #5yrsago Knowledge is why you build your own apps https://pluralistic.net/2021/01/28/payment-for-order-flow/#knowledge-is-power #5yrsago Understanding /r/wallstreetbets https://pluralistic.net/2021/01/28/payment-for-order-flow/#wallstreetbets #5yrsago How apps steal your location https://pluralistic.net/2021/01/28/payment-for-order-flow/#trackers-tracked #5yrsago Mexican indigenous telco wins spectrum fight https://pluralistic.net/2021/01/28/payment-for-order-flow/#tic-victory Upcoming appearances (permalink) Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Salt Lake City: Enshittification at the Utah Museum of Fine Arts (Tanner Humanities Center), Feb 18 https://tanner.utah.edu/center-events/cory-doctorow/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berkeley: Bioneers keynote, Mar 27 https://conference.bioneers.org/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) How the Internet Got Worse (Masters in Business) https://www.youtube.com/watch?v=auXlkuVhxMo Enshittification (Jon Favreau/Offline): https://crooked.com/podcast/the-enshittification-of-the-internet-with-cory-doctorow/ Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1019 words today, 14468 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: The petty (but undeniable) delights of cultivating unoptimizability as a habit (22 Jan 2026)
Today's links The petty (but undeniable) delights of cultivating ungovernability as a habit: Get good at being on hold. Hey look at this: Delights to delectate. Object permanence: "Ventus"; Woody Guthrie v Trump's dad; Tory MP v poppers. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. The petty (but undeniable) delights of cultivating ungovernability as a habit (permalink) I am on record as being skeptical of the notion that if you shop very carefully, you can make society better. "Conscious consumption" is not a tool for structural change, and any election that requires you to "vote with your wallet" is always won by the people with the thickest wallets (statistically speaking, that's not you): https://pluralistic.net/2025/09/13/consumption-choices/#marginal-benefits Now, that's not to say that boycotts are useless. But a boycott is a structured and organized campaign. The Montgomery bus boycott wasn't a matter of a bunch of people waking up one morning and saying, "You know what, fuck it, I'm gonna walk today": https://en.wikipedia.org/wiki/Montgomery_bus_boycott The Montgomery bus boycott was an organized project, put together by a powerful membership organization, the NAACP, that demanded far more of its members than merely shopping very carefully. The boycott was the end stage of an organized resistance, not a substitute for it. The problem with "conscious consumption" is that it comes out of the neoliberal tradition in which every political matter is supposedly determined by your individual actions, and not your actions as part of a union or other political institution that works as a bloc to overthrow the status quo. "Conscious consumption" arises out of the tradition that gave us Margaret Thatcher's maxim, "There is no such thing as society. There are individual men and women and there are families and no government can do anything except through people and people look to themselves first." Any attempt to change society by shopping very carefully is destined to fail, but it's worse than that. Because "shopping very carefully" never makes systemic change, its practitioners inevitably decide the reason they're not seeing the change they yearn for is that their allies aren't shopping carefully enough. This turns the careful shopper into a cop who polices other people's consumption, demanding that they stop eating some foodstuff or using Twitter or watching HBO Max. Squabbling over whether using a social media network makes you a Nazi generates far more heat than light – so much heat that it incinerates the solidarity you need to actually fight Nazis. Which is not an argument against boycotts! Boycotts work. If boycotts didn't work, then genocide apologists wouldn't be apoplectic over the BDS movement: https://bdsmovement.net/ But a "boycott" isn't the same thing as "you and your social circle deciding that buying the wrong product makes you a Bad Person and then devoting your energies to scolding your allies for choosing Coke instead of Pepsi." Boycotts are downstream of organizing; they are not a substitute for organizing. There is such a thing as society. Now, all that said, I will confess: I sometimes do something that looks a lot like "shopping very carefully," and when I do, I derive enormous satisfaction from it (but I am always careful not to mistake my tiny victories for political action). But I get it, honestly, I do. Sometimes, "shopping very carefully" is a way to eke out a tiny, personal victory in the face of overwhelming odds against a wildly overmatched opponent. That feels very good. One example would be patronizing my local repair shop (or fixing my stuff myself). The big structural barriers to repair are things like "parts pairing": https://pluralistic.net/2024/05/24/record-scratch/#autoenshittification And manufacturers who abuse trademark law to get CBP to seize refurbished parts at the border: https://www.shacknews.com/article/108049/apple-repair-critic-louis-rossmann-takes-on-us-customs-counterfeit-battery-seizure The repair problem isn't that your neighbors are "sheeple" who've had their minds warped by a "throwaway society." The problem is that technical and legal countermeasures have made repair so hard and unprofitable that getting your stuff fixed is more expensive and time-consuming than it needs to be. That said: I love going to my local repair shop. I love fixing things on my own. It's great. It makes me feel great. I think you should do it because it may make you feel great, too, and it'd be nice for you to support your local fix-it place, but let's not pretend that we'll change society that way. Here's another example: for the past couple years, I've been navigating a (thankfully very treatable) cancer diagnosis. The fact that my cancer is very treatable doesn't mean it's easily treated. America's shitty, for-profit healthcare system is terrible at the best of times, and nearly unnavigable when coping with a complex condition that crosses a lot of disciplinary lines and requires access to specialized, expensive equipment. I'm asymptomatic, so the hardest part of having cancer – so far – is fighting the Kaiser bureaucracy to make sure my treatment goes off as planned: https://pluralistic.net/2024/11/05/carcinoma-angels/#squeaky-nail The fact that the different Kaiser departments drop so many balls when handing off care between them means that I have to juggle those balls for them. I make extensive use of organizational tactics like "suspense files," which are a kind of inverted to-do list, in that they let you manage other people's to-do lists, rather than your own: https://pluralistic.net/2024/10/26/one-weird-trick/#todo (In case you're wondering, the best part of having cancer is that Kaiser comps 100% of your parking! Free cancer parking!) Now, I also make sure to note each of Kaiser's failures and I raise grievances and California health ombudsman complaints for each one – not because I'm angry and want an apology, but because I'm a well-organized, native English-speaking cancer patient with no symptoms, which means that I can do the advocacy that other people can't, and help them (I also track these complaints with suspense files, calendar entries, etc, to make sure that they're followed through). Partly, I'm able to do this because I'm very organized. I'm not organized because I worship at the cult of "personal productivity"; I'm definitely Jenny Odell-pilled on that score: https://memex.craphound.com/2019/04/09/how-to-do-nothing-jenny-odells-case-for-resisting-the-attention-economy/ I'm organized because I pursue The Way of Jim Munroe's "Time Management for Anarchists" ("once I learned how to make my own structure, I was able to kick my expensive boss habit and work on my own"): https://jimmunroe.net/comics/pamphlets/time_management_for_anarchists/time_management_for_anarchists.html Having invested a lot of energy into being organized, I now get massive discounts on dealing with other people's shit. Remember: giant corporations and other remorseless bureaucracies throw up roadblocks on the assumption that you will be a "rational economic actor." The airline assumes that if it costs you 15 hours to collect on the $50 voucher you're entitled to, you will just let them steal $50 from you. But once you get organized enough, you can cut that 15-hour investment down to a 15-minute one, and I will absolutely trade 15 minutes of dealing with an airline's bullshit for $50 of that airline's money. (Why yes, Air Canada did fuck me over on Jan 3 and get me home at 5AM the next day, instead of 730PM the night before; and yes, they did deny my compensation claim; and yes, I have filed an appeal with the Canada Transport Agency; why do you ask?) One of my favorite podcasts is "An Arm and a Leg," which divides itself between deep dive structural analyses into how corrupt and ghastly American medical billing is, and enumerations of sweet hacks that ninja bill-fighters have come up with to slice through the billing labyrinth your insurer and hospital trap you in and cut straight to the bullseye: https://armandalegshow.com/ For example, the latest episode tells the story of Jared Walker, who figured out that hospitals were stealing billions of dollars every year from the poorest people in America, who were all entitled to have their medical bill canceled. He founded Dollarfor, a nonprofit that helps patients get their medical debt canceled: https://armandalegshow.com/episode/our-favorite-project-of-2025-levels-up-and-you-can-help/ Dollarfor now has an automated tool that guides you through a survey and then generates and files the completed, hospital-specific paperwork needed to get your medical debt canceled (they've made versions of this for every hospital in America!): https://dollarfor.org/ (If you're a health worker, here's a printable guide with QR codes that you can clip to your lanyard and show to patients while you deliver care): https://drive.google.com/file/d/14cfwK66A_mfBBBqn35_Lp7930uoY-73f/view Now, the real problem here isn't that hospitals steal billions from charity cases: it's that America has a garbage for-profit healthcare system that kills and bankrupts people at scale. Dollarfor is amazing, but it's not going to fix that problem. I don't know Walker, but I bet if you asked him, he'd agree with this, and say something like, "Yes, and I'm helping people not have their lives destroyed by this garbage system, which is good unto itself; and also, it might give them the free time and wherewithal to participate in movements to overthrow the garbage system." I really dote on the fact that Dollarfor has literally built a different version of their tool for every single hospital in the country. It's a perfect example of how turning yourself into a highly organized adversary can overcome the time-based economics our enemies rely on to keep their garbage systems intact. Whenever I think of this stuff, I flash on two pop-culture references that made a deep impression on me. The first comes from 1985's Real Genius, Val Kilmer's best ever movie (fight me!). Real Genius is set at a fictionalized version of Caltech in which young prodigies slowly discover that their scumbag prof has tricked them into working on a weapons contract for the DoD. This being fictional-Caltech, there are all these scenes in which very smart people do weird and amazing things. At one point, we learn that there's a former child prodigy living in the basement under the dorms, a guy named Lazlo Hollyfeld who became a hermit after discovering that he, too, had been duped into working on a baby-killer project. We get these tantalizing glimpses of Lazlo in his subterranean redoubt, where he has built some kind of giant Rube Goldberg machine that is engaged in a mysterious mechanical process that involves manipulating cards of some sort. At the film's denouement (spoiler alert for a 40 year old movie), we discover what he was doing: Lazlo: These are entries into the Frito-Lay Sweepstakes. "No purchase necessary, enter as often as you want" – so I am. Chris: That's great! How many times? Lazlo: Well, this batch makes it one million six hundred and fifty thousand. I should win thirty-two point six percent of the prizes, including the car. Chris: That kind of takes the fun out of it, doesn't it? Lazlo: They set up the rules, and lately I've come to realize that I have certain materialistic needs. https://www.youtube.com/watch?v=I6kBfBXZBdc Then there's a scene from the otherwise tepid (fight me!) Batman Returns (1992) in which we encounter the Penguin in his subterranean redoubt, brandishing pages full of kompromat that have been laboriously taped together: The Penguin: What about the documents that prove you own half the firetraps in Gotham City? Maximillian 'Max' Shreck: If there were such documents – and that's not an admission – I would have seen to it they were shredded. The Penguin: Ah, good idea! [pulls out a sheaf of documents] The Penguin: A lot of tape and a little patience make all the difference. https://www.imdb.com/title/tt0103776/quotes/ Both Lazlo and the Penguin are defeating the time-based security assumptions of their adversaries. Frito Lay treats filling in 1.65m sweepstakes entries as the same thing as filling in infinity entries; Max Schrek treats the time needed to piece together shredded paper as infinite. Rounding a very large number up to infinity isn't entirely irrational, but once you get organized enough, you just might be able to find the time – or a system – to bring that very big number down to an entirely tractable value. Yes, this is a species of "careful shopping" but my point isn't to say that shopping carefully is useless – rather, that it's a drastic error to mistake this useful (and surprisingly satisfying) tactic for a strategy that will truly alter the system. Hey look at this (permalink) Verizon Wastes No Time Switching Device Unlock Policy to 365 Days https://www.droid-life.com/2026/01/20/verizon-device-unlock-policy-365-days/ CEOs say AI is making work more efficient. Employees tell a different story. https://www.msn.com/en-us/money/markets/ceos-say-ai-is-making-work-more-efficient-employees-tell-a-different-story/ar-AA1UE3Tq This is the End of the US Global Monetary System https://profstevekeen.substack.com/p/this-is-the-end-of-the-us-global Europe has more bargaining strength than it thinks https://www.programmablemutter.com/p/europe-has-more-bargaining-strength U.S workers just took home their smallest share of capital since 1947, at least https://finance.yahoo.com/news/u-workers-just-took-home-214018586.html Object permanence (permalink) #25yrsago Karl Schroeder's "Ventus" https://www.mindjack.com/books/ventus.html #20yrsago Hollywood’s Canadian MP plagiarizes entertainment industry in op-ed https://web.archive.org/web/20060814015107/http://www.michaelgeist.ca/index.php?option=com_content&task=view&id=1082 #20yrago Pope: Divine inspiration is copyrighted https://web.archive.org/web/20070219175621/http://www.timesonline.co.uk/tol/news/world/europe/article717916.ece #10yrsago Gay Tory MP outs himself as a “poppers” user, slams proposed ban https://web.archive.org/web/20160122212659/https://www.msn.com/en-gb/news/uknews/mp-crispin-blunt-admits-using-poppers-while-attacking-proposed-ban/ar-BBotElv #10yrsago Donald Trump’s dad was Woody Guthrie’s hated Klansman landlord https://theconversation.com/woody-guthrie-old-man-trump-and-a-real-estate-empires-racist-foundations-53026 #5yrsago How one of America's most abusive employers gets away with it https://pluralistic.net/2021/01/22/paperback-writer/#toothless #1yrago EFF's transition memo for the Biden admin https://pluralistic.net/2021/01/22/paperback-writer/#memo Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Salt Lake City: Enshittification at the Utah Museum of Fine Arts (Tanner Humanities Center), Feb 18 https://tanner.utah.edu/center-events/cory-doctorow/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berkeley: Bioneers keynote, Mar 27 https://conference.bioneers.org/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) How the Internet Got Worse (Masters in Business) https://www.youtube.com/watch?v=auXlkuVhxMo Enshittification (Jon Favreau/Offline): https://crooked.com/podcast/the-enshittification-of-the-internet-with-cory-doctorow/ Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1023 words today, 12377 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: Google's AI pricing plan (21 Jan 2026)
Today's links Google's AI pricing plan: From each according to their ability (to pay). Hey look at this: Delights to delectate. Object permanence: Disney buys Pixar; Bruces on "vernacular video"; Hickey paralysis; RIP David Hartwell; Personalized pricing; They were warned. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. Google's AI pricing plan (permalink) Google is spending a lot on AI, but what's not clear is how Google will make a lot from AI. Or, you know, even break even. Given, you know, that businesses are seeing zero return from AI: https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/ But maybe they've figured it out. In a recent edition of his BIG newsletter, Matt Stoller pulls on several of the strings that Google's top execs have dangled recently: https://www.thebignewsletter.com/p/will-google-organize-the-worlds-prices The first string: Google's going to spy on you a lot more, for the same reason Microsoft is spying on all of its users: because they want to supply their AI "agents" with your personal data: https://www.youtube.com/watch?v=0ANECpNdt-4 Google's announced that it's going to feed its AI your Gmail messages, as well as the whole deep surveillance dossier the company has assembled based on your use of all the company's products: Youtube, Maps, Photos, and, of course, Search: https://twitter.com/Google/status/2011473059547390106 The second piece of news is that Apple has partnered with Google to supply Gemini to all iPhone users: https://twitter.com/NewsFromGoogle/status/2010760810751017017 Apple already charges Google more than $20b/year not to enter the search market; now they're going to be charging Google billions to stay out of the AI market, too. Meanwhile, Google will get to spy on Apple customers, just like they spy on their own users. Anyone who says that Apple is ideologically committed to your privacy because they're real capitalists is a sucker (or a cultist): https://pluralistic.net/2024/01/12/youre-holding-it-wrong/#if-dishwashers-were-iphones But the big revelation is how Google is going to make money with AI: they're going to sell AI-based "personalized pricing" to "partners," including "Walmart, Visa, Mastercard, Shopify, Gap, Kroger, Macy’s, Stripe, Home Depot, Lowe's, American Express, etc": https://blog.google/products/ads-commerce/agentic-commerce-ai-tools-protocol-retailers-platforms/ Personalized pricing, of course, is the polite euphemism for surveillance pricing, which is when a company spies on you in order to figure out how much they can get away with charging you (or how little they can get away with paying you): https://pluralistic.net/2025/06/24/price-discrimination/# It's a weird form of cod-Marxism, whose tenet is "From each according to their desperation; to each according to their vulnerability." Surveillance pricing advocates say that this is "efficient" because they can use surveillance data to offer you discounts, too – like, say you rock up to an airline ticket counter 45 minutes before takeoff and they can use surveillance data to know that you won't take their last empty seat for $200, but you would fly in it for $100, you could get that seat for cheap. This is, of course, nonsense. Airlines don't sell off cheap seats like bakeries discounting their day-olds – they jack up the price of a last-minute journey to farcical heights. Google also claims that it will only use its surveillance pricing facility to offer discounts, and not to extract premiums. As Stoller points out, there's a well-developed playbook for making premiums look like discounts, which is easy to see in the health industry. As Stoller says, the list price for an MRI is $8,000, but your insurer gets a $6000 "discount" and actually pays $1970, sticking you with a $30 co-pay. The $8000 is a fake number, and so is the $6000 – the only real price is the $30 you're paying. The whole economy is filled with versions of this transparent ruse, from "department stores who routinely mark everything as 80% off" to pharmacy benefit managers: https://pluralistic.net/2024/09/23/shield-of-boringness/#some-men-rob-you-with-a-fountain-pen Google, meanwhile, is touting its new "universal commerce protocol" (UCP), a way for AI "agents" to retrieve prices and product descriptions and make purchases: https://www.thesling.org/the-harm-to-consumers-and-sellers-from-universal-commerce-protocol-in-googles-own-words/ Right now, a major hurdle to "agentic AI" is the complexity of navigating websites designed for humans. AI agents just aren't very reliable when it comes to figuring out which product is which, choosing the correct options, and putting it in a shopping cart, and then paying for it. Some of that is merely because websites have inconsistent "semantics" – literally things like the "buy" button being called something other than "buy button" in the HTML code. But there's a far more profound problem with agentic shopping, which is that companies deliberately obfuscate their prices. This is how junk fees work, and why they're so destructive. Say you're a hotel providing your rate-card to an online travel website. You know that travelers are going to search for hotels by city and amenities, and then sort the resulting list by price. If you hide your final price – by surprising the user with a bunch of junk fees at checkout, or, better yet, after they arrive and put their credit-card down at reception – you are going to be at the top of that list. Your hotel will seem like the cheapest, best option. But of course, it's not. From Ticketmaster to car rentals, hotels to discount airlines, rental apartments to cellular plans, the real price is withheld until the very last instant, whereupon it shoots up to levels that are absolutely uncompetitive. But because these companies are able to engage in deceptive advertising, they look cheaper. And of course, crooked offers drive out honest ones. The honest hotel that provides a true rate card, reflecting the all-in price, ends up at the bottom of the price-sorted list, rents no rooms, and goes out of business (or pivots to lying about its prices, too). Online sellers do not want to expose their true prices to comparison shopping services. They benefit from lying to those services. For decades, technologists have dreamed of building a "semantic web" in which everyone exposes true and accurate machine-readable manifests of their content to facilitate indexing, search and data-mining: https://people.well.com/user/doctorow/metacrap.htm This has failed. It's failed because lying is often more profitable than telling the truth, and because lying to computers is easier than lying to people, and because once a market is dominated by liars, everyone has to lie, or be pushed out of the market. Of course, it would be really cool if everyone diligently marked up everything they put into the public sphere with accurate metadata. But there are lots of really cool things you could do if you could get everyone else to change how they do things and arrange their affairs to your convenience. Imagine how great it would be if you could just get everyone to board an airplane from back to front, or to stand right and walk left on escalators, or to put on headphones when using their phones in public. Wanting it badly is not enough. People have lots of reasons for doing things in suboptimal ways. Often the reason is that it's suboptimal for you, but just peachy for them. Google says that it's going to get every website in the world to expose accurate rate cards to its chatbots to facilitate agentic AI. Google is also incapable of preventing "search engine optimization" companies from tricking it into showing bullshit at the top of the results for common queries: https://pluralistic.net/2024/05/03/keyword-swarming/#site-reputation-abuse Google somehow thinks that the companies that spend millions of dollars trying to trick its crawler won't also spend millions of dollars trying to trick its chatbot – and they're providing the internet with a tool to inject lies straight into the chatbot's input hopper. But UCP isn't just a way for companies to tell Google what their prices are. As Stoller points out, UCP will also sell merchants the ability to have Gemini set prices on their products, using Google's surveillance data, through "dynamic pricing" (another euphemism for "surveillance pricing"). This decade has seen the rise and rise of price "clearinghouses" – companies that offer price "consulting" to direct competitors in a market. Nominally, this is just a case of two competitors shopping with the same supplier – like Procter and Gamble and Unilever buying their high-fructose corn-syrup from the same company. But it's actually far more sinister. "Clearinghouses" like Realpage – a company that "advises" landlords on rental rates – allow all the major competitors in a market to collude to raise prices in lockstep. A Realpage landlord that ignores the service's "advice" and gives a tenant a break on the rent will be excluded from Realpage's service. The rental markets that Realpage dominates have seen major increases in rental rates: https://pluralistic.net/2025/10/09/pricewars/#adam-smith-communist Google's "direct pricing" offering will allow all comers to have Google set their prices for them, based on Google's surveillance data. That includes direct competitors. As Stoller points out, both Nike and Reebok are Google advertisers. If they let Google price their sneakers, Google can raise prices across the market in lockstep. Despite how much everyone hates this garbage, neoclassical economists and their apologists in the legal profession continue to insist that surveillance pricing is "efficient." Stoller points to a law review article called "Antitrust After the Coming Wave," written by antitrust law prof and Google lawyer Daniel Crane: https://nyulawreview.org/issues/volume-99-number-4/antitrust-after-the-coming-wave/ Crane argues that AI will kill antitrust law because AI favors monopolies, and argues "that we should forget about promoting competition or costs, and instead enact a new Soviet-style regime, one in which the government would merely direct a monopolist’s 'AI to maximize social welfare and allocate the surplus created among different stakeholders of the firm.'" This is a planned economy, but it's one in which the planning is done by monopolists who are – somehow, implausibly – so biddable that governments can delegate the power to decide what we can buy and sell, what we can afford and who can afford it, and rein them in if they get it wrong. In 1890, Senator John Sherman was stumping for the Sherman Act, America's first antitrust law. On the Senate floor, he declared: If we will not endure a King as a political power we should not endure a King over the production, transportation, and sale of the necessaries of life. If we would not submit to an emperor we should not submit to an autocrat of trade with power to prevent competition and to fix the price of any commodity. https://pluralistic.net/2022/02/20/we-should-not-endure-a-king/ Google thinks that it has finally found a profitable use for AI. It thinks that it will be the first company to make money on AI, by harnessing that AI to a market-rigging, price-gouging monopoly that turns Google's software into Sherman's "autocrat of trade." It's funny when you think of all those "AI safety" bros who claimed that AI's greatest danger was that it would become sentient and devour us. It turns out that the real "AI safety" risk is that AI will automate price gouging at scale, allowing Google to crown itself a "King over the necessaries of life": https://pluralistic.net/2023/11/27/10-types-of-people/#taking-up-a-lot-of-space (Image: Noah_Loverbear; CC BY-SA 3.0; Cryteria, CC BY 3.0; modified) Hey look at this (permalink) The Line, a Saudi Megaproject, Is Dead https://www.thenation.com/article/world/the-line-neom-saudi-vision-2030/ Mark Carney's full speech at the World Economic Forum https://www.youtube.com/watch?v=btqHDhO4h10 A Grassroots Victory in the Golden Age of Bullies https://asupposedlylonething.net/blog/2026/grassroots-victory-golden-age-bullies/ AI may be everywhere, but it's nowhere in recent productivity statistics https://www.theregister.com/2026/01/15/forrester_ai_jobs_impact/ The Long Now of the Web: Inside the Internet Archive’s Fight Against Forgetting https://hackernoon.com/the-long-now-of-the-web-inside-the-internet-archives-fight-against-forgetting Object permanence (permalink) #20yrsago Disney swaps stock for Pixar; Jobs is largest Disney stockholder https://web.archive.org/web/20060129105430/https://www.telegraph.co.uk/money/main.jhtml?xml=/money/2006/01/22/cnpixar22.xml&menuId=242&sSheet=/money/2006/01/22/ixcitytop.html #20yrsago HOWTO anonymize your search history https://web.archive.org/web/20060220004353/https://www.wired.com/news/technology/1,70051-0.html #15yrsago Bruce Sterling talk on “vernacular video” https://vimeo.com/18977827 #15yrsago Elaborate televised prank on Belgium’s terrible phone company https://www.youtube.com/watch?v=mxXlDyTD7wo #15yrsago Portugal: 10 years of decriminalized drugs https://web.archive.org/web/20110120040831/http://www.boston.com/bostonglobe/ideas/articles/2011/01/16/drug_experiment/?page=full #15yrsago Woman paralyzed by hickey https://web.archive.org/web/20110123072349/https://www.foxnews.com/health/2011/01/21/new-zealand-woman-partially-paralyzed-hickey/ #15yrsago EFF warns: mobile OS vendors aren’t serious about security https://www.eff.org/deeplinks/2011/01/dont-sacrifice-security-mobile-devices #10yrsago Trumpscript: a programming language based on the rhetorical tactics of Donald Trump https://www.inverse.com/article/10448-coders-assimilate-donald-trump-to-a-programming-language #10yrsago That time the DoD paid Duke U $335K to investigate ESP in dogs. Yes, dogs. https://www.muckrock.com/news/archives/2016/jan/21/duke-universitys-deep-dive-uncanny-abilities-canin/ #10yrsago Kathryn Cramer remembers her late husband, David Hartwell, a giant of science fiction https://web.archive.org/web/20160124050729/http://www.kathryncramer.com/kathryn_cramer/2016/01/til-death-did-us-part.html #10yrsago What the Democratic Party did to alienate poor white Americans https://web.archive.org/web/20160123041632/https://www.alternet.org/economy/robert-reich-why-white-working-class-abandoned-democratic-party #10yrsago Bernie Sanders/Johnny Cash tee https://web.archive.org/web/20160126070314/https://weardinner.com/products/bernie-cash #5yrsago NYPD can't stop choking Black men https://pluralistic.net/2021/01/21/i-cant-breathe/#chokeholds #5yrsago Rolling back the Trump rollback https://pluralistic.net/2021/01/21/i-cant-breathe/#cra #1yrsago Winning coalitions aren't always governing coalitions https://pluralistic.net/2025/01/06/how-the-sausage-gets-made/#governing-is-harder #1yrago The Brave Little Toaster https://pluralistic.net/2025/01/08/sirius-cybernetics-corporation/#chatterbox #1yrago The cod-Marxism of personalized pricing https://pluralistic.net/2025/01/11/socialism-for-the-wealthy/#rugged-individualism-for-the-poor #1yrago They were warned https://pluralistic.net/2025/01/13/wanting-it-badly/#is-not-enough Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Salt Lake City: Enshittification at the Utah Museum of Fine Arts (Tanner Humanities Center), Feb 18 https://tanner.utah.edu/center-events/cory-doctorow/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ "can't make Big Tech better; make them less powerful" (Get Subversive) https://www.youtube.com/watch?v=X1EzM9_6eLE Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1010 words today, 11362 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: AI is how bosses wage war on "professions" (20 Jan 2026)
Today's links AI is how bosses wage war on "professions": The only people *required* to tell their bosses to fuck off. Hey look at this: Delights to delectate. Object permanence: Enshittification v VC; Byrne v DRM; Forger does it for the exposure; Beach trash hotel; Mafia nicknames; Longbow puzzle; NIMBYs; No one should be on the No-Fly list. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. AI is how bosses wage war on "professions" (permalink) Growing up, I assumed that being a "professional" meant that you were getting paid to do something. That's a perfectly valid definition (I still remember feeling like a "pro" the first time I got paid for my writing), but "professional" has another, far more important definition. In this other sense of the word, a "professional" is someone bound to a code of conduct that supersedes both the demands of their employer and the demands of the state. Think of a doctor's Hippocratic Oath: having sworn to "first do no harm," a doctor is (literally) duty-bound to refuse orders to harm their patients. If a hospital administrator, a police officer or a judge orders a doctor to harm their patient, they are supposed to refuse. Indeed, depending on how you feel about oaths, they are required to refuse. There are many "professions" bound to codes of conduct, policed to a greater or lesser extent by "colleges" or other professional associations, many of which have the power to bar a member from the profession for "professional misconduct." Think of lawyers, accountants, medical professionals, librarians, teachers, some engineers, etc. While all of these fields are very different in terms of the work they do, they share one important trait: they are all fields that AI bros swear will be replaced by chatbots in the near future. I find this an interesting phenomenon. It's clear to me that chatbots can't do these jobs. Sure, there are instances in which professionals may choose to make use of some AI tools, and I'm happy to stipulate that when a skilled professional chooses to use AI as an adjunct to their work, it might go well. This is in keeping with my theory that to the extent that AI is useful, it's when its user is a centaur (a person assisted by technology), but that employers dream of making AI's users into reverse centaurs (machines who are assisted by people): https://pluralistic.net/2025/12/05/pop-that-bubble/#u-washington A psychotherapist who uses AI to transcribe sessions so they can refresh their memory about an exact phrase while they're making notes is a centaur. A psychotherapist who monitors 20 chat sessions with LLM "therapists" in order to intervene if the LLM starts telling patients to kill themselves is a "reverse centaur." This situation makes it impossible for them to truly help "their" patients; they are an "accountability sink," installed to absorb the blame when a patient is harmed by the AI. Lawyers might use a chatbot to help them format a brief or transcribe a client meeting (centaur)- but when senior partners require their juniors and paralegals to write briefs at inhuman speed (reverse centaur), they are setting themselves up for briefs full of "hallucinated" citations: https://www.damiencharlotin.com/hallucinations/ I hold a bedrock view that even though an AI can't do your job, an AI salesman can convince your boss to fire you and replace you with an AI that can't do your job: https://pluralistic.net/2025/03/18/asbestos-in-the-walls/#government-by-spicy-autocomplete But why are bosses such easy marks for these gabby AI hustlers? Partly, it's because an AI can probably do your boss's job – if 90% of your job is answering email and delegating tasks, and if you are richly rewarded for success but get to blame failure on your underlings, then, yeah, an AI can totally do that job. But I think there's an important psychological dimension to this: bosses are especially easy to trick with AI when they're being asked to believe that they can use AI to fire workers who are in a position to tell them to fuck off. That certainly explains why bosses are so thrilled by the prospect of swapping professionals for chatbots. What a relief it would be to fire everyone who is professionally required to tell you to fuck off when you want them to do stupid and/or dangerous things; so you could replace them with servile, groveling LLMs that punctuate their sentences with hymns to your vision and brilliance! This also explains why media bosses are so anxious to fire screenwriters and actors and replace them with AI. After all, you prompt an LLM in exactly the same way a clueless studio boss gives notes to a writers' room: "Give me ET, but make it about a dog, give it a love interest, and put a car chase in Act III." The difference is that the writers will call you a clueless fucking suit and demand that you go back to your spreadsheets and stop bothering them while they're trying to make a movie, whereas the chatbot will cheerfully shit out a (terrible) script to spec. The fact that the script will suck is less important than the fact that swapping writers for LLMs will let studio bosses escape ego-shattering conflicts with empowered workers who actually know how to do things. It also explains why bosses are so anxious to replace programmers with chatbots. When programmers were scarce and valuable, they had to be lured into employment with luxurious benefits, lavish pay, and a collegial relationship with their bosses, where everyone was "just an engineer." Tech companies had business-wide engineering meetings where techies were allowed to tell their bosses that they thought their technical and business strategies were stupid. Now that tech worker supply has caught up with demand, bosses are relishing the thought of firing these "entitled" coders and replacing them with chatbots overseen by traumatized reverse centaurs who will never, ever tell them to fuck off: https://pluralistic.net/2025/08/05/ex-princes-of-labor/#hyper-criti-hype And of course, this explains why bosses are so eager to use AI to replace workers who might unionize: drivers, factory workers, warehouse workers. For what is a union if not an institution that lets you tell your boss to fuck off? https://www.thewrap.com/conde-nast-fires-union-staffers-video/ AI salesmen may be slick, but they're not that slick. Bosses are easy marks for anyone who dangles the promise of a world where everyone – human and machine – follows orders to the letter, and praises you for giving them such clever, clever orders. (Image: Christoph Scholz; CC BY-SA 2.0; Cryteria, CC BY 3.0; modified) Hey look at this (permalink) Giving University Exams in the Age of Chatbots https://ploum.net/2026-01-19-exam-with-chatbots.html Vein Finder Demonstration https://www.youtube.com/watch?v=NS68ePykav0 Author of ‘Don’t Say Abolish ICE’ Memo Is a Corporate Consultant https://prospect.org/2026/01/19/author-dont-say-abolish-ice-memo-corporate-consultant-westexec/ Experiment suggests AI chatbot would save insurance agents a whopping 3 minutes a day https://www.theregister.com/2026/01/16/axlerod_ai_saves_insurance_agents_time/ IMF Warns Global Economic Resilience at Risk if AI Falters https://slashdot.org/story/26/01/19/1423221/imf-warns-global-economic-resilience-at-risk-if-ai-falters Object permanence (permalink) #20yrsago Broadcast Flag is back, this time it covers iPods and PSPs, too https://memex.craphound.com/2006/01/20/broadcast-flag-is-back-this-time-it-covers-ipods-and-psps-too/ #20yrsago Nonprofit alternative to CDDB gets its first deal https://web.archive.org/web/20060128114433/http://blog.musicbrainz.org/archives/2006/01/introducing_lin_1.html #20yrsago David Byrne: boycott DRM https://web.archive.org/web/20060117084842/http://journal.davidbyrne.com/ #20yrsago Cozy blanket with sleeves: the Slanket https://web.archive.org/web/20060203040004/https://www.theslanket.com/ #15yrsago Safe-cracking robot autodials combinations to brute-force a high-security safe https://web.archive.org/web/20110709082726/http://www.kvogt.com/autodialer/ #15yrsago Forger never takes money, only wants to see his works hanging in galleries https://www.nytimes.com/2011/01/12/arts/design/12fraud.html #15yrsago Hotel made of beach trash in Madrid https://www.smh.com.au/traveller/travel-news/new-hotel-is-complete-rubbish-20110120-19xjl.html #15yrsago Enfield, CT cancels screening of Moore’s Sicko after pressure from local gov’t https://web.archive.org/web/20110123033350/http://web.resourceshelf.com/go/resourceblog/63420 #15yrsago Best mafiosi nicknames from today’s historic bust https://web.archive.org/web/20110126120419/https://blogs.villagevoice.com/runninscared/2011/01/the_20_best_nic.php #10yrsago Very sad news about science fiction titan David G Hartwell https://memex.craphound.com/2016/01/20/very-sad-news-about-science-fiction-titan-david-g-hartwell/ #10yrsago Solving the “Longbow Puzzle”: why did France and Scotland keep their inferior crossbows? https://www.journals.uchicago.edu/doi/abs/10.1086/684231 #10yrsago Netflix demands Net Neutrality, but makes an exception for T-Mobile https://www.theverge.com/2016/1/19/10794288/netflix-t-mobile-binge-on-net-neutrality-zero-rating #10yrsago Research: increased resident participation in city planning produces extreme wealth segregation https://arstechnica.com/tech-policy/2016/01/data-analysis-reveals-that-us-cities-are-segregating-the-wealthy/ #10yrsago Independent economists: TPP will kill 450,000 US jobs; 75,000 Japanese jobs, 58,000 Canadian jobs https://www.techdirt.com/2016/01/19/more-realistic-modelling-tpps-effects-predicts-450000-us-jobs-lost-gdp-contraction/ #10yrsago Howto: make your own fantastically detailed Star Trek: TOS bridge playset https://www.instructables.com/Star-Trek-Enterprise-Bridge-Playset/ #10yrsago Strategic butt coverings in video games https://www.youtube.com/watch?v=ujTufg1GvR4 #10yrsago Company that pampers rich people at Burning Man won’t give up https://memex.craphound.com/2016/01/20/company-that-pampers-rich-people-at-burning-man-wont-give-up/ #5yrsago No one should be on the No-Fly List https://pluralistic.net/2021/01/20/damn-the-shrub/#no-nofly #5yrsago My letter to the FBI https://pluralistic.net/2021/01/20/damn-the-shrub/#foia #1yrago Enshittification isn't caused by venture capital https://pluralistic.net/2025/01/20/capitalist-unrealism/#praxis #1yrago Keir Starmer appoints Jeff Bezos as his "first buddy" https://pluralistic.net/2025/01/22/autocrats-of-trade/#dingo-babysitter Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ "can't make Big Tech better; make them less powerful" (Get Subversive) https://www.youtube.com/watch?v=X1EzM9_6eLE Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1002 words today, 10352 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: Social media without socializing (19 Jan 2026)
Today's links Social media without socializing: For Zuck, your friends are a problem to be solved. Hey look at this: Delights to delectate. Object permanence: "Among Others"; Vagina tea-balls; MLK was a socialist; Planet Money's free Gatsby audiobook; Bounty for wiretapping lefty profs; Poe's graveside ritual; Sleep Mafia; Whence came tarps; GM's Dieslgate; NRO's octopus; Amazon solidarity; Billionaire-proofing the internet. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. Social media without socializing (permalink) From the earliest days of social media, social media bosses have been at war with sociability. To create a social media service is to demarcate legitimate and illegitimate forms of sociability. It's a monumental act of hubris, really. It was ever thus. The founder of Friendster decreed that people could only form friendship bonds with each other, but could not declare themselves to be "friends" of everyone with a common interest. You and I could be friends, but you couldn't be "friends" with a group called "bloggers." Each member of that group would have to create a reciprocal friendship link to see one another's feeds. Way back in 1999, Larry Lessig taught us that "code is law." By encoding these restrictions into the feed, Friendster's programmers were putting limits on the kinds of relationships that could be formed using the service. But Lessig's law (code?) is often overidden by an even older principle: William Gibson's 1982 maxim that "the street finds its own uses for things." Friendster told its users how to be friends with one another, and Friendster's users treated Friendster's management as damage and routed around it. They created accounts with names like "New York City" and whenever anyone friended that account, it friended them back. Users hacked their own way to form "illegitimate" friendships based on affinity into the system: https://www.zephoria.org/thoughts/archives/2003/08/17/the_fakester_manifesto.html As social media turned into a billion- (and then a trillion-) dollar business, the urgency of the struggle between how social media bosses demanded that we socialize and how we wanted to socialize only got sharper. Mark Zuckerberg doubtless thought he was covering all his bases when he tossed a casual "It's complicated" to the pulldown menu for defining your relationship status, but that's because he doesn't understand how complicated all our relationships are: https://www.phillymag.com/news/2013/07/10/facebook-complicated-relationship-status/ For Zuck, crisply defined relationships were things that he could do simple math on in order to target ads, make recommendations, and sort users into categories. When you need to treat relationships as elements in a series of discrete mathematical operations, the fact that relationships are intrinsically, irreducibly qualitative is a serious bug. So Zuck did what computer scientists usually do when they want to do math on qualitative variables: he incinerated all the qualitative elements by quantizing them, and then did math on the dubious residue that remained: https://locusmag.com/feature/cory-doctorow-qualia/ Zuck's biggest problem isn't the ambiguity of your social connections, though – it's that they exist at all. Think about it: Mark Zuckerberg personally makes or loses billions of dollars based on how much you socialize with your friends on his platforms. If your friends engage with you in ways that are low intensity and easily concluded ("How'd you sleep?" "Just fine." "That's nice."), then he loses. If, on the other hand, you and your friends get into protracted, intense interactions, he gets to show you so many ads and make so much money. Your friends are a problem for Mark Zuckerberg to solve, and (to his undying chagrin), you and your friends stubbornly refuse to organize your relationships around Zuck's financial imperatives. You just wanna hang out in the rhythms that are part of any friendship – sometimes intense, sometimes casual, often sporadic. I mean, honestly, if you're going to insist on just having normal friendships, how the hell can Mark Zuckerberg post the kind of growth his shareholders expect? This explains much of the drive to transform Facebook from a platform that shows you the things your friends post to a platform that mostly shows you things that "content creators" post. Your friends aren't motivated by the dangling possibility of viral dollars if they get you to "engage" with their posts, but for content creators, your engagement buys the groceries and pays the rent. By swapping out your friends and replacing them with people who are highly motivated to "engage" with you, Zuck gets a lever he can yank to get his users to arrange their conduct in ways that goose his growth. In other words, Zuck lured you in with the promise of having pleasurable online conversations that matter to you; and now that he's trapped you, he wants you to break up with your friends so you have more time to watch his community access cable station. It also explains Zuck's passion for filling his platform with botshit, and his plan to solve the loneliness epidemic by giving you chatbots instead of friends: https://fortune.com/2025/06/26/mark-zuckerberg-ai-friends-hinge-ceo/ For Mark Zuckerberg, all people are just shitty chatbots – chatbots that won't follow orders. He wants to be able to point us at one another in the hopes that we will simply prompt one another into endless chatter, with endless scrolling, and endless ad insertions. This works great with chatbots, not so well with people: https://www.youtube.com/watch?v=EtNagNezo8w After all, Zuck doesn't really believe most other people exist. Read Careless People, Sarah Wynn-Williams's tell-all whistleblower memoir about her years at Facebook and you'll quickly realize that for Zuck, people are statistical artifacts, not co-equal beings worthy of moral consideration: https://pluralistic.net/2025/04/23/zuckerstreisand/#zdgaf Billionaires are plagued by solipsism. Not believing other people exist is a great aid to billionairedom, because it lets you amass your fortune without scrupling over the population-scale misery you're inflicting on the way: https://pluralistic.net/2025/08/18/seeing-like-a-billionaire/#npcs For Zuck, AI is the most exciting technology in history (even more exciting than the Metaverse, if you can believe it!) because it might give him the world he dreams of: a world without people, or, at very least, a social media network without any socializing: https://pluralistic.net/2026/01/05/fisher-price-steering-wheel/#billionaire-solipsism Hey look at this (permalink) Congress Wants To Hand Your Parenting to Big Tech https://www.eff.org/deeplinks/2026/01/congress-wants-hand-your-parenting-big-tech AI companies will fail. We can salvage something from the wreckage https://www.theguardian.com/us-news/ng-interactive/2026/jan/18/tech-ai-bubble-burst-reverse-centaur Critical Perspectives on "AI" in Education https://sites.google.com/csusb.edu/criticalperspectives/home Public-private predicaments https://www.not-so-obvious.net/public-private-predicaments/ The Jolla Phone Proved We’ve Been Using Smartphones Wrong All Along https://techglimmer.io/jolla-phone-2026-review-kill-switch-privacy-review/#Jolla (h/t Hacker News) Object permanence (permalink) #20yrsago Nutjob offers $100 bounty to UCLA students who wiretap lefty profs https://news.slashdot.org/story/06/01/21/1948206/ucla-students-urged-to-expose-radical-professors #20yrsago Mysterious birthday ritual at Poe’s graveside disrupted by rubberneckers https://web.archive.org/web/20060212041742/https://www.cnn.com/2006/US/01/19/poe.mystery.ap/index.html?section=cnn_latest #20yrsago DRM primer for librarians https://web.archive.org/web/20060115061831/https://www.ala.org/ala/washoff/WOissues/copyrightb/digitalrights/DRMfinal.pdf #20yrsago Hollywood’s MP caught lying on tape https://web.archive.org/web/20061010121359/http://www.michaelgeist.ca/index.php?option=com_content&task=view&id=1080 #20yrsago Musician playing at Hollywood’s MP fundraiser owes success to copying https://web.archive.org/web/20080704112401/http://accordionguy.blogware.com/blog/_archives/2006/1/19/1714267.html #15yrsago Book made using 4 daisy-chained printers spanning 100 years’ worth of technology https://web.archive.org/web/20110111054908/https://www.xavierantin.fr/archive/Just-In-Time/ #15yrsago Assemblage octopus for sale https://web.archive.org/web/20110124175436/http://jemayer.tumblr.com/post/2802328671 #15yrsago Among Others: extraordinary, magic story of science fiction as a toolkit for taking apart the world https://memex.craphound.com/2011/01/18/among-others-extraordinary-magic-story-of-science-fiction-as-a-toolkit-for-taking-apart-the-world/ #10yrsago Reminder: Don’t put balls of tea leaves in your vagina https://www.the-independent.com/life-style/health-and-families/health-news/women-putting-herb-balls-in-vagina-to-detox-their-wombs-have-been-warned-of-dangers-a6814671.html #10yrsago Martin Luther King, socialist: “capitalism has outlived its usefulness” https://theintercept.com/2016/01/18/martin-luther-king-jr-celebrations-overlook-his-critiques-of-capitalism-and-militarism/ #10yrsago Debullshitifying the “sleep science” industry: first up, sleeplessness and obesity https://web.archive.org/web/20160120210128/http://askforevidence.org/articles/obesity-linked-to-not-getting-enough-sleep #10yrsago England’s most senior civil judge rules that Terrorism Act violates human rights https://www.theguardian.com/world/2016/jan/19/terrorism-act-incompatible-with-human-rights-court-rules-in-david-miranda-case #10yrsago Delhi’s “Sleep Mafia” control the nights of 100,000 homeless workers https://www.youtube.com/watch?v=rXzElV75x08 #10yrsago Replica weapons made from thousands of cut and stacked post-its https://web.archive.org/web/20160109080110/http://ercolimarco.me/post-it-sculpture/ #10yrsago How the standard, high-quality disaster-relief tarpaulin came to be https://www.wired.com/2016/01/tarpaulin/ #10yrsago GM’s Dieselgate: mechanics privately admit software update removes crimeware from Opel cars https://web.archive.org/web/20160121055745/http://www.ft.com/cms/s/0/16ff471e-bdfd-11e5-846f-79b0e3d20eaf.html #10yrsago Griefer hacks baby monitor, terrifies toddler with spooky voices https://memex.craphound.com/2016/01/19/griefer-hacks-baby-monitor-terrifies-toddler-with-spooky-voices/ #10yrsago Spanish-language broadcasting titan Univision buys controlling interest in The Onion https://www.univision.com/noticias/univision-makes-investment-in-the-onion #10yrsago How the National Reconnaissance Office came to choose a sinister, planet-devouring octopus for a logo https://www.muckrock.com/news/archives/2016/jan/19/octopus-NRO/ #5yrsago Amazon warehouse union gets tech solidarity https://pluralistic.net/2021/01/19/deastroturfing/#real-power #5yrsago Facebook's community standards https://pluralistic.net/2021/01/18/peak-indifference/#community-standards #5yrsago Honor MLK day with the Internet Archive https://pluralistic.net/2021/01/18/peak-indifference/#mlk #5yrsago Planet Money's free Great Gatsby audiobook https://pluralistic.net/2021/01/18/peak-indifference/#gatsby #5yrsago Pandemics and peak indifference https://pluralistic.net/2021/01/18/peak-indifference/#peak-indifference #5yrsago How to leak a Zoom meeting https://pluralistic.net/2021/01/18/peak-indifference/#watermarks #1yrago Billionaire-proofing the internet https://pluralistic.net/2025/01/14/contesting-popularity/#everybody-samba #1yrago Canada shouldn't retaliate with US tariffs https://pluralistic.net/2025/01/15/beauty-eh/#its-the-only-war-the-yankees-lost-except-for-vietnam-and-also-the-alamo-and-the-bay-of-ham #1yrago Fu-Schnickens https://pluralistic.net/2025/01/17/holy-batfu-its-an-apple/#ba-schnicker-bah-snchnucker Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Enshittification (Jon Favreau/Offline): https://crooked.com/podcast/the-enshittification-of-the-internet-with-cory-doctorow/ Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America ( words today, total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: The world needs an Ireland for disenshittification (17 Jan 2026)
Today's links The world needs an Ireland for disenshittification: Regulatory arbitrage isn't just for tax cheats. Hey look at this: Delights to delectate. Object permanence: "Fledgling"; Magnetic forest rings; Electable Mr Sanders; "Terrorists" were just blind guys. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. The world needs an Ireland for disenshittification (permalink) Ireland is a tax haven. In the 1970s and 1980s, life in the civil-war wracked country was hard – between poverty, scarce employment and civil unrest, the country hemorrhaged its best and brightest. As the saying went, "Ireland's top export is the Irish." In desperation, Ireland's political class hit on a wild gambit: they would weaponize Ireland's sovereignty in service to corporate tax evasion. Companies that pretended to establish their headquarters in Ireland would be able to hoard their profits, evading their tax obligations to every other country in the world: https://en.wikipedia.org/wiki/Ireland_as_a_tax_haven A single country – poor, small, at the literal periphery of a continent – was able to foundationally transform the global order. Any company that has enough money to pretend to be Irish can avoid 25-35% in tax, giving it an unbeatable edge against competitors that lack the multinational's superpower of magicking all its profits into a state of untaxable grace somewhere over the Irish Sea. The effect this had on Ireland is…mixed. The Irish state is thoroughly captured by the corporations that pretend to call Ireland home. Anything those corporations want, Ireland must deliver, lest the footloose companies up sticks and start pretending to be Cypriot, Luxembourgeois, Maltese or Dutch. This is why Europe's landmark privacy law, the GDPR, has had no effect on America's tech giants. They pretend to be Irish, and Ireland lets them get away with breaking European law. The Irish state even hires these companies' executives to regulate their erstwhile employers: https://pluralistic.net/2025/12/01/erin-go-blagged/#big-tech-omerta But there is no denying that Ireland has managed to turn the world's taxable trillions into its own domestic billions. The fact that Ireland is cashing out less than 1% of what it's costing everyone else is terrible for the world's tax systems and competitive markets, but it's been a massive windfall for Ireland, and has lifted the country out of its centuries of colonial poverty and privation. There are many lessons to be learned from Ireland's experiment with regulatory arbitrage, but one is unequivocal: even a small, poor, disintegrating nation can change the world system by offering a site where you can do things that you can't do anywhere else, and if it does, that poor nation can grow wealthy and comfortable. What's more, there are plenty of "things that you can't do anywhere else" that are very good. It's not just corporate tax evasion. First among these things that you can't do anywhere else: it's a crime in virtually every country on earth to modify America's defective, enshittified, privacy-invading, money-stealing technology exports. That's because the US trade representative has spent the past 25 years using the threat of tariffs to bully all of America's trading partners into adopting "anti-circumvention" laws: https://pluralistic.net/2026/01/15/how-the-light-gets-in/#theories-of-change There is nothing good about this. The fact that local businesses can't sell you a privacy blocker, an alternative client, a diagnostic tool, a spare part, a consumable, or even software for your American-made devices leaves you defenseless before US tech's remorseless campaign of monetary and informational plunder – and it means that your economy is denied the benefits of creating and exporting these incredibly desirable, profitable products. Incredibly, Trump deliberately blew up this multi-trillion dollar system of US commercial advantage. By chaotically imposing and rescinding and re-imposing tariffs on the world, he has neutralized the US trade rep's tariff threats. Foreign firms just can't count on exporting to America anymore, so the threat of (more) tariffs grows less intimidating by the minute: https://pluralistic.net/2025/12/16/k-shaped-recovery/#disenshittification-nations The time is ripe for the founding of a disenshittification nation, an Ireland for disenshittification. I have no doubt that eventually, most or all of the countries in the world will drop their anti-circumvention laws (the laws that ban the modification of US tech exports). Once one country starts making these disenshittifying tools, there'll be no way to prevent their export, since all it takes to buy one of these tools from a circumvention haven is an internet connection and a payment method. Once everyone in your country is buying and using jailbreaking tools from abroad, there'll be no point in keeping these laws on your own books. But the first country to get there stands a chance of establishing a durable first-mover advantage – of reaping hundreds of billions selling disenshittifying products around the world. That country could be to enshittification-resistant technology what Finland was to mobile phones during the Nokia decade (and wouldn't you know it, the EU's newly minted "Tech Sovereignty" czar is a Finn!): https://commission.europa.eu/about/organisation/college-commissioners/henna-virkkunen_en The world has experimented with many kinds of havens over the centuries. In the early 18th century, Madagascar became a haven for British naval deserters, who were adopted into the island's matriarchal clans. Together, they founded an anarchist pirate utopia: https://pluralistic.net/2023/01/24/zana-malata/#libertalia The global system of trade has allowed America's tech companies to steal and hoard trillions, and to put every country at risk of being bricked when their IT systems are switched off at a single word from Trump: https://pluralistic.net/2026/01/01/39c3/#the-new-coalition There are more than 200 countries in the world. There's also an ever-expanding cohort of brilliant international technologists whose Silicon Valley dreams have turned into a nightmare of being shot in the face by an ICE goon, or being kidnapped, separated from their families and being locked up in a Salvadoran slave-labor prison. These techies are looking for the next place to put down roots and "make a dent in the universe." Lots of countries could be that place. The Ireland for disenshittification wouldn't just have their pick of international technologists – they'd have plenty of Americans hungering for a better life. Two-thirds of young Americans "are considering leaving the US": https://www.newsweek.com/nearly-two-thirds-of-young-americans-are-considering-leaving-the-us-11010814 Ireland pulled off its tax-haven gambit by making influential people very rich, so that they would go to bat for Ireland. The Ireland for disenshittification will have the same chance. The new tech companies that unlock US Big Tech's trillions and turn them into their own billions (with the remainder being shared by us, tech users, in the form of lower prices and better products) will be a powerful bloc in support of this project. Ireland showed us: it just takes one country to defect from this global prisoner's dilemma, and then everything is up for grabs. (Image: Stuart Caie, CC BY 2.0; Sourabh.biswas003; CC BY-SA 3.0; modified) Hey look at this (permalink) STFU 🤫 https://github.com/Pankajtanwarbanna/stfu Libro.fm is hiring a Technical Product Manager https://blog.libro.fm/open-positions/technical-product-manager-content-systems/ The Harm to Consumers and Sellers from Universal Commerce Protocol, in Google’s Own Words https://www.thesling.org/the-harm-to-consumers-and-sellers-from-universal-commerce-protocol-in-googles-own-words/ ‘Anything that can’t go on forever eventually stops’: ‘Enshittification’ author issues stark warning … https://www.hilltimes.com/story/2026/01/15/anything-that-cant-go-on-forever-eventually-stops-enshittification-author-issues-stark-warning-to-ottawa-over-ai-policy/488014/ 88% of all songs on Spotify have been demonetized https://musically.com/2026/01/15/5-1tn-annual-music-streams-but-120-5m-tracks-had-10-or-fewer/ Object permanence (permalink) #20yrago Hollywood’s Member of Parliament makes national news https://web.archive.org/web/20060213161019/http://www.macleans.ca/topstories/politics/article.jsp?content=20060123_120006_120006 #20yrsago Skip $250/plate dinner for dirty MP, eat with copyfighters https://web.archive.org/web/20060118062522/http://www.onlinerights.ca/ #20yrago Octavia Butler’s “Fledgling”: subtle, thrilling vampire novel https://memex.craphound.com/2006/01/17/octavia-butlers-fledgling-subtle-thrilling-vampire-novel/ #10yrsago Revealed: the hidden web of big-business money backing Europe and America’s pro-TTIP “think tanks” https://thecorrespondent.com/3884/Big-business-orders-its-pro-TTIP-arguments-from-these-think-tanks/855725233704-2febf71a #10yrsago The bizarre magnetic forest rings of northern Ontario https://www.bldgblog.com/2016/01/rings/ #10yrsago 2016 is the year of the telepathic election, and it’s not pretty http://www.antipope.org/charlie/blog-static/2016/01/some-american-political-marker.html #10yrsago Trump Casinos lost millions every single year that Donald Trump ran it (but he’s still rich) https://memex.craphound.com/2016/01/17/trump-casinos-lost-millions-every-single-year-that-donald-trump-ran-it-but-hes-still-rich/ #10yrsago Oregon domestic terrorists now destroying public property in earnest https://www.theguardian.com/us-news/2016/jan/16/oregon-militias-behavior-increasingly-brazen-as-public-property-destroyed?CMP=edit_2221 #10yrsago Jeremy Corbyn proposes ban on dividends from companies that don’t pay living wages https://www.theguardian.com/politics/2016/jan/16/jeremy-corbyn-to-confront-big-business-over-living-wage #10yrsago The Electable Mr Sanders https://web.archive.org/web/20160119083607/http://robertreich.org/post/137454417985 #10yrsago Suspicious, photo-taking “Middle Eastern” men were visually impaired tourists https://www.cbc.ca/news/canada/british-columbia/vancouver-mall-video-men-1.3406619 #5yrsago Fighting fiber was the right's dumbest self-own https://pluralistic.net/2021/01/17/turner-diaries-fanfic/#1a-fiber Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publical, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Enshittification (Jon Favreau/Offline): https://crooked.com/podcast/the-enshittification-of-the-internet-with-cory-doctorow/ Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1045 words today, 9348 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: Catch this! (16 Jan 2026)
Today's links Catch this! Email is good, actually. Hey look at this: Delights to delectate. Object permanence: LDS excommunication; King Foundation v "I Have a Dream"; "Lat-stage capitalism" v "Christ, what an asshole"; Pelosi v Porter. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. Catch this! (permalink) Call it "lifehacking," or just call it, "paying attention to how you stay organized" – I don't care what you call it, I am an ardent practitioner of it. I like improving my processes because I like what I do, and the more efficient I am at all of it (with apologies to Jenny Odell), the more of that stuff I can get done: https://memex.craphound.com/2019/04/09/how-to-do-nothing-jenny-odells-case-for-resisting-the-attention-economy/ I want to do a lot of stuff. I am one of those people who is ten miles wide and one inch deep (it probably has something to do with imbibing Heinlein's maxim that "specialization is for insects" at an impressionable age). There's a million waterways I want to dip my toe (or my oar) into, and the better organized I am, the more of that stuff I'll get to do before I kick off. I'm 54, and while there's a lot of road ahead of me, I can see the end, off there in the distance. It's coming, and I'm not done – I'm barely getting started. I've been around lifehacking since the very moment it was born. I was there. I published the notes on Danny O'Brien's seminal 2004 talk at the O'Reilly Emerging Technology Conference, "Life Hacks: Tech Secrets of Overprolific Alpha Geeks": https://craphound.com/lifehacksetcon04.txt In the years since, I've cultivated a small – but mighty – repertoire of organizational habits and tools that let me get a hell of a lot done. Weirdly, many of these tools are things that other people hate, and I can see why – they use them in very different ways from me. That's true of browser tabs (I loooove browser tabs): https://pluralistic.net/2024/01/25/today-in-tabs/#unfucked-rota And to-do lists, which will totally transform your life, once you realize that the most important to-do list is the one you maintain for everyone else who owes you a response, a package, or money: https://pluralistic.net/2024/10/26/one-weird-trick/#todo Other essential tools languish in neglect, artifacts of the old, good web – the elegant weapons that dominated a more civilized age. First among these? RSS readers: https://pluralistic.net/2024/10/16/keep-it-really-simple-stupid/#read-receipts-are-you-kidding-me-seriously-fuck-that-noise I will freely stipulate that people have a good reason to hate all this stuff. "Productivity porn" is often proffered as a mix of humblebrag (a way to make other people jealous of your almighty "productivity") and denial (fiddling with your systems is a ready substitute for actually doing things). Many (most?) of the foremost self-appointed pitchmen for "lifehacking" are cringey charlatans peddling "courses" and other nonsense. But if you keep digging, there's a solid foundation beneath all the rot. At its very best, this stuff is a way to figure out what you really want to do, and to organize your life so that the stuff you want to do is the stuff you're doing. A lot of people get into this kind of thing thinking it'll let them do everything. No one can do everything. The best you can hope for is to make conscious decisions about which stuff you'll never get to, while leaving at least a little room for serendipity. Like I said, I want to do a lot of stuff. My organizing tactics are as much about deciding what I won't do as they are about deciding what I will do: https://locusmag.com/feature/cory-doctorow-how-to-do-everything-lifehacking-considered-harmful/ Which brings me to another tool that everyone hates and I love: email. I live and die by email. First of all, I filter all my incoming email: mail from people who are in my address book stays in my inbox; mail from people I've never heard from before goes into a mailbox called "People I don't know." When I reply to a message, Thunderbird adds the recipient to my address book, so the next time I hear from them, they'll stay in my main mailbox. I also filter out anything containing the word "unsubscribe," sending it into a folder called "Unlikely" (but not if the message contains my name – which is how I can stay subscribed to mailing lists I don't have time to read and make sure to reply when someone mentions me). Second of all, I have a zillion Quicktext macros that I use to reply to frequently asked questions. I have one that spits out my mailing address; another that spits out my bio; and others for politely saying no to things I don't have time for, for information about how to pay one of my invoices, etc, etc. Third: I have a small folder of emails that I can't reply to right away (usually because I need some information from a third party), which I review every morning and answer anything that I can clear. Finally, I save it all. I have so much saved email, which means that if you ask me about something from 20 years ago, there's a good chance I can find it – provided we organized it over email. All of which explains why I refuse – to the extent that I can – to do anything important over instant messaging, whether that's Signal or any of the other messaging tools that come with social media, workplace software, etc. I understand why people like instant messaging: it does not overwhelm you with the burdens of the past. It is largely ahistorical, with archives that are hard to access and search. Its norms and register are less formal than email. And, of course, instant messaging is far superior to email in some contexts. If you're on vacation with friends, having a big group-chat where you can say, "I'm making dinner – is everyone OK with cheese?" is indispensable. Same goes for asking a friend for directions, announcing that you've arrived at someone's office, or confirming whether it's OK to substitute 2% for whole milk on a grocery run. But if you're like me – if you've figured out how to do as many of the things that matter to you as you can possibly squeeze in, then getting an IM mid-flow is like someone walking up to a juggler who's working on a live chainsaw, a bowling ball, and a machete and tossing him a watermelon while shouting, "Hey, catch this!" The problem is that if you are asking about something important, something that can't be instantaneously managed by the recipient, then they will have to drop everything they're doing and, at the very least, make a note to themselves to go back to your message later and deal with it. Instant messaging doesn't have an inbox with everything you've been sent. Of course, that's why people love it. But the fact that you can't see all the things other people are expecting you to answer doesn't mean that they aren't expecting it. It also doesn't mean that everything will be fine if you just ignore all those messages. Instant messaging is a great tool for managing something that everyone is doing at the same time. It's also a nice way to keep an ambient social flow of updates from people in a rocking groupchat. But IM is fundamentally unserious. It is antithetical to the project of making a conscious decision about what you won't do, so that you do as many of the things that matter to you before you get to the end of the road. A massive email inbox is intimidating, but switching to IMs doesn't make all the demands in the email go away. It just puts them out of sight until they either expire or explode. Far better to decide what balls you're going to drop than to have them knocked out of your hand by a fast-moving watermelon. (Image: Mark James, CC BY 2.5, modified) Hey look at this (permalink) Minneapolis Labor, Community Leaders Join Call for Jan. 23 General Strike to Demand ICE Out https://www.commondreams.org/news/minneapolis-ice-general-strike Bankrupt scooter startup left one private key to rule them all https://www.theregister.com/2026/01/16/bankrupt_scooter_startup_key/ Equilibrium (is) for Dummies https://profstevekeen.substack.com/p/equilibrium-is-for-dummies Investors Have a Large Footprint in Certain Rental Markets. It Just Depends on Where You Look. https://www.thesling.org/investors-have-a-large-footprint-in-certain-rental-markets-it-just-depends-on-where-you-look/ Everything Costs More Because the Algorithm Says So https://thewalrus.ca/everything-costs-more-because-the-algorithm-says-so/ Object permanence (permalink) #25yrsago Teresa Nielsen Hayden’s formal excommunication from the Latter Day Saints https://web.archive.org/web/20010203204300/http://www.panix.com/~pnh/GodandI.html #20yrsago King Foundation uses copyright to suppress “I Have a Dream” speech https://www.washingtonpost.com/wp-dyn/content/article/2006/01/14/AR2006011400980.html #20yrsago Firefly fans trying to raise enough dough to produce a new season https://web.archive.org/web/20060118033219/https://www.browncoatsriseagain.com/ #20yrsago New discussion draft of GNU General Public License is released https://gplv3.fsf.org/ #10yrsago “Late stage capitalism” is the new “Christ, what an asshole” https://x.com/mjg59/status/688238257935548416 #10yrsago Worried about Chinese spies, the FBI freaked out about Epcot Center https://www.muckrock.com/news/archives/2016/jan/14/fbi-epcot/ #10yrsago India’s Internet activists have a SOPA moment: no “poor Internet for poor people” https://www.theguardian.com/world/2016/jan/15/india-net-neutrality-activists-facebook-free-basics #5yrsago Pelosi kicks Katie Porter off the Finance Committee https://pluralistic.net/2021/01/16/speaker-willie-sutton/#swampgator Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publical, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Why Big Tech is a Trap for Independent Creators (Stripper News) https://www.youtube.com/watch?v=nmYDyz8AMZ0 Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ "can't make Big Tech better; make them less powerful" (Get Subversive) https://www.youtube.com/watch?v=X1EzM9_6eLE Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1141 words today, 8278 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: How the Light Gets In (15 Jan 2026)
Today's links How the Light Gets In: The door is open a crack! Hey look at this: Delights to delectate. Object permanence: Poitras v First Look; Aaronsw's "Against School"; I was investigated by the FBI. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. How the Light Gets In (permalink) Of all the tools that I use to maintain my equilibrium in these dark days, none is so important as remembering the distinction between happiness, optimism and hope. Happiness is self-explanatory – and fleeting. Even in the worst of times, there are moments of happiness – a delicious meal with friends, a beautiful sunrise, a stolen moment with your love. These are the things we chase, and rightly so. But happiness is always a goal, rarely a steady state. Optimism, on the other hand, is a toxin to be avoided. Optimism is a subgenre of fatalism, the belief that things will get better no matter what we do. It's just the obverse of pessimism. Both are ways of denying human agency. To be an optimist is to be a passenger of history, along for the ride, with no hope of changing its course. But hope? That's the stuff. Hope is the belief that if we change the world for the better, even by just a little, that we will ascend a gradient towards a better future, and as we rise up that curve, new terrain will be revealed to us that we couldn't see from our lower vantage-point. It's not necessary – or even possible – to see a course from here to the world you want to live in. You can get there in stepwise fashion, one beneficial change at a time: https://pluralistic.net/2021/10/03/hope-not-optimism/ These days, I am often unhappy, but I am filled with hope. A couple of weeks ago, I gave a speech, "The Post-American Internet," at the 39th Chaos Communications Congress in Hamburg: https://pluralistic.net/2026/01/01/39c3/#the-new-coalition In that talk, I laid out the case for hope. So many of the worst aspects of modern life can be traced to our enshittified technology, from mass surveillance and totalitarian control to wage suppression and conspiratorial cults. This enshittified technology, in turn, is downstream of policy decisions made by politicians who were bullied into their positions by the US trade rep, who used the threat of tariffs to push for laws that protected the right of tech giants to plunder the world's money and data, by criminalizing competitors who disenshittified their products, leaving technology users defenseless. Trump's tariffs have effectively killed that threat. If you can't tell from day to day – let alone year to year – whether the US will accept your exports, you can't rely on exporting to the USA. What's more, generations of pro-oligarch policies have stripped America's bottom 90% of discretionary income, stagnating their wages and leaving them mired in health, education, and housing debt (even as the system finds ever more sadistic and depraved ways for arm-breakers to collect on that debt): https://pluralistic.net/2025/12/16/k-shaped-recovery/#disenshittification-nations This is terrible for Americans, but when life gives you SARS, you make sarsaparilla. With the decline of the US market for global exporters, there's finally political space to stop worrying about tariffs and reconsider anti-circumvention laws, to create "disenshittification nations" that stage raids on the most valuable lines of business of the most profitable companies in world history – Big Tech: https://pluralistic.net/2026/01/13/not-sorry/#mere-billions People who dream of turning American tech trillions into their own billions are powerful allies in the fight against enshittification, but they're only one group that we can recruit to our side. There's another powerful bloc waiting in the wings: national security hawks. These people are rightly terrified that Trump will order his tech companies to switch off their governments, businesses and households, all of whom are dependent on US cloud-based administrative software for email, document creation and archiving, databases and mobile devices. Trump's tech companies could also brick any nation's mobile phones, medical devices, cars, and tractors. It's the same risk that China hawks warned of when it looked as though Huawei would provide all of the world's 5G infrastructure: allow companies that are absolutely beholden to an autocrat who is not restrained by the rule of law to permeate your society, and your society becomes a prisoner to the autocrat's whims and goodwill. A coalition of digital rights activists; investors and entrepreneurs; and national security hawks makes for a powerful bloc indeed. Each partner in the coalition can mobilize different constituencies and can influence different parts of the state. These are very different groups, and that's why this coalition is so exciting: this is a three-pronged assault on the hegemony of Big Tech. That's not to say that this will automatically happen. Nothing happens automatically. Fuck pessimism, and fuck optimism, too. Things happen because people do stuff: https://pluralistic.net/2021/10/17/against-the-great-forces-of-history/ That's where hope comes in. The door to a better technological future has been slammed shut and triple-locked for 25 years. Today, it is open a crack. A crack isn't much, but as Leonard Cohen taught us, "that's how the light gets in": https://genius.com/Leonard-cohen-anthem-lyrics Understand: this isn't a bet on politicians discovering heretofore unsuspected wellsprings of courage or principle. This is a bet on politicians confronting unstoppable political will that corners them into doing the right thing. I understand why Europeans, Canadians and Britons might feel cynical about their political classes (to say nothing of Americans, of course). It has been decades since a political party delivered broad, structural change that improved the lives of everyday people. Instead, we've had generations of neoliberal austerity sadists, autocrats and corrupt dolts who've helped billionaires stripmine our civilization and set the world on fire. But politics have changed before, and they can change again (note that I didn't say they will change – just that they can, because we can change them). Society may feel deadlocked, but crises precipitate change. As I said in my Hamburg speech, the EU went from 15 years behind in their solar transition to ten years ahead, in just a few years, thanks to the energy crisis that slammed into the continent after Putin invaded Ukraine. Crises precipitate change. The fact that the EU pivoted so quickly away from fossil fuels to solar is nothing short of a miracle. Anyone who feels like their politicians would never buck Big Tech needs to explain how it came to pass that these politicians just told Big Oil to fuck off. The fossil fuel industry is losing. This is goddamned wild – indeed, their loss might just be locked in at this point, because fossil fuel and its applications (like internal combustion) are now more expensive and more impractical than the cleantech alternatives: https://pluralistic.net/2025/10/02/there-goes-the-sun/#carbon-shifting Sure, it sucks that Trump has killed incentives to drive an EV and that the EU is dropping its goal for phasing out internal combustion engines, but given that EVs are faster, cheaper and better than conventional automobiles, the writing is on the wall for the IC fleet. That's the wild thing about better technology: people want it, and they get pissed off when they're told they can't have it. When the Texas legislature tried to pass a law requiring that power companies add a watt of fossil-fuel generation capacity for every watt of solar they brought online, Trump-voting farmers and ranchers from the deepest red parts of Texas (Texas!!) flooded town halls and hearings, demanding an end to "DEI for natural gas": https://billmckibben.substack.com/p/for-reality They won. Politics aren't just terrible today, they're in chaos. Crises precipitate change. After World War II, one of Britain's two parties, the Liberals (AKA "Whigs") imploded. With them out of the way, the Labour Party rose to power, with a transformative agenda backed by a mass movement, which created the British welfare state. Today, the British Conservative Party (AKA "Tories") are also imploding, and look set to be taken over by a fascist MAGA-alike party, Reform. As of a couple months ago, that seemed like very bad news, since Labour is also set to implode, thanks to Prime Minister Keir Starmer's austerity, authoritarianism, corruption and cowardice. For quite a while, it looked like when Starmer's Labour is totally wiped out in the next election, they would give way to Reform, plunging Britain into Hungarian- (or American)-style autocracy. But all that has changed. Today, the UK Greens have a new leader, Zack Polanski, who has dragged the Greens into an agenda that promises transformations as bold as the ones that remade the country under Clement Attlee's Labour government. Polanski is a fantastic campaigner, and he is committed to the same kind of grassroots co-governance with a mass movement that characterized Zohran Mamdani's historic NYC mayoral campaign. In other words, it seems like both of Britain's sclerotic mainstream parties will be wiped out in the next election, and the real fight in the UK is between two transformative upstart parties, one of which plans to spend billionaires' dark money to mobilize fascists yearning for ethnic cleansing; and the other wants a fair, prosperous and equitable society where we abolish billionaires, confront the climate emergency, and smash corporate power. In other words, the UK is heading into an election in which voters have a choice that's more meaningful than Coke vs Pepsi. Versions of this are playing out around the world. Anti-billionaire policies have surfaced time and again, everywhere, since the late 2010s: https://pluralistic.net/2025/06/28/mamdani/#trustbusting None of this means that we will automatically win. I'm not asking you to be an optimist here, but I am demanding that you have hope. Hope is a discipline: it requires that you tirelessly seek out the best ways to climb up that gradient toward a better world, trusting that as you attain higher elevation, you will find new paths up that slope. The door is open a crack. Now isn't the time to complain that it isn't open wider – now's the time to throw your shoulder against it. (Image: Joe Mabel, CC BY 3.0) Hey look at this (permalink) No, liberals were not right about Trump https://www.peoplesline.org/p/no-liberals-were-not-right-about Asimov’s Editor Sheila Williams Hospitalized https://locusmag.com/2026/01/sheila-williams-hospitalized/ Want to understand the K-shaped economy? Go fly on an airplane https://www.cnn.com/2026/01/14/business/k-shaped-economy-delta-nightcap How It Stops, How It Ends https://www.againstallenemies.net/p/how-it-stops-how-it-ends ‘They’ve pickled each others’ brains’ https://sf.gazetteer.co/theyve-pickled-each-others-brains?giftLink=ce04b5653afd37bc361bfdaab30b6b62 Object permanence (permalink) #25yrsao Journal of a homeless woman in San Francisco: witty, articulate, pregnant, and addicted to heroin https://web.archive.org/web/20010124050200/https://www.thematrix.com/~sherrod/diary.html #20yrsago Study: how Canadian copyright law is bought by entertainment co’s https://web.archive.org/web/20060207141159/http://www.michaelgeist.ca/index.php?option=com_content&task=view&id=1075 #20yrsago My Toronto Star editorial about Hollywood’s Member of Parliament https://web.archive.org/web/20060616024225/http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_Type1&call_pageid=971358637177&c=Article&cid=1137279034770 #10yrsago Aaron Swartz’s “Against School” – business leaders have been decrying education since 1845 https://newrepublic.com/article/127317/school #10yrsago Yosemite agrees to change the names of its significant locations to appease trademark troll https://www.outsideonline.com/outdoor-adventure/environment/yosemite-rename-several-iconic-places/?scope=anon #10yrsago Bernie Sanders support soars among actual voters, if not Democratic Party power-brokers https://www.theguardian.com/commentisfree/2016/jan/14/bernie-sanders-is-winning-with-the-one-group-his-rivals-cant-sway-voters #5yrsago Tesla's valuation is 1600x its profitability https://pluralistic.net/2021/01/15/hoover-calling/#intangibles #5yrsago Disneyland kills annual passes https://pluralistic.net/2021/01/15/hoover-calling/#disney-dash #5yrsago Machine learning is a honeypot for phrenologists https://pluralistic.net/2021/01/15/hoover-calling/#phrenology #5yrsago Yugoslavia's Cold War obsession with Mexican music https://pluralistic.net/2021/01/15/hoover-calling/#yu-mex #5yrsago I was investigated by the FBI https://pluralistic.net/2021/01/15/hoover-calling/#g-man #5yrsago Facebook says it's the best henhouse fox https://pluralistic.net/2021/01/15/hoover-calling/#hens-need-foxes #5yrsago Laura Poitras fired from First Look ( https://pluralistic.net/2021/01/15/hoover-calling/#poitras Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publical, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ "can't make Big Tech better; make them less powerful" (Get Subversive) https://www.youtube.com/watch?v=X1EzM9_6eLE The Enshitification Life Cycle with David Dayen (Organized Money) https://www.buzzsprout.com/2412334/episodes/18399894 Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1058 words today, 7122 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: It's not normal (14 Jan 2026)
Today's links It's not normal: Remember when you owned stuff? Hey look at this: Delights to delectate. Object permanence: Telco rats out protesters; Rogers v Net Neutrality; Jailhouse lawyer v Stingrays; Black Panther self-care. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. It's not normal (permalink) Samantha: This town has a weird smell that you're all probably used to…but I'm not. Mrs Krabappel: It'll take you about six weeks, dear. -The Simpsons, "Bart's Friend Falls in Love," S3E23, May 7, 1992 We are living through weird times, and they've persisted for so long that you probably don't even notice it. But these times are not normal. Now, I realize that this covers a lot of ground, and without detracting from all the other ways in which the world is weird and bad, I want to focus on one specific and pervasive and awful way in which this world is not normal, in part because this abnormality has a defined cause, a precise start date, and an obvious, actionable remedy. 6 years, 5 months and 22 days after Fox aired "Bart's Friend Falls in Love," Bill Clinton signed a new bill into law: the Digital Millennium Copyright Act of 1998 (DMCA). Under Section 1201 of the DMCA, it's a felony to modify your own property in ways that the manufacturer disapproves of, even if your modifications accomplish some totally innocuous, legal, and socially beneficial goal. Not a little felony, either: DMCA 1201 provides for a five year sentence and a $500,000 fine for a first offense. Back when the DMCA was being debated, its proponents insisted that their critics were overreacting. They pointed to the legal barriers to invoking DMCA 1201, and insisted that these new restrictions would only apply to a few marginal products in narrow ways that the average person would never even notice. But that was obvious nonsense, obvious even in 1998, and far more obvious today, more than a quarter-century on. In order for a manufacturer to criminalize modifications to your own property, they have to satisfy two criteria: first, they must sell you a device with a computer in it; and second, they must design that computer with an "access control" that you have to work around in order to make a modification. For example, say your toaster requires that you scan your bread before it will toast it, to make sure that you're only using a special, expensive kind of bread that kicks back a royalty to the manufacturer. If the embedded computer that does the scanning ships from the factory with a program that is supposed to prevent you from turning off the scanning step, then it is a felony to modify your toaster to work with "unauthorized bread": https://arstechnica.com/gaming/2020/01/unauthorized-bread-a-near-future-tale-of-refugees-and-sinister-iot-appliances/ If this sounds outlandish, then a) You definitely didn't walk the floor at CES last week, where there were a zillion "cooking robots" that required proprietary feedstock; and b) You haven't really thought hard about your iPhone (which will not allow you to install software of your choosing): https://pluralistic.net/2024/01/12/youre-holding-it-wrong/#if-dishwashers-were-iphones But back in 1998, computers – even the kind of low-powered computers that you'd embed in an appliance – were expensive and relatively rare. No longer! Today, manufacturers source powerful "System on a Chip" (SoC) processors at prices ranging from $0.25 to $8. These are full-fledged computers, easily capable of running an "access control" that satisfies DMCA 1201. Likewise, in 1998, "access controls" (also called "DRM," "technical protection measures," etc) were a rarity in the field. That was because computer scientists broadly viewed these measures as useless. A determined adversary could always find a way around an access control, and they could package up that break as a software tool and costlessly, instantaneously distribute it over the internet to everyone in the world who wanted to do something that an access control impeded. Access controls were a stupid waste of engineering resources and a source of needless complexity and brittleness: https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/ But – as critics pointed out in 1998 – chips were obviously going to get much cheaper, and if the US Congress made it a felony to bypass an access control, then every kind of manufacturer would be tempted to add some cheap SoCs to their products so they could add access controls and thereby felonize any uses of their products that cut into their profits. Basically, the DMCA offered manufacturers a bargain: add a dollar or two to the bill of materials for your product, and in return, the US government will imprison any competitors who offer your customers a "complementary good" that improves on it. It's even worse than this: another thing that was obvious in 1998 was that once a manufacturer added a chip to a device, they would probably also figure out a way to connect it to the internet. Once that device is connected to the internet, the manufacturer can push software updates to it at will, which will be installed without user intervention. What's more, by using an access control in connection with that over-the-air update mechanism, the manufacturer can make it a felony to block its updates. Which means that a manufacturer can sell you a device and then mandatorily update it at a later date to take away its functionality, and then sell that functionality back to you as a "subscription": https://pluralistic.net/2022/10/28/fade-to-black/#trust-the-process A thing that keeps happening: https://www.theverge.com/2024/7/20/24202166/snoo-premium-subscription-happiest-baby And happening: https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer And happening: https://pluralistic.net/2024/05/24/record-scratch/#autoenshittification In fact, it happens so often I've coined a term for it, "The Darth Vader MBA" (as in, "I'm altering the deal. Pray I don't alter it any further"): https://pluralistic.net/2025/09/01/fulu/#i-am-altering-the-deal Here's what this all means: any manufacturer who devotes a small amount of engineering work and incurs a small hardware expense can extinguish private property rights altogether. What do I mean by private property? Well, we can look to Blackstone's 1753 treatise: The right of property; or that sole and despotic dominion which one man claims and exercises over the external things of the world, in total exclusion of the right of any other individual in the universe. You can't own your iPhone. If you take your iPhone to Apple and they tell you that it is beyond repair, you have to throw it away. If the repair your phone needs involves "parts pairing" (where a new part won't be recognized until an Apple technician "initializes" it through a DMCA-protected access control), then it's a felony to get that phone fixed somewhere else. If Apple tells you your phone is no longer supported because they've updated their OS, then it's a felony to wipe the phone and put a different OS on it (because installing a new OS involves bypassing an "access control" in the phone's bootloader). If Apple tells you that you can't have a piece of software – like ICE Block, an app that warns you if there are nearby ICE killers who might shoot you in the head through your windshield, which Apple has barred from its App Store on the grounds that ICE is a "protected class" – then you can't install it, because installing software that isn't delivered via the App Store involves bypassing an "access control" that checks software to ensure that it's authorized (just like the toaster with its unauthorized bread). It's not just iPhones: versions of this play out in your medical implants (hearing aid, insulin pump, etc); appliances (stoves, fridges, washing machines); cars and ebikes; set-top boxes and game consoles; ebooks and streaming videos; small appliances (toothbrushes, TVs, speakers), and more. Increasingly, things that you actually own are the exception, not the rule. And this is not normal. The end of ownership represents an overturn of a foundation of modern civilization. The fact that the only "people" who can truly own something are the transhuman, immortal colony organisms we call "Limited Liability Corporations" is an absolutely surreal reversal of the normal order of things. It's a reversal with deep implications: for one thing, it means that you can't protect yourself from raids on your private data or ready cash by adding privacy blockers to your device, which would make it impossible for airlines or ecommerce sites to guess about how rich/desperate you are before quoting you a "personalized price": https://pluralistic.net/2025/12/11/nothing-personal/#instacartography It also means you can't stop your device from leaking information about your movements, or even your conversations – Microsoft has announced that it will gather all of your private communications and ship them to its servers for use by "agentic AI": https://www.youtube.com/watch?v=0ANECpNdt-4 Microsoft has also confirmed that it provides US authorities with warrantless, secret access to your data: https://www.forbes.com/sites/emmawoollacott/2025/07/22/microsoft-cant-keep-eu-data-safe-from-us-authorities/ This is deeply abnormal. Sure, greedy corporate control freaks weren't invented in the 21st century, but the laws that let those sociopaths put you in prison for failing to arrange your affairs to their benefit – and your own detriment – are. But because computers got faster and cheaper over decades, the end of ownership has had an incremental rollout, and we've barely noticed that it's happened. Sure, we get irritated when our garage-door opener suddenly requires us to look at seven ads every time we use the app that makes it open or close: https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain But societally, we haven't connected that incident to this wider phenomenon. It stinks here, but we're all used to it. It's not normal to buy a book and then not be able to lend it, sell it, or give it away. Lending, selling and giving away books is older than copyright. It's older than publishing. It's older than printing. It's older than paper. It is fucking weird (and also terrible) (obviously) that there's a new kind of very popular book that you can go to prison for lending, selling or giving away. We're just a few cycles away from a pair of shoes that can figure out which shoelaces you're using, or a dishwasher that can block you from using third-party dishes: https://www.theguardian.com/technology/2015/feb/13/if-dishwashers-were-iphones It's not normal, and it has profound implications for our security, our privacy, and our society. It makes us easy pickings for corporate vampires who drain our wallets through the gadgets and tools we rely on. It makes us easy pickings for fascists and authoritarians who ally themselves with corporate vampires by promising them tax breaks in exchange for collusion in the destruction of a free society. I know that these problems are more important than whether or not we think this is normal. But still. It. Is. Just. Not. Normal. Hey look at this (permalink) Two underdog trustbusters running for Congress https://the-antimonopolist.ghost.io/two-utrustbusters-running-for-congress/ The Conscience of a Hacker https://phrack.org/issues/7/3 Dingbat Imperialism, the Lowest Stage of Capitalism https://www.unpopularfront.news/p/dingbat-imperialism-the-lowest-stage Trump Killed the CFPB's "Open Banking" Rule. Now Big Banks Are Crushing Your Favorite Finance App. https://economicpopulist.substack.com/p/trump-killed-the-cfpbs-open-banking Elizabeth Warren’s Plan for a Revived Democratic Party https://www.thenation.com/article/politics/elizabeth-warren-democrats-2026-midterms/ Object permanence (permalink) #15yrsago Belarusian mobile operators gave police list of demonstrators https://charter97.org/en/news/2011/1/12/35161/ #15yrsago Threatened library gets its patrons to clear the shelves https://www.theguardian.com/books/2011/jan/14/stony-stratford-library-shelves-protest #15yrsago Canadian regulator smacks Rogers for Net Neutrality failures https://web.archive.org/web/20110116044741/https://www.michaelgeist.ca/content/view/5574/125/ #10yrsago A day in the life of a public service serial killer’s intern https://web.archive.org/web/20160116122141/https://motherboard.vice.com/read/the-killing-jar #10yrsago How an obsessive jailhouse lawyer revealed the existence of Stingray surveillance devices https://www.theverge.com/2016/1/13/10758380/stingray-surveillance-device-daniel-rigmaiden-case #10yrsago The Internet of Things in Your Butt: smart rectal thermometer https://web.archive.org/web/20160116182024/https://motherboard.vice.com/read/this-rectal-thermometer-is-the-logical-conclusion-of-the-internet-of-things #10yrsago UK Home Secretary auditions for a Python sketch: “UK does not undertake mass surveillance” https://web.archive.org/web/20160114224805/https://motherboard.vice.com/read/the-uk-does-not-undertake-mass-surveillance-says-uk-home-secretary #10yrsago US Treasury Dept wants to know which offshore crimelords are buying all those NYC and Miami penthouses https://www.csmonitor.com/USA/USA-Update/2016/0113/Are-luxury-condo-purchases-hiding-dirty-money #5yrsag Facebook shows mall ninja gear ads on insurrection articles https://pluralistic.net/2021/01/14/10-point-program/#monetizing #5yrsago The Black Panther self-care method https://pluralistic.net/2021/01/14/10-point-program/#panthers Upcoming appearances (permalink) Denver: Enshittification at Tattered Cover Colfax, Jan 22 https://www.eventbrite.com/e/cory-doctorow-live-at-tattered-cover-colfax-tickets-1976644174937 Colorado Springs: Guest of Honor at COSine, Jan 23-25 https://www.firstfridayfandom.org/cosine/ Ottawa: Enshittification at Perfect Books, Jan 28 https://www.instagram.com/p/DS2nGiHiNUh/ Toronto: Enshittification and the Age of Extraction with Tim Wu, Jan 30 https://nowtoronto.com/event/cory-doctorow-and-tim-wu-enshittification-and-extraction/ Victoria: 28th Annual Victoria International Privacy & Security Summit, Mar 3-5 https://www.rebootcommunications.com/event/vipss2026/ Berlin: Re:publical, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 Recent appearances (permalink) Enshittification (Creative Nonfiction podcast) https://brendanomeara.com/episode-507-enshittification-author-cory-doctorow-believes-in-a-new-good-internet/ A post-American, enshittification-resistant internet (39c3) https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet Enshittification with Plutopia https://plutopia.io/cory-doctorow-enshittification/ "can't make Big Tech better; make them less powerful" (Get Subversive) https://www.youtube.com/watch?v=X1EzM9_6eLE The Enshitification Life Cycle with David Dayen (Organized Money) https://www.buzzsprout.com/2412334/episodes/18399894 Latest books (permalink) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 (https://us.macmillan.com/books/9781250865908/picksandshovels). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 (thebezzle.org). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 (http://lost-cause.org). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 (http://seizethemeansofcomputation.org). Signed copies at Book Soup (https://www.booksoup.com/book/9781804291245). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com. "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books (permalink) "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2026 "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Memex Method," Farrar, Straus, Giroux, 2026 "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 Colophon (permalink) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America (1001 words today, 6053 total) "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Medium (no ads, paywalled): https://doctorow.medium.com/ Twitter (mass-scale, unrestricted, third-party surveillance and advertising): https://twitter.com/doctorow Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X



Back to top



Krebs on Security

Back to top

Who Operates the Badbox 2.0 Botnet?
The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.

Kimwolf Botnet Lurking in Corporate, Govt. Networks
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.

Patch Tuesday, January 2026 Edition
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.

Who Benefited from the Aisuru and Kimwolf Botnets?
Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and cybercrime services that appear to have benefitted from Kimwolf's spread.

The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.

Happy 16th Birthday, KrebsOnSecurity.com!
KrebsOnSecurity.com celebrates its 16th anniversary today! A huge "thank you" to all of our readers -- newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark days. Happily, comeuppance was a strong theme running through our coverage in 2025, with a primary focus on entities that enabled complex and globally-dispersed cybercrime services.

Dismantling Defenses: Trump 2.0 Cyber Year in Review
The Trump administration has pursued a staggering range of policy pivots this past year that threaten to weaken the nation’s ability and willingness to address a broad spectrum of technology challenges, from cybersecurity and privacy to countering disinformation, fraud and corruption. These shifts, along with the president’s efforts to restrict free speech and freedom of the press, have come at such a rapid clip that many readers probably aren’t even aware of them all.

Most Parked Domains Now Serving Malicious Content
Direct navigation -- the act of visiting a website by manually typing a domain name in a web browser -- has never been riskier: A new study finds the vast majority of "parked" domains -- mostly expired or dormant domain names, or common misspellings of popular websites -- are now configured to redirect visitors to sites that foist scams and malware.

Microsoft Patch Tuesday, December 2025 Edition
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities.

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
A sprawling academic cheating network turbocharged by Google Ads that has generated nearly $25 million in revenue has curious connections to a Kremlin-connected oligarch whose Russian university builds drones for Russia's war against Ukraine.



Back to top



Proton Foundation Blog

Back to top

A lawsuit is challenging WhatsApp’s encryption claims. Here’s what we know.
A class-action lawsuit challenges WhatsApp’s end-to-end encryption claims. We break down the allegations, denials, and what’s actually known.

5 invoice email templates for freelancers and small businesses
Get paid on time with these 5 freelance invoice email examples, including a past due invoice email for late payments.

Proton survey reveals how your spreadsheets live on long after you’ve forgotten them
Proton surveyed 1,000 people across four countries to reveal how personal spreadsheet data lives on, stays shared, and may be used long after you forget it.

Exposed sheets: Research reveals hidden liability of spreadsheets
Who can access your spreadsheets? New Proton research shows how ghost access, AI, and big tech exposes your data.

ChatGPT ads are rolling out. Here’s why they’re worse than search ads — and what you can do
OpenAI is rolling out ChatGPT ads. Here's what's changing, why it's worse than search ads, and what you can do to protect your privacy.

AI in daily life: 10 examples and how to protect your privacy
Explore 10 examples of AI in everyday life, both obvious and less well known. Find out how AI collects your data and how to safeguard it.

How to protect your business from phishing attacks: Signs, examples, and prevention strategies
Learn how to spot common scams and implement 10 proven prevention strategies to strengthen your cybersecurity.

Lumo 1.3: Introducing Projects, a better way to organize and create
Lumo’s latest update adds Projects, dedicated encrypted spaces for any task, designed to boost productivity while saving time.

Instagram leak: Why you are getting password reset emails and how to protect yourself
Unsolicited password reset emails worry Instagram users amid breach rumors. What we know on the alleged Instagram leak and how to stay safe.

How to turn off Gemini in Gmail — and why you should
New AI features are making their way to your Gmail inbox. Here's how to turn off Gemini in Gmail and why you should.



Back to top



Bellingcat

Back to top

Identifying ‘Less-Lethal’ Weapons Used By DHS Agents in US Immigration Raids and Protests

To stay up to date on our latest investigations, join Bellingcat’s WhatsApp channel here. Federal agents have frequently used so-called “less-lethal” weapons against protesters, including impact projectiles, tear gas and pepper spray, since the Trump administration’s nationwide immigration raids began last year.  The use of less-lethal weapons (LLWs) has been controversial. While designed to incapacitate or […]

The post Identifying ‘Less-Lethal’ Weapons Used By DHS Agents in US Immigration Raids and Protests appeared first on bellingcat.



Alex Pretti: Analysing Footage of Minneapolis CBP Shooting

To stay up to date on our latest investigations, join Bellingcat’s WhatsApp channel here On January 24, Alex Pretti, a 37-year-old intensive care unit nurse at the Minneapolis Veterans Affairs Health Care System, was shot and killed by federal agents on Nicollet Avenue in Minneapolis, Minnesota. The shooting comes just over two weeks after Renee […]

The post Alex Pretti: Analysing Footage of Minneapolis CBP Shooting appeared first on bellingcat.



Five Shots in Five Minutes: Analysing One Federal Agent’s Use of Less-Lethal Launcher in Minneapolis

This investigation is part of a collaboration between Bellingcat and Evident Media. You can watch Evident’s video here. The fatal shooting of Renee Nicole Good by Immigration and Customs Enforcement (ICE) agent Jonathan Ross in Minneapolis on Jan. 7 sparked nationwide protests, with often violent clashes breaking out between protesters and federal agents. Some of […]

The post Five Shots in Five Minutes: Analysing One Federal Agent’s Use of Less-Lethal Launcher in Minneapolis appeared first on bellingcat.



Analysing Footage of Minneapolis ICE Shooting

To stay up to date on our latest investigations, join Bellingcat’s WhatsApp channel here On Jan. 7 Renee Good, a 37-year-old mother of three, was shot and killed by a federal agent on Portland Avenue in Minneapolis, Minnesota. The incident was captured on several separate videos and spread rapidly on social media. The videos were soon […]

The post Analysing Footage of Minneapolis ICE Shooting appeared first on bellingcat.



Inside the Strike: The US Munition That Hit a Residential Building in Venezuela

A Bellingcat investigation has identified remnants of an AGM-88 series missile inside a three-storey apartment complex that was hit in Catia La Mar during the US military raid on Venezuela on Jan. 3, 2026 that reportedly killed at least one civilian.  According to the Venezuelan independent media outlet, El Pitazo, Rosa Gonzalez, 79, was killed […]

The post Inside the Strike: The US Munition That Hit a Residential Building in Venezuela appeared first on bellingcat.



Investigating the Impact of US-Israeli Strikes on Iran’s Nuclear Programme 

In the early hours of June 13, Israeli missiles slammed into apartment buildings across the Iranian capital, Tehran.  By morning, it became apparent that nine men Israel said were closely associated with the country’s nuclear programme were dead.  Videos posted to social media showed buildings in flames and rescue workers sifting through rubble as they […]

The post Investigating the Impact of US-Israeli Strikes on Iran’s Nuclear Programme  appeared first on bellingcat.



How Russia’s Invasion is Impacting Ukraine’s Youth

Last month, in the dead of a cold Autumn night, residents in the Ukrainian town of Balakliia were woken by the sound of two massive explosions. Social media footage showed apartments ablaze, balconies obliterated and a deep crater smouldering in a parking lot. Three people were killed and 13 injured in the November 17 attack, […]

The post How Russia’s Invasion is Impacting Ukraine’s Youth appeared first on bellingcat.



Profiting From Exploitation: How We Found the Man Behind Two Deepfake Porn Sites

Content warning: This article contains descriptions of non-consensual sexual imagery. Depending on which of his social media profiles you were looking at, Mark Resan was either a marketing lead at Google or working for a dental implant company, a human resources company and a business software firm – all at the same time.            But a […]

The post Profiting From Exploitation: How We Found the Man Behind Two Deepfake Porn Sites appeared first on bellingcat.



Russia’s Smuggled Grain Finds New Market in Saudi Arabia

A joint investigation by Bellingcat and Lloyd’s List has identified Saudi Arabia as the newest country to import grain directly from a Western-sanctioned port in occupied Crimea, as Russia attempts to secure recognition of the Ukrainian territory via a US-led peace plan. Satellite imagery and Automated Identification System (AIS) data from Lloyd’s List Intelligence shows […]

The post Russia’s Smuggled Grain Finds New Market in Saudi Arabia appeared first on bellingcat.



From School to Battlefield to Grave: How Russian Cossacks drive young people to war

The All-Russian Cossack Society turns school clubs into pipelines for state-sponsored militarisation and recruitment for war in Ukraine. Bellingcat shows how they shape an alternative mobilisation force.

The post From School to Battlefield to Grave<span id="hide-colon">:</span> <span class="subtitle">How Russian Cossacks drive young people to war</span> appeared first on bellingcat.





Back to top



100r

Back to top

Summary of changes for December 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of December.

It's that time of the year when we look back to our many bird encounters, account for what was damaged and mended, reminisce about moments immortalized in our paper calendars, and think of the many projects that have yet to leave the pages of our notebooks. We'd like to thank everyone who wrote to us, especially those who have tirelessly corrected errors in our writing and code, and we want to do a shoutout to the members of Merveilles, as well as artists, thinkers and tinkerers everywhere for inspiring us.

We kicked off January with the release of the 1-bit version of Oquonie for Playdate. It would be the first time, since the iOS version, that the game has a soundtrack. Devine also improved the html5 Uxn emulator to make all of our games and tools playable in the browser. Uxn's list of utilities has grown, with additions like a spreadsheet editor, a font editor, a theme editor and a desktop calendar.

rabbit Waves has grown by five new topics this year, and we have since assimilated this knowledge into daily life. On many summer evenings, we were out on deck scanning the skies for the Big Dipper, the Little Dipper, and Cassiopeia. Polaris sits 1 degree away from the celestial north pole, neither of us had ever truly appreciated this incredible fact until now and we can't think of any piece of knowledge that has so deeply touched us. Learning about field care also had a lasting effect on us, since then we carry a First-Aid kit whenever we go out on a long hike.

In early May, we set sail for Texada Island for a haul-out. This will be as far north as we would go this year, because we had to sail right back down again to meet up with friends on Blakely Island. After the event, we had yet another place to be, we pointed our bow west and sailed out of the Juan de Fuca Strait. Pino arrived in Ucluelet just in time to attend a friend's presentation to the city council about building a new boatyard. The rest of our summer schedule was not as rigid, we spent time amongst hummingbirds, met beautiful cetaceans, solar-cooked breads and played dominos aboard wooden boats.

In December, our usual afternoon walks were often spoiled by heavy rainfall. The prolonged absence of sunlight, the constant downpours, turned Pino's topsides green. Like in Ray Bradbury's short story All Summer in a Day, our world was all rainstorms. We were too glad when the clouds parted on the winter solstice. Every year, December ends with us folding big prisms out of modular orgami techniques, especially sonobes. This year's masterpiece was a stunning triakis icosahedron made of colorful construction paper. We also played through The Neverhood drinking hot spiced apple juice. We've since been exploring other Scummvm games.

In the recent onslaught of slop, we are continually impressed and inspired by artists and developers who fight back against the machine learning spear that is pointed toward them. Choose human agency, sabotage agents! See you in 2026!

Our favorite series this year was Scavengers Reign and Common Side Effects, and ours favorite films were Sinners and Nosferatu.

Book Club: This month we are still reading Middlemarch by George Eliot, but Devine also finished Blindness by José Saramago and Rek started paging through Make, Sew and Mend by Bernadette Banner.

Devine's favorite read of the year was Donna Tartt's The Secret History, and Rek enjoyed and cried over Girl's Last Tour by Tsukumizu.



Summary of changes for November 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of November.

This month, we celebrate Hundred Rabbit's 10 year anniversary and remember with great fondness how, in November 2015, we sat together at a coffee shop in Montreal, puzzling over how we would start a new life on the water. Here's hoping for 10 more years of learning and documenting experiments around low-tech and resilience!

We finally stashed our summer sailing gear, we compressed everything into vacuum bags drawing out as much air as we could to discourage mold. We're entering the month of December in Victoria, and we are beginning to feel the increasing dampness of winter in our clothes, we also see it as the condensation gathers on Pino's windows.

Devine spent the last few days in Austria for the Ultramateria Festival talking with local artists and activists about the design philosophy of Hundred Rabbits. Devine also gave an Orca workshop, played some techno in a gorgeous venue, made a brief appearance on Austrian television and Fireside Fedi.

Rek spent time troubleshooting a raw water leak in Calcifer II, gaining in-depth knowledge of yet another part of the engine. What was learned was documented in the ever-growing engine care portal under raw water pump. Rek has also been working on the upcoming Playdate version of Donsol!

Book Club: This month we are still reading Madame Bovary: Provincial Manners by Gustave Flaubert.



Summary of changes for October 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of October.

We sailed Pino back to Victoria before heading east for AMP Festival 2025. The venue was packed! The Aliceffekt show(YouTube) started with a bit of radio taiso, to make sure everyone had a chance to limber up, it was pretty funny.

As the trees were shedding the last of their leaves, members of the Merveilles community composed a spooky mixtape(download), and we folded paper to craft ourselves some homemade Halloween masks. Like every year, we carved a pumpkin. This year's design was inspired by the Hollow creature from the amazing animated sci-fi series Scavengers Reign.

We spent the rest of the month with family, seeing friends and reviewing microgrant applications for Rhizome.

We have re-opened the store for sticker sales, but at the moment we cannot ship them to the US due to the suspension of the de minimis exemption. We hope to resume shipments as soon as we can figure out how to comply with the new shipping rules. The sale of our physical books to the US is unaffected. We'll end this update with the mention that Oquonie is part of the Playdate Catalogue fall sale lasting until Nov 13, 2025. Thank you to everyone who continue to explore our strange little world.

Book Club: This month we are reading The Outsiders by Susan E. Hinton, and Madame Bovary: Provincial Manners by Gustave Flaubert.

Continue Reading



Summary of changes for September 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of September.

As promised, we released a revised transcription of Devine's talk Permacomputing 101 for Critical Signals 2025! We have moved our website to a Canadian TDL(100r.ca), so be sure to update your bookmarks! We will keep the .co version of our website online for redundancy.

Rek finished revising the upcoming version of the Victoria to Sitka logbook and passed the text over to Devine for proof-reading. The finished publication will feature 104 drawings, 19 recipes, and 18 new sections on a variety of topics. We hope to release the digital version early next year, and the printed version a bit later.

Our friend Erik(d6) designed a bespoke chat server so that the Uxn community could meet up through an interface designed specifically to interface nicely with tiny clients so we hacked together a little rom for it. Get in touch if you'd like to hang out on there!

Devine is performing in Montreal on October 11th, as Aliceffekt, at the AMP Festival 2025. They've also released a new album this month, called Ver'Iystl(Bandcamp), adding further dimension to the many places populating the Neauismetica. Let us know if you're planning to come!

Book Club: This month we are reading The Glass Bead Game by Hermann Hesse, and we are continuing to read Middlemarch by George Eliot.

Continue Reading



Summary of changes for August 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of August.

In preparation for a programming class that's coming up, we've implemented a graphical tiny-BASIC runtime called Sunflower BASIC. It contains the essential blocks of a BASIC language interpreter with enough features to communicate elementary programming concepts and how each one is implemented. We've also released the Permacomputing 101 talk given at Critical Signals 2025 which covered a few interesting aspect of digital preservation and some tactics to craft software in a way that may last.

Choosing to remain in the Southern Gulf islands in August this year has permitted us to pick blackberries, plums and apples. We have incorporated the fruit into cakes, or just squished whole berries over morning toast. We processed some of the apples into jam, and are currently delighting in eating through the rest. We've also been experimenting with the solar cooker, preparing some cinnamon buns in it for the first time! See our cameo in our friend Peter's latest video.

Continue Reading



Summary of changes for July 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of July.

This month we sailed into the Juan de Fuca Strait, escorted by pods of orcas and a lone young humpback whale. The last time we had been here was in July 2020, on our way back from Japan. After weathering gale force winds at anchor in Becher Bay, we stopped in Port San Juan. The beaches there are covered in old growth driftwood, carried there by winter storms. Some trees are so large and have been there so long that people have installed swings on them. The way to Barkley Sound was bleak, we spent 10 hours of it in a fog bank, only to emerge near Cape Beale to a bright sun over jade-colored waters. We pulled into Ucluelet the next day, just in time to meet up with our friend Avi to view the building site for their upcoming boatyard project.

We spent a few days anchored in Barkley Sound, in an anchorage with the biggest population of hummingbirds we'd ever seen. The hummingbird visits were constant, with 3-4 buzzing around us at all times. During our stay there we completed our game entry for Catjam named Polycat. The game is very hard, but also very short. Watch a video of Devine playing the game.

In the second half of July, Pino sailed back to the Southern Gulf islands and stayed anchored alongside a friend, messing with their laser engraver, hiking, picking blackberries, and working on projects. Instead of hummingbirds, in Fulford, we had kingfishers, they really liked sitting on the wind vane's arrow on top of the mast. See this amazing drone footage shot by our friends aboard MV Poem.

Devine has been invited to talk about permacomputing at Critical Signals on August 12th. They will try to introduce some of the ideas that they find most interesting via practical examples. Save the date!

Book Club: This month we are reading Ancillary Justice by Ann Leckie.

Continue Reading



Summary of changes for June 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of June.

For a few days, Pino became a land creature, living on stilts, while we scrubbed and re-painted the lower part of the hull. Our propeller had a bit of a wobble, which we hope is now corrected. We also battled with the old wheel quadrant and were finally able to remove it, at least a part of it. Boaters have frequently helped us while we were in boatyards, and we are finally able to pay it forward. We offered both advice to those who asked and lent tools to folks that needed them. It felt nice. Teapot's new bottom has seen water for the first time, the new gelcoat will allow us to take it around into bays for many more years to come.

We spent many June days working on both Turnip Complete(Uxn book) and the enhanced version of the Victoria to Sitka Logbook, with frequent breaks to enjoy the beautiful places we found ourselves in.

The beginning of our sailing season has been very blustery, allowing for some good sailing, but also often forcing us to wait at anchor for clement weather. Later, we sailed through the San Juan Islands to meet up with some Merveillans on Blakely Island. We are very grateful to be part of a community of such kind, curious, and generous people. The image that was drawn for this month's update represents cooperation between members of Merveilles.

Book Club: This month we are reading Ill Met By Moonlight by Sarah A. Hoyt, Silmarillion by J.R.R Tolkien and Girl's Last Tour by Tsukumizu.

Continue Reading



Summary of changes for May 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of May.

Oquonie was released on the Playdate Catalog this month! We'd like to thank everyone who sent us photos of their progress in the game, it has been nice to follow along. The game is kind of our first official release on a modern handheld platform, and we're happy to see that Uxn roms run well on it! It might be one of the first original Playdate games implemented that way?

In other news, Devine started working on a book, the working title is "Turnip Complete". The goal is to write a complete and stand-alone implementation guide for the Uxn virtual machine and devices, along with some example programs and thoughts about playful computery things. We might have something to show for it come autumn, maybe.

We've left Victoria for the summer, and are falling back into the groove of waking up at dusk to catch the tide. We have a quick haul out lined up, and afterward we'll be sailing around the Gulf Islands until the fall. We have lots of projects to finish up these next couple of months and can't wait to share them with you.

We share photos of life aboard throughout the month on our little photo site, if you're curious to see what the daily life aboard Pino is like.

Book Club: This month we are reading Artemis by Andy Weir, Gardening Without Work: For the Aging, the Busy and the Indolent by Ruth Stout and A History of Thinking on Paper by Roland Allen.

Continue Reading



Summary of changes for April 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of April.

The weather is getting warmer, which is perfect for airing out Pino's lockers, and drying off moldy clothes and tools. Anything stored in the v-berth lockers, below the waterline, suffer from extreme wetness. It is a very, very annoying fact of boat life, but there is really no way to bring good air flow in those spaces. We scrubbed the lockers clean, parted with items we no longer needed, and sent two laptops to the recycler.

In last month's update, we mentioned Flickjam, a game jam based on Increpare's Flickgame. We received a total of 27 entries! They're really fun, and all playable in the browser. Devine's jam entry is about a very adorable rabbit learning to play the word "rabbit" on a xylophone in Solresol.

Devine spent some time off the computer, skating and folding paper. The paper computer pages have been updated to cover some new ways in which computer emulators can be operated on paper. While on that subject, we highly recommend Tadashi Tokieda's excellent talk named A world from a sheet of paper.

Another item on Devine's list was to gradually phase out Uxnasm.c in favor of the self-hosted assembler. We're not 100% pleased yet, but it is getting closer to retirement.

Starting on May 20th 2025(1000 PST/PDT) the Playdate Catalogue will include Oquonie. The game is also available on our itch.io store.

The video for Devine's November 2024 talk A Shining Place Built Upon The Sand is now on YouTube.

Book Club: This month we are reading Banvard's Folly by Paul Collins, Einstein's Dreams by Alan Lightman, and we are still making progress on the The Goldfinch by Donna Tartt.

Continue Reading



Summary of changes for March 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of March.

Summary Of Changes

In the above illustration, little Ninj is going through a first-aid kit, looking through our supplies to see what needs to be topped off and what is out-of-date. Rek drew a list of suggestions on what to include in both a first-aid and a medical kit for the Rabbit Waves project, we plan to add more items soon(thanks to everyone on Mastodon who suggested additions! It'll be in the April update).

We will spend the first few days of April participating in Flickjam, making small games in the style of Flickgame, a tool originally made by Increpare, in which the world is navigated by clicking on pixels of different colors to head in different directions. Devine ported Flickgame to Varvara, and wrote a compiler for flick games to uxn roms.

This past month, Rek finished transcribing the entire 15 weeks of the Victoria to Sitka logbook! We have plans to turn it into a book, in the style of Busy Doing Nothing, with tons of extra content and illustrations.

March was a very good month for silly calendar doodles. Our paper calendar is always in view, it documents important events like releases, appointments, as well as food, memes, and other noteworthy things that happened on each day.

Book Club: This month we are still reading The Goldfinch by Donna Tartt(it's a long book).

Continue Reading



Summary of changes for February 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of February.

Summary Of Changes

On February 14th, we celebrated our 9th year living aboard our beloved Pino. Read a short text by Devine, which expands on what it means to truly be a generalist.

Despite the weather being less-than-ideal, we were able to install our replacement solar panels, and revisit our notes on solar installations.

Devine completed Nebu, a spritesheet editor as well as a desktop calendar, alongside many other little desktop utilities. Nebu is just over 8.3 kB, a bit less than a blank excel file.

In times of increasing climate and political instability, it is a good time to get together with your community and make plans for emergencies. Consider reading Tokyo Bosai about disaster preparedness, this elaborate document deals with disasters that occur specifically in Japan, but many of the recommendations are useful regardless. We released a new page on rabbit waves with suggestions on what to pack in an Emergency Bag. Remember, every emergency bag is different, and what is essential varies per person.

We also put together a print-it-yourself zine, which combines useful information about Morse Code and Signal Flags. If you have printed the zine and don't know how to fold it, see Rek's illustrated instructions. Speaking of signal flags, we printed stickers of Rek's ICS flag drawings.

The nice weather finally arrived this week and we were able to redo Teapot's gelcoat. This was our first time working with gelcoat, our friends Rik & Kay, who lent us their workspace, were very patient and generous teachers. We will continue the project later when the gelcoat has cured.

Book Club: This month we are reading The Goldfinch by Donna Tartt.

Continue Reading



Summary of changes for January 2025

Hey everyone!

This is the list of all the changes we've done to our projects during the month of January.

Summary Of Changes

Devine spent time improving the html5 Uxn emulator, and thanks to their hard work it is now possible to play Niju, Donsol, and Oquonie directly in the browser on itch.io, the same goes for projects like Noodle and Tote.

It's been a long time coming, but Oquonie is now playable on Playdate. Rek spent the last week converting the 2-bit assets for Oquonie to 1-bit, because some of the characters and tiles were too difficult to read, now all of the assets work perfectly on monochromatic screens. As an amazing plus, Devine got the music and sounds working perfectly, just like in the original iOS version.

From January 19-25th, we both participated in Goblin Week, an event in which you make goblins every day for a week(whatever that means to you). See the goblin series made by Rek(viewable here in higher rez also) and the one made by Devine(Mastodon).

Pino has earned two new replacement solar panels this month! We have not installed them yet, it is still too cold outside in Victoria (we are expecting snow this week).

We share photos often in our monthly updates, and so Devine spent time building our very own custom photo feed named Days. It is possible to follow the feed with RSS.

Book Club: This month we are reading How do You Live? by Genzaburo Yoshino and Middlemarch by George Eliot.

Continue Reading



Summary of changes for December 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of December.

Summary Of Changes

Before diving into the ins and outs of the past year, we'd like to begin by sending our very warmest thanks to everyone who generously hosted us, drove us to the hardware store, invited us out for fries to cheer us up, fixed typos in the books, improved the documentation, lent us power-tools, donated to the studio, spent hours to show us how to fix broken things and corrected us when we were wrong.

During the first few weeks of the year, we were busy with planning our upcoming sail north to Alaska, during which a DDoS attack took down many of our repositories and precipitated our decentralizing of the project source files. Mirroring our projects across multiple forges and diversifying the means in which they were available became necessary.

In preparation for the heavy weather up north, we strengthened the chainplates and replaced a few experienced halyards. In fact, our most vivid memories of the early spring was of the blisters we made splicing dyneema. We've also built ourselves a gimballed stove with space for an open pantry allowing us to store more fresh vegetables by doing away with the oven.

Our summer was spent exploring the Northern Canada and Alaskan coastline to test the recent boat projects, a sort of shakedown if you will, in preparation for plans we may divulge in a future update. During our transit, we began writing down notes on various forms of analog communication which have now mostly fallen into obscurity. These notes later became an integral part of the Rabbit Waves project, created with the hope of sparking an interest in these valuable but vanishing skillsets.

Through it all, we continued improving the Uxn ecosystem documentation and toolchain, which has played a central role in our work now for four years! We've also explored other enticing avenues where small robust virtual machines could be used for knowledge preservation, namely Conway's Fractran, which all came together into the Shining Sand talk given at the the year's end.

We're looking cautiously forward to the challenges that awaits us all in 2025. Approaching these adversarial forces with collective tactical preparedness and clarity is more important than ever, and we shall all rise to the occasion!

We had a lot of really good wildlife moments this year, and so the last drawing of 2024 is of a half-mooning seal.

Book Club: This month we are reading The Secret History by Donna Tartt. Our favorite book this year was West with the Night by Beryl Markham, see all of the other books we read in 2024.

Continue Reading



Summary of changes for November 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of November.

Summary Of Changes

Our website has a new look! The illustrated algae-eared rabbit nav helped solve the problem of navigating on mobile. We added a lot of information to this wiki over the years, creating separate portals for its evergrowing content was inevitable, we hope you like the re-design. Some of the content has shifted, and we've simplified many of the pages.

A couple of folks on Merveilles got together recently and made a Diablo Tribute tape. A limited run of physical cassettes are currently in production, but in the meantime the tribute album is available to download on Bandcamp.

Next month on December 6th, Devine will share the stage with Iszoloscope, Oddie(Orphx) & Creature at Foufounes Electriques in Montréal as part of AMP Industrial Events. Then on the 7th, we will both(remotely) present a summary of all the interesting analog communication schemes that inspired and found their way into Rabbit Waves and Wiktopher for Iterations 2024 organized by Creative Coding Utrecht.

Devine's talk for Handmade Seattle 2024 entitled A Shining Palace Built Upon the Sand was released online(YouTube), we also released the written transcript.

Due to the ongoing Canada Post strike we had to close the sale of stickers in our store, we'll let you know once we resume operations (this also applies to Patreon supporters, we'll ship perks your way as soon as we can).

Book Club: This month we are still reading The Memoirs of Sherlock Holmes by Arthur Conan Doyle.

Continue Reading



Summary of changes for October 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of October.

Summary Of Changes

Pino is back in Victoria. Being back in a city also means that we are shipping sticker sheets again! Devine found a spirograph set at a thrift store for 5$, we now make patterns on every letter we ship.

We are happy to announce the official release of Rabbit Waves! The idea for the project came after discussing the disappearance of certain traditional seasteading skills and maritime communication knowledge that we believe are valuable when electronics misbehave, but that are also just generally fun to learn and use. The world of the micro-site will grow as we think of new ideas to expand it.

Devine participated in Drawtober again this year and completed a zine that teaches the basics of multiset rewriting with examples, it also includes the source for a tiny Fractran interpreter. Since its release, many people have printed their own. Avanier went a step further and re-drew the zine on black paper! Devine also released an interactive version, and CapitalEx created with it a beautiful little world to explore! Handmade Seattle 2024 is coming up, Devine will be there to talk about weird computer stuff, and will hand out copies of the zine too.

This year, we carved a Calcifer pumpkin (see our other Halloween pumpkins).

Book Club: This month we read The Memoirs of Sherlock Holmes by Arthur Conan Doyle.

Continue Reading



Summary of changes for September 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of September.

Summary Of Changes

September started off warm, but got cold and windy fast, we spent lots of time sitting by the woodstove drinking tea. As promised, we have begun transcribing the Victoria to Sitka logbook digitally, we release one week's worth of logs at a time. We populated the logs with photos and Rek's sketches(also sourced from the handwritten logbook). End of the month, we closed our summer 2024 sailing route, Pino has traveled very far this year! We made 76(!!!) stops over a period of 5 months, sailing 1900 NM.

We announced a new project this month named Rabbit Waves. It will serve as a vessel to expand, in a playful way, on some of our favourite things. Expect lots of art featuring root vegetable root-shaped sailboats, rabbits, and seabirds! The website will host more content next month.

For 3 years now, we've had a monthly hand-drawn calendar in the galley that we cover with doodles, at the end of the year, Rek binds the 12 pages together, and it makes it easy to look back at where we were, what we were doing at a previous time. Everyday has some kind of highlight or other. It's one of our favourite habits.

Listen to Devine's remix of SOPHIE's One More Time feat. Popstar.

Book Club: This month we read Project Hail Mary by Andy Weir. We are forever in love with Rocky.

Continue Reading



Summary of changes for August 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of August.

Summary Of Changes

This month, Pino reached the northern tip of Vancouver Island, sailed south through Johnstone Strait, and into calmer, familiar waters on the 11th of August. Both of us were eager for a taste of summer weather, we hoped to catch what was left of it. Our legs demanded an anchorage with options for walking, so we chose to anchor in Hathayim Marine Park. The lovely people on the sailboat Nanamuk were anchored here too, they mapped many of the trails in the area, even the overgrown, less-traveled routes. We updated our summer route map through northern B.C.

From May 1st to August 11th, like with our book Busy Doing Nothing, Rek kept a detailed logbook of daily happenings onboard. We hope to publish these notes to this wiki soon.

Book Club: This month we are reading The Adventures of Sherlock Holmes by Arthur Conan Doyle, The Design of Everyday Things by Don Norman, and Everyday Utopia: What 2000 years of Wild Experiments Can Teach Us About the Good Life by Kristen R. Ghodsee.

Continue Reading



Summary of changes for July 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of July.

Summary Of Changes

Pino and crew have moved a lot in the past month. On the first of July, we were in Sitka, Southeast Alaska, and then on the last day of the month we were back in Millbrook Cove, very near to the top of Vancouver Island. We sailed 590 NM and stopped in 15 different anchorages.

Leaving Sitka, we sailed along the west coast of Southeast Alaska for a few days to try and take advantage of a good weather window, we had some engine issues which too motivated the need for such a long passage(see our track)—we spent two days troubleshooting the issue while anchored in Port Bazan, a bay far from everything, with no internet connection or way to talk to anybody, we were glad to have the physical engine manual on board. Sailing on open waters is always nice, we saw black-footed albatrosses, horned puffins, a whale per hour, and many more sea otters(Port Bazan was full of them).

After checking back into Prince Rupert, the way back south through Northern Canada was plagued with unfavorable winds, we had to beat into it, or travel on quiet waters to make progress. We resorted to doing short hops between anchorages, conditions did not permit for long distances. Doing short hops though did allow us to discover beautiful places we might have otherwise missed. We spent many grey days waiting for weather, reading, drawing, and beginning work on markl, we're giving it another go).

Book Club: This month we read Erewhon by Samuel Butler, Technophilia and Its Discontents by Ellen Ullman, The Democracy Of Species by Robin Wall Kimmerer, I Will Fight No More Forever by Merrill D. Beal, In Cold Blood by Truman Capote, and Mrs Dalloway by Virginia Woolf.

Continue Reading



Summary of changes for June 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of June.

Summary Of Changes

We spent all of June cruising through Southeast Alaska, we visited 4 cities and stopped by 14 different anchorages. On June 27th, 420 nautical miles later, we arrived in the beautiful town of Sitka — our favorite city so far.

We have sailed as far north as we are willing to go this year, at 57°N — the same latitude as Kodiak. Sailing in these waters has been challenging, there is a lot of current, and the wind is often light, or absent. Because of these frequent calms, Calcifer II has seen a lot of use this year. We will now slowly make our way back south, exploring new anchorages along the west coast of Southeast Alaska all the while. We continue to update our path in Alaska here, when we cross back into Canada we'll resume updates here.

Book Club: This month we are reading West With the Night by Beryl Markham.

Continue Reading



Summary of changes for May 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of May.

Summary Of Changes

We spent this month moving northward through both southern and northern British Columbia. We've been moving almost every day, stopping every night to anchor, sleep and recuperate. Sailing near land is not as relaxing as sailing offshore, this reef-strewn coast requires careful navigation. We've had many long days of endless tacking from one side of the channel to the other, almost all the way to Port McNeill, then after that we started to get more weather from the south for some mostly pleasant, but cold and rainy, downwind sailing. We've been using our woodstove a lot, in evenings it helps warm the boat after a long sail.

On May 29th, 623 nautical miles miles after leaving Victoria, we arrived in Prince Rupert, our last major port in British Columbia before we head north to Southeast Alaska. Then, on June 2nd, we arrived in Ketchikan, Southeast Alaska. Most of our updates this month detail some of the places we've been(see the above list). To see our path, look at Western Canada and us se alaska. We update the map as we find internet.

We've seen sea otters, lots of humpback whales, two pods of orcas(one pod had a baby tagging along), eagles, and lots of mountains. In other non-travel related news, Devine is going to speak again at Handmade Seattle this upcoming November!

Pino book & movie club

Book Club: This month we are reading The Martian by Andy Weir.

Continue Reading



Summary of changes for April 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of April.

Summary Of Changes

Devine has been busy working on the implementation and documentation of wryl's fantastic programming language Modal. Rewriting systems are a computation paradigm that is generally unknown and under-explored that might have some fascinating features that might be able help us to tackle some of our future projects.

In other news, Pino is ready to head northward! We finished all of our boats projects and left the dock on May 1st. See a photo of our first day of the year on the water, taken as we exited Enterprise Channel, just north of Trial Island south of Victoria. On our travels we will continue to push updates every month like usual, but the updates will only go live when we find internet, and this may or may not coincide with the start of every month. We will keep a log of our travels, populated with plenty of drawings!

Pino book & movie club

Book Club: This month we are reading The Fountainhead by Ayn Rand.

Continue Reading



Summary of changes for March 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of March.

Summary Of Changes

News

Pino now has all-new chainplates! We removed the original ones earlier this month to inspect them and found some pit corrosion(as well as a small crack), replacing them was necessary. With the chainplates gone, we removed the entire starboard side cabinet to see what was behind it—it's always nice to see parts of our boat we've never seen. We also replaced 3 old halyards on Pino. Devine earned themself a couple of blisters splicing dyneema onto some of our existing halyards.

Sejo revisited the Uxn tutorial, and appended corrections. The most important change is that the tutorial is now targeting the learn-uxn platform(online) maintained by metasyn. Now, people can jump right in and experiment without having to set up a dev environment. Tsoding, someone who can code in front of the camera in a language they've never used or read the docs for, did a pretty funny session in Uxntal, you can watch it here.

There has been too many exciting Uxn projects coming out these past few days, so we'll just put a link to the hashtag. Someone also created a Discord channel, it's a good place to learn about other concatenative languages and an alternative for people who have trouble with #uxn, in irc.libera.chat.

Pino book & movie club

This month we are reading The Last Great Sea by Terry Glavin, and we watched the movie Tenet.

Continue Reading



Summary of changes for February 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of February.

Summary Of Changes

News

Late last month we started re-modeling part of our galley, the work is now complete! It's subtle, but the splash image for the log now includes the re-design. We will test our new galley when we go out cruising.

Pino will be adventuring a bit more north this summer, we're planning to explore the north coast of British Columbia, all the way to Prince Rupert, or possibly Ketchikan(AK), areas with little to no cell coverage. How far we go depends on what we find on the way. If the seas and winds are kind, and if we have time, we might go farther. We spend our days studying charts, gathering supplies, and fixing up the boat to make sure the passage is safe and pleasant. More updates on our plans soon!

Want to see something cool? Xsodect made Tetris(Mastodon) in Orca.

Pino book & movie club

This month we watched The Race to Alaska Movie.

Continue Reading



Summary of changes for January 2024

Hey everyone!

This is the list of all the changes we've done to our projects during the month of January.

Summary Of Changes

On January 10th the forge that we use to host our projects was taken down by DDoS attacks and was struggling to come back online(it's back now, read the post-mortem), the event reminded us that we ought to host mirrors and release versions of these source files ourselves. We have begun to host copies across our various websites. The builds are still accessible through itch.io. These will be automatically updated as we work on them in their individual repositories, but mirrored there for reliability. We are thankful for Sourcehut's tireless work on resolving the issue and for taking the time to communicate important changes.

In keeping with the spirit of improving the resilience of the tools we use we've taken a moment to write a kind of pocket version of the console emulator and self-hosted assembler as to see how many lines are needed to start from the seed assembler and replicate it. A copy of the pocket emulator, the source for the assembler and its hexadecimal representation have been documented.

On January 17th Victoria got its first snowfall, with it came temperatures below freezing. We got to test our recent improvements, like a new louvered closet vent to help ventilate the space(there are also two existing vents at the top, one on each side). The closet has been dry for the first time in 3 years. We've made an effort not to keep too many items on the floor so the area can breathe. We got ice inside of the windows for the first time ever though... not ideal.

See Uxn running on a Zaurus Husky(Mastodon).

Pino book club

This month we are reading The Haunting of Hill House by Shirley Jackson.

Continue Reading



Summary of changes for December 2023

Hey everyone!

This is the list of all the changes we've done to our projects during the month of December.

Summary Of Changes

News

Wiktopher was released on paperback! Our small collection of self-published books is growing.

We finished the upholstery in the saloon, Pino feels like a new boat. We also published an article on this past summer's Solar Cooking Experiment.

Last September Devine and a group of people went on a 3-day train ride from Seattle to St Louis for the last edition of Strange Loop 2023. This video documents that journey.

As mentionned in November's update, Tinyletter, the service we use to send out our monthly newsletter, is shutting down in February 2024. We will now be using Sourcehut to send our monthly updates. With this new system our emails will be leaner than ever, using plain text(no html). We cannot transfer accounts to this new list ourselves, so if you want to keep receiving updates by email please sign up again here. Clicking on the subscribe button will open your email client, you can leave the body and subject of the email blank. We will keep sending newsletters with TinyLetter until the end of January 2024, so as to give people time to make the switch. If you sign up to this new list, unsuscribe from the old newsletter to avoid getting two emails with the same content for December and January. We hope you continue to follow our updates.

Note that since it's our first time sending updates with the new newsletter format, it may look a little wonky. We'll improve on it next month.

2023 was kind to us, we look forward to seeing what 2024 brings! We hope the coming year treats you all well.

Pino book & movie club

This month we are reading The Tartar Steppe by Dino Buzzati, and we went to see 君たちはどう生きるか(The Boy and the Heron).

Continue Reading



Summary of changes for November 2023

Hey everyone!

This is the list of all the changes we've done to our projects during the month of November.

Summary Of Changes

News

Wiktopher is finally finished. We started this book in 2017 while in French Polynesia, constrained by power limitations and hardware failures. Writing demanded less energy than drawing digitally, Rek could use the Chromebook to work (see tools ecosystem). You can read the first two chapters of the finished story here[4.1 MiB] as a PDF. If you liked what you've read, we hope you'll consider reading the rest!

We treated ourselves this month to new saloon cushions(see upholstery). We sleep and live on these, it's so nice to have plump cushions again!

IMPORTANT. You may have heard but the service we use to send our newsletter(TinyLetter) is shutting down early next year (Feb 2024). We are in the process of setting up an alternative, we'll provide details on that in December's newsletter and on this website.

Pino book & movie club

We are reading Thomas Pynchon's The Crying of Lot 49, and enjoyed watching Close Encounters of the Third Kind.

Continue Reading



Summary of changes for October 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of October. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

This month we got tattooed(Mastodon) by the very talented Lizbeth. Check out her tattoo art.

Devine's Strange Loop 2023 talk was released online, watch it here(YouTube). We also released the talk as a text version, Computing and sustainability, for those who prefer to read. We talked with the members of Frugarilla on their latest podcast(French), in which we finally admit that our whole thing is a sneaky way of getting programmers interested in food preservation.

Every year we carve halloween pumpkins, this year we made a Uxn pumpkin!

See Oquonie running on a linux handheld(Mastodon).

Pino book club

We are reading Selma Lagerlöf's The Wonderful Adventures of Nils.

Continue Reading



Summary of changes for September 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of September. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino returned to the Victoria docks a little early this year so Devine could go to Strange Loop 2023. We had a lovely sail that day, with clear skies, and 10 kts on the beam. Despite being a little food and sleep deprived, Devine's presentation went well, we will share the recording here once it is released.

Rek has been busy editing Wiktopher, finessing the conlangs featured in the story. One of the featured languages is Ilken, a whistled language, designed for long-distance communication, and playable with instruments. A few years ago Devine designed a language for it, but we decided to instead use a modern variation of Solresol, a musical language by Jean-François Sudre. Rek drew a fanart of the mascot of Solresol, and Devine a communication lantern.

Currently, Devine is working at translating Thousand Rooms(Famimi Remisolla) in Solresol as practice. We're also editing a Brazilian Portuguese version, to be released next month.

We've been toying with the idea of making an audiobook for the story, and asked Paul B. to use their voice synthesis tool Gesture to try and hear what a poem in Ilken(Solresol) sounds like. The result was so lovely that it made Rek cry of joy.

Rek's sketch thread(Mastodon) is still going. Devine will be producing a lot more art next month for Drawtober!

Pino book club

We are reading J.D. Salinger's Catcher in the Rye, and B. F. Skinner's Walden Two.

Continue Reading



Summary of changes for August 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of August. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino sailed a bit more northward this month and went all the way to the Octopus Islands. We visited this place during a very windy week, with winds blowing 30-35 kts the entire time. We got acquainted with a few northern rapids, like Hole in the Wall and Surge Narrows. It is a bit of a mindfuck to think that in these waters the tide ebbs north and floods south.

This summer has been especially arid, and because of it the province has seen a lot forest fires (see pictures of our smokey transit). Trails that we know and love on Cortes Island, that are usually wet and muddy, were bone dry this year. We had a few days of hard rain, during that time we collect rain water and go for walks to look for slugs and snails.

Both of us have been drawing a lot this month, see this Neoneve portrait(Mastodon) by Devine (drawn with Oekaki), and this sketch thread(Mastodon) by Rek..

Pino book club

We have read Adam Wisniewski-Snerg's Robot, George Orwell's Homage to Catalonia, and Michael A. Hiltzik's Dealers of Ligthning.

Continue Reading



Summary of changes for July 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of July. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

We spent many quiet days in Roscoe Bay, and then wandered over to melanie cove for a few days before moving to our favorite anchorage in Desolation Sound, Hathayim Marine Park. This inlet is quiet, and not overly busy, it is ideal for focusing on projects. We walk the 3 km trail to Squirrel Cove everyday.

We have been hard at work reviewing Wiktopher, and we're happy to announce that we've finished the first pass of corrections! We'll be doing many more passes, but this was a very big step. Rek has been drawing(Mastodon) a lot, and Devine has been working on their presentation for Strange Loop 2023.

Check out this amazing Uxn cheat sheet by Nettie!

Pino book & movie club

We are reading Lewis Carrol's Bruno and Sylvie. We re-watched Vampire Hunter D for the hundredth time.

Continue Reading



Summary of changes for June 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of June. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino spent the first few days of the month on land, having its bottom re-painted, and its various bits serviced and checked. We took our propeller apart for the first time.

We've added a few write-ups of our travels so far (see above entry with links under 100r.ca), but the most significant one is our 46nmi sail up to Princess Louisa Inlet, a long fjord on British Columbia's Sunshine Coast, with an incredible gem at the end. It is an amazing, and unique place. We're glad we finally got to go. As we write this, we are in Roscoe Bay on West Redonda Island, tethering off a phone hoisted up the mast (it works quite well).

This summer we are power stable. We had issues last year because of parisitic draws due to old wiring (see DC electrical refit), but now everything is working as it should. We're charging our computers without an inverter, and that too is working out quite well so far (see charging electronics).

Together, Hikari and Lynn made chibicc-uxn, a c compiler for Uxn, and with it also released a port of the classic software Neko(xneko, oneko sakura).

Pino book & movie club

We are reading Arkady and Boris Strugatsky's Roadside Picnic. We've been re-watching Kaamelott(the series, book 1 though 6) for the hundredth time.

Continue Reading



Summary of changes for May 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of May. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino is off the dock, and spending time at anchor. The weather has been excellent, and with days of full comes sun solar cooking! We baked some bread, and roasted some green coffee beans in the sun. We are enjoying some quiet days before we haul the boat out of the water at the start of June.

Devine's talk proposal to Strange Loop 2023 has been accepted, so parts of the summer will be collecting our notes and writing slides for the presentation in September.

The recording for the show Devine(Alicef) did with Anju Singh and Reylinn(visuals) last march for Biosonic on Galiano Island is online, watch it here.

We had a small impromptu logo jam event on Merveilles this month. Members of the community re-interpreted the logo, with illustrations, photo collages, and even food. See all of the entries so far. Nf just completed Fourtette, a block game. Devine provided guidance, Rek made the title screen art, and d6 provided music.

Pino book & movie club

We went to the theater for the first time in a long time, to see Suzume(2023). We have also finished reading Saint-Exupery's Courrier Sud.

Continue Reading



Summary of changes for April 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of April. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

Oquonie is out and it is playable! A big thank you to those who helped us test the game on a variety of devices and systems all the way to Windows95. This version of Oquonie differs a little from the original, in that some of the puzzles and secrets have changed. We hope that those who played the original will too enjoy this one. We have a special build of the game on itchio with the emulator and rom combined, if you have a false-negative virus warning on Windows 10, you will need to use the standard uxn32 emulator and rom.

We have watched as people implemented their own emulators and were able to play Oquonie on a Varvara of their own making. The current implementation documentation might need to be improved, if you have feedback for things that could be clearer, please let us know!

We published our experiments with solar cooking this month, and wrote a more detailed post on solar evacuated tube cooking. The real test will happen this summer. We plan to keep a log of everything we cook, how long it takes, and the conditions(sun, overcast, temp etc).

We're still closing a few projects aboard Pino, to get it ready for some summer sailing. Our plans for now are loose, we're hauling the boat out of the water in early June, with plans to sail back towards Desolation Sound afterward, with a possible stop by Jervis Inlet.

Pino book & movie club

We're watching La Belle Verte by Coline Serreau.

Continue Reading



Summary of changes for March 2023

Hey everyone! This is the list of all the changes we've done to our projects during the month of March.

Summary Of Changes

News

We spent the first half of March on Galiano Island in the Salish Sea for BioSonic(by ActivePassive), an event series exploring the intersections of music, art and biodiversity. On March 10th we gave a talk titled What Are Computers For?, see the art from the talk. The next day, Devine and Anju Singh performed together using Orca, with Reylinn on visuals. A video of the perfomance and of the talk will be released soon, in the meantime, see photos of the talk and of the show, taken by photographer Dayna Szyndrowski.

We are still working on re-releasing Oquonie. We spent the month of March playing the game, finding bugs, and fixing them. Oquonie will be playable next month.

This month we've been experimenting with solar cooking, to try to save on cooking fuel this summer. We are currently making tests, gathering data, and hope to share this with you all end of April. In the meantime, enjoy this amazing music by Xsodect, made using Orca.

Pino book club

We're reading Structure and Interpretation of Computer Programs (SICP) by Harold Abelson, Gerald Jay and Julie Sussman.

Continue Reading



Summary of changes for February 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of February. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

On February 14th, we celebrated our 7th year living aboard our beloved Pino. It's also around this time 10 years ago that we were still living in Odaiba(Japan), and beginning our work on what would be our first game collaboration: oquonie.

The uxn port of Oquonie has advanced in incredible leaps this month. Rek has finished re-doing all of the assets. Devine is now working on the music, and finalizing some of the levels. We are testing the game as we go, and hope to release it sometime next month. Oquonie will be playable on a number of platforms, including the Nintendo DS(Mastodon), as well as the Playdate. See a small preview(Mastodon).

Early next month we are traveling to Galiano Island in the Salish Sea for BioSonic(by ActivePassive). We'll be part of an event series exploring the intersections of music, art and biodiversity. We'll give a talk on March 10th, and Devine will perform with Orca on the 11th at the Galiano South Hall.

Watch Devine's set for Lovebyte 2023.

Pino book club

We're reading Courrier Sud by Antoine de Saint-Exupéry.

Continue Reading



Summary of changes for January 2023

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of January. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

This month, we started porting Oquonie to Uxn. This is a long time coming, but we weren't sure if it was possible to do, and we still had a lot to learn before even thinking of taking it on. Now, we think we are ready. We are re-drawing the sprites(Mastodon), and they look amazing. This is an important test for us, and for Uxn.

Here is a very adorable little Uxn sprite for Potato that comes up when a rom path was mistyped, see it also on the Uxn page.

Pino book club

We're reading The Journey Home: Some Words in Defense of the American West by Edward Abbey.

Continue Reading



Summary of changes for December

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of December. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

The rabbits are re-wiring Pino. So far this month, we spent entire afternoons removing, and passing new wires into the boat's walls and ceiling. This project has taken up most of our time this month. For updates on the project, see electrical refit. We also released an edited transcript of Devine's talk weathering software winter, for those who prefer to read.

We forgot to mention it in the last update, but Compudanzas just released a new version of their introduction to uxn programming book! The online tutorial also had some updates.

Happy new year everyone! See more photos of Pino(on the far left) and friends decorated for the occasion.

Pino book club

We're reading Le Péril Bleu by Maurice Renard.

Continue Reading



Summary of changes for November

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of November. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

We put some red lights on Pino, to help combat winter gloom. We also started growing another lion's mane mushroom on board(we grew the same variety last fall), it already has a little tuft!

Devine's talk Weathering Software Winter for Handmade Seattle was recorded, watch it here(Vimeo). The video is for the entire first day of the conference, so for your convenience Devine's talk starts at 1h25min.

A little while ago Rostiger drew an amazing series of illustrations explaining Uxn, and how it works. Ben made a zine out of it and gave us a copy. Make your own Uxn zine using this PDF[1.38 MB].

Pino book club

We're reading Gulliver's Travels by Jonathan Swift, and How to Blow Up a Pipeline by Andreas Malm.

Continue Reading



Summary of changes for October

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of October. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino is in Victoria again, and we're diving back into our favorite fall activities like pumpkin carving (see halloween pumpkins), and fruit picking. The boat is now filled with apple jam. October was a drawing month for the both of us. Devine participated in drawtober and completed 28 drawings using Noodle. Rek finished a sequence for the ongoing comic project Hakum.

For those in the Pacific Northwest, Devine will be giving a talk called Weathering Software Winter at Handmade Seattle on November 17th.

As you know, we share a community online with a fantastic group of people. Some months ago Lizbeth designed a burgee for Merveilles and this month we decided to make one for Pino. See the Merveilles burgee.

Pino book club

We're reading Life, the Universe and Everything by Douglas Adams, and What The Doormouse Said by John Markoff.

Continue Reading



Summary of changes for September

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of September. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

The days are getting shorter, and so is the time that we can spend on the computer, due to our batteries depleting earlier a bit each day. So, Devine spends evenings proof-reading the wiktopher manuscript, reading and messing around with the Playdate, and Rek continues ink work on an upcoming project(Mastodon, no project page yet).

While cleaning up the boat, Devine found two small black notebooks. We started paging through them, to see if we should keep them. The notebooks were full of sketches, interspersed with shopping lists, and incomplete logs from earlier sailing trips we'd done. We found logs detailing our very first attempt at sailing offshore, our sail down the US West Coast and Mexico, and our passage from Tonga to New Zealand. We read the logs, and decided to transcribe and publish them online. Read the lost logbook.

Devine wrote a little timer program for the Adafruit Playground.

Pino book club

We're reading Hitchhiker's Guide to the Galaxy by Douglas Adams.

Continue Reading



Summary of changes for August

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of August. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Pino is back in the land of faster internet, and our boat's belly has been re-filled with food. We returned to the Gulf Islands, and are busy eating as many wild blackberries as we can stomach ('tis the season).

Our last anchorage in Desolation Sound was Tenedos Bay, a really lovely place with an amazing (vertical) hike, and clear, clear waters. We also wrote a post on Sturt Bay on Texada Island, a place we stopped on the way up earlier this year, and again when we traveled back south.

As mentioned brieftly in our last post, Devine has been working on an OS called Potato. Rek drew a mascot, and another illustration featuring Varvara and Potato together. Potato is for the Varvara computer, designed to fill the gaps where a host device might not have an underlying file system, like handheld consoles (many people use Uxn on Nintendo DS).

Rek has been drawing a lot, their winter will consist of scanning and processing a sketchbook-full of art. We are still proofreading Wiktopher. A recent stop in Sidney permitted us to print the entire book on paper to make it easier (and more pleasant) to make corrections. The result is 70 (double-sided) pages of text. As of today, we have gone over and marked in red the first chapter (out of 12). Editing books is never easy or fast, but we'll get there.

We know a couple of people have made hako dice sets, so we feel bad for "patching" a physical game, but the face organization of the die has changed somewhat, now, the opposing sides are always of equal value. If any of you are looking for a simple 2-player boardgame to play, try Conway's Phutball. Devine transcribed the rules on their wiki.

Pino book club

We're reading Mathematical Puzzles & Diversions by Martin Gardner.

Continue Reading



Summary of changes for July

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of July. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

News

Sometimes we find an anchorage that is so nice, so ideal, that we end up staying for weeks. We stayed in Von Donop Bay (hathayim marine park) for well over a month. The southernmost anchorage is near many trails that snake and branch out deep into the woods, and the bay is so large that we kept finding new corners to explore by dinghy. The water in the area is warmer than in Victoria, we can dive, and check Pino's bottom without freezing. This is our first real summer on the boat, when we have no big boat projects to do, nor big transits to plan, and it feels amazing.

We have stretched our food stores to the limit (it has been 2 months since we last stocked up in full). A 5 km trek through the woods takes us to a little General Store, they never have fresh produce (or it gets bought out before we get there) but we go once in a while to replenish our stock of potatoes and onions. We are relying on sprouts a lot (see growing food).

This month, we made a Keynote talk for Nime 2022, and Devine started work on a little OS project called Potato, see some footage(Mastodon). There is no documentation yet, but soon.

Pino book club

We're reading The Stories of Ray Bradbury by Ray Bradbury.

Continue Reading



Summary of changes for June

Hey everyone! This is the list of all the changes we've done to our projects and apps during the month of June. We'll also be reporting in our on position in the world, and on our future plans.

Summary Of Changes

Wired

Back to top

He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive
A source trapped inside an industrial-scale scamming operation contacted me, determined to expose his captors’ crimes—and then escape. This is his story.

Revealed: Leaked Chats Expose the Daily Life of a Scam Compound’s Enslaved Workforce
A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials—including 4,200 pages of messages that lay out its operations in unprecedented detail.

Judge Delays Minnesota ICE Decision While Weighing Whether State Is Being Illegally Punished
A federal judge ordered a new briefing due Wednesday on whether DHS is using armed raids to pressure Minnesota into abandoning its sanctuary policies, leaving ICE operations in place for now.

Deepfake ‘Nudify’ Technology Is Getting Darker—and More Dangerous
Sexual deepfakes continue to get more sophisticated, capable, easy to access, and perilous for millions of women who are abused with the technology.

The Instant Smear Campaign Against Border Patrol Shooting Victim Alex Pretti
Within minutes of the shooting, the Trump administration and right-wing influencers began disparaging the man shot by a federal immigration officer on Saturday in Minneapolis.

ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations
A new federal filing from ICE demonstrates how commercial tools are increasingly being considered by the government for law enforcement and surveillance.

DOGE May Have Misused Social Security Data, DOJ Admits
Plus: The FAA blocks drones over DHS operations, Microsoft admits it hands over Bitlocker encryption keys to the cops, and more.

US Judge Rules ICE Raids Require Judicial Warrants, Contradicting Secret ICE Memo
The ruling in federal court in Minnesota lands as Immigration and Customs Enforcement faces scrutiny over an internal memo claiming judge-signed warrants aren’t needed to enter homes without consent.

CBP Wants AI-Powered ‘Quantum Sensors’ for Finding Fentanyl in Cars
US Customs and Border Protection is paying General Dynamics to create prototype “quantum sensors,” to be used with an AI database to detect fentanyl and other narcotics.

149 Million Usernames and Passwords Exposed by Unsecured Database
This “dream wish list for criminals” includes millions of Gmail, Facebook, banking logins, and more. The researcher who discovered it suspects they were collected using infostealing malware.

ICE Agents Are ‘Doxing’ Themselves
The alleged risks of being publicly identified have not stopped DHS  and ICE employees from creating profiles on LinkedIn, even as Kristi Noem threatens to treat revealing agents’ identities as a crime.

Surveillance and ICE Are Driving Patients Away From Medical Care, Report Warns
A new EPIC report says data brokers, ad-tech surveillance, and ICE enforcement are among the factors leading to a “health privacy crisis” that is eroding trust and deterring people from seeking care.

ICE Details a New Minnesota-Based Detention Network That Spans 5 States
Internal ICE planning documents propose spending up to $50 million on a privately run network capable of shipping immigrants in custody hundreds of miles across the Upper Midwest.

US Hackers Reportedly Caused a Blackout in Venezuela
Plus: AI reportedly caused ICE to send agents into the field without training, Palantir’s app for targeting immigrants gets exposed, and more.

Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed
X has placed more restrictions on Grok’s ability to generate explicit AI images, but tests show that the updates have created a patchwork of limitations that fail to fully address the issue.

Why ICE Can Kill With Impunity
Over the past decade, US immigration agents have shot and killed more than two dozen people. Not a single agent appears to have faced criminal charges.

Former CISA Director Jen Easterly Will Lead RSAC Conference
The longtime cybersecurity professional says she’s taking the helm of the legacy security organization at “an inflection point” for tech and the world beyond.

Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking
Flaws in how 17 models of headphones and speakers use Google’s one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.

Verizon Outage Knocks Out US Mobile Service, Including Some 911 Calls
A major Verizon outage appeared to impact customers across the United States starting around noon ET on Wednesday. Calls to Verizon customers from other carriers may also be impacted.

Trump Warned of a Tren de Aragua ‘Invasion.’ US Intel Told a Different Story
Hundreds of records obtained by WIRED show thin intelligence on the Venezuelan gang in the United States, describing fragmented, low-level crime rather than a coordinated terrorist threat.



Back to top



Guardian

Back to top

This site is down!

Back to top



404Media

Back to top

DHS Says Critical ICE Surveillance Footage From Abuse Case Was Actually Never Recorded, Doesn't Matter
Court records reveal the incredibly sad state of ICE's evidence retention systems.

Many UK Users Soon Won't Be Able to Access Pornhub
Starting February 2, many people connecting from the UK will not be able to access the porn site and many others.

Police Told to Be ‘as Vague as Permissible’ About Why They Use Flock
The documents show law enforcement sees themselves as being consistently and universally under threat from the people it is supposed to protect.

Dozens of CDC Health Databases Have Gone Dark Under Trump: ‘The Consequences Will Be Dire’
Nearly half of routinely-updated CDC databases have experienced delays or shutdowns in 2025, with vaccination-related systems disproportionately affected, according to a new study.

Two Heads, Three Boobs: The AI Babe Meta Is Getting Surreal
The algorithm is driving AI-generated influencers to increasingly weird niches.

Podcast: Unmasking Deepfakes Kingpins (with Kolina Koltai)
Bellingcat's Kolina Koltai talks about OSINT investigations into synthetic abuse imagery sites, and seeing them go down because of her work.

I Replaced My Friends With AI Because They Won't Play Tarkov With Me
What began as a joke got a little too real. So I shut it down for good.

How Right Wing Influencers Used AI Slop to Turn Renee Good Into a Meme
A look at “necromemetics” and the meme economy in the aftermath of violence.

Scientists Discovered a Cow That Uses Tools Like a Chimpanzee
Veronika, a brown cow in Austria, uses sticks and brushes as multipurpose tools to scratch hard-to-reach spots

Behind the Blog: Signs of the Times
This week, we discuss stances on AI, a conference about money laundering, and signs about slavery coming down.

Scientists Got Men to Rate Penises by How Intimidating They Are. This Is What They Found.
Why is the human penis so big? Scientists probed the evolution of penis size through sexual selection and mate competition in a first-of-its-kind study

Aliens and Angel Numbers: Creators Worry Porn Platform ManyVids Is Falling Into ‘AI Psychosis’
“Ethical dilemmas about AI aside, the posts are completely disconnected with ManyVids as a site,” one ManyVids content creator told 404 Media.

Podcast: Here’s What Palantir Is Really Building
We talk ELITE, the tool Palantir is working on; how AI influencers are defaming celebrities; and Comic-Con's ban of AI art.

Amateur Radio Operators in Belarus Arrested, Face the Death Penalty
"My local community is being systematically liquidated in what I can only describe as a targeted intellectual genocide."

Comic-Con Bans AI Art After Artist Pushback
The famed convention's organizers have banned AI from the art show.



Back to top



Darknet Diaries

Back to top

169: MoD

Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the internet.

This is part 2 of the LoD/MoD series. Part 1 is episode 168: “LoD”.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Red Canary. Red Canary is a leading provider of Managed Detection and Response (MDR), helping nearly 1,000 organizations detect and stop threats before they cause harm. With a focus on accuracy across identities, endpoints, and cloud, we deliver trusted security operations and a world-class customer experience. Learn more at redcanary.com.

This show is sponsored by Maze. Maze uses AI agents to triage and remediate cloud vulnerabilities by figuring out what’s actually exploitable, not just what’s theoretically risky. They remove the noise, prioritize vulns that matter, and manage remediation, so your team stops wasting time on meaningless vulns. Visit MazeHQ.com/darknet for more information.

Sources



168: LoD

The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security culture today.

This is part 1 of the LoD/MoD saga. Part 2 is episode 169: “MoD”.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Rippling. Rippling is the unified platform for Global HR, Payroll, IT, and Finance. They’ve helped millions replace their mess of cobbled-together tools with one system designed to give leaders clarity, speed, and control. With Rippling, you can run your entire HR, IT, and Finance operations as one, or pick and choose the products that best fill the gaps in your software stack. Learn more rippling.com/darknet.

This show is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Meter’s full-stack solution covers everything from first site survey to ongoing support, giving you a single partner for all your connectivity needs. Go to meter.com/darknet to book a demo now!


Sources



167: Threatlocker

A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.

Sponsors

This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.



166: Maxie

Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories from her time as a professional penetration tester, including high-stakes physical intrusions, red team chaos, and the unique adrenaline of hacking the real world.

Her book: The Art of Attack: Attacker Mindset for Security Professionals (https://amzn.to/4ojYSVZ)

Her data center: www.subseacloud.com/



165: Tanya

Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder.

You can sign up for her newsletter at https://newsletter.shehackspurple.ca/

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This episode is sponsored by Hims. Hims offers access to ED treatment options ranging from trusted generics that cost up to 95% less than brand names to Hard Mints, if prescribed. To get simple, online access to personalized, affordable care for ED, Hair Loss, Weight Loss, and more, visit https://hims.com/darknet.

Support for this show comes from Drata. Drata is the trust management platform that uses AI-driven automation to modernize governance, risk, and compliance, helping thousands of businesses stay audit-ready and scale securely. Learn more at drata.com/darknetdiaries.

View all active sponsors.

Books



164: Oak Cliff Swipers

He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens of co‑conspirators, stacks of stolen plastic, and a lifestyle built on chaos.

Meet Nathan Michael, leader of Oak Cliff Swipers.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from Pantheon. Pantheon keeps your site fast, secure, and always on. That means better SEO, more conversions, and no lost sales from downtime. But this isn’t just a business win; it’s a developer win too. Your team gets automated workflows, isolated test environments, and zero-downtime deployments. Visit Pantheon.io, and make your website your unfair advantage.

Support for this show comes from Adaptive Security. Deepfake voices on a Zoom call. AI-written phishing emails that sound exactly like your CFO. Synthetic job applicants walking through the front door. Adaptive is built to stop these attacks. They run real-time simulations, exposing your teams to what these attacks look like to test and improve your defences. Learn more at adaptivesecurity.com.




163: Ola

In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker.

Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Miro. AI doesn’t have to be intimidating—in fact, it can help your team thrive. Miro’s Innovation Workspace changes that by bringing people and AI together to turn ideas into impact, fast. Whether you’re launching a new podcast, streamlining a process, or building the next big thing, Miro helps your team move quicker, collaborate better, and actually enjoy the work. Learn more at https://miro.com/.

This show is sponsored by Thales. With their industry-leading platforms, you can protect critical applications, data and identities – anywhere and at scale with the highest ROI. That’s why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most – applications, data and identities. Learn more at http://thalesgroup.com/cyber.

View all active sponsors.

Sources




162: Hieu

All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree.

Find Hieu on X: https://x.com/HHieupc.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from Drata. Drata is the trust management platform that uses AI-driven automation to modernize governance, risk, and compliance, helping thousands of businesses stay audit-ready and scale securely. Learn more at drata.com/darknetdiaries.

This show is sponsored by Red Canary. Red Canary is a leading provider of Managed Detection and Response (MDR), helping nearly 1,000 organizations detect and stop threats before they cause harm. With a focus on accuracy across identities, endpoints, and cloud, we deliver trusted security operations and a world-class customer experience. Learn more at redcanary.com.



161: mg

In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities.

Learn more about mg at: o.mg.lol

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from Axonius. Axonius transforms asset intelligence into intelligent action. With the Axonius Asset Cloud, customers preemptively tackle high-risk and hard-to-spot threat exposures, misconfigurations, and overspending. The integrated platform brings together data from every system in an organization’s IT infrastructure to optimize mission-critical risk, performance, and cost measures via actionable intelligence. Covering cyber assets, software, SaaS applications, identities, vulnerabilities, infrastructure, and more, Axonius is the one place to go for Security, IT, and GRC teams to continuously drive actionability across the organization. Bring truth to action with Axonius. Learn more at axonius.com.



160: Greg

Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona.

Follow Greg on Twitter: https://x.com/Laughing_Mantis.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Red Canary. Red Canary is a leading provider of Managed Detection and Response (MDR), helping nearly 1,000 organizations detect and stop threats before they cause harm. With a focus on accuracy across identities, endpoints, and cloud, we deliver trusted security operations and a world-class customer experience. Learn more at redcanary.com.

This show is sponsored by Miro. AI doesn’t have to be intimidating—in fact, it can help your team thrive. Miro’s Innovation Workspace changes that by bringing people and AI together to turn ideas into impact, fast. Whether you’re launching a new podcast, streamlining a process, or building the next big thing, Miro helps your team move quicker, collaborate better, and actually enjoy the work. Learn more at https://miro.com/.



159: Vastaamo

Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl.

Get more from Joe linktr.ee/joetidy.

Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet (https://amzn.to/3He7GNs).

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Red Canary. Red Canary is a leading provider of Managed Detection and Response (MDR), helping nearly 1,000 organizations detect and stop threats before they cause harm. With a focus on accuracy across identities, endpoints, and cloud, we deliver trusted security operations and a world-class customer experience. Learn more at redcanary.com.



158: MalwareTech

MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected.

https://malwaretech.com

Sponsors

Support for the show comes from Black Hills Information Security. Black Hills has a variety of penetration assessment and security auditing services they provide customers to help keep improve the security of a company. If you need a penetration test check out www.blackhillsinfosec.com/darknet.

Support for this show comes from Arctic Wolf. Arctic Wolf is the industry leader in security operations solutions, delivering 24x7 monitoring, assessment, and response through our patented Concierge Security model. They work with your existing tools and become an extension of your existing IT team. Visit arcticwolf.com/darknet to learn more.

Support for this show comes from Cloaked, a digital privacy tool. Cloaked offers private email, phone numbers, and virtual credit card numbers. So you can be anonymous online. They also will remove your personal information from the internet. Like home address, SSN, and phone numbers. Listeners get 20% off a Cloaked subscription when they visit https://cloaked.com/darknet. Calling 1-855-752-5625 for a free scan to check if your personal information is exposed!



157: Grifter

Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.

Learn more about Grifter by visiting grifter.org.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.

This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it’s often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.



156: Kill List

The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see what was real and fake and discovered a hitman for hire site which took him on an unbelievable journey.

Chris Monteiro Twitter: x.com/Deku_shrub, Website: https://pirate.london/

Carl Miller Twitter: https://x.com/carljackmiller.

Kill List podcast: https://wondery.com/shows/kill-list/

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This episode is sponsored by ProjectDiscovery. Tired of false positives and falling behind on new CVEs? Upgrade to Nuclei and ProjectDiscovery, the go-to tools for hackers and pentesters. With 10,000 detection templates, Nuclei helps you scan for exploitable vulnerabilities fast, while ProjectDiscovery lets you map your company’s perimeter, detect trending exploits, and triage results in seconds. Get automation, accuracy, and peace of mind. First-time users get one month FREE of ProjectDiscovery Pro with code DARKNET at projectdiscovery.io/darknet.

This episode is sponsored by Kinsta. Running an online business comes with enough headaches—your WordPress hosting shouldn’t be one of them. Kinsta’s managed hosting takes care of speed, security, and reliability so you can focus on what matters. With enterprise-level security, a modern dashboard that’s actually intuitive, and 24/7 support from real WordPress experts (not chatbots), Kinsta makes hosting stress-free. Need to move your site? They’ll migrate it for free. Plus, get your first month free when you sign up at kinsta.com/DARKNET.



155: Kingpin

In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware hacker and computer engineer, Joe has been exploring and manipulating electronic systems since the 1980s. As a former member of the legendary hacker collective L0pht Heavy Industries, he has significantly contributed to the cybersecurity landscape. Joe is also the proprietor of Grand Idea Studio, a research and development firm, and has shared his expertise through various media, including his YouTube channel. Join us as we explore Joe’s unique perspective on hacking, engineering, and his extraordinary journey in the world of technology.

https://joegrand.com/

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from Lumen. It used to be hard to track your metabolism, but Lumen is a little device that you breath into which tells you if your burning fat or carbs, fast and easy and have your results in seconds. And knowing that will help you know what kind of food your body needs. And knowing that will help you with your health goals like losing weight or gaining muscle. Take the next step to improving your health go to lumen.me/darknet.

Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.



154: Hijacked Line

Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how he did it, why he did, and what he spent it on.

Conor’s website: https://conorfreeman.ie

Conor’s X: https://x.com/conorfrmn

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from Drata. Drata is the trust management platform that uses AI-driven automation to modernize governance, risk, and compliance, helping thousands of businesses stay audit-ready and scale securely. Learn more at drata.com/darknetdiaries.

Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.

Sources



153: Bike Index

Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who does it and where do the bikes go? We talk with Bryan from Bike Index who investigates this.

https://bikeindex.org

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

This show is sponsored by Flashpoint. As one of the largest private providers of threat intelligence, Flashpoint delivers what security teams need most: clarity. By combining cutting-edge technology with the expertise of world-class analyst teams, their Ignite platform gives organizations instant access to critical data, expertly analyzed insights, and real-time alerts —all in one seamless platform. To access one of the industry’s best threat data and threat intelligence, visit flashpoint.io today.



152: Stacc Attack

Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.

https://x.com/STACCoverflow

He has a merch store now freestacc.io.

Sponsors

Support for this show comes from Cobalt Strike. Cobalt Strike simulates real-world, advanced cyber attacks to enable red teams to proactively evaluate an organisation’s security readiness and defence response. Their Command and Control framework gives red teamers the ability to customise their engagements and incorporate their own tools and techniques, allowing you to stress-test specific parts of your incident response capabilities. Learn more about Cobalt Strike and get a custom demo at https://cobaltstrike.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.





151: Chris Rock

Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.

https://x.com/chrisrockhacker

Sponsors
Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit http://try.flare.io/darknet-diaries to learn more.



150: mobman 2

In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware. Something didn’t sit right with a lot of people about that episode. It’s time to revisit that episode and get to the bottom of things.

Sponsors
This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Sources
https://www.youtube.com/watch?v=GDMc2PZM4V4
https://www.illmob.org/notmymobman/
https://darknetdiaries.com/episode/20



149: Mini-Stories: Vol 3

In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

Sponsors
Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.



148: Dubsnatch

Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

Sponsors
Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.




147: Tornado

In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.



146: ANOM

In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.



145: Shannen

Shannen Rossmiller wanted to fight terrorism. So she went online and did.

Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI.

Thanks to Spycast for allowing usage of the audio interview with Shannen.

Sponsors

Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.



144: Rachel

Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm.


Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/


Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/.


Sponsors

Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.




143: Jim Hates Scams

Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers.


Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning



Sponsors

Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more.


This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet.


This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.


CLAIM=a6e199f5f9fd5954e532117c829c8f0a8f0f1282=CLAIM





142: Axact

Axact sells fake diplomas and degrees. What could go wrong with this business plan?


Sponsors

Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more.


Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.



141: The Pig Butcher

The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world.


Sponsors

Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more.


Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries.


This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.



140: Revenge Bytes

Madison's nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy story.



139: D3f4ult

This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made.


Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.


Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries.


Sources

https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban

https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/

https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/

https://archive.ph/Si79V#selection-66795.5-66795.6

https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html



138: The Mimics of Punjab

This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy.


To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY).




Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries.


Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com.



137: Predator

A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world.


In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/.


We also hear from Bill Marczak and John Scott-Railton from Citizen Lab.


If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games.


Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer.



136: Team Xecuter

Team Xecuter was a group involved with making and selling modchips for video game systems. They often made mods that allowed the video game system to rip games or play pirated games. It was a crowd favorite in the modding scene. Until it all fell apart. The story of what happened to Team Xecuter must be heard to believe.


This episode features Gary Bowser. You can find more about Gary here:


https://twitter.com/Bowser_GaryOPA

https://garyopa.com/

https://www.gofundme.com/f/garyopa-restarting-his-life?utm_location=darknetdiaries


Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.


Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com.


Sources

https://www.washingtonpost.com/archive/politics/1994/10/27/ringleader-pleads-guilty-in-phone-fraud/56e551bb-a727-43e8-a3ca-1c1f4cf6ef82/

https://www.justice.gov/sites/default/files/usao/legacy/2010/10/12/usab4304.pdf

https://www.eurogamer.net/nintendo-to-appeal-not-guilty-judgement-of-flash-cart-sellers-7

https://www.gamesindustry.biz/nintendo-pounces-on-global-piracy-outfit

https://www.justice.gov/opa/pr/two-members-notorious-videogame-piracy-group-team-xecuter-custody

https://medium.com/swlh/watch-paint-dry-how-i-got-a-game-on-the-steam-store-without-anyone-from-valve-ever-looking-at-it-2e476858c753#.z05q2nykc

https://www.lemonde.fr/police-justice/article/2022/05/27/voler-des-societes-qui-font-des-milliards-qu-est-ce-que-j-en-ai-a-faire-max-louarn-c-ur-de-hackeur_6127821_1653578.html

https://www.theverge.com/2020/11/20/21579392/nintendo-big-house-super-smash-bros-melee-tournament-slippi-cease-desist

https://www.youtube.com/watch?v=U7VwtOrwceo

https://www.youtube.com/watch?v=5sNIE5anpik



135: The D.R. Incident

Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he went through.


Breakmaster Cylinder’s new album: https://breakmastercylinder.bandcamp.com/album/the-moon-all-that.


Sponsors

Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit https://flare.io to learn more.


Sources

https://www.wired.com/story/costa-rica-ransomware-conti/

https://malpedia.caad.fkie.fraunhofer.de/details/win.bandook

https://www.youtube.com/watch?v=QHYH0U66K5Q

https://www.youtube.com/live/prCr7Z94078

https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america

https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/

https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/


Attribution

Darknet Diaries is created by Jack Rhysider.

Assembled by Tristan Ledger.

Episode artwork by odibagas.

Mixing by Proximity Sound.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.



134: Deviant

Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings to see if the building is secure or not. He has done this for a long time and has a lot of tricks up his sleeve to get into buildings. In this episode we hear 3 stories of him breaking into buildings for a living.


You can find more about Deviant on the following sites:


https://twitter.com/deviantollam


https://www.instagram.com/deviantollam


https://youtube.com/deviantollam


https://defcon.social/@deviantollam


https://deviating.net/


Sponsors

Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com.


This show is sponsored by Packetlabs. They’ve created the Penetration Testing Buyer’s guide - a comprehensive resource that will help you plan, scope, and execute your Penetration Testing projects. Inside, you’ll find valuable information on frameworks, standards, methodologies, cost factors, reporting options, and what to look for in a provider. https://guide.packetlabs.net/.


Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries.



133: I'm the Real Connor

One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the strangest days he’s ever had.


Sponsors

Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Qurotum Cyber at quorumcyber.com.


Skiff is a collaboration platform built for privacy from the ground up. Every document, note, and idea you write is end-to-end encrypted and completely private. Only you and your trusted collaborators can see what you’ve created. Try it out at https://skiff.com.


Support for this show comes from AttackIQ. AttackIQ’s security optimization platform emulates the adversary with realism to test your security program, generating real-time performance data to improve your security posture. They also offer free training. Head to attackiq.com to get a closer look at how AttackIQ can help you today.



Sources

https://connortumbleson.com/

https://krebsonsecurity.com/2022/10/glut-of-fake-linkedin-profiles-pits-hr-against-the-bots/

Snippet from Darknet Diaries ep 119 about North Korean’s getting tech jobs to steal bitcoin https://www.youtube.com/watch?v=v1ik6bAwELA



Attribution


Assembled by Tristan Ledger.

Sound design by Garrett Tiedemann.

Episode artwork by odibagas.

Mixing by Proximity Sound.

Theme music created by Breakmaster Cylinder.



132: Sam the Vendor

Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor.


Learn more about Sam at https://www.doingfedtime.com/.


Sponsors

Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.



131: Welcome to Video

Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website.


This story is part of Andy’s new book “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. An affiliate link to the book on Amazon is here: https://amzn.to/3VkjSh7.




Sponsors

Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.



130: Jason's Pen Test

Join us as we sit down with Jason Haddix (https://twitter.com/Jhaddix), a renowned penetration tester who has made a name for himself by uncovering vulnerabilities in some of the world’s biggest companies. In this episode, Jason shares his funny and enlightening stories about breaking into buildings and computers, and talks about the time he discovered a major security flaw in a popular mobile banking app.


Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Support for this show comes from Arctic Wolf. Arctic Wolf is the industry leader in security operations solutions, delivering 24x7 monitoring, assessment, and response through our patented Concierge Security model. They work with your existing tools and become an extension of your existing IT team. Visit arcticwolf.com/darknet to learn more.



129: Gollumfun (Part 2)

Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story of what happened there and some of the crimes he committed.


In part 2, his past catches up to him.


Listen to more of Brett on his own show. https://www.thebrettjohnsonshow.com/.





128: Gollumfun (Part 1)

Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story of what happened there and some of the crimes he committed.


Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.



127: Maddie

Maddie Stone is a security researcher for Google’s Project Zero. In this episode we hear what it’s like battling zero day vulnerabilities.


Sponsors

Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com.


Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.



Sources

https://www.sophos.com/en-us/medialibrary/pdfs/technical%20papers/yu-vb2013.pdf

https://www.youtube.com/watch?v=s0Tqi7fuOSU

https://www.vice.com/en/article/4x3n9b/sometimes-a-typo-means-you-need-to-blow-up-your-spacecraft



126: REvil

REvil is the name of a ransomware service as well as a group of criminals inflicting ransomware onto the world. Hear how this ransomware shook the world.


A special thanks to our guest Will, a CTI researcher with Equinix.


Sponsors

Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com.


Support for this show comes from Arctic Wolf. Arctic Wolf is the industry leader in security operations solutions, delivering 24x7 monitoring, assessment, and response through our patented Concierge Security model. They work with your existing tools and become an extension of your existing IT team. Visit arcticwolf.com/darknet to learn more.



125: Jeremiah

Jeremiah Roe is a seasoned penetration tester. In this episode he tells us about a time when he had to break into a building to prove it wasn’t as secure as the company thought.


You can catch more of Jeremiah on the We’re In podcast.


Sponsors

Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet.



124: Synthetic Remittance

What do you get when you combine social engineering, email, crime, finance, and the money stream flowing through big tech? Evaldas Rimašauskas comes to mind. He combined all these to make his big move. A whale of a move.


Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.



123: Newswires

Investing in the stock market can be very profitable. Especially if you can see into the future. This is a story of how a group of traders and hackers got together to figure out a way to see into the future and make a lot of money from that.


Sponsors

Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.


Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper’s Zero Trust Data Center provides uncompromising visibility across all your data center environments. Visit juniper.net/darknet to learn more.



122: Lisa

In this episode we hear some insider threat stories from Lisa Forte.


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet.


Attribution

Darknet Diaries is created by Jack Rhysider.


Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether.


Episode artwork by odibagas.


Mixing by Proximity Sound.


Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.



121: Ed

In this episode we hear some penetration test stories from Ed Skoudis (twitter.com/edskoudis). We also catch up with Beau Woods (twitter.com/beauwoods) from I am The Cavalry (iamthecavalry.org).


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com/darknet.


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.


View all active sponsors.


Attribution

Darknet Diaries is created by Jack Rhysider.


Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether.


Episode artwork by odibagas.


Audio cleanup by Proximity Sound.


Theme music created by Breakmaster Cylinder. 



120: Voulnet

This is the story about when Mohammed Aldoub, AKA Voulnet, (twitter.com/Voulnet) found a vulnerability on Virus Total and Tweeted about it.


Sponsors

Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.


Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.


Sources

https://www.cyberscoop.com/story/trial-error-kuwait-mohammed-aldoub-case/



119: Hot Wallets

In this episode we interview journalist Geoff White to discuss some of the recent crypto currency heists that have been happening. Geoff has been tracking a certain group of thieves for some time and shares his knowledge of what he’s found.


Much of what we talk about in this episode has been published in Geoff’s new book The Lazarus Heist: From Hollywood to High Finance: Inside North Korea’s Global Cyber War (https://amzn.to/3mKf1qB).


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. axonius.com/darknet


Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.



118: Hot Swaps

This is the story of Joseph Harris (https://twitter.com/akad0c). When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned.


Joseph sometimes demonstrates vulnerabilities he finds on his YouTube channel https://www.youtube.com/channel/UCdcuF5Zx6BiYmwnS-CiRAng.


Listen to episode 112 “Dirty Coms” to hear more about what goes on in the communities Joseph was involed with.


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks.


Support for this show comes from Synack. Synack is a penetration testing firm. But they also have a community of, people like you, who earn regular money by legally hacking. If you’re interested in getting paid to hack, visit them now at synack.com/red-team, and click ‘apply now.’



117: Daniel the Paladin

Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.


Sponsors

Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet.


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.



116: Mad Dog

Jim Lawler, aka “Mad Dog”, was a CIA case officer for 25 years. In this episode we hear some of the stories he has and things he did while working in the CIA.


Jim has two books out. Affiliate links below.

Living Lies: A Novel of the Iranian Nuclear Weapons Program https://amzn.to/3s0Ppca

In the Twinkling of an Eye: A Novel of Biological Terror and Espionage https://amzn.to/3y7B4OL


Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper’s Zero Trust Data Center provides uncompromising visibility across all your data center environments. Visit juniper.net/darknet to learn more.



115: Player Cheater Developer Spy

Some video game players buy cheats to win. Let’s take a look at this game cheating industry to see who the players are.


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.



114: HD

HD Moore (https://twitter.com/hdmoore) invented a hacking tool called Metasploit. He crammed it with tons of exploits and payloads that can be used to hack into computers. What could possibly go wrong? Learn more about what HD does today by visiting rumble.run/.


Sponsors

Support for this show comes from Quorum Cyber. They exist to defend organisations against cyber security breaches and attacks. That’s it. No noise. No hard sell. If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and specially if you are interested in Microsoft Security - reach out to www.quorumcyber.com.


Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. And Snyk does it all right from the existing tools and workflows you already use. IDEs, CLI, repos, pipelines, Docker Hub, and more — so your work isn’t interrupted. Create your free account at snyk.co/darknet.



113: Adam

Adam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part of the team. But a strange series of events took him in another direction, that definitely didn’t make him happy.


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.


Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.



112: Dirty Coms

This episode we talk with a guy named “Drew” who gives us a rare peek into what some of the young hackers are up to today. From listening to Drew, we can see that times are changing for the motive behind hacking. In the ’90s and ’00s it was done for fun and curiosity. In the ’10s Anonymous showed us what Hacktivism is. And now, in the ’20s, the young hackers seem to be profit driven.




Sponsors


Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.




Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper Secure Edge can help you keep your remote workforce seamlessly secure wherever they are.



111: ZeuS

ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan became so big, that it resulted in one of the biggest FBI operations ever.


Sponsors

Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.


Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet.



110: Spam Botnets

This episode tells the stories of some of the worlds biggest spamming botnets. We’ll talk about the botnets Rustock, Waledac, and Cutwail. We’ll discover who was behind them, what their objectives were, and what their fate was.


Sponsors

Support for this show comes from Juniper Networks (hyperlink: juniper.net/darknet). Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper Secure Edge can help you keep your remote workforce seamlessly secure wherever they are. 


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.



109: TeaMp0isoN

TeaMp0isoN was a hacking group that was founded by TriCk and MLT (twitter.com/0dayWizard). They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.


Sponsors

Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.


Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.



108: Marq

This is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and police.


Sponsors

Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.


Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


View all active sponsors.


Sources

Court records and news articles were used to fact check this episode. However Marq requested that links to his full name not be made available.


https://techcrunch.com/2019/12/19/ring-doorbell-passwords-exposed/

https://www.wired.com/2010/03/hacker-bricks-cars/



107: Alethe

Alethe is a social engineer. Professionally she tries to trick people to give her passwords and access that she shouldn’t have. But her journey to this point is interesting and in this episode she tells us how she became a social engineer.

Follow Alethe on Twitter: https://twitter.com/AletheDenis


Sponsors

Support for this show comes from Skiff. Skiff is a collaboration platform built for privacy from the ground up. Every document, note, and idea you write is end-to-end encrypted and completely private. Only you and your trusted collaborators can see what you’ve created. Try it out at https://www.skiff.org/darknet.


Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



106: @Tennessee

How much online abuse are you willing to take before you decide to let your abuser have what they want? Unfortunately, this is a decision that many people have to ask themselves. If someone can threaten you physically, it bypasses whatever digital security you have in place.


Thanks to https://twitter.com/jw for sharing this harrowing story with us.


Affiliate links to books:


The Smart Girl’s Guide to Privacy: https://www.amazon.com/gp/product/1593276486/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1593276486&linkCode=as2&tag=tunn01-20&linkId=0a8ee2ca846534f77626757288d77e00


Extreme Privacy:https://www.amazon.com/gp/product/B0898YGR58/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B0898YGR58&linkCode=as2&tag=tunn01-20&linkId=575c5ed0326484f0b612f000621b407f


Sponsors


Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.


Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/.


View all active sponsors.



105: Secret Cells

Joseph Cox (https://twitter.com/josephfcox), Senior Staff Writer at Motherboard (https://www.vice.com/en/topic/motherboard), joins us to talk about the world of encrypted phones.


Books


Affiliate links to books:


The Smart Girl’s Guide to Privacy: https://www.amazon.com/gp/product/1593276486/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1593276486&linkCode=as2&tag=tunn01-20&linkId=0a8ee2ca846534f77626757288d77e00


Extreme Privacy:https://www.amazon.com/gp/product/B0898YGR58/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B0898YGR58&linkCode=as2&tag=tunn01-20&linkId=575c5ed0326484f0b612f000621b407f




Sponsors


Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.


Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/.


View all active sponsors.



104: Arya

Arya Ebrahami has had quite a personal relationship with darknet marketplaces. In this episode you’ll hear about his adventures on tor. Arya’s current project is https://lofi-defi.com.


Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.


View all active sponsors.


Sources

https://www.nbcwashington.com/news/local/27-arrested-in-prince-william-county-narcotics-investigation/58441/

https://patch.com/virginia/manassas/undercover-narcotics-operation-nets-27-arrrests-xanax-distribution-ring



103: Cloud Hopper

Fabio Viggiani is an incident responder. In this episode he talks about the story when one of his clients were breached.


Sponsors


Support for this show, and for stretched security teams, comes from SOC.OS. Too many security alerts means alert fatigue for under-resourced SecOps teams. Traditional tools aren’t solving the problem. SOC.OS is the lightweight, cost-effective, and low-maintenance solution for your team. Centralise, enrich, and correlate your security alerts into manageable, prioritised clusters. Get started with an extended 3-month free trial at https://socos.io/darknet.


Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.



Sources


 https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper

 https://www.reuters.com/article/us-china-cyber-cloudhopper-companies-exc-idUSKCN1TR1D4

 https://www.fbi.gov/wanted/cyber/apt-10-group

 https://www.youtube.com/watch?v=277A09ON7mY

 https://www.wsj.com/articles/ghosts-in-the-clouds-inside-chinas-major-corporate-hack-11577729061

 https://www.technologyreview.com/2018/12/20/239760/chinese-hackers-allegedly-stole-data-of-more-than-100000-us-navy-personnel/



102: Money Maker

Frank Bourassa had an idea. He was going to make money. Literally. Listen to the story of a master counterfeiter.



101: Lotería

In 2014 the Puerto Rico Lottery was mysteriously losing money. Listen to this never before told story about what happened and who did it.


Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.


Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.


Sources

https://en.wikipedia.org/wiki/Puerto_Rico_Lottery

https://www.justice.gov/usao-pr/pr/10-individuals-indicted-drug-trafficking-and-money-laundering

https://www.dea.gov/press-releases/2014/07/22/caribbean-corridor-strike-force-arrests-10-individuals-indicted-drug

https://casetext.com/case/united-states-v-delfin-robles-alvarez-7



100: NSO

The NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile phone. They sell this spyware to government agencies around the world. How is it used and what kind of company is the NSO Group?


Thanks to John Scott-Railton and Citizen Lab for investigating this and sharing their research.


Sponsors

Support for this show comes from Detectify. Try their web vulnerability scanner free. Go to https://detectify.com/?utm_source=podcast&utm_medium=referral&utm_campaign=DARKNET


Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/.


Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.


For a full list of sources used in this episode and complete transcripts visit https://darknetdiaries.com.



99: The Spy

Igor works as a private investigator in NYC. He’s often sitting in cars keeping a distant eye on someone with binoculars. Or following someone through the busy streets of New York. In this episode we hear about a time when Igor was on a case but sensed that something wasn’t right.


Sponsors

Support for this show comes from Exabeam. Exabeam lets security teams see what traditional tools can’t, with automated threat detection and triage, complete visibility across the entire IT environment and advanced behavioral analytics that distinguishes real threats from perceived ones, so security teams stay ahead and businesses keep moving — without fear of the unknown. When the security odds are stacked against you, outsmart them from the start with Exabeam. Learn more at https://exabeam.com/DD.


Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.


View all active sponsors.


Sources

Article: The Case of the Bumbling Spy

Podcast: The Catch and Kill Podcast with Ronan Farrow



98: Zero Day Brokers

Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it.

Affiliate link for book: This is How They Tell Me The World Ends (https://www.amazon.com/gp/product/1635576059/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1635576059&linkCode=as2&tag=tunn01-20&linkId=0aa8c966d98b49a7927bfc29aac76bbe)

Audiobook deal: Try Audible Premium Plus and Get Up to Two Free Audiobooks (https://www.amazon.com/Audible-Free-Trial-Digital-Membership/dp/B00NB86OYE/?ref_=assoc_tag_ph_1485906643682&_encoding=UTF8&camp=1789&creative=9325&linkCode=pf4&tag=tunn01-20&linkId=31042b955d5e6d639488dc084711d033)

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.

Support for this show comes from Privacy.com. Privacy allows you to create anonymous debit cards instantly to use for online shopping. Visit privacy.com/darknet to get a special offer.

View all active sponsors.

Sources



97: The Pizza Problem

What if someone wanted to own your Instagram account? Not just control it, but make it totally theirs. This episode tells the story of how someone tried to steal an Instagram account from someone.

Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

View all active sponsors.

Sources



96: The Police Station Incident

Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and a task force officer with the Secret Service. In this episode she tells a story which involves all of these roles.

https://twitter.com/NicoleBeckwith

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.

Support for this show comes from Exabeam. Exabeam lets security teams see what traditional tools can’t, with automated threat detection and triage, complete visibility across the entire IT environment and advanced behavioral analytics that distinguishes real threats from perceived ones, so security teams stay ahead and businesses keep moving — without fear of the unknown. When the security odds are stacked against you, outsmart them from the start with Exabeam. Learn more at https://exabeam.com/DD.

View all active sponsors.

Sources



95: Jon & Brian's Big Adventure

Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this. But even with all the preparation, something still goes terribly wrong.


Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.

Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/.

View all active sponsors.

Sources



94: Mariposa

Chris Davis has been stopping IT security threats for decades. He’s currently running the company Hyas that he started. In this episode he tells a few tales of some threats that he helped stop.

Sponsors

Support for this show comes from Exabeam. Exabeam lets security teams see what traditional tools can’t, with automated threat detection and triage, complete visibility across the entire IT environment and advanced behavioral analytics that distinguishes real threats from perceived ones, so security teams stay ahead and businesses keep moving — without fear of the unknown. Learn more by visiting exabeam.com/dd.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

View all active sponsors.

Sources



93: Kik

Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.



92: The Pirate Bay

The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn’t store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate Bay has been the largest places you can find pirated movies, music, games, and apps. But this site first came up 2003. And is still up and operation now, 18 years later! You would think someone would shut this place down by now. How does the biggest source for copyrighted material stay up and online for that long? Listen to this episode to find out.

Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

View all active sponsors.



91: webjedi

What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka webjedi was there for one of these intrusions and tells us the story of what happened.

You can find more talks from Amélie at her website webjedi.net.

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.

View all active sponsors.

Sources







90: Jenny

Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she’s done.

Sponsors

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.

View all active sponsors.

Sources



89: Cybereason - Molerats in the Cloud

The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats. 

Sponsors

This episode is sponsored by Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in your hands. Their future-ready attack platform gives defenders the wisdom to uncover, understand, and piece together multiple threats. And the precision focus to end cyberattacks instantly – on computers, mobile devices, servers, and the cloud. They do all this through a variety of tools they’ve developed such as antivirus software, endpoint monitoring, and mobile threat detection tools. They can give you the power to do it yourself, or they can do all the monitoring and respond to threats in your environment for you. Or you can call them after an incident to get help cleaning up. If you want to monitor your network for threats, check out what Cybereason can do for you. Cybereason. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

View all active sponsors.

Sources



88: Victor

Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.

Listen to episodes 86, and 87 before this one to be caught up on the story leading up to this.

Sponsors

This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.

This podcast is sponsored by the JSCM Group. They have a service called ClosedPort: Scan, and it’s is a monthly Penetration Test performed by Cyber Security Experts. Contact JSCM Group today at jscmgroup.com/darknet.

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.



87: Guild of the Grumpy Old Hackers

In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to VictorEdwin, and Mattijs tell their story.

Sponsors

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Support for this show comes from Privacy.com. Privacy allows you to create anonymous debit cards instantly to use for online shopping. Visit privacy.com/darknet to get a special offer.

View all active sponsors.



86: The LinkedIn Incident

In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.

For a good password manager, check out LastPass.

Sponsors

Support for this episode comes from Quadrant Information Security. If you need a team of around the clock analysts to monitor for threat in your network using a custom SIEM, check out what Quadrant can do for you by visiting www.quadrantsec.com.

Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.



85: Cam the Carder

This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder.

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Oracle for Startups. Oracle for Startups delivers enterprise cloud at a startup price tag, with free cloud credits and 70% off industry-leading cloud services to help you reel in the big fish—confidently. To learn more, visit Oracle.com/goto/darknet.

View all active sponsors.

Sources



84: Jet-setters

How bad is it if you post your boarding pass on Instagram? Our guest, “Alex” decides to figure this out for themself and has quite a story about what happened. You can read more from “Alex” on their blog https://mango.pdf.zone.

We also hear from TProphet who’s here to give us some travel hacks to save tons on airfare when we start traveling again. You can learn more about TProphet’s travel hacks at https://seat31b.com or https://award.cat.

Sponsors

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Support for this show comes from Tanium. With Tanium you can gain real-time security and operational data directly from your endpoints – along with the ability to take action on, and create reports from, that data – in just minutes, so that you and your teams can have the insight and capability necessary to accomplish the mission effectively. Learn more at https://federal.tanium.com.

View all active sponsors.

Sources



83: NSA Cryptologists

In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there.

To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights.

Marcus has written several books on security. They are Tribe of HackersTribe of Hackers Blue TeamTribe of Hackers Red TeamTribe of Hackers Security LeadersThink in Code, and a childrens book called Three Little Hackers.

Also check out the Tribe of Hackers podcast to hear interviews with all these amazing people!

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

View all active sponsors.



82: Master of Pwn

The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.

Thanks to Dustin Childs and Brian Gorenc from ZDI to hear all about Pwn2Own.

Thanks to Radek and Pedro for sharing their experiences of becoming the Masters of Pwn.

Sponsors

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Support for this show comes from Kars 4 Kids. Donate your car today, this organization will sell to use for their charity.

View all active sponsors.

Sources



81: The Vendor

This is the story of a darknet marketplace vendor we’ll name V. V tells his story of how he first became a buyer, then transitioned into seller.

This episode talks about drugs. Listener discretion is advised.

If you want to contact V his email is at https://darknetdiaries.com/episode/81.

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.



80: The Whistleblower

In this episode we hear a story from a social engineer who’s job it is to get people to do things they don’t want to do. Why? For profit.

Sponsors

Support for this episode comes from SentinelOne which can protect and assistwith ransomeware attacks. On top of that, SentinelOne offers threat hunting, visibility, and remote administration tools to manage and protect any IoT devices connected to your network. Go to SentinelOne.com/DarknetDiaries for your free demo. Your cybersecurity future starts today with SentinelOne.

Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

View all active sponsors.



79: Dark Basin

What do you do when you find yourself the target of a massive hacking campaign, and you are getting thousands of phishing emails and someone following you in your car. You might turn to Citizen Lab who has the ability to research who is behind this and help bring the hackers to justice.

Our guests this episodes are Adam Hulcoop and John Scott-Railton of Citizen Lab. This episode also has an interview with Matthew Earl of Shadowfall.

Sponsors

Support for this show comes from LastPass by LogMeIn. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



78: Nerdcore

Nerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdcore music.

This episode features guests ytcrackerOhm-I, and Dual Core.


Content warning: This episode has explicit lyrics.


Music

For a playlist of music used in this episode visit darknetdiaries.com/episode/78.

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



77: Olympic Destroyer

In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out a lot of the Olympic’s digital infrastructure. Teams rushed to get things back up, but it was bad. Malware had repeatedly wiped the domain controllers rendering a lot of the network unusable. Who would do such a thing?

We will talk with Andy Greenberg to discuss Olympic Destroyer, a chapter from his book Sandworm (affiliate link).

Sponsors

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



76: Knaves Out

This is the story about how someone hacked into JP Morgan Chase, one of the biggest financial institutions in the world. It’s obvious why someone would want to break into a bank right? Well the people who hacked into this bank, did not do it for obvious reasons. The hackers are best described as knaves. Which are tricky, deceitful fellows.

Sponsors

Support for this show comes from LastPass by LogMeIn. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Support for this episode comes from SentinelOne which can protect and assistwith ransomeware attacks. On top of that, SentinelOne offers threat hunting, visibility, and remote administration tools to manage and protect any IoT devices connected to your network. Go to SentinelOne.com/DarknetDiaries for your free demo. Your cybersecurity future starts today with SentinelOne.

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.


For a complete list of sources and a full transcript of the show visit darknetdiaries.com/episode/76.



75: Compromised Comms

From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This had terrifying consequences.

Guests this episodes are Jenna McLaughlin and Zach Dorfman.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

View all active sponsors.

Sources

Attribution

Darknet Diaries is created by Jack Rhysider.

Research assistance this episode from Yael Grauer.



74: Mikko

Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winnings.

This episode contains a story from Mikko Hypponen of F-Secure. We also interview Mikko to know more about him and the history of malware.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Sources



73: WannaCry

It is recommend to listen to episodes 53 “Shadow Brokers”71 “FDFF”, and 72 “Bangladesh Bank Heist” before listening to this one.


In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UK’s national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.

Thank you to John Hultquist from FireEye and thank you to Matt Suiche founder of Comae.

Sponsors

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project.



72: Bangladesh Bank Heist

A bank robbery with the objective to steal 1 billion dollars. This is the story of the largest bank robbery in history. And it was all done over a computer.

Our guest this episode was Geoff White. Learn more about him at geoffwhite.tech.

Check out Geoff’s new book Crime Dot Com. Affiliate link: https://www.amazon.com/gp/product/1789142857/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1789142857&linkCode=as2&tag=darknet04-20&linkId=bb5a6aa7ba980183e0ce7cee1939ea05


Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



71: Information Monopoly

In this episode, we’re going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.

A big thanks to Yeonmi Park for sharing her story with us. Also thanks to Alex Gladstein for telling us the inside story.

You can find more about Flash Drive For Freedom at flashdrivesforfreedom.org.


Yeonmi’s book "In Order to Live": https://www.amazon.com/gp/product/014310974X/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=014310974X&linkCode=as2&tag=darknet04-20&linkId=88ebdc087c6ce041105c479b1bb6c3d2


Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



70: Ghost Exodus

Ghost Exodus is a hacker. He conducted various illegal activities online. Some of which he documents on YouTube. He’s also a great musician. He got into some trouble from his hacking. This is his story.

A big thanks to Ghost Exodus for sharing his story with us. Also thanks to Wesley McGrew for telling us the inside story.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

This episode was sponsored by Detectify. What vulnerabilities will their crowdsource-powered web vulnerability scanner detect in your web applications? Find out with a 14-day free trial. Go to https://detectify.com/Darknet

Sources



69: Human Hacker

We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.

A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us.

Check out his book Social Engineering: The Science of Human Hacking, affiliate link here.

Check out his podcast called The Social-Engineer podcast.

Sponsors

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Sources


Book Recommendations with affiliate links:



68: Triton

A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of operational technology researchers down a strange path towards an uncommon, but grave, threat. In this episode, we hear how these researchers discovered this threat and tried to identify who was responsible for the malware behind it. We also consider how this kind of attack may pose a threat to human life wherever there are manufacturing or public infrastructure facilities around the world.

A big thanks to Julian GutmanisNaser AldossaryMarina Krotofil, and Robert M. Lee for sharing their stories with us.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project.

Sources



67: The Big House

John Strand is a penetration tester. He’s paid to break into computer networks and buildings to test their security. In this episode we listen to stories he has from doing this type of work.

Thanks to John Strand for coming on the show and telling your story.

Sponsors

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources



66: freakyclown

Freakyclown is a physical penetration tester. His job is to break into buildings to test the security of the building. In this episode we hear stories of some of these missions he’s been on.

Thanks to Freakyclown for coming on the show and telling your story.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

This episode was sponsored by Molekule, a new air purifier that completely destroys air pollutants to help you breath easier. https://molekule.com.



65: PSYOP

PSYOP, or “Psychological Operations”, is something the US military has been doing to foreign audiences for decades. But what exactly is it? And what’s the difference between white, gray, and black PSYOP missions? We talk to PSYOP specialists to learn more.

Thanks to Jon Nichols for telling us about this fascinating world.

Sponsors

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources

Videos



64: The Athens Shadow Games

Vodafone Greece is the largest telecom provider in Greece. But in 2004 a scandal within the company would pin them to be top of the news cycle in Greece for weeks. Hackers got in the network. And what they were after took everyone by surprise.

Sponsors

Support for this episode comes from Okta. Learn more about how you can improve your security posture with the leader in identity-driven security at okta.com/darknet.

This episode is supported by PlexTrac. PlexTrac is the purple teaming platform and is designed to streamline reporting, tracking and attestation so you can focus on getting the real cybersecurity work done. Whether you're creating pen test reports on the red team, or tracking and remediating on the blue team, PlexTrac can help.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



63: w0rmer

The hacker named w0rmer was active within AnonOps. These are Anonymous Operations which often organize and wage attacks on websites or people often with the purpose of social justice. Eventually w0rmer joined in on some of these hacking escapades which resulted in an incredible story that he will one day tell his kids.

Thanks to w0rmer for telling us your story.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

SourcesArchived Tweets

Feb 7, 2012 Twitter user @Anonw0rmer posts “@MissAnonFatale I managed to pwn1 a site , get my papers , find my required primary IDS , yeah baby, i deservers em :)”

Feb 8, 2012 1:17 AM, Twitter user @Anonw0rmer posted, “ROFL! WaS that us? https://www.wvgazettemail.com/news/legal_affairs/hackers-group-posts-police-chiefs-information-online/article_77f79fd5-f76f-5825-ae19-43a398361fdf.html o yeah oops #OpPigRoast #CabinCr3w”

Feb 9, 2012 12:35 AM, Twitter user @Anonw0rmer posted, “DB Leak http://dps.alabama.gov https://pastehtml.com/view/bnik8yo1q.html”. The bottom of this post originally showed this NSFW image.

Feb 9, 2012 at 8:42 PM, Twitter user @Anonw0rmer posted, “Mobile Alabama Police Criminal Record Database Logins Failing To Protect And Serve I Via @ItsKahuna I http://pastehtml.com/view/bnmjxxgfp.html #OpPiggyBank.”

Feb 9, 2012 at 8:39 PM, Twitter user @CabinCr3w posted, “Texas Dept. of safety Hacked By @AnonWOrmer for #OpPiggyBank http://bit.ly/x1KH5Y #CabinCr3w #Anonymous” Bottom of pastebin also shows a woman holding a sign saying “We Are ALL Anonymous We NEVER Forgive. We NEVER Forget. <3 @Anonw0rmer”

Feb 10, 2012 at 9:07 PM, Twitter user @Anonw0rmer posted, “My baby SETS standards ! wAt U got? https://i.imgur.com/FbH2K.jpg https://i.imgur.com/zsPvm.jpg https://i.imgur.com/S2S2C.jpg https://i.imgur.com/TVqdN.jpg #CabinCr3w”.

Links



62: Cam

Cam’s story is both a cautionary tale and inspirational at the same time. He’s been both an attacker and defender. And not the legal kind of attacker. He has caused half a million dollars in damages with his attacks. Attacks that arose from a feeling of seeing injustices in the world. Listen to his story.

Sponsors

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources



61: Samy

Samy Kamkar is a hacker. And while he’s done a lot of stuff, he’s best known for creating the Samy Worm. Which spread its way through a popular social media site and had crazy results.

Thanks to our guest Samy Kamkar for telling his story. Learn more about him by visiting https://samy.pl/.

Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.

Sources



60: dawgyg

This is a story about the hacker named “dawgyg” and how he made over $100,000 in a single day, from hacking.

Thanks to our guest dawgyg for telling his story.

Sponsors

This episode is sponsored by SentinelOne - to learn more about their endpoint security solutions and get a 30-day free trial, visit sentinelone.com/darknetdiaries

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources



59: The Courthouse

In this episode we hear from Gary and Justin. Two seasoned penetration testers who tell us a story about the time when they tried to break into a courthouse but it went all wrong.

Sponsors

This episode was sponsored by Detectify. Try their web vulnerability scanner free. Go to https://detectify.com/?utm_source=podcast&utm_medium=referral&utm_campaign=DARKNET

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources



58: OxyMonster

OxyMonster sold drugs on the darknet at Dream Market. Something happened though, and it all came crashing down.

Sponsors

This episode was sponsored by Detectify. Try their web vulnerability scanner free. Go to https://detectify.com/?utm_source=podcast&utm_medium=referral&utm_campaign=DARKNET

This episode was sponsored by Molekule, a new air purifier that completely destroys air pollutants to help you breath easier. https://molekule.com to use check out code “DARKNET10” to get a discount.


See complete list of sources at https://darknetdiaries.com/episode/58.



57: MS08-067

Hear what goes on internally when Microsoft discovers a major vulnerability within Windows.

Guest

Thanks to John Lambert for sharing this story with us.

Sponsors

Support for this episode comes from ProCircular. Use the team at ProCircular to conduct security assessments, penetration testing, SIEM monitoring, help with patches, or do incident response. Visit www.procircular.com/ to learn more.

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Sources

Attribution

Darknet Diaries is created by Jack Rhysider.

Episode artwork by odibagas.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.



56: Jordan

This is the story of Jordan Harbinger. A bit of a misfit teenager, who was always on the edge of trouble. In this story we hear what happened that lead to a visit from the FBI.

Guest

Thanks to Jordan Harbinger for sharing his story with us. You can find hist podcast by searching for The Jordan Harbinger Show wherever you listen to podcasts.

Sponsors

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.


More information at https://darknetdiaries.com/episode/56.



55: NoirNet

A holiday special episode. A private pen tester takes on a job that involves him with another eccentric pen tester, a mischievious smile, and his quest to gain access to the network.

Guest

Thanks to TinkerSec for telling us the story.

Sources

Attribution

Darknet Diaries is created by Jack Rhysider.

Artwork this episode by habblesthecat.


More information at DarknetDiaries.com.



54: NotPetya

The story of NotPetya, seems to be the first time, we see what a cyber war looks like. In the summer of 2017 Ukraine suffered a serious and catastrophic cyber attack on their whole country. Hear how it went down, what got hit, and who was responsible.

Guest

Thanks to Andy Greenberg for his research and sharing this story. I urge you to get his book Sandworm because it’s a great story.


Sponsors

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2019 to get a $20 credit on your next project.

Support for this episode comes from Honeybook. HoneyBook is an online business management tool that organizes your client communications, bookings, contracts, and invoices – all in one place. Visit honeybook.com/darknet to get 50% off your subscription.

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit cmd.com/dark to get a free demo.


For more show notes visit darknetdiaries.com/episode/54.



53: Shadow Brokers

The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened.

Guest

Thanks to Jake Williams from Rendition Security for telling us the story.

Sponsors

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.



52: Magecart

Credit card skimming is growing in popularity. Gas pumps all over are seeing skimmers attached to them. It’s growing in popularity because it’s really effective. Hackers have noticed how effective it is and have began skimming credit cards from websites.

Guest

Thanks to Yonathan Klijnsma from RiskIQ.

Sponsors

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2019 to get a $20 credit on your next project.

Support for this episode comes from Honeybook. HoneyBook is an online business management tool that organizes your client communications, bookings, contracts, and invoices – all in one place. Visit honeybook.com/darknet to get 50% off your subscription.

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.


Visit darknetdiaries.com for full show notes and transcripts.



Ep 51: The Indo-Pak Conflict

Kashmir is a region right in between India, Pakistan, and China. For the last 70 years Pakistan and India have fought over this region of the world, both wanting to take control of it. Tensions sometimes heat up which can result in people being killed. When tensions get high in the real world, some people take to the internet and hack their rivals as a form of protest. In this episode we’ll explore some of the hacking that goes on between India and Pakistan.

Sponsors

Support for this episode comes from Check Point. Check Point makes firewalls and security appliances you can use to combat the latest generation of cyber attacks. Upgrade your cybersecurity at CheckPoint.com

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.


For more show notes and links visit https://darknetdiaries.com/episode/51.



Ep 50: Operation Glowing Symphony

Operation Inherent Resolve was started in 2016 which aimed to combat ISIS. It was a combined joint task force lead by the US military. Operation Inherent Resolve sent troops, ships, and air strikes to Iraq and Syria to fire weapons upon ISIS military. It’s widely known that US military engaged with ISIS in this way. But what you may not have heard, is the story of how the US military also combated ISIS over the Internet. This is the story of how the US hacked ISIS.

Sponsors

This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2019 to get a $20 credit on your next project.

Support for this episode comes from Honeybook. HoneyBook is an online business management tool that organizes your client communications, bookings, contracts, and invoices – all in one place. Visit [honeybook.com/darknet] to get 50% off your subscription.

Support for this episode comes from Check Point. Check Point makes firewalls and security appliances you can use to combat the latest generation of cyber attacks. Upgrade your cybersecurity at CheckPoint.com



Ep 49: Elliot

In this episode we meet Elliot Alderson (@fs0c131y) from Twitter. Who is this strange masked person? What adventures have they gotten themselves into? Many stories will be told. The mask will be lifted.


Sponsors

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Go to https://nordvpn.com/darknet to get 70% off a 3 year plan and use code darknet for an extra month for free!




Ep 48: Operation Socialist

This is the story about when a nation state hacks into a company within another nation.


Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25 to get 25% off.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “DARKNET” to get 75% off when signing up for 3 years.




Ep 47: Project Raven

This is the story about an ex-NSA agent who went to work for a secret hacking group in the UAE.


Sponsors

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.




Ep 46: XBox Underground (Part 2)

This is the story about the XBox hacking scene and how a group of guys pushed their luck a little too far.

This is part 2 of a 2 part series.


Sponsors

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet.

Learn more about stocks and investing from MyWallSt. Visit mywallst.com/darknet to learn more.




Ep 45: XBox Underground (Part 1)

This is the story about the XBox hacking scene and how a group of guys pushed the hacking a little too far.

This is part 1 of a 2 part series.

Sponsors

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET".

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools.

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. Use promot code "DARKNET25". 




Ep 44: Zain

Ransomware is ugly. It infects your machine and locks all the the data and to unlock you have to pay a fee. In this episode we dive into some of the people behind it.

Sponsors

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

This episode was sponsored by MyWallSt. Their app can help you find good looking stocks to invest in. Visit MyWallSt.com/dark to start your free 30 day trial.

For more show notes and links check out darknetdiaries.com.




Ep 43: PPP

This is the story about how I acquired a black badge from DEFCON (pictured above).

We also hear the story about who PPP is, and their CTF journey at DEFCON.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “DARKNET”.

This episode was sponsored by Detectify. Try their web vulnerability scanner free. Go to https://detectify.com/?utm_source=podcast&utm_medium=referral&utm_campaign=DARKNET




Ep 42: Mini-Stories: Vol 2

Three stories in one episode. Listen in on one of Dave Kennedy's penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client.

Guests

A very special thanks to Dave Kennedy. Learn more about his company at trustedsec.com.

Thank you Clay for sharing your story. Check out the WOPR Summit.

Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io.

I first heard Clay's story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention.

Sponsors

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools.

For more show notes and links check out darknetdiaries.com.




Ep 41: Just Visiting

Join JekHyde and Carl on a physical penetration test, a social engineering engagagement, a red team assessment. Their mission is to get into a building they shouldn't be allowed, then plant a rogue computer they can use to hack into the network from a safe place far away.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET".

This episode was sponsored by Hostinger. Go to https://hostinger.com/darknet and use code DARKNET to get 15% off a hosting plan and check out this week’s free feature.

For more information visit darknetdiaries.com.




Ep 40: No Parking

Take a ride with a red teamer. A physical penetration tester as he tries to make his away into unauthorized areas, steal sensitive documents, hack into the computers, and escape with company property.

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

This episode was sponsored by Hostinger. Go to https://hostinger.com/darknet and use code DARKNET to get 15% off a hosting plan and check out this week’s free feature.

For complete show notes and links go to darknetdiaries.com.




Ep 39: 3 Alarm Lamp Scooter

A talk at Defcon challenged people to find a way to destroy a hard drive. A young man was inspired by this challenge and was determined to find a way to destroy a hard drive. But this is not a typical young man, with a typical plan.

For pictures of Daniel and his projects visit darknetdiaries.com/episode/39.

This episode was sponsored by Nord VPN. Visit nordvpn.com/darknet and use promo code "DARKNET".

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet.




Ep 38: Dark Caracal

A journalist wrote articles critical of the Kazakhstan government. The government did not like this and attempted to silence her. But they may have done more than just silence her. Perhaps they tried to spy on her too. The EFF investigated this case and went down a very interesting rabbit hole.

Thanks to Cooper Q from EFF's new Threat Lab. Also big thanks to Eva from EFF, Andrew Blaich and Michael Flossman from Lookout.

For another story about the EFF listen to episode 12 "Crypto Wars".

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.




Ep 37: LVS

The Venetian casino in Las Vegas Nevada was the largest hotel in the world until 2015. The parent company is Las Vegas Sands (LVS) which owns 10 properties around the world. And the CEO and founder of LVS is Sheldon Adelson. One day the CEO said something which sparked quite a firestorm.

This episode was sponsored by Nucleus. Visit nucleussec.com to start your free trial.

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

For more show notes visit DarknetDiaries.com.




Ep 36: Jeremy from Marketing

A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn't go as planned.

Thanks to @TinkerSec for telling us this story.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET".

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet.

For more show notes visit https://darknetdiaries.com/episode/36.




Ep 35: Carbanak

ATM hacking. Hollywood has been fantasizing about this since the 1980's. But is this a thing now? A security researcher named Barnaby Jack investigated ATMs and found them to be vulnerable. Once he published his data the ATM hacking scene rose in popularity and is is a very serious business today.

One of the first big ATM robberies was done with the malware called Carbanak. Jornt v.d. Wiel joins us to discuss what this malware is.

This episode was sponsored by Nucleus. Visit nucleussec.com to start your free trial.

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet.

For more show notes and links visit darknetdiaries.com.




Ep 34: For Your Eyes Only

Nude selfies. This episode is all about nude selfies. What happens if you take one and give it to a vengeful boyfriend. What happens when a hacker knows you have them and wants to steal them from your phone. What happens is not good. 

This episode was sponsored by Nord VPN. Visit nordvpn.com/darknet and use promo code "DARKNET".

This episode was sponsored by Molekule, a new air purifier that completely destroys air pollutants to help you breath easier. Visit molekule.com to use check out code "DARKNET" to get a discount.

For references, sources, and links check out the show notes at darknetdiaries.com/episode/34/.




Ep 33: RockYou

In 2009 a hacker broke into a website with millions of users and downloaded the entire user database. What that hacker did with the data has changed the way we view account security even today.

This episode was sponsored by CuriosityStream. A streaming service showing non-fiction and documtnaries. Visit https://curiositystream.com/darknet and use promo code "darknet".

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

To see more show notes visit darknetdiaries.com/episode/33.




Ep 32: The Carder

A carding kingpin was tracked by the Secret Service. How did he steal the cards? Where was he stealing them from? How much was he making doing this? And where did he go wrong? Find out all this and more as we listen to how the Secret Service investigated the case.

This episode was sponsored by Eero. A solution to blanket your home in WiFi. Visit https://eero.com/darknet and use promo code "darknet".

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "darknet".

Cover image this episode created by 𝕄årç ∆⃝ 𝕄ølïñårō.

Go to Darknet Diaries for additional show notes.




Ep 31: Hacker Giraffe

In late November 2018, a hacker found over 50,000 printers were exposed to the Internet in ways they shouldn't have been. He wanted to raise awareness of this problem, and got himself into a whole heap of trouble. 

For show notes and links visit DarknetDiaries.com.

This episode was sponsored by CuriosityStream. A documentary streaming service. Visit curiositystream.com/darknet and use promo code "darknet".

This episode is also sponsored by Cover. Visit cover.com/darknet to get insured today.




Ep 30: Shamoon

In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack?

Very special thanks goes to Chris Kubecka for sharing her story.

She is author of the book Down the Rabbit Hole An OSINT Journey, and Hack The World With OSINT (due out soon).

This episode was sponsored by Eero. A solution to blanket your home in WiFi. Visit https://eero.com/darknet and use promo code "darknet".

This episode is also sponsored by Cover. Visit cover.com/darknet to get insured today.




Ep 29: Stuxnet

Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully able to destroy numerous centrifuges. Hear who did it and why.

Special thanks to Kim Zetter for joining us this episode. You can find more about Stuxnet from her book Count Down to Zero Day




Ep 28: Unit 8200

Israel has their own version of the NSA called Unit 8200. I was curious what this unit does and tried to take a peek inside. Hear what I found by listening along to this episode.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “darknet”.

This episode is also sponsored by Mack Weldon. Visit mackweldon.com to shop for premium men's casual wear and get a 20% off discount with your first order by using promo code “diaries”.




Ep 27: Chartbreakers

Something is wrong with the Apple Podcasts top charts. As a podcaster, this personally annoyed and intrigued me. I investigate how this is happening and who is behind it.

For show notes visit https://darknetdiaries.com/episode/27.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code 'darknet'.

This episode is sponsored by LPSS Digital Marketing, your source for honest, transparent marketing services for businesses of all sizes. Visit LPSS at https://www.lpss.co/ for details.




Ep 26: IRS

The IRS processes $3 trillion dollars a year. A lot of criminals want to get a piece of that. In 2015 the IRS had a large data breach. Hundreds of thousands of tax records were leaked. What happened and who was behind this? Listen to this episode to find out.

For show notes visit https://darknetdiaries.com




Ep 25: Alberto

Alberto Hill was sent to prison for a long time for hacking. For a crime he said he did not commit. Listen to his story and you be the judge on whether he's guilty or not.




Ep 24: Operation Bayonet

Darknet markets are online black markets. They are highly illegal, and dangerous to run. Hear exactly how dangerous it was for Alphabay and Hansa dark markets.




Ep 23: Vladimir Levin

When banks started coming online, they almost immediately started being targeted by hackers. Vladimir Levin was one of the first ever known hacker to try to rob a bank. He succeeded a little, and failed a lot. Vladimir would go down in the history books as one of the most notorious hackers of all time because of his attempted online bank robberies.




Ep 22: Mini-Stories: Vol 1

Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow.

Podcast recommendation: Moonshot.




Ep 21: Black Duck Eggs

Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time he and his team broke into a global 5 company. A company so large that theft of intellictual property could result in billions of dollars of damage. 

Ira's consulting company: Secure Mentum.

His books: Spies Among Us, Advanced Persistent Security, Through the Eyes of the Enemy




Ep 20: mobman

Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode.

Image for this episode created by dr4w1ngluc4s. Check out his Instagram to see some amazing artwork!

 Check out the podcasts Van Sounds and True Crime Island




Ep 19: Operation Aurora

In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet. It’s so popular many people just think Google is the Internet. Google hires many of the most talented minds and has been online since the 90s. Hacking into Google is no easy task. There’s a team of security engineers who test and check all the configurations on the site before they go live. And Google has teams of security analysts and technicians watching the network 24/7 for attacks, intrusions, and suspicious activity. Security plays a very vital role at Google, and everything has to have the best protections. But this attack slipped past all that. Hackers had found their way into the network. They compromised numerous systems, burrowed their way into Google’s servers, and were trying to get to data they shouldn’t be allowed to have. Google detected this activity. And realized pretty quickly they were dealing with an attack more sophisticated than anything they’ve ever seen.

Podcast recommendation: Twenty Thousand Hertz




Ep 18: Jackpot

A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money.




Ep 17: Finn

A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for.




Ep 16: Eijah

In 2007, a hacker named Eijah got fed up with the way DRM prevented him from being able to play the content he paid for. He decided to fight back against the AACS and find a way to circumvent the DRM. By the time Eijah was done, his life wasn't the same.




Ep 15: Ill Tills

A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked?




Ep 14: #OpJustina

In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.




Ep 13: Carna Botnet

In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing.




Ep 12: Crypto Wars

In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to use strong encryption. Listen to their battle and what they had to do through to accomplish this.




Ep 11: Strictly Confidential

What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.




Ep 10: Misadventures of a Nation State Actor

In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.




Ep 9: The Rise and Fall of Mt. Gox

Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?




Ep 8: Manfred (Part 2)

Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this. 




Ep 7: Manfred (Part 1)

Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.




Ep 6: The Beirut Bank Job

Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.




Ep 5: #ASUSGATE

Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable. 




Ep 4: Panic! at the TalkTalk Board Room

Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.




Ep 3: DigiNotar, You are the Weakest Link, Good Bye!

The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.




Ep 2: The Peculiar Case of the VTech Hacker

VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.




Ep 1: The Phreaky World of PBX Hacking

Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured.






Back to top



KyberturvaKeskus

Back to top

Kyberturvallisuuskeskuksen viikkokatsaus - 4/2026
Hammaslääkärikäynnin ajanvaraukseksi naamioidut kalasteluviestit ovat lisääntyneet. Julkaisimme viikolla myös Tietoturva Nyt! -artikkelin viimeaikaisista pikaviestipalveluiden tilikaappauksista. Lisäksi kerromme viime vuoden lopussa kasvaneesta Kimwolf -bottiverkosta ja Kuntien tietoturva 2026 -webinaarista. Kyberturvallisuuskeskus kerää parhaillaan palautetta julkisista tilannekuvatuotteistaan. Lisätietoa ja linkki palautekyselyyn löytyy viikkokatsauksesta.

Telegram- ja WhatsApp-pikaviestitilit kaappausyritysten kohteena
Olemme saaneet kuluneiden viikkojen aikana paljon ilmoituksia WhatsApp- ja Telegram-pikaviestipalveluiden tilien kaappaamisista ja kaappausten yrityksistä. Tilejä voidaan kaapata linkitystoiminnolla tai rekisteröimällä tili kokonaan uudelleen kaappaajan laitteeseen vahvistuskoodin avulla. Suosittelemme suojaamaan pikaviestitilit uudelleenrekisteröintiä vastaan kaksivaiheisella tunnistautumisella ja tarkistamaan, että tileihin ei ole liitetty tuntemattomia laitteita ja että puhelinliittymäsi vastaajan PIN-koodi ei ole oletus PIN-koodi.

Kyberturvallisuuskeskuksen viikkokatsaus - 3/2026
Tällä viikolla kerromme mm. tietoturvanäkökulmista AI-avustajien käyttöön, hotelli- ja matkavarausteemalla liikkuvista kalasteluviesteistä sekä nauhoitetuista huijauspuheluista pankin nimissä. Lisäksi kerromme tekstiviestitse pyytämättä saapuneista vahvistuskoodeista. Kerromme myös pk-yrityksille aukeamassa olevasta rahoitustukihausta sekä joulukuun Kybersään julkaisusta.

Joulukuun Kybersää 2025
Joulukuun alkupuoli oli kyberturvallisuuden näkökulmasta melko rauhallinen. Säätilanne kuitenkin heikkeni kuukauden loppua kohden, eikä myrskyiltäkään vältytty.

Älykkäät avustajat, uudet riskit - Tietoturvanäkökulmia AI-avustajien käyttöön
Tekoälyyn perustuvat avustajat ovat yleistyneet nopeasti organisaatioissa. Niiden käyttö ulottuu asiakaspalvelusta tietotyön tehostamiseen sekä kokous- ja viestintäympäristöihin. Samalla AI-avustajien hyödyntäminen tuo mukanaan merkittäviä tietoturva- ja kyberturvallisuushaasteita, jotka on huomioitava sekä järjestelmien suunnittelussa että operoinnissa. Tämä artikkeli kokoaa keskeiset näkökulmat ja suositukset AI-avustajien turvalliseen ja vastuulliseen käyttöön.

Kyberturvallisuuskeskuksen viikkokatsaus - 2/2026
Tällä viikolla palaamme vuoden 2025 kyberilmiöihin videolla, jolla asiantuntijamme keskustelevat vuoden merkittävimmistä ja kiinnostavimmista kyberilmiöistä ja antavat kansalaisille ja organisaatiolle vinkkejä kyberturvalliseen vuoteen 2026.

Haavoittuvuus MongoDB-tietokantaohjelmistossa mahdollistaa luottamuksellisen tiedon paljastumisen
MongoDB-tietokantaohjelmiston haavoittuvuus johtaa mahdollisesti luottamuksellisen tiedon vuotamiseen ja haavoittuvuuden hyväksikäyttö on mahdollista ilman tunnistautumista. Käytännössä kaikki versiot ovat haavoittuvia ja haavoittuvuuden aktiivisesta hyväksikäytöstä on viitteitä. Korjaava päivitys on saatavilla ja sen asennusta suositellaan välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 01/2026


Viestintäverkkojen turvallisuutta vahvistetaan - 5G-tukiasemat sääntelyn piiriin
Liikenne- ja viestintävirasto Traficom on uudistanut viestintäverkon kriittisistä osista antamansa määräyksen. Uudistettu määräys laajentaa sääntelyn koskemaan tietyiltä osin myös 5G-verkon tukiasemia. Teleyritysten on jatkossa tunnistettava 5G-verkon kriittiset osat, kuten tukiasemat, arvioitava niiden keskeisyys ja merkittävyys, sekä dokumentoitava arviot. Uusi määräys tulee voimaan 19.12.2026 ja korvaa toukokuussa 2021 annetun aiemman määräyksen.

Kyberturvallisuuskeskuksen viikkokatsaus - 51/2025
Tällä viikolla muistutamme joulun ja lomakauden kyberturvallisuuteen liittyvistä riskeistä. Kerromme myös kotireitittimiä koskevasta haavoittuvuudesta. Haittaohjelmakatsauksessa tarkastelemme Prizmes-troijalaista, joka kohdistuu mobiililaitteisiin ja pyrkii keräämään käyttäjätietoja huomaamatta. Lisäksi kerromme viikkokatsauksen joulutauosta sekä vuoden 2026 ensimmäisestä koostejulkaisusta.

Kriittinen haavoittuvuus Cisco Secure Email Gateway ja Secure Email and Web Manager -tuotteissa
Cisco on julkaissut tiedotteen aktiivisesti hyväksikäytetystä haavoittuvuudesta, joka koskee Cisco Secure Email Gateway ja Secure Email and Web manager -tuotteitaan. Haavoittuus mahdollistaa mielivaltaisten komentojen ajamisen järjestelmässä root-tason oikeuksilla. Hyväksikäyttöä on havaittu myös Suomessa.

TOTOLINK X5000R (AX1800) -kotireitittimen haavoittuvuus mahdollistaa haittakoodin suorittamisen kotiverkossa
TOTOLINK X5000R -kotireitittimestä on löytynyt haavoittuvuus, joka mahdollistaa tietyissä olosuhteissa laitteen täyden kaappaamisen. Kirjoitushetkellä haavoittuvuuteen ei ole tiedossa virallista korjausta. Suosittelemme laitteen poistamista verkoista, kunnes haavoittuvuus on korjattu.

Kyberturvallisuuskeskuksen viikkokatsaus - 50/2025
Tällä viikolla kerromme tallennusmedian turvallisuuden parhaista käytännöistä: miten hallitaan salauksen palautusavaimia turvallisesti. Marraskuun Kybersää muistuttaa joulusesonkia hyödyntävistä valeverkkokaupoista ja käyttäjiä vaanivista haittaohjelmista. Pilvipalveluiden turvallisuuteen liittyviä kysymyksiä, riskejä ja näkökulmia käsitellään myös kuukauden Kybersäässä.

Marraskuun Kybersää 2025
Marraskuun kybersäätila jäi yleiskuvaltaan sateiseksi, vaikka kuukausi olikin kokonaisuudessaan melko rauhallinen. Säätilaa heikensivät pääasiassa haittaohjelmiin ja haavoittuvuuksiin liittyvät havainnot.

Kyberturvallisuuskeskuksen viikkokatsaus - 49/2025
Tällä viikolla kerromme Traficomin johtaman verkkorikosten torjunnan yhteistyön saamasta palkinnosta sekä ohjeistuksesta EU-rahoitushakuihin, vuoden viimeisestä Kyberala murroksessa -webinaarista, EU:n kyberkestävyyssäädöksen tilanteesta ja Nyt valppaana -yleisötilaisuudesta. Viikon haittaohjelmakatsauksessa on Waledac.

Pilvipalveluiden pääkäyttäjätunnusten hallinta – parhaat käytännöt
Pilvipalvelut ovat nykyään lähes jokaisen organisaation IT-infrastruktuuriin kuuluva osa. Niitä hyödynnetään erittäin kriittisissäkin organisaation toiminnoissa, joten pilvipalveluiden pääkäyttäjätunnusten turvallinen hallinta on erittäin tärkeää. Yhdenkin pääkäyttäjätunnuksen väärinkäyttö voi vaarantaa koko organisaation pilviympäristön ja pysäyttää liiketoiminnan. Tässä artikkelissa käymme läpi kolme yleisintä pilvipalvelua – Amazon Web Services (AWS), Microsoft Azure ja Google Cloud Platform (GCP) – ja kerromme, miten niiden pääkäyttäjätunnuksia tulisi suojata ja ylläpitää.

Kriittinen haavoittuvuus Reactin React Server Components -toiminnallisuudessa
React-kirjaston React Server Components -toiminnallisuudessa on havaittu haavoittuvuus, jonka avulla todentamaton hyökkääjä voi suorittaa mielivaltaista koodia kohdelaitteella. Haavoittuvuutta käytetään aktiivisesti hyväksi, minkä vuoksi on välttämätöntä asentaa päivitykset viipymättä ja tarkastaa organisaatioiden käyttämien tuotteiden tilanne haavoittuvuuden osalta. Mikäli haavoittuvia ohjelmistoja ei ole vielä paikattu, on syytä olettaa tietomurron tapahtuneen.

Kyberturvallisuuskeskuksen viikkokatsaus - 48/2025
Tällä viikolla kerromme Oodissa 2. joulukuuta järjestettävästä Nyt valppaana verkossa! Tunnista ja torju digihuijaukset -yleisötilaisuudesta. Kerromme myös verkkokauppojen maksusivuihin kohdistuvista digitaalisen skimmaamisen hyökkäyksistä sekä BadBox 2.0 -haittaohjelmalle altistuneista laitteista, joita on päätynyt myyntiin tunnetuissa yhdysvaltalaisissa kauppaketjuissa. Lisäksi esittelemme uuden Shai Hulud -madon, joka leviää kehittäjäympäristöissä ja varastaa käyttöoikeustietoja. Tuomme esiin myös viimeaikaiset Microsoft 365 -tilimurrrot ja viikottaisessa haittaohjelmakatsauksessa tutustumme PromptLockiin.

Microsoft 365 -tilimurroista kertova varoitus on poistettu
Suomalaisten organisaatioiden Microsoft 365 -tilejä kaapataan tietojenkalastelun seurauksena. Tapausten mittavasta kasvusta johtuen Kyberturvallisuuskeskus julkaisi asiasta syyskuussa vakavan varoituksen. Kalasteluviestit voivat olla erittäin haastavia tunnistaa ja siksi tilimurroilta tulee suojautua ottamalla käyttöön turvallisuustoimintoja organisaatiotasolla. Kyberturvallisuuskeskukselle ilmoitettujen M365-tilimurtotapausten määrä on tasoittunut ja varoitus poistetaan, mutta M365-tilimurtojen uhka säilyy siitä huolimatta.

Shai-Hulud-hyökkäyksen toinen aalto - toimenpidesuositukset organisaatioille
Uusi haittaohjelma leviää laajasti NPM-ekosysteemissä. Se on kohdistettu erityisesti suosittujen julkaisijoiden, kuten Zapier ja ENS Domains, paketteihin. Shai-Hulud: the Second Coming -nimellä tunnettu hyökkäys tartuttaa npm-paketteja ja kerää niitä käyttävistä järjestelmistä tunnuksia sekä arkaluontoisia tietoja. Tartunta leviää edelleen uusiin koodijakeluihin ja käyttöympäristöihin täysin ilman tai vain vähäisellä ihmisen avustuksella hyödyntäen ympäristöön luotuja automaatioita. Hyökkäys aiheuttaa kehittäjäympäristöille merkittävän tietoturvariskin ja rapauttaa luottamusta ohjelmistojen toimitusketjuihin. Organisaatioiden tulee tarkistaa kehitysinfrastruktuurit tartuntojen varalta, poistaa käytöstä vaarantuneet paketit ja kierrättää altistuneet salaisuudet.

Näkymätön varas verkkokaupassasi - Digitaalisella skimmauksella voi olla merkittäviä taloudellisia vaikutuksia
Digitaalisessa skimmauksessa rikolliset asentavat verkkokauppaan haitallista koodia ja varastavat sitä kautta maksuprosessissa annettavat tiedot. Aihe on ajankohtainen, sillä erityisesti Black Fridayn alla verkkokauppojen kautta tehdään ostoksia poikkeuksellisen paljon. Tässä artikkelissa kerromme mistä digitaalisessa skimmauksessa on kysymys ja miten verkkokauppojen omistajat voivat havaita ja ennaltaehkäistä digitaalista skimmausta.

Kyberturvallisuuskeskuksen viikkokatsaus - 47/2025
Tällä viikolla kerromme pakettihuijauksista, joita esiintyy etenkin Black Fridayn kaltaisten sesonkien aikana. Kerromme myös Microsoft 365-tilimurroista sekä juuri pidetystä Kriittinen Koodi -webinaarista. Muistutamme ilmoittautumaan kyberturvallisuuden EU-rahoituksen hakuinfotilaisuuksiin ja kerromme Euroopan komission järjestämästä CRA:n sidosryhmätilaisuudesta. Olemme myös avanneet kyselyn tulevista arviointi- ja hyväksyntätarpeista NCSA:n asiakkaille. Lisäksi viikottaisessa haittaohjelmakatsauksessa tutustumme Shiz-haittaohjelmaan.

Microsoft 365 -tilimurrot uhkaavat yrityksiä ja organisaatioita
Microsoft 365 -tilejä murretaan jatkuvasti onnistuneiden tietojenkalastelujen seurauksena. Tietojenkalasteluviestit ovat laadukkaita ja usein erityisen petollisia siksi, että ne voivat tulla murretulta yhteistyökumppanin tililtä. M365-tilimurtojen uhka säilyy ja siksi organisaatioilla ja yrityksillä on erityinen vastuu M365-ympäristön suojaamisessa. Tilimurron seuraukset voivat olla vakavia: mainehaittaa, laskutuspetoksia ja tietojenkalastelua organisaation nimissä, arkaluonteisten tietojen vuotaminen tai jopa koko organisaation tärkeiden tietojen päätyminen rikollisten käsiin.

Kysely tulevista arviointi- ja hyväksyntätarpeista - vastaa viimeistään 5.12.
Liikenne- ja viestintävirasto Traficomin NCSA (National Communications Security Authority) kartoittaa asiakkaidensa tulevia arviointi- ja hyväksyntätarpeita sekä kokemuksia aiemmista arvioinneista. Kyselyn tarkoituksena on tukea arviointien suunnittelua, resurssien kohdentamista ja palveluiden kehittämistä. Kysely koskee sekä tietojärjestelmäarviointeja että salaus- ja tuotearviointeja. Pyydämme teitä täyttämään ja palauttamaan oheisen kyselylomakkeen 5.12.2025 mennessä. Vastausohje löytyy kyselylomakkeelta.

Kriittinen ja hyväksikäytetty haavoittuvuus Fortinet FortiWeb -tuotteessa
Fortinet julkaisi haavoittuvuustiedotteen FortiWeb-tuotteisiin vaikuttavasta haavoittuvuudesta, joka voi mahdollistaa todentamattoman hyökkääjän suorittaa ylläpitokomentoja järjestelmässä erikseen muokattujen HTTP- tai HTTPS-pyyntöjen avulla. Fortinet sekä useat muut toimijat ovat havainneet haavoittuvuutta hyväksikäytettävän aktiivisesti tietomurtojen yrityksissä.

Huoltokatko viestinnän sähköisissä lomakkeissa ja palveluissa la 15.11. klo 7-13
Alla mainitut sähköiset lomakkeet ja palvelut eivät ole käytettävissä la 15.11. klo 7-13 huoltotöiden vuoksi. Huoltokatko ei koske Oma asiointi -palvelua.

Kyberturvallisuuskeskuksen viikkokatsaus - 46/2025
Tällä viikolla kerromme siitä, kuinka Black Friday -tarjoukset houkuttelevat myös rikollsia tekemään ajankohtaisten tarjousten teemaisia valeverkkokauppoja ja kalasteluviestejä. Lisäksi kerromme ClickFix-tekniikasta, jota käytetään haittaohjelmien levittämiseen. Marraskuun 18. päivä järjestämme webinaarin ohjelmistokehityksen johtamisesta. Maksuttomaan webinaariin voi ilmoittautua katsauksessa olevan linkin kautta. Julkaisimme lokakuun Kybersään ja viikon haittaohjelmakatsauksessa syvennymme M0yv-haittaohjelman toimintaan.

Lokakuun Kybersää 2025
Lokakuu jatkoi pilvistä ja koleaa syyskautta myös Kyberturvallisuuden osalta, vaikka tilanne rauhoittuikin aavistuksen syyskuuhun verrattuna.

Haittaohjelma voidaan aktivoida huomaamatta ClickFix-tekniikan avulla - Tutustu ilmiöön ja suojaudu
ClickFix-hyökkäykset ovat nykyaikainen hyökkäyskeino, jossa käyttäjä erehdytetään suorittamaan haittaohjelma omalla laitteellaan. Haittaohjelman tarkoitus voi olla tietojen varastaminen laitteelta tai kiristyshaittaohjelman aktivoiminen. Kerromme, miten ClickFix toimii ja miten hyökkäykseltä voi suojautua.

Kyberturvallisuuskeskuksen viikkokatsaus - 45/2025
Tällä viikolla kerromme viime aikojen eniten esillä olleista hyökkääjien tavoista huijata tavallisia kansalaisia. Hyökkääjiä kiinnostavat erityisesti rahat ja tiedot. Huijausten ja kalasteluviestien skaala on laaja, joten kaikkien tulee olla alati varuillaan ja tarkkana uusia viestejä tarkastellessaan. Viikolla järjestettiin myös Cyber Security Nordic -messut, joissa myös Kyberturvallisuuskeskus oli paikalla.

Kyberturvallisuuskeskuksen viikkokatsaus - 44/2025
Tällä viikolla kerromme edelleen jatkuvasta M365-tilien murtoaallosta, laskutuspalveluiden hyväksikäytöstä laskutuspetoksissa, uuden EU:n kyberturvallisuuden rahoitushaun aukeamisesta ja mahdollisuudesta kommentoida EU:n Kyberkestävyyssäädöstä. Viikon haittaohjelmakatsauksessa on Nymaim-troijalainen.

Digitaalinen Eurooppa -ohjelma avasi uuden rahoitushaun: 50 miljoonaa euroa kyberturvallisuuteen
EU:n Digitaalinen Eurooppa -rahoitusohjelman vuoden 2025 toinen hakukierros avautuu. Ohjelman kautta jaetaan rahoitusta kyberaiheisiin 50 miljoonaa euroa.

Kyberturvallisuuskeskuksen viikkokatsaus - 43/2025
Tällä viikolla kerromme, miksi reititin on kotiverkon tärkein suojamuuri ja miten se estää hyökkäykset kodin laitteisiin. Käsittelemme myös F5-teknologiayritykseen kohdistunutta tietomurtoa sekä VESKY 2025 -hankkeen julkaisemaa vesihuollon kyberturvallisuuden materiaalia. Lisäksi kerromme Europolin SIMcartel-operaatiosta, jossa suljettiin petoksissa käytettyä infrastruktuuria. Haittaohjelmakatsauksessa tutustumme Windows-järjestelmiä saastuttavaan Expiro-virukseen.

Kyberturvallisuuskeskuksen viikkokatsaus - 42/2025
Tällä viikolla kerromme Windows 10 -käyttöjärjestelmän tuen päättymisestä, EU:n pikamaksuasetuksesta ja Kyberturvallisuuskeskuksen nimissä liikkuneista huijauspuheluista. Cyber Security Nordic -messut tulevat taas ja kerromme Traficomin ja Huoltovarmuuskeskuksen järjestämästä Tietoturva 2025 -seminaarista osana messujen ohjelmaa. Kerromme myös viime viikolla julkaistun Digi- ja väestötietoviraston (DVV) vuoden 2025 Digiturvabarometrin havainnoista. Viikon haittaohjelmakatsauksessa esittelemme Ranbyus-haittaohjelman.

Yhdysvaltalainen tietoturva- ja teknologiayritys F5 tietomurron kohteena
Yhdysvaltalainen tietoturva- ja teknologiayritys F5 on ilmoittanut joutuneensa vakavan tietomurron kohteeksi. Valtiolliseksi uhkatoimijaksi arvioitu taho oli saanut pääsyn F5:n sisäisiin järjestelmiin ja kopioinut muun muassa BIG-IP-tuotteiden lähdekoodia sekä tietoja julkaisemattomista haavoittuvuuksista. Tapaus on herättynyt laajaa huomiota, sillä F5:n tietoturva- ja muuta teknologiaa käytetään laajasti eri organisaatioiden toimesta ympäri maailmaa. Kyberturvallisuuskeskus suosittelee F5:n järjestelmiä käyttäviä organisaatoita tekemään tarvittavat toimenpiteet niiden suojaamiseksi.

Tilisiirtoja kellon ympäri turvallisesti reaaliajassa
EU:n pikamaksuasetus astui voimaan 9.10.2025. Se velvoittaa pankkeja tarjoamaan pikasiirtoja kaikille asiakkailleen Euroopassa. Lisäksi pankki tarkistaa maksunsaajan nimen ja tilinumeron vastaavan toisiaan ennen maksun suorittamista. Asetuksen tavoitteena on tuoda tilisiirrot reaaliaikaan, parantaa maksujen turvallisuutta ja vähentää väärille tileille tehtyjä siirtoja.

Rikolliset soittavat Traficomin Kyberturvallisuuskeskuksen nimissä huijauspuheluja
Traficomin tietoon on tullut tapauksia, joissa rikolliset ovat soittaneet uhreille ja esiintyneet Kyberturvallisuuskeskuksen asiantuntijoina. Huijauspuheluissa rikolliset ovat muun muassa väittäneet uhrien matkapuhelimien olevan virusten saastuttamat ja että kyberturvallisuuskeskuksen asiantuntijat tulevat noutamaan laitteet pois. Lisäksi puheluissa on myös pyydetty pankkitunnuksia ja maksukorttien tietoja.  Rikolliset ovat lähettäneet myös EU:n kyberturvallisuusdirketiivi NIS2 -aiheisia Whatsapp-viestejä, joissa viitataan organisaation tekemään tietoturvailmoitukseen. Viestissä pyydetään vahvistamaan kyseisen viestin vastaanottaminen - tarkoituksena on saada uhri vastaamaan, jolloin rikolliset voivat soittaa takaisin ja jatkaa huijausta. Näihin viesteihin ei tule vastata. Kyberturvallisuuskeskus pyytää ilmoittamaan huijaus- ja tietojenkalasteluviesteistä matalalla kynnyksellä keskukselle. Huijauspuheluissa tai viesteissä rikolliset pyrkivät synnyttämään uhrissa hätää tai pelkoa, jotta saisivat hänet toimimaan ja luovuttamaan esimerkiksi pankkitunnukset. Lisäksi rikolliset vetoavat yleensä kiireeseen, jotta uhri toimisi nopeasti.

Kyberturvallisuuskeskuksen viikkokatsaus - 41/2025
Tällä viikolla kerromme kriittisten päivitysten tärkeydestä. Jos laitteista löytyy kriittisiä haavoittuvuuksia, niiden päivittämistä ei voi viivyttää tarpeettomasti. Rikolliset käyttävät päivittämättömiä laitteita tietomurtoihin säännöllisesti. Lisäksi muistutamme tarkkaavaisuuteen organisaatioiden viestinnässä. Rikolliset esiintyvät usein organisaation johtajana ja lähestyvät työntekijöitä pikaviestimillä tai sähköposteilla yrittäen saada työntekijöitä siirtämään rahaa monenlaisin verukkein.

Syyskuun Kybersää 2025
Syyskuu toi mukanaan saderintamia myös kyberturvallisuuden ylle. Loppukesästä lisääntyneet poikkeamat jatkoivat kasvuaan ja kuukauden yleiskuva oli pääosin sateinen.

Valepomon viesti voi tulla kalliiksi – tunnista toimitusjohtajahuijaus ajoissa!
Syksyn aikana Kyberturvallisuuskeskus on vastaanottanut useita ilmoituksia toimitusjohtajahuijauksista. Rikolliset hyödyntävät sosiaalista manipulointia, heikkoja prosesseja ja ajankohtaisia tapahtumia saadakseen taloudellista hyötyä: rikolliset pyytävät esimerkiksi kiireellisiä tilisiirtoja, lahjakorttiostoja tai tekaistujen laskujen maksamista. Tässä artikkelissa käydään läpi, mistä toimitusjohtajahuijauksissa on kyse.

Redis-ohjelmistossa vakava haavoittuvuus
Redis-ohjelmiston vakava haavoittuvuus altistaa järjestelmän tietomurrolle ja mielivaltaisen koodin suorittamiselle. Haavoittuvuus koskee kaikkia Redis-ohjelmiston versioita. Ohjelmisto on laajasti käytetty ja sen vakiokonfiguraatio on haavoittuva. Suosittelemme haavoittuvien instanssien paikantamista ja päivittämistä välittömästi.

Suomen kansallisen kryptotyöryhmän linjaukset kansallisiin PQC-salaustuotearviointeihin 1.1.2026 alkaen
Nykyiset klassiset julkisen avaimen kryptografiset menetelmät ovat haavoittuvia tehokkaalle kvanttilaskennalle, joten niiden korvaamiseksi on käynnissä useita kansainvälisiä projekteja, jotka tähtäävät kvanttiturvallisten algoritmien (PQC, post-quantum cryptography) standardointiin. Suomen kansallinen kryptotyöryhmä on tehnyt seuraavat linjauksia kansallisiin salaustuotearviointeihin liittyen 1.1.2026 alkaen.

Kyberturvallisuuskeskuksen viikkokatsaus - 40/2025
Tällä viikolla kerromme palvelunestohyökkäyksistä ja niiden vaikutuksista. Kerromme myös Bulletproof Hosting -ilmiöstä rikollisen toiminnan mahdollistajana. Esittelemme lyhyesti harjoitusta, jossa turvallisuusviranomaiset harjoittelivat valtiolliseen kybervaikuttamiseen vastaamista ja lisäksi kerromme Euroopan kyberturvallisuuskuukaudesta, jonka teemana on omien arjen tietoturvataitojen parantaminen. Tämän viikon haittaohjelmakatsauksessa esittelemme Lockyn.

Ennakointi on paras puolustus palvelunestohyökkäyksiä vastaan
Palvelunestohyökkäys voi lamaannuttaa verkkopalvelut hetkessä ja aiheuttaa taloudellisia vahinkoja sekä mainehaittaa. Palvelun käytön estymisen vaikutukset näkyvät nopeasti palvelun käyttäjille ja voivat hankaloittaa heidän arkeaan. Tämä artikkeli kokoaa yhteen keskeiset vaiheet siitä, miten organisaatio voi varautua palvelunestohyökkäykseen, toimia sen aikana ja palautua sen jälkeen.

Omien arjen tietoturvataitojen parantaminen Euroopan kyberturvallisuuskuukauden teemana
Lokakuussa vietetään jo 13. kertaa Euroopan kyberturvallisuuskuukautta (ECSM). Tänä vuonna teema korostaa arjen valintoja ja tapoja, joilla vaikutamme omaan, muiden ja koko verkon turvallisuuteen. Traficomin Kyberturvallisuuskeskuksen koordinoima Some- ja verkkohuijausten ehkäisyn verkosto kampanjoi yhdessä turvallisemman verkkokokemuksen puolesta hyödyntäen Aalto-yliopiston toteuttamaa SecPort-sivustoa, joka tarjoaa käytännön vinkkejä ja oppimateriaaleja kansalaisten kyberturvataitojen vahvistamiseen.

Bulletproof Hosting – Merkittävä rikollisen toiminnan mahdollistaja
Bulletproof Hosting (BPH) termillä viitataan toimijoihin, jotka tarjoavat rikollisille tai muille haitallisille toimijoille verkkopalveluita, joihin puuttuminen viranomaistoimin on haastavaa. Tällaiset palveluntarjoajat eivät aktiivisesti puutu käyttäjien rikolliseen toimintaan, kuten haittaohjelmien levitykseen, roskapostin lähettämiseen tai huijaussivustojen ylläpitoon. BPH-palvelut toimivat usein maissa, joissa kansainvälisiä oikeuskäytäntöjä valvotaan ja noudatetaan väljästi. Kyberturvallisuuskeskus kehittää aktiivisesti toimia ilmiön rajoittamiseksi viranomaisten ja operaattoreiden kanssa. Ilmiön rajoittaminen kuitenkin vaatii, että kaikki kyberekosysteemin toimijat huomioivat ilmiön toiminnassaan.

Haavoittuvuuksia Cisco IOS ja IOS XE -laitteissa
Cisco on julkaissut korjauspäivitykset 14 vakavaan haavoittuvuuteen eri IOS-tuoteperheen tuotteissa. Haavoittuvuuksista vakavin mahdollistaa muun muassa mielivaltaisen koodin ajamisen etänä ilman kirjautumista.

Kriittisiä Cisco ASA- ja FTD-haavoittuvuuksia käytetään hyväksi hyökkäyksissä
Cisco on julkaissut korjauspäivitykset kolmeen vakavaan haavoittuvuuteen Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) -tuotteissa. Haavoittuvuudet mahdollistavat muun muassa mielivaltaisen koodin ajamisen etänä. Haavoittuvuuksia käytetään aktiivisesti hyväksi. Haavoittuva järjestelmä on syytä päivittää välittömästi ja tutkia tuotteet mahdollisten tietomurtojen varalta. Pelkkä päivittäminen ei riitä hyökkäyskoodin poistamiseen järjestelmistä.

Kyberturvallisuuskeskuksen viikkokatsaus - 39/2025
Tällä viikolla kerromme huijauspuheluiden estotoiminnasta, joka palkittiin vuoden 2025 rikoksentorjuntakilpailussa ja joka on merkittävästi vähentänyt huijauspuheluiden määrää Suomessa. Avaamme myös, mitä haittaohjelmat ovat ja millaisia riskejä ne aiheuttavat sekä annamme vinkkejä niiltä suojautumiseen. Haittaohjelmakatsauksessa tutustumme tarkemmin Flubot-haittaohjelmaan, joka levisi huijaustekstiviestien avulla.

Paluu Connect4Cyber-tapahtuman tunnelmiin – kansainväliset kyberturvallisuustoimijat kohtasivat Helsingissä
Elokuun lopulla järjestetty Connect4Cyber – Brokerage and Info Day kokosi yhteen laajan joukon kyberturvallisuusalan toimijoita Suomesta ja eri puolilta Eurooppaa. Business Finlandin pääkonttorilla pidetty tapahtuma tarjosi täyden salin verran keskusteluja ajankohtaisista rahoitusmahdollisuuksista, teknologian kehityssuunnista ja kansainvälisestä yhteistyöstä.

Kyberturvallisuuskeskuksen viikkokatsaus - 38/2025
Tällä viikolla kerromme syyskuussa paljon vaikuttaneista M365-tilimurroista ja annamme ohjeita niiltä suojautumiseen. Kerromme myös Ruotsissa tapahtuneesta laajalti vaikuttaneesta tietovuodosta sekä toimitusketjuhyökkäyksistä. Kyberkestävyyssäädöksen haavoittuvuuksista raportointivelvollisuus astuu voimaan 11.9.2026 ja ohjeistamme miten sen osalta organisaatioiden tulisi toimia. Tämän viikon haittaohjelmakatsauksessa tutustumme Tinba -haittaohjelmaan.

Suojaa Microsoft 365 -ympäristösi tietomurroilta ennakkoon – pääsy käyttäjätilille voidaan estää vielä silloinkin, kun tunnukset ovat vuotaneet
Microsoft 365 -tunnukset ovat usein hyökkäysten kohteena Suomessa. Jos hyökkääjä saa haltuunsa käyttäjän tunnukset ja salasanan, hän pääsee murretulle käyttäjätilille samoilla oikeuksilla kuin oikea käyttäjä. Seuraukset voivat olla vakavia: mainehaittaa, laskutuspetoksia ja tietojenkalastelua organisaation nimissä, arkaluonteisten tietojen vuotaminen tai jopa koko organisaation tärkeiden tietojen päätyminen rikollisten käsiin. Tilien huolellinen suojaaminen ennakolta on aina ensisijainen tapa suojautua tietomurroilta. M365-tietomurroilta voidaan suojautua myös silloin kun hyökkääjällä on jo murretut tunnukset hallussaan. Tässä artikkelissa kerromme, miten voit suojautua tietomurroilta ennakolta ja jopa silloin, kun hyökkääjällä on jo murretut Microsoft 365 -tunnukset.

Digitaalisesta Euroopasta opittua: 7 vinkkiä onnistuneen rahoitushakemuksen laatimiseen
Digitaalinen Eurooppa -rahoitusohjelma on kohta neljävuotias, ja hakijat alkavat vähitellen oppia, mistä ohjelmassa on kyse. Siksi myös rahoitushauista on tulossa entistä kilpaillumpia. Aikaisempien hakukierrosten perusteella arvioijat ovat tunnistaneet tiettyjä toistuvia puutteita, jotka pudottavat hakemusten pisteitä. Siksi kokosimme yhteen kootut vinkit hakemuksen laatimista varten. Kun otat kirjoittaessa huomioon nämä seikat, olet jo reippaasti muita hakijoita edellä!

Kyberturvallisuuskeskuksen viikkokatsaus - 37/2025
Tällä viikolla kerromme julkaisemastamme vakavasta varoituksesta M365-tilimurtoja ja niiden yrityksiä koskien. Varoituksen kohderyhmää ovat kaikki yritykset ja muut organisaatioit sekä niiden työntekijät, jotka käyttävät M365-tuotteita. Esittelemme myös elokuun Kybersään ja kerromme tällä viikolla pidetystä Kriittinen koodi -webinaarista, jonka aiheena oli ohjelmistoturvallisuus huoltovarmuuden ytimessä. Tutustumme tämän viikon viikkokatsauksessa myös Hummer-haittaohjelmaan.

Elokuun Kybersää 2025
Elokuu toi päätöksen kyberturvallisuuden kannalta rauhalliselle kesäkaudelle. Myrskypilviä nähtiin kuukauden aikana erityisesti tietomurtojen sekä haittaohjelmien ja haavoittuvuuksien alueilla.

Microsoft 365 -tilejä murretaan – varo tietojenkalastelua
Traficomin Kyberturvallisuuskeskukselle on vuonna 2025 ilmoitettu yhteensä 330 Microsoft 365 -tileihin liittyvää tietomurtotapausta tai sen yritystä. Kohteena on ollut erikokoisia organisaatioita useilta toimialoilta. Hyvin usein kaapattuja tilejä käytetään kalasteluviestin lähettämiseen tilin yhteystiedoille, jolloin tietomurrot leviävät tehokkaasti organisaatiosta toiseen.

Microsoft 365 -tilejä murretaan – varo tietojenkalastelua
Lokakuun aikana Kyberturvallisuuskeskukselle on ilmoitettu 121 tapausta M365-tilimurtoihin liittyen. Lomakauden päätyttyä tapausten määrässä havaittiin huomattavaa kasvua ja tällä hetkellä organisaatioiden sähköpostitilejä murretaan kiihtyvällä tahdilla. Murroille ja jatkokalasteluviesteille altistuneita organisaatioita on lukuisia ja yhden organisaation sisällä voi tapahtua useita, jopa kymmeniä tilimurtoja. Rikolliset kirjautuvat varastettujen tunnusten avulla Microsoft 365 -palveluihin ja kaapattuja tilejä hyödynnetään uusien tietojenkalasteluviestien lähettämiseen sekä laskutuspetosten tekemiseen.

Kyberturvallisuuskeskuksen viikkokatsaus - 36/2025
Tällä viikolla kerromme rahanmenetyksistä lastensuojeluteemaisiin huijausviesteihin, Microsoftin uusista todentamismenetelmistä sekä viikottaisesta haittaohjelmasta. Kutsumme teidät myös kriittinen koodi -webinaariin.

Rikolliset levittävät huijausviestejä lastensuojelun nimissä
Rikolliset levittävät tällä hetkellä huijaustekstiviestejä, joissa esiintyvät esimerkiksi sosiaalityöntekijöinä ja viittaavat lastensuojeluun. Huijauksen uhreiksi on joutunut muun muassa yksittäisiä organisaatioita ja rahalliset menetykset ovat vaihdelleet tuhansista euroista aina sataan tuhanteen euroon saakka.

Kyberturvallisuuskeskuksen viikkokatsaus - 35/2025
Tällä viikolla viikkokatsauksessa kerromme lastensuojelun nimissä lähetetyistä huijaustekstiviesteistä, joilla rikolliset pyrkivät kalastelemaan tietoja. Lisäksi kerromme Teams-puheluhuijauksista, joissa rikolliset esiintyvät IT-tukena ja yrittävät saada pääsyn työntekijän koneelle. Liiikkeellä on ollut myös PDF-editointiohjelmiksi naamioituja haittaohjelmia, joiden avulla rikolliset voivat varastaa tietoja tai kaapata järjestelmän. Viikottainen haittaohjelmakatsaus käsittelee tällä viikolla Avalanche-nimistä haittaohjelmaa.

Traficom ja Supo: Kyberturvallisuuden uhkataso pysynyt koholla - vakavien tapausten määrät kasvussa
Traficomin ja Suojelupoliisin tiedote Kuluneena vuonna kyberturvallisuuden uhkataso on pysynyt Suomessa edelleen kohonneena. Uhkataso nousi vuonna 2022 sen jälkeen, kun Venäjä käynnisti laajamittaisen hyökkäyksensä Ukrainaan. Traficomin Kyberturvallisuuskeskukselle ilmoitettujen tapausten perusteella suomalaiset organisaatiot ovat edelleen vihamielisen kybertoiminnan kohteena, ja vakavien tietomurtojen sekä niiden yritysten määrä on noussut. Kyberturvallisuuskeskuksen selvittämien vakavien tapausten määrä on yli kaksinkertaistunut viime vuoteen verrattuna. Havainnot ohjelmistojen haavoittuvuuksista ovat myös selvästi lisääntyneet, mikä kasvattaa merkittävästi kyberuhkaa yhteiskunnassa. Suojelupoliisin mukaan valtiollinen kybertoiminta Suomea kohtaan jatkuu aktiivisena. Traficom ja Suojelupoliisi pitävät yhteiskuntaa laajasti lamauttavien kyberiskujen todennäköisyyttä kuitenkin edelleen pienenä.

IT-tukena esiintyvät hyökkääjät lähestyvät organisaatioita Teams-puheluilla
IT-tukena esiintyvät hyökkääjät ottavat yhteyttä organisaatioiden työntekijöihin soittamalla Microsoft Teams -puhelun etäyhteysohjelman käyttämiseksi. Etäyhteysohjelman avulla hyökkääjä voi ujuttaa kohdeympäristöön haittaohjelmia, viedä tietoja ja aktivoida esimerkiksi kiristyshaittaohjelman. Kyseessä on puhelun kautta tapahtuva tietojenkalasteluyritys. Organisaatiot voivat rajoittaa ulkopuolisista Teams-organisaatioista tulevia yhteydenottoja hyökkäysten torjumiseksi.

Citrix NetScaler ADC ja NetScaler Gateway -tuotteissa kriittinen haavoittuvuus
Citrix on julkaissut korjauspäivitykset kolmeen vakavaan haavoittuvuuteen NetScaler ADC ja NetScaler Gateway -tuotteissa. Haavoittuvuudet mahdollistavat muun muassa mielivaltaisen koodin ajamisen etänä ja palvelunestotilan aiheuttamisen. Haavoittuvuuksia käytetään aktiivisesti hyväksi ja haavoittuva järjestelmä on syytä päivittää välittömästi.

Haittaohjelmia levitetään aktiivisesti PDF-editointiohjelmiksi naamioituina
Liikkeellä on haittaohjelmakampanja, jossa rikolliset levittävät näennäisiä PDF-editoreita. Ohjelma voi liittää laitteen osaksi bottiverkkoa ja varastaa tietoja. Turvallisin tapa hankkia uusia sovelluksia on ladata ohjelmistot vain virallisista lähteistä ja olla tarkkana liian hyviltä kuulostavien tarjousten kanssa.

Kyberturvallisuuskeskuksen viikkokatsaus – 34/2025
Tällä viikolla kerromme nettihuijauksista, joissa rikolliset esiintyvät työeläkeyhtiön nimissä ja pelottelevat eläkkeen loppumisella. Linkin klikkaaminen kuitenkin johtaa petokselliseen sivuun, joka kalastelee eläkeläisten verkkopankkitunnuksia. Kerromme myös halpoja älylaitteita vaivaavasta BadBox-haittohjelmasta. Lisäksi Liikenne- ja viestintävirastosta voi hakea rahoitusta viestintäverkkojen ja tietojärjestelmien tietoturvallisuuden parantamiseksi kyberturvallisuuslain vaatimusten mukaiseksi.

Rahoitustukihaku kyberturvallisuuslain toimeenpanemisen tukemiseksi avattu
Liikenne- ja viestintävirasto Traficom myöntää rahoitustukea kyberturvallisuuslain (124/2025) soveltamisalaan kuuluville mikrokokoisille, pienille ja keskisuurille organisaatioille kyberturvallisuuslaissa asetettujen vaatimusten toteuttamiseksi ja toimijoiden kyberturvallisuustason nostamiseksi organisaatiossa. Haku on auki 16.10.2025 klo 16:15 asti.

Kyberturvallisuuskeskuksen viikkokatsaus - 33/2025
Tällä viikolla kerromme ulkomaisista numeroista soitetuista huijauspuheluista. Lisäksi kerromme paljon liikkeellä olleista M365-tilimurroista, uuden radiolaitteita koskevan määräyksen voimaanastumisesta, sekä syksyllä tapahtuvasta ohjelmistoturvallisuutta käsittelevästä webinaarista. Lisäksi olemme julkaisseet heinäkuun Kybersään ja viikon haittaohjelmakatsauksessa kerromme 911 S5 -haittaohjelmasta.

Heinäkuun Kybersää 2025
Helteinen heinäkuu käynnistyi poutaisesti myös kybersään näkökulmasta. Kuun loppua kohden säätilanne kääntyi jälleen sateisempaan suuntaan.

Älykellot, itkuhälyttimet ja puhelimet yhä turvallisempia – EU kiristää tietoturvavaatimuksia
Älykellot, älypuhelimet ja monet muut langattomat laitteet ovat osa arkeamme, mutta tiedätkö kuinka tietoturvallisia nämä laitteet ovat? Nyt ei tarvitse murehtia – uudet EU:n vaatimukset varmistavat, että kodin laitteet ovat entistä tietoturvallisempia.

Kyberturvallisuuskeskuksen viikkokatsaus - 32/2025
Tämän viikon viikkokatsauksessa kerromme havainnoista organisaatioiden M365-tilien tietomurtoihin ja kalasteluviesteihin liittyen. Lisäksi muistutamme lasten tietoturvataitojen tärkeydestä koulujen alkaessa. Nostamme esille myös Citrix-haavoittuvuuden aiheuttamien tietomurtojen tilanteen ja esittelemme uuden haittaohjelmakatsauksen, joka tarjoaa viikoittain tietoa ajankohtaisista haittaohjelmista.

SonicWall Gen 7 -palomuurien SSLVPN-haavoittuvuutta hyväksikäytetään tietomurroissa
Viime päivien aikana SonicWall Gen 7 -palomuurituotteisiin liittyen on havaittu merkittävä määrä onnistuneita tietomurtoja sekä niiden yrityksiä eri tietoturvatoimijoiden raportoimana. Joissakin tapauksissa onnistuneita tietomurtoja on havaittu myös ajantasaisissa laitteissa. Toistaiseksi ei ole tiedossa, onko näissä tapauksissa kyseessä uusi nollapäivähaavoittuvuus vai aiemmin julkaistujen haavoittuvuuksien uudenlainen hyväksikäyttö. Päivitys 7.8.2025: Sonicwallin päivitetyn tiedotteen mukaan tähän liittyvää nollapäivähaavoittuvuutta ei ole löytynyt.

Vinkkejä kyberharjoituksen suunnitteluun
Oletko saanut tehtäväksesi suunnitella ja järjestää kyberharjoituksen omassa organisaatiossasi? Olet ehkä saanut evästystä johdolta, tehnyt taustatyötä aiheesta ja lukenut Kyberharjoitusohjeemme tai tutustunut ylläpitämäämme Skenaariopankkiin. Harjoituksen suunnittelu voi tuntua haastavalta, jos ohjeita ja odotuksia tulee monesta eri suunnasta. Olemme keränneet tähän artikkeliin perusohjeiden lisäksi muutamia harjoitusten suunnittelussa hyväksi koettuja havaintoja, joiden avulla suunnittelu helpottuu ja harjoituksesta saadaan enemmän hyötyä.

Kyberturvallisuuskeskuksen viikkokatsaus - 31/2025
Tällä viikolla kerromme aggressiivisesta kiristysviestikampanjasta. Lisäksi muistutamme päivitysten asentamisesta ja elinkaaren päänsä saavuttaneiden laitteiden ja ohelmistojen päivittämisestä myös lomakaudella. Muistutamme myös, että laskutushuijauksia on liikkeellä lomakaudella.

Aggressiivinen kiristysviestikampanja käynnissä
Kyberturvallisuuskeskus on havainnut aggressiivisen kiristysviestikampanjan. Viestejä on lähetetty runsaasti yksityisille henkilöille ja organisaatioille. Kampanja voi aiheuttaa kuormitusta sähköpostipalveluihin.

Kyberturvallisuuskeskuksen viikkokatsaus - 30/2025
Tällä viikolla kerromme globaalisti merkittävästä Sharepoint-haavoittuvuudesta ja rikollisten verkkopetoksissa käyttämistä keinoista.

Kyberturvallisuuskeskuksen viikkokatsaus - 29/2025
Tällä viikolla kerromme huijauksista tekstiviesteillä ja sähköpostilla poliisin nimissä. Viranomaisena esiintyvät rikolliset ovat yrittäneet huijata ihmisiä kertomaan verkkopankkitunnuksensa. Sillä välin oikea poliisi on osallistunut kansainväliseen poliisioperaatioon, jolla rikollisten käyttämä bottiverkko on saatu suljettua. Lisäksi kerromme laitteiden päivittämisen tärkeydestä. Päivittämättä jätetyt laitteet ovat rikollisille helppoa riistaa uusien bottiverkkojen rakentamiseen. Päivittämättömän laitteen omistaja voi tietämättään joutua rikoksen välikappaleeksi.

Päivittämättömät laitteet houkuttavat rikollisia
Laajasti käytetyn Windows 10 -käyttöjärjestelmän tuki päättyy 14.10.2025. Tämän jälkeen siihen ei ole saatavilla tietoturvapäivityksiä tai teknistä tukea. Kun minkä tahansa laitteen käyttöikä lähenee loppuaan, on tietoturvan kannalta viisainta hankkia uusi laite, johon on tarjolla päivityksiä.

Ylijohtaja Kärkkäinen: Suomi on varautunut hyvin erilaisiin kyberuhkiin
Suomessa kyberturvallisuutta on kehitetty pitkäjänteisesti ja strategisesti hyvässä yhteistyössä yhteiskunnan eri sektorien kanssa. Viranomaiset ja yhteiskunnan kriittiset sektorit varautuvat jatkuvasti erilaisiin uhkiin ja hyökkäyksiin. Kansainvälisesti tarkasteltuna Suomi on kyberturvallisuuden kärkimaita.

Kriittinen ja hyväksikäytetty SQL Injektio haavoittuvuus Fortinet FortiWeb palvelussa
Fortinet on julkaissut päivityksen FortiWebin kriittiseen haavoittuvuuteen, joka sallii todentamattoman hyökkääjän suorittaa SQL-komentoja muotoiltujen HTTP- tai HTTPS-pyyntöjen kautta. Haavoittuvuuden hyödyntämiskeino on nyt saatavilla ja sitä käytetään laajasti.

Kyberturvallisuuskeskuksen viikkokatsaus - 28/2025
Tällä viikolla kerromme Microsoft 365 -ympäristön Direct Send -ominaisuudesta, jota rikolliset käyttävät hyväkseen lähettääkseen väärennettyjä kalasteluviestejä ja tutustumme kesäkuun Kybersäähän. Kerromme myös Kuluttajaliiton Huijausinfo -hankkeesta, jossa Kyberturvallisuuskeskus on ollut mukana.

Kesäkuun Kybersää 2025
Kesäkausi on tarjonnut pääosin rauhallista kybersäätä, eikä kesäkuu tehnyt poikkeusta trendiin. Vilkkaimmillaan oleva lomasesonki on heijastunut myös kyberturvallisuustilanteeseen.

Käynnissä oleva hyökkäyskampanja hyödyntää Microsoft 365:n Direct Send -ominaisuutta kalasteluviestien lähettämiseen
Microsoft 365 Direct Send -ominaisuus on haavoittuvuus, minkä avulla monitoimilaitteet, tulostimet tai sovellukset voivat lähettää sähköpostia tunnistautumattomana suoraan Microsoft 365 -ympäristöön. Tietoturvatutkijat ovat havainneet, että uhkatoimijat käyttävät tätä ominaisuutta väärentääkseen sisäisten käyttäjien sähköpostiosoitetta ja lähettääkseen kalastelusähköpostiviestejä vaarantamatta heidän tilejään. Kun uhkatoimijalla on tiedossa verkkotunnus ja vastaanottajan sähköpostiosoite, tämä voi lähettää väärennettyjä sähköposteja, jotka näyttävät olevan peräisin organisaation sisältä. Tällaisten viestien lähettäminen ei edellytä tunnistautumista M365 -palveluun. Yksinkertaisuus tekee Direct Sendistä houkuttelevan ja vaivattoman tavan tietojenkalastelukampanjoille. Huomioithan että, Direct Send -ominaisuus on erikseen otettava pois käytöstä.

Kyberturvallisuuskeskuksen viikkokatsaus - 27/2025
Tällä viikolla kerromme tietoja varastavien haittaohjelmien aiheuttamista riskeistä ja muistutamme tietoturvan tärkeydestä myös lomakaudella sekä vinkkaamme Microsoft 365-ympäristön tietoturvaa parantavista keinoista.

Kyberturvallisuuskeskuksen viikkokatsaus - 26/2025
Microsoft siirtyy Entra ID -todentamismenetelmien käyttöön syksyllä 2025. Valmistautuminen kannattaa aloittaa hyvissä ajoin. Kerromme myös BadBox2.0-haittaohjelmasta, joka voi päätyä uuteen laitteeseen jo valmistusvaiheessa.

Kriittisiä haavoittuvuuksia Cisco Identity Services Engine- ja Cisco ISE Passive Identity Connector -tuotteissa
Cisco Identity Services Enginen (ISE) ja Cisco ISE Passive Identity Connectorin (ISE-PIC) -tuotteissa on havaittu kaksi kriittistä haavoittuvuutta, joita hyväksikäyttämällä hyökkääjä voi etänä suorittaa komentoja käyttöjärjestelmässä pääkäyttäjän (root) oikeuksin ilman tunnistautumista. Haavoittuvuuksiin on saatavilla korjaava päivitys, joka suositellaan asentamaan välittömästi.

Ole valppaana tekoälyn kanssa
Erilaiset tekoälymallit ovat hyödyllinen ja hauska lisä sekä työhön että vapaa-aikaan, ja tarjolla on nykyään palveluita moniin eri käyttötarkoituksiin. Uutena teknologiana tekoäly tarjoaa hienoja mahdollisuuksia, mutta sen kanssa on myös syytä olla varovainen, koska kaikkia riskejä ei vielä tunneta kattavasti.

Kriittinen ja hyväksikäytetty haavoittuvuus NetScaler ADC ja NetScaler Gateway -tuotteissa
Citrix on julkaissut NetScaler ADC ja NetScaler Gateway -tuotteissa olevaan kriittiseen haavoittuvuuteen CVE-2025-6543 korjauksen. Haavoittuvuutta hyödyntämällä hyökkääjä saa tuotteen siirtymään palvelunestotilaan. Haavoittuvuuden hyväksikäyttöä on jo havaittu ja sen korjaava päivitys on syytä asentaa viipymättä.

Haittaohjelma voi lymyillä laitteessa jo ostovaiheessa – laitteet on poistettava käytöstä, jos valmistaja ei tarjoa korjausta
Suomen kuluttajamarkkinoilla on havaittu valmiiksi haittaohjelmalla saastuneita Android-älylaitteita. Haittaohjelman asentamista varten laitteisiin on upotettu takaovi jo valmistusvaiheessa, eikä sitä voi poistaa. Jos laitteen valmistaja ei tarjoa virallista korjausta, laite on poistettava verkosta ja toimitettava sähkö- ja elektroniikkajätteen keräykseen. Traficomin Kyberturvallisuuskeskus kehottaa kansalaisia tarkistamaan käytössään olevat laitteet ja epäilysten herätessä harkitsemaan huolellisesti uusien hankintaa.

Lausuntopyyntö - Määräys viestintäverkon kriittisistä osista
Liikenne- ja viestintävirasto Traficom pyytää lausuntoa luonnoksista määräykseksi viestintäverkon kriittisistä osista sekä sen perustelumuistioksi. Lausunto pyydetään toimittamaan Liikenne- ja viestintävirasto Traficomille lausuntopalvelu.fi verkkopalvelun kautta viimeistään 15.8.2025.

Kyberturvallisuuskeskuksen viikkokatsaus - 25/2025
Tällä viikolla kerromme neuvoja huijausten uhreille avun saamiseksi ja muistutamme ylläpitäjiä DNS:stä huolehtimisesta. Muina aiheina OTKES:in raportti Helsingin tietomurrosta, päivitetty ohje tietoturvallisuuden arviointilaitosten toiminnasta ja näkökulmia viimeviikkoisesta pilvipalvelujen kriteeristöt ja arviointi -tilaisuudesta.

Kriittinen haavoittuvuus Veeam Backup & Replication -tuotteessa
Veeam Backup & Replication -tuotteeeseen on julkaistu haavoittuvuuksia, joista yksi on kriittinen ja mahdollistaa koodin suorittamisen etänä varmuuskopiointipalvelimella todennetulla toimialueen käyttäjätunnuksella. Haavoittuvuuksiin on saatavilla korjaava pävitys, järjestelmien päivittämistä suositellaan välittömästi.

Kriittinen haavoittuvuus NetScaler ADC ja NetScaler Gateway -tuotteissa
Citrix on julkaissut korjauspäivitykset kahteen vakavaan haavoittuvuuteen NetScaler ADC ja NetScaler Gateway -tuotteissa. Haavoittuvuudet mahdollistavat muun muassa käyttöoikeuksien kiertämisen sekä oikeudettoman pääsyn järjestelmämuistiin. Haavoittuva järjestelmä on syytä päivittää välittömästi ja haavoittuvuudelle mahdollisesti alttiina olleet järjestelmät tutkia murron varalta.

Verkkorikollisuutta kitketään yhteistyössä
Verkkorikollisuuden määrä on kasvanut viime vuosina globaalisti, ja se on johtanut myös Suomessa useiden miljoonien eurojen menetyksiin vuosittain. Kehityssuunta on huolestuttava, sillä se voi horjuttaa yleistä luottamusta digitaaliseen yhteiskuntaan ja sen palveluihin. Verkkorikollisuuden kitkemiseksi tehdään monipuolista ja aktiivista yhteistyötä eri toimijoiden kesken - samaan aikaan jokainen verkkopalveluiden käyttäjä vaikuttaa toiminnallaan omaan ja muiden turvallisuuteen.

Mistä apua, jos tulee huijatuksi netissä?
Verkossa huijatuksi joutuminen ei ole leikin asia. Uhri voi menettää rahansa tai henkilökohtaisia, arkaluonteisia tietoja. Rikoksen uhri voi menettää myös mielenrauhansa ja turvallisuuden tunteensa. Vahinkojen minimoimiseksi täytyy toimia nopeasti. Kerromme, mitä tehdä ihan ensimmäiseksi, kun huomaa tai epäilee tulleensa huijatuksi sekä siitä, mistä huijatuksi tullut voi saada apua niin teknisiin, taloudellisiin kuin mielen hyvinvoinnin kysymyksiin.

Uudet kyberturvallisuusrahoitushaut Digitaalinen Eurooppa- ja Horisontti Eurooppa -ohjelmista ovat nyt auki
Euroopan kyberturvallisuuden teollisuus-, teknologia- ja tutkimusosaamiskeskus (ECCC) on avannut uusia rahoitushakuja Digitaalinen Eurooppa (DEP) - ja Horisontti Eurooppa (HE) -ohjelmien alla. Avautuneissa hauissa on haettavana rahoitusta yhteensä enintään 145,5 miljoonaa euroa.

Tietoturvallisuuden arviointilaitosten toimintaa koskeva ohje on päivitetty
Liikenne- ja viestintävirasto Traficom on julkaissut päivitetyn ohjeen tietoturvallisuuden arviointilaitosten toiminnasta. Uudistettu ohje sisältää muun muassa NIS2-direktiiviin liittyviä päivityksiä sekä ohjeistusta salaustuotearviointipätevyyden hakemisesta.

Kyberturvallisuuskeskuksen viikkokatsaus - 24/2025
Tällä viikolla kerromme muun muassa Kyberturvallisuuskeskuksen nimissä soitetuista huijauspuheluista ja Kyberala murroksessa -webinaarista.

Toukokuun Kybersää 2025
Toukokuu oli kyberturvallisuuden osalta pääosin rauhallinen. Toisaalta kulunut kuukausi toi mukanaan myös yksittäisiä myrskypilviä, kun useat länsimaat kertoivat joutuneensa valtiollisiin kyberuhkatoimijoihin yhdistettyjen hyökkäysten kohteeksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 23/2025
Tällä viikolla kerromme miten huijaussivustot hyödyntävät ETA- ja ESTA -matkustuslomakkeita, muistutamme myös päivityksien ja hyvien salasanojen tärkeydestä.

Uusi nelivuotinen hanke jatkaa EU:n kyberturvallisuuden vahvistamista – seuraa avautuvia rahoitushakuja
Hankkeen aikana rahoitustukea myönnetään mm. uusien kyberturvallisuussäädösten toimeenpanemisen tukemiseen. Tavoitteena on kyberturvallisuuden vahvistaminen Euroopassa ja kansallisella tasolla.

Kyberturvallisuuskeskuksen viikkokatsaus - 22/2025
Tällä viikolla kiinnitämme huomiota lähestyvään lomakauteen. Huijarit eivät lomaile, vaan päinvastoin kohdistavat toimitusjohtajahuijauksia lomailevien talousvastaavien sijaisiin. Lisäksi kerromme lisääntyvästä yhteistyöstä kyberturvallisuuden alalla ja uudesta langattomien laitteiden turvallisuutta parantavasta lainsäädännöstä.

Radiolaitteiden uudet tietoturvavaatimukset käyttöön 1.8.2025
EU:n radiolaitedirektiivin tietoturvavaatimuksia aletaan soveltaa 1.8.2025. Tavoitteena on suojata viestintäverkkoja, parantaa yksityisyyttä ja estää verkon kautta tapahtuvia taloudellisia petoksia.

Suomen ja Ukrainan kyberturvallisuusviranomaiset allekirjoittivat yhteisymmärryspöytäkirjan - Suomi ja Ukraina syventävät yhteistyötään kyberturvallisuuden edistämisessä.
Suomi ja Ukraina syventävät yhteistyötään kyberturvallisuuden ja suojauksen edistämisessä. Maat ovat allekirjoittaneet yhteisymmärryspöytäkirjan, jonka tavoitteena on vahvistaa yhteistyötä sekä helpottaa hyvien käytäntöjen ja teknisen tiedon jakamista kyberturvallisuusviranomaisten välillä.

TV on älylaite, jonka turvallisuudesta tulee huolehtia - Ole tarkkana Android TV -medialaitteiden kanssa
Markkinoilla on runsaasti erilaisia Android TV -laitteita, jotka tarjoavat käyttäjille mahdollisuuden suoratoistaa sisältöä, käyttää sovelluksia ja selata internetiä television kautta. Kaikki laitteet eivät kuitenkaan ole laadultaan tai tietoturvaltaan samalla tasolla.

Kyberturvallisuuskeskuksen viikkokatsaus - 21/2025
Tällä viikolla kerromme Android TV -laitteisiin kohdistuvasta ja laajalle levinneestä haittaohjelmasta.

Kansalliset ja EU-rahoitusmahdollisuudet kyberturvallisuuden kehittämiseen -webinaari 18.6.2025
Kyberturvallisuuskeskus järjestää ke 18.6.2025 klo 9–10 kaikille avoimen webinaariin, jossa esitellään ajankohtaisia näkymiä kansallisesti haettavista rahoitustuista ja EU-rahoitusmahdollisuuksista kyberturvallisuuden kehittämiseen sekä rahoituksen hakemiseen liittyviä palveluita.

Kyberturvallisuuskeskuksen viikkokatsaus - 20/2025
Tällä viikolla kerromme Suomessakin erittäin suositun WordPress-julkaisujärjestelmän turvallisemmasta ylläpidosta. Kerromme lisäksi tietoja varastavista haittaohjelmista sekä EU:n haavoittuvuustietokannasta.

Ajankohtaista verkkojulkaisualustoista – huolehdi sivustosi tai verkkokauppasi turvallisuudesta
Yhä useammalla organisaatiolla on jonkinlainen maksu- ja henkilötietoja käsittelevä verkkokauppa, ja useimmilla vähintään verkkosivut. Uudessa ohjeessamme annamme vinkkejä verkkokauppojen turvallisuuden parantamiseen. Tässä kirjoituksessa käsittelemme myös ajankohtaisia asioita ohjeen taustalla.

Tunnistautuminen sähköisiin asiointipalveluihimme muuttuu – Suomi.fi-viestien käyttöönottoa ehdotetaan tunnistautumisen yhteydessä
Digi- ja väestötietovirasto (DVV) uudistaa Suomi.fi-tunnistautumista. 12.5.2025 alkaen sinulle voidaan ehdottaa Suomi.fi-viestien käyttöönottoa, kun tunnistaudut vahvasti viranomaisen sähköiseen asiointipalveluun. Muutos koskee myös Traficomin asiointipalveluita.

Kyberturvallisuuskeskuksen viikkokatsaus - 19/2025
Tällä viikolla kerromme mm. siitä miten Hyöky-palvelu uudistuu sekä tulevasta webinaarista, jossa keskustellaan kysymyksistä, jotka kannattaa esittää ohjelmistotoimittajalle.

Huhtikuun Kybersää 2025
Kyberturvallisuudessa oli kuun alkuvaiheessa tarjolla leutoa kevätsäätä, jota kuitenkin sumensivat huijausten ja kalastelun alueella havaitut ajoittaiset sadekuurot. Maaliskuussa tietomurtoja ja -vuotoja lähestyneet ukkospilvet väistyivät huhtikuun aikana, sään jäädessä edelleen sateiseksi.

Save the Date: Kansainvälinen EU-rahoituksen verkostoitumistapahtuma Helsingissä 27.8.2025
Haluatko löytää uusia kumppaneita EU-hankkeisiin ja kuulla ajankohtaisista rahoitusmahdollisuuksista kyberturvallisuuden alalla? Varaa kalenteristasi 27.8.2025 ja suuntaa EU-rahoituksiin keskittyvään verkostoitumistapahtumaan Helsinkiin!

Kyberturvallisuuskeskuksen viikkokatsaus -18/2025
Tällä viikolla kerromme mm. kansallisen kyberturvallisuuslain toimeenpanosta ja siitä miten voit tunnistaa uusia liikkeellä olevia kalasteluviestejä.

Kriittinen aktiivisesti hyväksikäytetty haavoittuvuus SAP NetWeaver-komponentissa
SAP NetWeaver-ohjelmistokomponentista löydetty haavoittuvuus on kriittinen ja mahdollistaa uhkatoimijalle järjestelmän haltuunoton. Haavoittuvuutta on hyväksikäytetty aktiivisesti ja havaintoja haavoittuvuuden avulla tehdyistä murroista on myös Suomesta. Haavoittuva järjestelmä on syytä päivittää välittömästi ja haavoittuvuudelle mahdollisesti alttiina olleet järjestelmät tutkia murron varalta.

Kyberturvallisuuskeskuksen viikkokatsaus - 17/2025
Tällä viikolla kerromme Ajovarman nimissä levitettävistä tietojenkalasteluviesteistä, Oraclen pilvipalveluiden mahdollisen tietovuodon riskeistä organisaatioille sekä Traficomin uudistuneesta ohjeesta tietojärjestelmien tietoturvallisuuden arviointi- ja hyväksyntäprosesseista.

Kyberturvallisuuskeskuksen viikkokatsaus – 16/2025
Viime viikon vaalit sujuivat kyberturvallisissa merkeissä. Tällä viikolla kerromme, mitä uusi kyberturvallisuuslaki tuo tullessaan. Voit ilmoittautua toukokuun webinaariin, jossa asiasta kerrotaan vielä lisää. Viikon kuumin puheenaihe on ollut haavoittuvuustietokannan tuleva kohtalo, kun CVE-projektin rahoitus on päättymässä ja kansainväliselle kyberturvallisuudelle tärkeitä palveluita ajetaan alas.

Uusittu ohje tietojärjestelmien tietoturvallisuuden arviointi- ja hyväksyntäprosesseista
Liikenne- ja viestintävirasto Traficom on antanut uusitun ohjeen tietojärjestelmien tietoturvallisuuden arviointi- ja hyväksyntäprosesseista. Se korvaa aiemmin julkaistun ohjeen. Ohje on tarkoitettu viranomaisille ja yrityksille, joilla on tarve käsitellä kansallista tai kansainvälistä turvallisuusluokiteltua tietoa sähköisessä muodossa.

Kyberturvallisuuskeskuksen viikkokatsaus - 15/2025
Tällä viikolla kerromme mm. ajankohtaisista huijauksista ja miltä kuluneen viikon palvelunestohyökkäykset näyttivät Kyberturvallisuuskeskuksen silmin.

Maaliskuun Kybersää 2025
Maaliskuun haavoittuvuuksien, huijausten ja tilimurtojen himmentämässä puolipilvisessä Kybersäässä oli kuitenkin havaittavissa myös verkkojen toimivuuden ja sääntelyn kehityksen aiheuttamia keväisiä auringonpilkahduksia.

Kyberturvallisuuslaki on hyväksytty eduskunnassa - NIS2-direktiivin mukaiset velvoitteet astuvat voimaan 8.4.2025
Kyberturvallisuuslaki tuo mukanaan uusia riskienhallinta- ja raportointivelvoitteita monille toimialoille. Yksi ensimmäisistä askeleista on toimijaluetteloon ilmoittautuminen.

Digitaalinen Eurooppa -rahoitusohjelman työsuunnitelma vuosille 2025-2027 on julkaistu
Digitaalinen Eurooppa -ohjelman vuosien 2025–2027 työohjelma julkaistiin maaliskuun lopussa. Kyberturvallisuuteen on varattu 390 miljoonaa euroa, ja tulevissa hauissa rahoitusta suunnataan muun muassa uusien teknologioiden, kuten tekoälyn ja kvanttiturvallisten algoritmien kehittämiseen. Ensimmäiset haut avautuvat vuoden 2025 aikana.

Kyberturvallisuuskeskuksen viikkokatsaus - 14/2025
Tällä viikolla kerromme tietoja varastavasta haittaohjelmasta, jota levitetään tekijänoikeusrikkomusten varjolla. Muina aiheina ovat verkon reunalaitteiden riskit sekä EU:n digipalveluasetuksen keinot vaalihäirinnän ehkäisemiseksi.

Ivanti Connect Secure -haavoittuvuuden hyväksikäyttöä havaittu vanhemmissa versioissa
Ivanti Connect Secure -tuotteen haavoittuvuutta (CVE-2025-22457) on käytetty hyväksi helmikuun päivityksiä vanhemmissa versioissa. Päivitykset tai vanhentuneen 9.x version käytöstä poistaminen on syytä tehdä nopealla aikataululla.

Kyberturvallisuuskeskuksen viikkokatsaus - 13/2025
Tällä viikolla kerromme muun muassa, miten viestiä kyberhyökkäyksestä sekä pian voimaantulevasta kyberturvallisuuslaista, joka voi vaatia toimenpiteitä NIS2-velvollisilta.

Kuberneteksen ingress-nginx controller -komponentissa useita haavoittuvuuksia
Kuberneteksen ingress-nginx controller -komponentista on löydetty neljä haavoittuvuutta joista yksi on erityisen kriittinen. Kriittistä haavoittuvuutta (CVE-2025-1974) hyväksikäyttämällä hyökkääjä voi suorittaa mielivaltaista koodia etänä ilman tunnistautumista haavoittuvissa Kubernetes klustereissa. Hyökkääjä voi päästä käsiksi myös kaikkiin Kubernetes klusterin salaisuuksiin. Haavoittuvat Kubernetes-instanssit tulisi päivittää mahdollisimman pian.

Kyberturvallisuuskeskuksen viikkokatsaus - 12/2025
Tällä viikolla kerromme mm. Tietoturvaseminaarista ja siitä miten voit tunnistaa huijaukset.

Kyberturvallisuuskeskuksen viikkokatsaus - 11/2025
Kyberturvallisuuskeskuksen vuosikatsaus on julkaistu! Tällä viikolla kerromme myös helmikuun kybersäästä ja uudesta ohjeesta Microsoft 365 Entra ID:n asetusten tarkistamiseen

Helmikuun Kybersää 2025
Helmikuun Kybersään vallitseva kybersäätila oli sateinen, jopa ehkä räntäsateinen, vaikka pieniä pilkahduksia auringosta oli havaittavissa. Toimitusjohtajahuijaukset, viranomaisten nimissä tehty kalastelu ja M365-tilimurrot jatkuivat helmikuussa.

Tietoturvan suunnannäyttäjä -tunnustus annettiin pitkäjänteisestä työstä digitaalisen yhteiskunnan turvaamiseksi
Liikenne- ja viestintävirasto Traficomin jakaman Tietoturvan suunnannäyttäjä -tunnustuksen sai tänä vuonna johtava erityisasiantuntija Kimmo Rousku Digi- ja väestötietovirastosta. Perusteluissa Kimmo Rouskua kiitettiin esimerkillisestä ja pitkäjänteisestä työstä suomalaisen yhteiskunnan kyber- ja digiturvallisuuden edistämiseksi.

Vuosi 2024 muistetaan isoista kybertapauksista
Helsingin kaupungin tietomurto sekä Suomenlahden ja Itämeren alla kulkeneiden kaapelien vaurioitumiset nostivat kyberturvallisuuden otsikoihin vuonna 2024. Liikenne- ja viestintävirasto Traficomin julkaisema Kyberturvallisuuden vuosi 2024 kertaa maamme vuoden tärkeimmät kyberturvallisuuden tapahtumat, kehitystrendit sekä luotaa tulevaisuuteen havaintojen perusteella.

Kyberturvallisuus Suomessa - kuvitettu käsikirja kyberturvallisuuteen
Kyberturvallisuus Suomessa on tiivis, kuvitettu käsikirja tämän päivän kyberturvallisuuteen. Visualisoinnit auttavat havainnollistamaan monimutkaisia ja teknisiä ilmiöitä sekä hahmottamaan asioiden mittakaavaa.

Kyberturvallisuuskeskuksen viikkokatsaus - 10/2025
Tällä viikolla kerromme mm. Facebook-tilimurtoihin johtavista huijausviesteistä, 12.3. pidettävästä Tietoturva 2025 -seminaarista ja siitä miten salasanoja hallitaan turvallisesti.

Into Certification Oy on kolmas tietoturvallisuuden arviointilaitos, jolla on Katakri 2020 -pätevyys
Liikenne- ja viestintävirasto Traficom on 25.2.2025 laajentanut tietoturvallisuuden arviointilaitos Huld Certification Oy:n arviointilaitoshyväksyntää niin, että se kattaa jatkossa myös Katakri 2020 -pätevyysalueen turvallisuusluokkien TL IV ja TL III osalta.

Kyberturvallisuuskeskuksen viikkokatsaus - 09/2025
Tällä viikolla kerromme muun muassa miten kierrätät vanhat laitteet tietoturvallisesti. Lisäksi kerromme kaapelivaurioiden varalta olemassa olevista varajärjestelyistä. Kerromme verkkoalustoilla tapahtuvista huijauksista sekä Kyberturvallisuuskeskuksen nimissä soitetuista huijauspuheluista.

Huijauspuheluita Kyberturvallisuuskeskuksen nimissä
Traficomin Kyberturvallisuuskeskus on saanut viime viikkoina muutamia ilmoituksia huijauspuheluista, joissa on esiinnytty Kyberturvallisuuskeskuksen edustajana.

Kyberturvallisuuskeskuksen viikkokatsaus - 08/2025
Tällä viikolla kerromme Steam-tunnusten kalastelusta, toimitusjohtajahuijauksista sekä ohjelmistoriippuvuuksien riskienhallinnasta. Loppuun kuulumiset Disobey-tapahtumasta.

Vakava haavoittuvuus Palo Alton PAN-OS järjestelmässä
Palo Alton PAN-OS järjestelmässä on havaittu vakava haavoittuvuus, jota hyväksikäyttämällä hyökkääjä voi ohittaa tunnistautumisen ja suorittaa tiettyjä PHP-skriptejä. Haavoittuvuuden hyväksikäytöstä on jo viitteitä, joten on suositeltavaa asentaa korjaava päivitys ja selvittää onko hyväksikäyttöä jo tapahtunut.

Kyberturvallisuuskeskuksen viikkokatsaus - 07/2025
Tällä viikolla kerromme mm. rakkauspetoksista ja siitä miten kybermaailmassakin on hyvä varautua häiriöihin

Radiolaitteiden tietoturvavaatimukset täsmentyvät – tarkista tuotteen vaatimustenmukaisuus ajoissa
EU:n radiolaitedirektiivin tietoturvavaatimusten soveltaminen alkaa 1.8. Nyt julkaistut standardit helpottavat valmistajia, maahantuojia ja myyjiä varmistamaan laitteidensa vaatimustenmukaisuuden.

Tammikuun Kybersää 2025
Ensimmäisessä vuotta 2025 käsittelevässä Kybersäässä julkaistaan pitkän aikavälin ilmiöt, joiden seurantaan Kyberturvallisuuskeskus tänä vuonna erityisesti keskittyy. Tammikuun säätiedotteessa perehdytään jälleen myös viiteen keskeisimpään lähitulevaisuuden uhkaan.

Kriittisiä haavoittuvuuksia Ivanti Connect Secure ja Ivanti Policy Secure
Ivanti on julkaisut tietoturvapäivitykset, joista Ivanti Connect Secure ja Ivanti Policy Secure haavoittuvuuksia hyväksikäyttämällä hyökkääjä voi suorittaa mielivaltaisia koodia komentoja haavoittuvalla laitteella.

Kansallisen koordinointikeskuksen rahoitustuki edisti yritysten kyberturvallisuutta
Traficomin Kyberturvallisuuskeskuksen kansallinen koordinointikeskus myönsi vuosina 2023–2024 mikro- ja pk-yrityksille rahoitustukea modernien tieto- ja kyberturvaratkaisujen käyttöönottoon ja innovointiin yhteensä noin 2 milj. euroa. 4Front Oy:n laatiman rahoitustuen vaikuttavuusarvioinnin mukaan tuen suorat vaikutukset tuen saajien kyberturvallisuuteen ovat merkittäviä. Lisäksi rahoitustuen voidaan arvioida vaikuttavan positiivisesti kansalliseen kyberturvallisuuskapasiteettiin esimerkiksi tuen saajien asiakassuhteiden ja toimitusketjujen kautta.

Kyberturvallisuuskeskuksen viikkokatsaus - 06/2025
Tällä viikolla kerromme tietojenkalastelusta, jossa hyödynnetään suosittua tiedostonjakopalvelu Dropboxia. Muina aiheina ovat konfiguroimattoman palvelun aiheuttama tietovuodon riski, riskienhallinta ohjelmistoturvallisuudessa ja ajankohtaiset huijaukset.

Kyberturvallisuuskeskuksen viikkokatsaus - 05/2025
Tällä viikolla kerromme mm. Internetin kauppapaikoilla leviävästä haittaohjelmasta ja siitä miten yhdistysten pitää panostaa myös tietoturvaan.

Verkon reunalaitteiden riskit ovat merkittävä uhka organisaatioille
Reunalaitteiden näkyminen ja avoimuus internetiin avaa paljon hyökkäyspintaa pahantahtoisille toimijoille. Haavoittuvuudet sekä virheet konfiguraatiossa ovat kirjautumistunnusten vuotamisen ohella merkittävimmät murrolle altistavat tekijät.

Määräyshankepäätös: Määräys viestintäverkon kriittisistä osista
Liikenne- ja viestintävirasto Traficom on antanut 23.1.2025 seuraavan määräyshankepäätöksen: Määräys viestintäverkon kriittisistä osista (TRAFICOM/36420/03.04.05.00/2025).

Internetin kauppapaikoilla leviää nyt haittaohjelma - toimi näin
Poliisi kertoi viime viikolla puhelimiin asennettavasta haittaohjelmasta, jota levitetään internetin kauppapaikoilla. Haittaohjelman avulla huijari voi saada koko puhelimesi hallintaansa ja päästä esimerkiksi verkkopankkiisi. Älä avaa viesteissä olevia linkkejä tai lataa sovelluksia ulkopuolisen pyynnöstä.

Kyberturvallisuuskeskuksen viikkokatsaus - 04/2025
Tällä viikolla kerromme uusien tekniikoiden ja tekoälypalveluiden turvallisesta käyttöönotosta. Mukana asiaa myös ohjelmistoturvallisuudesta.

Sonicwall SMA1000 laitteiden hallintakäyttöliittymässä kriittinen haavoittuvuus
Kriittinen haavoittuvuus SonicWall SMA1000 -laitteiden Appliance Management Console (AMC) ja Central Management Console (CMC) -hallintakäyttöliittymissä mahdollistaa hyökkääjälle mielivaltaisten komentojen suorittamisen etänä ilman autentikointia. Haavoittuvuuden hyväksikäyttöä on mahdollisesti havaittu. Käyttäjiä kehotetaan päivittämään laitteiden ohjelmisto välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 3/2025
Hakukoneiden hakutuloksiin ei kannata luottaa kritiikittömästi. Tälläkin viikolla on nähty väärennettyjen hakutulosten johtavan kalastelusivuille. Tällä viikolla kerromme myös, kuinka Suomessa järjestetty Nato-huippukokous sujui kyberturvallisuuden näkökulmasta. Muistutamme verkon reunalaitteiden turvallisesta hallinnoinnista ja ajankohtaisten turvallisuuspäivitysten tärkeydestä. Lisäksi kutsumme tutustumaan uusiin sääntelyvaatimuksiin CRA (Cyber Resilience Act) -teematilaisuuteen.

Kriittinen rsync-haavoittuvuus vaatii välitöntä korjausta
Rsync-palvelussa on julkaistu kriittinen haavoittuvuus. Pinonylivuotohaavoittuvuus (CVE-2024-12084) antaa hyökkääjille mahdollisuuden suorittaa mielivaltaista koodia kohdepalvelussa. Päivitä rsync välittömästi.

Joulukuun Kybersää 2024
Joulukuussa havaittiin verkon reunalaitteisiin kohdistuneita tietomurron yrityksiä ja kiristyshaittaohjelmia. Lisäksi viranomaisten nimissä tehtiin tietojenkalastelua ja erilaiset huijaukset jatkuivat. Viranomaisten tehokas yhteistyö ja yhteiskunnan varautumisen hyvä taso näkyivät jälleen, kun 25.12.2024 tapahtunutta merikaapeleiden vauriotapausta ryhdyttiin selvittämään.

Fortinetin FortiOS ja FortiProxy -tuotteissa kriittinen haavoittuvuus
Fortinet on julkaissut päivityksiä kriittiseen haavoittuvuuteen FortiOS ja FortiProxy -tuotteissaan. Haavoittuvuutta hyväksikäyttämällä hyökkääjän on mahdollista saavuttaa superadmin-tason oikeudet järjestelmässä. Fortinet on kertonut, että haavoittuvuutta hyväksikäytetään aktiivisesti. Fortinet on julkaissut 14.1 myös muita päivityksiä eri tuoteperheisiinsä.

Kyberturvallisuuskeskuksen viikkokatsaus - 2/2025
Kiristyshaittaohjelmatapauksia havaittiin viime vuonna aiempaa vähemmän, mutta ilmoitusten määrä kasvoi loppuvuonna. Tällä viikolla varoitamme myös kryptovaluutoista kiinnostuneista huijareista.

Ivanti Connect Secure -haavoittuvuuden hyväksikäyttöä havaittu
Ivanti julkaisi kaksi uutta haavoittuvuutta Ivanti Connect Secure, Ivanti Policy Secure ja ZTA Gateway-tuotteisiinsa. Päivitys tulee suorittaa välittömästi, sillä Ivanti Connect Secure -tuotteessa olevan haavoittuvuuden (CVE-2025-0282) hyväksikäyttöä on jo havaittu.

Vastaa Kyberturvallisuuskeskuksen tilannekuvatuotteiden palautekyselyyn


SonicWall julkaisi päivityksiä palomuureissa havaittuihin kriittisiin haavoittuvuuksiin
SonicWall julkaisi palomuurituotteisiinsa viisi uutta haavoittuvuutta, joiden avulla hyökkkääjä voi ohittaa tunnistatumisen sekä voi suorittaa haluamiaan komentoja kohteina olevilla laitteilla. Haavoittuvat ohjelmistot tulee päivittää viipymättä ja lisäksi on selvitettävä, onko mahdollista haavoittuvuuden hyväksikäyttöä jo tapahtunut sekä estettävä mahdollisesti jo vaarantuneiden tunnusten hyväksikäyttö.

Kyberturvallisuuskeskuksen viikkokatsaus - 01/2025
Vuoden ensimmäisen viikkokatsauksen aiheena on Viikkokatsausten vuosi 2024.

Kyberturvallisuuskeskuksen viikkokatsaus - 51/2024
Tällä viikolla kerromme esimerkiksi tekijänoikeusteemaisista huijausviesteistä, joilla pyritään saamaan käyttäjän tietokoneelle haitallisia tiedostoja. Kerromme myös yhteistyöstä sekä some-palveluista tehdyistä valituksista.

Puolustusvoimat ja Traficom käynnistivät kyberturvallisuuden yhteistyöryhmän
Yhteistyöryhmässä (MIL-ISAC) on mukana monipuolisesti puolustusjärjestelmään liittyviä yrityksiä. Työryhmän toiminta käynnistyy tilannekuvan muodostamisella ja keskinäisellä tiedonvaihdolla.

Kansallisen koordinointikeskuksen vuosi 2024
Vuosi 2024 ja sen myötä kansallisen koordinointikeskuksen (NCC-FI) ensimmäinen EU-rahoitteinen projekti on tulossa päätökseen. Kulunut vuosi on ollut tapahtumarikas. Vuoden aikana koordinointikeskus on muun muassa myöntänyt mikro- ja pk-yrityksille 1,5 miljoonan euron edestä rahoitustukea tietoturvaratkaisujen käyttöönottoon, tarjonnut koulutusta EU-rahoitushakemuksien laatimiseen sekä järjestänyt erilaisia tapahtumia.

Kyberturvallisuuskeskuksen viikkokatsaus - 50/2024
Tällä viikolla kerromme mm. uudesta Lumma Stealer -haittaohjelman levitystavasta ja siitä miten inhimillinen virhe voi johtaa tietovuotoon.

Marraskuun Kybersää 2024
Marraskuu osoitti varautumisen tärkeyden, kun Suomea kohtasi kaksi hyvin erilaista digitalisoituneen yhteiskunnan poikkeamaa. Vuoden harmaimmaksi luonnehdittua kuukautta ovat lisäksi sävyttäneet eri pankkien nimissä tehdyt huijaus- ja kalastelukampanjat. Kulunut kuukausi toi mukanaan myös merkittäviä askelia kyberturvallisuuden parantamiseksi EU:ssa.

Kriittisiä haavoittuvuuksia Ivanti Cloud Services (CSA) -tuotteissa
Ivantin Cloud Services Application (CSA) -tuotteissa on julkaistu kolme kriittisiä haavoittuvuutta. Haavoittuvuuksia hyväksikäyttämällä hyökkääjät voivat suorittaa haluamiaan komentoja kohdeorganisaatioiden laitteilla. Päivitykset on syytä tehdä välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 49/2024
Tällä viikolla kerromme mm. alkuviikolla puhuttaneesta kaapelirikosta ja QR-koodien turvallisesta käytöstä.

Traficomin Kyberturvallisuuskeskus osallistui Puolustusvoimien järjestämään Naton Cyber Coalition -harjoitukseen
"Traficomilla on keskeinen rooli kriittisen infrastruktuurin turvaamisessa sekä vastuu kansallisen kybertilannekuvan ylläpitämisestä. Yhteiset kyberharjoitukset tarjoavat viranomaisille turvallisen alustan arvioida ja kehittää toimintatapoja haastavissa kriisi- ja häiriötilanteissa sekä niistä toipumisessa", sanoo Kyberturvallisuuskeskuksen Poikkeamanhallintaosaston johtaja Samuli Bergström.

Kyberturvallisuuskeskuksen viikkokatsaus - 48/2024
Tällä viikolla kerromme mm. ajankohtaisista M365-kalasteluista ja siitä miten loppuvuoden alennusmyynnit ja pakettisumat saavat myös rikolliset liikkeelle.

Digitaalinen skimmaus - vinkkejä verkkokaupan suojaamiseen
Digital skimming, eli digitaalinen skimmaus, on menetelmä, jota rikolliset käyttävät varastaakseen maksukorttitietoja ja muuta arkaluonteista tietoa suoraan verkkokaupoista. Kyseessä on merkittävä uhka, joka voi jäädä huomaamatta pitkiksi ajoiksi, ja aiheuttaa huomattavia taloudellisia ja maineellisia vahinkoja verkkosivustoille sekä niiden asiakkaille. Poimi tästä artikkelista talteen vinkit digitaalisen skimmauksen havaitsemiseen, ennaltaehkäisyyn ja toimenpiteisiin skimmaus-havainnon jälkeen.

Uudistettu määräys hätäliikenteen teknisestä toteutuksesta ja varmistamisesta
Määräys tulee pääosin voimaan 1.3.2025, ja se korvaa 20.12.2016 annetun Viestintäviraston määräyksen hätäliikenteen teknisestä toteutuksesta ja varmistamisesta (Viestintävirasto 33 G/2016 M).

Kyberturvallisuuskeskuksen viikkokatsaus - 47/2024
Tällä viikolla kerromme mm. juuri julkaistusta EU:n kyberkestävyyssäädöksestä sekä varautumisesta erilaisiin häiriötilanteisiin.

Sisäministeriö on julkaissut Häiriö- ja kriisitilanteisiin varautumisen oppaan
Uusi koko väestölle suunnattu Häiriö- ja kriisitilanteisiin varautuminen -opas on julkaistu Suomi.fissä. Sisäministeriö on toteuttanut verkko-oppaan Digi- ja väestötietoviraston sekä laajan yhteistyöverkoston kanssa. Opas kokoaa varautumisohjeet yhteen paikkaan. Traficom on ollut mukana oppaan tuottamisessa.

Kyberturvallisuuskeskuksen viikkokatsaus - 46/2024
Tällä viikolla kerromme mm. kiristyshaittaohjelmista, ilmoittamisesta ja kybersäästä.

Lokakuun Kybersää 2024
Lokakuussa Kyberturvallisuuskeskukselle tehdyissä kyberpoikkeamatapauksissa havaittiin määrällistä kasvua rauhallisemman alkusyksyn jälkeen. Syyssäässä on esiintynyt ajoittaisia sadepilviä ja harmautta suomalaisiin organisaatioihin viime aikoina kohdistuneiden erilaisten sähköpostitse ja tekstiviestitse lähetettävien tietojenkalastelu- ja huijauskampanjoiden vuoksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 45/2024
Tekstiviestihuijauksia on liikkeellä jatkuvasti, mutta niitä myös pysäytetään viranomaisten ja palveluntarjoajien yhteistyöllä. Kerromme myös hotelliasiakkaita jo pitkään kiusanneista huijauksista, joissa hyödynnetään varausjärjestelmien tietomurtoja.

Hotelli- ja matkanvarauspalveluiden tietomurtoja käytetään asiakkaiden huijaamiseen
Tässä analyysissä käydään läpi hotellien ja heidän asiakkaidensa raportoimia tietoturvapoikkeamia, joihin liittyy tietomurtoja hotellien omiin varausjärjestelmiin ja Booking.com-varauspalveluun. Booking.com on yleinen ja suosittu matka- ja majoitusvarauksia tarjoava palvelu. Erilaisia Booking.com-teemaisia petoksia ja tietojenkalasteluita on maailmalla raportoitu jo usean vuoden ajan. Kyberturvallisuuskeskus on raportoinut Booking.comin avulla tehdyistä petoksista mm. viikkokatsauksessa 2024/27. Yleisimpiä Booking.com-teemaisia verkkopetoksia ovat erilaiset tietojenkalasteluviestit.

Runsaasti tekstiviestikalastelua eri organisaatioiden nimissä
Traficomin Kyberturvallisuuskeskus on vastaanottanut viime aikoina runsaasti ilmoituksia tekstiviestikalasteluista esimerkiksi Fortumin, Terveystalon ja Traficomin nimissä. Olethan tarkkana jos saat tekstiviestin, jossa vaaditaan tekemään jotain kiireellisesti.

Kyberturvallisuuskeskuksen viikkokatsaus - 44/2024
Tällä viikolla kerromme, miten voit itse tarkistaa, näkyykö kotireitittimesi internettiin sekä voimakkaasti digitalisoituneen kiinteistö- ja rakennusalan kyberturvallisuushaasteista.

Kyberturvallisuuskeskuksen viikkokatsaus - 43/2024
Tällä viikolla kerromme palvelunestohyökkäyksistä sekä ilmiöstä, jossa yrityksiltä on udeltu eri tahojen avoimia laskuja ja todennäköisimmin valmisteltu laskutuspetoksia. Muina aiheina ovat Kaikki liikkeessä ja Cyber Security Nordic -tapahtumat sekä yli 300:lle yritykselle myönnetty tietoturvan kehittämisen tuki.

Fortinetin FortiManager-tuotteessa kriittinen haavoittuvuus
Fortinet on julkaissut korjauksia kriittiseen FortiManager-tuotteen haavoittuvuuteen. Haavoittuvuutta käytetään aktiivisesti hyväksi, joten on suositeltavaa asentaa korjaava päivitys viipymättä ja selvittää onko hyväksikäyttöä jo tapahtunut.

Kyberturvallisuuskeskuksen viikkokatsaus - 42/2024
Yhteistyön merkitys on ensisijaisen tärkeää yhteiskunnan palveluiden ja toimintojen suojaamiseksi kyberuhkia vastaan. Jokainen voi omilla toimillaan parantaa yhteistä kyberturvallisuuttamme huolehtimalla omien verkkolaitteidensa turvallisuudesta. Siihen saa parhaat neuvot tutustumalla juuri päivitettyihin Kyberturvallisuuskeskuksen ohjeisiin.

Määräyshankepäätös: Määräys teletoiminnan häiriötilanteista
Liikenne- ja viestintävirasto Traficom on antanut 2.10.2024 seuraavan määräyshankepäätöksen: Määräys teletoiminnan häiriötilanteista (TRAFICOM /499548/03.04.05.00/2024).

Tietoturvan kehittämisen tukea 313 yhteiskunnan kannalta elintärkeälle yritykselle
Liikenne- ja viestintävirasto Traficom on myöntänyt elokuun 2024 aikana loppuun tietoturvan kehittämisen tukena myönnettäväksi varatun 6 miljoonan euron määrärahan. Tietoturvan kehittämisen tuki tuli haettavaksi Liikenne- ja viestintävirasto Traficomilta 1.12.2022 alkaen. Yhteensä tukea myönnettiin 313 yhteiskunnan kannalta elintärkeälle yritykselle. Myönnetyt tuet vaihtelevat 371 eurosta 100 000 euroon.

Kyberturvallisuuskeskuksen viikkokatsaus - 41/2024
Tällä viikolla kerromme organisaatioita ja niiden asiakkaita kiusaavista palvelunestohyökkäyksistä. Tutustumme myös juuri julkaistun kansalliseen kyberturvallisuusstrategiaan.

Kriittisiä haavoittuvuuksia Palo Alto Networks Expeditionissa
Palo Alto Networks on julkaissut kriittisiä haavoittuvuuksia Palo Alto Networks Expedition -siirtotyökalussa. Haavoittuvuuden avulla hyökkääjä voi saada haltuun palomuurien järjestelmänvalvojan tilit ja paljastaa arkaluontoisia tietoja, kuten käyttäjänimiä, selväkielisiä salasanoja ja PAN-OS-palomuurien API-avaimia.

Syyskuun Kybersää 2024
Syyskuu toi tullessaan kyberturvallisuuden tapausrintamalla lievää kasvua rauhallisten kesäkuukausien jälkeen. Muutoin melko kirkkaassa syyssäässä esiintyi usvaa organisaatioihin kohdistuneiden palvelunestohyökkäysten sekä erilaisten tietojenkalastelu- ja huijauskampanjoiden vuoksi.

Palvelunestohyökkäystilanne Suomessa
Traficomin Kyberturvallisuuskeskus on vastaanottanut ilmoituksia palvelunestohyökkäyksistä aiempaa enemmän. Hyökkäykset ovat kuitenkin osa internetin arkea ja suurimmalla osalla niistä ei ole vaikutuksia organisaatioiden tai kansalaisten toimintaan.

Kvanttiturvallisia algoritmeja lisätty kansalliseen kriteeristöön
Klassiset julkisen avaimen salausmenetelmät ovat haavoittuvia riittävän tehokkaalle kvanttilaskennalle. Traficom suosittelee organisaatioita siirtymään mahdollisimman pian kvanttiturvallisten algoritmien käyttöön.

Kyberturvallisuuskeskuksen viikkokatsaus - 40/2024
Tällä viikolla kerromme mediassakin esillä olleesta verkkotunnusten päätymisestä vääriin käsiin. Kerromme mikä on verkkosivujen ja verkkotunnuksen ero sekä neuvomme miten verkkotunnuksista ja niiden hallinnasta voi huolehtia asianmukaisesti. Muina aiheina ovat Lumma Stealer haittaohjelman uudet levittämiskeinot, Digiturvaviikko ja alkanut kyberturvallisuuskuukausi, sekä tekstiviestien lähettäjätunnuksen suojaaminen.

Älä ota kesädomainia! – verkkotunnukset ovat arvokasta omaisuutta
Verkkotunnukset ovat nykyisin merkittävää aineetonta omaisuutta ja niistä kannattaa pitää huolta. Verkkotunnuksen päätyminen toisen käsiin voi olla kiusallista tai jopa vaarantaa tietoturvaa, eikä verkkotunnusta yleensä saa helposti takaisin.

Poikkeamien hallinnointi turvallisuuden parantajana
NIS 2 -direktiivin myötä organisaatioille tulee velvoite ilmoittaa merkittävistä tietoturvapoikkeamista valvovalle viranomaiselle. Miten poikkeama havaitaan? Tässä artikkelissa tarjoamme vinkkejä ja käytäntöjä, miten havaintokyvykkyyttä kehitetään.

CUPS-tulostusjärjestelmän haavoittuvuudet mahdollistavat mielivaltaisen koodin suorittamisen
CUPS-tulostusjärjestelmässä on useita haavoittuvuuksia, jotka voivat johtaa mielivaltaisen koodin suorittamiseen etänä ilman tunnistautumista. Organisaatioiden on suositeltavaa poistaa cups-browsed-palvelu käytöstä ja seurata tulevia päivityksiä.

Kyberturvallisuuskeskuksen viikkokatsaus - 39/2024
Tällä viikolla kerromme palvelunestohyökkäysten tilanteesta, kiristyshaittaohjelmista ja uusista huijauksista.

Akira- ja Lockbit-kiristyshaittaohjelmat valokeilassa
Kiristyshaittaohjelmat ovat yksi merkittävimmistä organisaatioihin kohdistuvista kyberuhista. Viime vuosina Suomessa havaituissa kiristyshaittaohjelmahyökkäyksissä ovat korostuneet Akira ja Lockbit 3.0. Hyvä varautuminen antaa parhaat mahdollisuudet hyökkäyksen torjumiseen ja siitä palautumiseen.

Traficomin ensimmäinen NATO-tuotehyväksyntä salausratkaisulle
Liikenne- ja viestintävirasto Traficomin Kyberturvallisuuskeskuksen kansainvälisiin tietoturvavelvoitteisiin liittyviin tehtäviin kuuluu salaustuotteiden hyväksyntä EU- ja NATO- turvallisuusluokitellun tiedon suojaamiseksi Suomessa. Julkisia hyväksyntiä myönnetään tuotteille, jotka täyttävät vaaditut turvallisuusominaisuudet. Turvaluokasta riippuen vaatimuksia on määritelty esimerkiksi salausalgoritmeille, tuotteen ohjelmisto- ja laiteturvallisuudelle sekä turvallisen kehityksen menettelyille.

Kyberturvallisuuskeskuksen viikkokatsaus - 38/2024
Tällä viikolla kerromme mm. carpet bombing -tekniikasta palvelunestohyökkäyksissä ja siitä miten Hyöky-palvelun ensimmäinen vuosi sujui.

Kansainvälinen kumppanuustapahtuma tarjosi tietoa ja verkostoitumismahdollisuuksia
Kansallinen koordinointikeskus järjesti syyskuun alussa kansainvälisen kumppanuustapahtuman yhdessä järjestelykumppanien kanssa. Tapahtumassa kuultiin monipuolisesti puheenvuoroja niin teknologisista kehityssuunnista kuin ajankohtaisista EU-rahoitusmahdollisuuksista kyberturvallisuuden alalla. Osallistujat pääsivät paitsi kysymään kysymyksiä asiantuntijoilta, myös verkostoitumaan keskenään.

EU-rahoitushakemuksiin tukea koulutuksella
EU-hankerahoituksien hakeminen voi näyttäytyä haastavana ja työläänä prosessina. Kansallinen koordinointikeskus (NCC-FI) tarjosi alkusyksystä koulutusta kyberalan EU-rahoitushakemuksien laatimiseen. Koulutuksen tavoitteena oli tukea suomalaisia organisaatioita korkeatasoisten EU-rahoitushakemusten laatimisessa.

Kriittisiä haavoittuvuuksia VMware vCenter Serverissä
VMware vCenter Server-ohjelmistosta on löydetty kaksi kriittistä haavoittuvuutta, joita hyväksikäyttämällä hyökkääjän on mahdollista saada itselleen ohjelmistoa pyörittävän palvelimen täysi hallinta. Valmistaja on julkaissut korjaavat päivitykset, jotka on syytä asentaa mahdollisimman pian.

Red Hat OpenShift Container Platform 4: kriittisiä haavoittuvuuksia
Red Hat OpenShiftistä on löydetty kaksi kriittistä haavoittuvuutta. Haavoittuvuudet mahdollistavat mielivaltaisen koodin suorittamisen ja OpenShiftiä suorittavien noodien kaappaamisen. Haavoittuvuuksia vastaan on olemassa rajoituskeinot, jotka on syytä suorittaa viipymättä.

Kyberturvallisuuskeskuksen viikkokatsaus - 37/2024
M365-tunnuksia kalastellaan nyt etenkin Dropbox-palvelun avulla. Olethan tarkkana Dropboxista saapuvien tiedostojen kanssa.

Elokuun Kybersää 2024
Elokuun Kybersää jatkui kesä-heinäkuun tapaan tavanomaista rauhallisempana. Sääntelykentällä aurinko porottaa lämpimästi, kun Traficomin uudistettu määräys teletoiminnan tietoturvasta astui voimaan.

SonicWall SSLVPN haavoittuvuutta hyväksikäytetään aktiivisesti
SonicWall SSLVPN -tuotteen haavoittuvuutta CVE-2024-40766 on havaittu hyväksikäytettävän aktiivisesti kiristyshaittaohjelmahyökkäyksissä. Haavoittuvat ohjelmistot tulee päivittää viipymättä ja selvittää onko mahdollista haavoittuvuuden hyväksikäyttöä jo tapahtunut sekä estää mahdollisesti jo vaarantuneiden tunnusten hyväksikäyttö.

Kyberturvallisuuskeskuksen viikkokatsaus - 36/2024
Tällä viikolla kerromme muun muassa vinkkejä lapsille ja vanhemmille turvalliseen pelaamiseen sekä bottiverkoista.

Uudistettu teletoiminnan tietoturvamääräys voimaan 1.9.2024
Liikenne- ja viestintävirasto Traficom on antanut uudistetun teletoiminnan tietoturvamääräyksen. Määräys tulee pääosin voimaan 1.9.2024, ja se korvaa 4.3.2015 annetun teletoiminnan tietoturvamääräyksen. Uudistus edellyttää kaikilta teleyrityksiltä toimenpiteitä tietoturvallisuuden ja riskien hallinnan vaatimusten toteuttamiseksi ja dokumentoimiseksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 35/2024
Tällä viikolla toivotamme uudet koululaiset tervetulleiksi myös digitaaliselle opintielle. Kerromme myös Microsoftin uudistuksesta, jolla palveluihin kirjautumisen ja hallinnan turvallisuutta parannetaan kaksivaiheisella kirjautumisella.

Kyberturvallisuuskeskuksen viikkokatsaus - 34/2024
Tällä viikolla kerromme mm. Nyt valppaana! -kampanjasta ja kokoamme tunnelmia Assembly-tapahtumasta. Mukana myös ajankohtaiset huijaukset.

Kriittinen haavoittuvuus LiteSpeed Cache WordPress -lisäosassa
LiteSpeed Cache WordPress -lisäosasta on löydetty kriittinen haavoittuvuus. Haavoittuvuuden hyväksikäyttö mahdollistaa hyökkääjälle pääsyn järjestelmään luomalla uusia käyttäjätunnuksia ilman tunnistautumista.

Uhka-analyysi ja uhkamallinnus varautumisen työkaluina kyberturvallisuusriskien hallinnassa
NIS 2 -direktiivi velvoittaa monia toimijoita riskienhallintaan omissa organisaatioissaan. Uhka-analyysin teko ja uhkamallinnuksen käyttöönotto ja ajan tasalla pitäminen tarjoavat järjestelmällisen menetelmän kyberturvallisuusriskien tunnistamiseen ja varautumiseen.

Nyt valppaana! - Kyberturvallisuuden kansalaiskampanjassa annetaan ohjeita tietoverkkohuijausten tunnistamiseen
Traficomin Kyberturvallisuuskeskuksen, Digi- ja väestötietovirasto DVV:n ja poliisin yhteisessä Nyt valppaana! -kampanjassa opetellaan tunnistamaan internetin varjopuolia ja suojautumaan niiltä.

Kyberturvallisuuskeskuksen viikkokatsaus - 33/2024
Tällä viikolla kerromme mitä kiristyshaittaohjelmat ovat ja miten niiltä voi suojautua.

Mikä ihmeen kiristyshaittaohjelma?
Kiristyshaittaohjelma on ohjelma, joka estää laitteen normaalin käytön ja esittää vaatimuksen lunnaiden maksamisesta rikollisille. Haittaohjelmatyypistä käytetään myös nimitystä lunnastroijalainen.

Kyberturvallisuuskeskuksen viikkokatsaus - 32/2024
Tällä viikolla kerromme mitä voit tehdä, jos henkilötietojasi joutuu väärin käsiin. Huijarit eivät lepää kesälläkään, joten muistutamme myös Traficomin nimissä lähetetyistä huijausviesteistä.

Heinäkuun Kybersää 2024
Kybersää oli heinäkuussa aikaisempia kuukausia jonkin verran rauhallisempi. Toisaalta heinäkuuhun mahtui merkittäviäkin tapahtumia, kun CrowdStrike-tietoturvatuotteen päivitys aiheutti laajan häiriön ympäri maailmaa. Huijausviestien osalta loppukuussa veronpalautusteemaiset viestit alkoivat jälleen yleistymään elokuun alun veronpalautuksia ennakoiden.

Kyberturvallisuuskeskuksen viikkokatsaus - 31/2024
Tällä viikolla kerromme mm. lainahuijauksista ja siitä miten syksyllä maksettavat veronpalautukset kiinnostavat myös rikollisia.

Kyberturvallisuuskeskuksen viikkokatsaus - 30/2024
Tällä viikolla kerromme mm. CrowdStriken päivityksen aiheuttamasta häiriöstä sekä annamme vinkkejä turvalliseen somettamiseen.

Sometilit kuntoon – vinkit turvalliseen somettamiseen
Oletko miettinyt, mitä tietoja sinusta voi sosiaalisen median kautta saada tai mitä tapahtuisi, jos sosiaalisen median tilisi saisikin haltuun jokin ulkopuolinen taho? Sosiaalisesta mediasta on tullut iso osa jokapäiväistä elämäämme, ja sen avulla on helppoa pitää ihmisiin yhteyttä tai jakaa pätkiä elämästään kuvien tai julkaisujen muodossa. On tärkeää muistaa, että sosiaalisen median pelikentällä on myös pelaajia, joilla ei ole hyvät mielessä. Tässä artikkelissa pureudutaan sosiaalisen median turvalliseen käyttöön, sekä avataan riskejä, joita sosiaalinen media tuo mukanaan.

CrowdStriken päivitys aiheuttanut häiriöitä Windows-laitteissa
CrowdStrike-tietoturvaohjelmiston päivitys on aiheuttanut Windows-laitteissa toistuvan uudelleenkäynnistymistilan (boot loop). CrowdStrike on pääosin organisaatiokäytössä oleva tietoturvaohjelmisto. Tapauksesta on aiheutunut häiriöitä ja käyttökatkoja organisaatioille ja eri palveluille ympäri maailmaa.

Kyberturvallisuuskeskuksen viikkokatsaus - 29/2024
Tällä viikolla kerromme mm. haavoittuvuuksien entistäkin nopeammasta hyväksikäytöstä ja osallistumisestamme Assembly-tapahtumaan.

Kriittinen haavoittuvuus Cisco Secure Email Gatewayssa (ent. IronPort)
Cisco Secure Email Gatewaysta (entinen IronPort) on löytynyt kriittinen haavoittuvuus. Haavoittuvuuden hyväksikäyttö mahdollistaa hyökkääjälle haitallisen koodin suorittamisen laitteen käyttöjärjestelmässä.

Kyberturvallisuuskeskuksen viikkokatsaus – 28/2024
Valtioneuvosto on asettanut tutkintaryhmän selvittämään Helsingin kaupunkiin kohdistunutta tietomurtoa. Käymme läpi, mitä tapauksesta voi oppia.

Kesäkuun Kybersää 2024
Kesäkuu näyttäytyi monella kyberrintamalla aikaisempia kuukausia rauhallisempana. Toisaalta esimerkiksi kalasteluviestit sekä Microsoft 365 -käyttäjätilien kalastelut jatkuivat. Kesälläkin on hyvä muistaa pitää organisaatioiden tietoturvasta huolta.

Kyberturvallisuuskeskuksen viikkokatsaus - 27/2024
Tällä viikolla varoittelemme M365-tietomurroista ja tietojenkalastelusta hotellivarauspalvelun kautta. Annamme myös vinkkejä kyberturvalliseen lomamatkailuun.

Ajankohtaiset EU-rahoitusmahdollisuudet kyberturvallisuusalalle
Heinäkuun aikana kyberturvallisuuden alalle avautuu useita kiinnostavia EU-rahoitusmahdollisuuksia. Rahoitusmahdollisuuksia on tarjolla niin yksityisen, julkisen kuin tutkimussektorinkin toimijoille. Rahoitusta myönnetään uusien teknologioiden käyttöönottoon ja hyödyntämiseen, sekä tutkimus- innovaatio- ja kehittämistoimintaan. Myös Naton DIANA-kiihdyttämöohjelma avaa kiinnostavia mahdollisuuksia kunnianhimoisten innovatiivisten teknologioiden kehittämiseen yhteistyötyössä laajan kumppani- ja asiantuntijaverkoston kanssa.

Kriittinen haavoittuvuus OpenSSH-ohjelmistossa
OpenSSH-ohjelmistosta löytynyt kriittinen haavoittuvuus mahdollistaa allaolevan järjestelmän täyden haltuunoton etänä ilman tunnistautumista. Haltuunotto on tähän mennessä todennettu glibc-pohjaisilla Linux-järjestelmillä sekä FreeBSD-järjestelmillä. Kyberturvallisuuskeskuksella ei ole tiedossa haavan aktiivista hyväksikäyttöä.

Kyberturvallisuuskeskuksen viikkokatsaus - 26/2024
Tällä viikolla kerromme esimerkiksi kyberturvallisuusharjoittelun tärkeydestä ja loma-ajan tietoturvasta.

Traficom ohjeistaa tietovälineiden turvalliseen tyhjentämiseen
Traficomin on julkaissut ohjeen suojattavaa tietoa sisältävien tallennusvälineiden tyhjennyksestä ja mahdollisessa uusiokäytöstä organisaatioiden riskienhallinnalle. Ohjeessa kuvataan yleisimmät edellytykset tallennusmedioiden luotettavaan, todennettavissa olevaan tyhjennykseen ja uusiokäyttöön.

Huijausviestejä Traficomin nimissä
Liikenne- ja viestintävirasto Traficom varoittaa Traficomin nimissä lähetetyistä huijausviesteistä. Huijausviesteissä väitetään, että viestin saajalla on erääntynyt maksamatta oleva sakko. Kyse on kalasteluviestistä, jolla sinut yritetään saada klikkaamaan viestissä olevaa linkkiä ja luovuttamaan pankkitunnuksesi rikollisille.

Kyberturvallisuuskeskuksen viikkokatsaus - 25/2024
Tällä viikolla kerromme mm. siitä, miten fyysinen turvallisuus on yksi tietoturvan keskeisimmistä tekijöistä ja suosittelemme valmistautumaan kvanttiturvallisiin salausalgoritmeihin siirtymiseen.

Traficom kehottaa valmistautumaan kvanttiturvallisiin salausalgoritmeihin siirtymiseen
Klassiset julkisen avaimen salausmenetelmät ovat haavoittuvia riittävän tehokkaalle kvanttilaskennalle. Tämä tarkoittaa sitä, että näillä menetelmillä salattuja tietoja voidaan kerätä talteen nyt ja purkaa myöhemmin, kun riittävän tehokas kvanttikone on saatavilla. Haavoittuvien menetelmien korvaamiseksi on käynnissä useita kvanttiturvallisten algoritmien standardointiin tähtääviä hankkeita, ja ensimmäisten standardien odotetaan valmistuvan tänä vuonna. Kvanttiturvallisia toteutuksia (esim. Signal-viestisovellus) on jo tehty standardiluonnosten perusteella.

Kyberturvallisuuskeskuksen viikkokatsaus - 24/2024
Tällä viikolla kerromme muun muassa toimitusjohtajien nimissä lähetetyistä huijauksista ja siitä miten toimitusketjuhyökkäykset ovat viime vuosina yleistyneet. Palaamme myös toukokuun Kybersään merkeissä viime kuun tapahtumiin.

Kriittisiä haavoittuvuuksia Adobe FrameMaker Publishing, Adobe Commerce ja Magento alustoissa
Adobe on julkaissut kriittisiä tietoturvapäivityksiä Adobe FrameMaker Publishing, Adobe Commerce ja Magento -ohjelmistoihin. Onnistunut hyväksikäyttö voi johtaa mielivaltaisen koodin suorittamiseen, tietoturvasuojauksien ohitukseen ja käyttöoikeuksien laajenemiseen. Jos käytössänne on Adoben FrameMaker Publishing palvelin, Adobe Commerce ja Magento -verkkokauppa-alusta, kehoitamme päivittämään Adobe -ohjelmistojen tietoturvapäivitykset viipymättä.

Toukokuun Kybersää 2024
Kybersää jatkui synkeänä myös toukokuussa. Kybersäätä synkensivät erityisesti tietomurtojen ja -vuotojen alalla julki tulleet tapaukset. Myös huijausten ja kalastelujen saralla myrskysi.

Huomio hankintojen ja toimitusketjujen turvallisuuteen - NIS2-direktiivissä uusia velvoitteita
Toimitusketjuhyökkäykset ovat yleistyneet viime vuosina. Asia on huomioitu myös NIS2-direktiivissä ja sen kyberturvallisuuden riskienhallinnan toimenpiteissä. NIS2-direktiivissä toimitusketjun hallintavelvoite ulottuu toimijan välittömiin toimittajiin ja palveluntarjoajiin. Hankintojen osalta uusi NIS2-direktiivi korostaa tuotteen tai palvelun kyberturvallisuuden huomioimista koko elinkaaren ajalta.

Kyberturvallisuuskeskuksen viikkokatsaus - 23/2024
Traficomin nimeä käytettiin SMS-huijaukseen, jossa maksamattoman sakon verukkeella kalasteltiin pankkitunnuksia. Poliisioperaatiossa suljetussa bottiverkossa oli yli 19 miljoonaa päätelaitetta. Bottiverkkoa operoitiin haittaohjelmalla, joka oli asennettuna miljooniin päätelaitteisiin ympäri maailmaa. Näillä ohjeilla varmistat, ettet ole osa bottiverkkoa.

911 S5 -bottiverkossa tuhansia suomalaisia IP-osoitteita mukana
Toukokuussa 2024 suljettu 911 S5 -bottiverkko tarjosi rikollisille pääsyn vaarantuneisiin IP-osoitteisiin ja niihin liittyviin yksityishenkilöiden ja yritysten omistamiin laitteisiin. Joukossa on ollut myös tuhansia kaapattuja laitteita, joiden IP-osoite sijaitsee Suomessa. Kaappaukset ovat tapahtuneet haitallisten VPN-palveluiden avulla. Ohjeen avulla tunnistat ja poistat haitallisen palvelun laitteeltasi.

Kyberturvallisuuskeskuksen viikkokatsaus - 22/2024
Tällä viikolla kerromme mm. oman organisaation palveluiden tietoturvan kartoittamisesta, sekä NIS2-direktiivin riskienhallintavelvoitteesta.

Vakava haavoittuvuus Check Point Quantum Gateway -tuotteissa
Check Point Quantum Gateway palomuurituotteissa on löydetty haavoittuvuus, jota on havaittu hyväksikäytettävän rajattuun asiakaskuntaan kohdistuvissa hyökkäysyrityksissä. Valmistaja on julkaissut korjaavan ohjelmistopäivityksen sekä ohjeita päivityksen suorittamiseen. Päivitys tulee ottaa käyttöön viipymättä ja varmistaa ettei onnistuneesta hyväksikäytöstä ole havaintoja. Haavoittuvuudelle on julkinen hyväksikäyttömenetelmä, joten ohjelmistojen päivittäminen tulee priorisoida korkeimmalle mahdolliselle tasolle.

Millaiseen kyberpoikkeamaan organisaatiosi on varautunut? Tutustu NIS2-direktiivin riskienhallintavelvoitteeseen
NIS2-direktiivissä säädetään kyberturvallisuuden riskienhallinnasta ja hallintatoimenpiteiden perustason velvoitteista. Traficomin valmistelemasta suositusluonnoksesta voi hakea tukea riskienhallinnan suunnitteluun.

Kyberturvallisuuskeskuksen viikkokatsaus - 21/2024
Kuntiin kohdistuneet kyberhyökkäykset ovat yleistyneet, ja tällä viikolla muistutammekin kuntien tietoturvan merkityksestä. Huomioimme myös tulevat europarlamenttivaalit ja annamme vinkkejä tietoturvasta huolehtimiseen vaalikampanjoinnin aikana.

Huippuhakkerit kolkuttelivat luvan kanssa paikallisten 5G-verkkojen tietoturvaa
Viime viikonloppuna kansainvälisessä 5G-tapahtumassa Espoon Dipolissa oli koolla 70 valkohattuhakkeria. Heille annettiin lupa testata 5G-verkon puolustusta, murtautua sisälle verkkoon, kartoittaa verkon sisäisiä komponentteja ja palveluja, korottaa omia käyttöoikeuksia ja saada verkko paremmin haltuun. Tämän lisäksi he saivat luvan muuttaa, asentaa, poistaa ja rikkoa verkon komponentteja. Testaamalla ja korjaamalla uutta, vielä kehitysvaiheessa olevaa, teknologiaa edistämme kyberturvallisuutta ja yhteiskunnan varautumista.

Mitä NIS2-direktiivissä esitetyt kyberhygieniakäytännöt ovat?
Kyberhygieniakäytännöt eli perustason tietoturvakäytännöt luovat perustan organisaation kyberturvallisuudelle. Jos kyberturvallisuus ei ole organisaatiolle vielä kovin tuttua, kyberhygieniakäytännöillä organisaatio pääsee alkuun kyberturvallisuudesta huolehtimisessa.

Kyberturvallisuuskeskuksen viikkokatsaus - 20/2024
Tällä viikolla kerromme esimerkiksi Helsingin tietomurrosta, joka osoittaa monille organisaatioille kuinka tärkeää tietoturvaan panostaminen on.

Oikotietä hyvään tietoturvaan ei ole - tukea ja tietoa on tarjolla
Oletteko miettineet kunnassanne, miten hyvin kuntanne ja hallussanne olevien kuntalaisten tiedot on suojattu? Milloin järjestelmät ja sovellukset on päivitetty? Milloin olette viimeksi harjoitelleet kyberhyökkäyksen varalle?

Modernien tietoturvaratkaisujen ja -innovaatioiden käyttöönoton tukea myönnettiin 36 yritykselle
Liikenne- ja viestintäviraston Kyberturvallisuuskeskuksen Kansallinen koordinointikeskus (NCC-FI) avasi 2.1.2024 Suomeen rekisteröidyille mikro- ja pk-yrityksille haettavaksi rahoitustukea modernien tietoturvaratkaisujen ja -innovaatioiden käyttöönottoprojekteihin. Rahoitustukea oli jaossa yhteensä 1,5 milj. euroa. 1.3.2024 päättyneeseen hakuun saapui 160 hakemusta. Rahoitustukea haettiin yhteensä noin 6,5 milj. euron edestä.

Kyberuhkien lieventäminen rajallisilla resursseilla - ohje kansalaisyhteiskunnalle julkaistu
Yhdysvaltain kyberturvallisuusvirasto (Cybersecurity and Infrastructure Security Agency, CISA) on luonut yhteisen kyberturvallisuuden ohjeistuksen keskeisten valtiollisten, valtiosta riippumattomien, yritysmaailman ja kansalaisyhteiskunnan kumppaneiden kanssa erityisen riskialttiille yhteisötoimijoille, kuten kansalaisyhteiskunnan järjestöille ja yksilöille. Suomesta yhteistyössä oli mukana Traficomin Kyberturvallisuuskeskus.

Tietomurrot - mitä ne ovat?
Helsingin kaupunki kertoi joutuneensa tietomurron kohteeksi toukokuun alussa. Tietomurto tarkoittaa luvatonta tietojärjestelmään, palveluun tai laitteeseen tunkeutumista tai sovelluksen, kuten esimerkiksi sähköpostitilin luvatonta käyttöä haltuun saatujen tunnusten avulla. Tietomurto on rikoslaissa määritelty rangaistava teko ja myös tietomurron yritys on rangaistavaa. Tässä artikkelissa kerromme tietomurroista yleisesti.

Kyberturvallisuuskeskuksen viikkokatsaus - 19/2024
Tällä viikolla poistimme huhtikuussa julkaistun vakavan varoituksen Palo Alton tuotteiden kriittisestä haavoittuvuudesta. Kerromme myös tarkempaa pohdintaa Mirai-haittaohjelman varjopuolista ja keinoista, joilla jokainen kuluttaja voi omalta osaltaan huolehtia laitteidensa ja verkkoympäristönsä tietoturvasta.

Huhtikuun Kybersää 2024
Kevät lähti kyberturvallisuuden osalta myrskyisästi käyntiin. Myrskyn merkkejä Kybersäähän toivat erityisesti huhtikuussa julkaistu Varoitus 1/2024 Palo Alton GlobalProtect-tuotteisiin liittyen, mutta myös Android-puhelimissa huijausviesteillä levinnyt haittaohjelma.

Palo Alto GlobalProtect -tuotteita koskenut Varoitus on poistettu
Palo Alto GlobalProtect -tuotetta käyttäviin organisaatioihin kohdistui vakava uhka huhtikuussa. Kriittinen haavoittuvuus johti Suomessakin tietomurtotapauksiin, mutta vakavammilta vahingoilta vältyttiin.

Miraissa on tulevaisuus
Mirai-haittaohjelmatartuntojen torjunta ja siivoaminen on osoittautunut vaikeaksi, sillä se nähdään helposti “jonkun toisen ongelmana”, kirjoittaa erityisasiantuntijamme Perttu Halonen.

Kyberturvallisuuskeskuksen viikkokatsaus - 18/2024
Tällä viikolla kerromme muun muassa pankkitietoja varastavasta Android-haittaohjelmasta. Mukana on tuttuun tapaan myös ajankohtaiset huijaukset.

Kyberturvallisuuskeskuksen viikkokatsaus - 17/2024
Tällä viikolla kerromme mm. tietojenkalastelusta -.fi-verkkotunnuksissa ja siitä miten tietoturvalliseen lomakauteen kannattaa varautua työpaikalla.

Useita vakavia haavoittuvuuksia Cisco ASA ja FTD-tuotteissa
Cisco Adaptive Security Appliance ja Firepower Threat Defense tuotteissa on havaittu haavoittuvuuksia, joita on käytetty osana valtiollisen toimijan suorittamia kyberhyökkäyksiä. Valmistaja on julkaissut korjaavat ohjelmistopäivitykset sekä ohjeita mahdollisen tietomurron havaitsemiseksi.

Miksi tietoturvapoikkeaman selvittäminen on tärkeää ja miksi asiasta kannattaa ilmoittaa viranomaiselle?
Tietoturvapoikkeama voi osua suoraan tai välillisesti mihin tahansa organisaatioon. Vaikka tietoturvaan olisi panostettu, järjestelmät olisivat päivitysten osalta ajan tasalla ja prosessit kunnossa, voi poikkeama silti päästä yllättämään. Kerromme, miksi organisaation CISO:n on hyvä pitää huolta siitä, että poikkeaman syy selvitetään ja miksi asiasta on hyvä ilmoittaa myös viranomaiselle.

Kyberturvallisuuskeskuksen viikkokatsaus - 16/2024
Tällä viikolla kerromme Palo Alto -verkkolaitteiden kriittisestä haavoittuvuudesta ja siihen julkaistusta keltaisesta varoituksesta. Luottotietorekisteriin nimissä on liikkeellä tietojenkalasteluviestejä ja organisaatiot ovat vastaanottaneet erilaisia laskutushuijauksia.

Tietomurtoja Palo Alto GlobalProtect-tuotteisiin – vaatii välittömiä toimia
Organisaatioissa laajasti käytetyn Palo Alto GlobalProtect-tuotteen haavoittuvuutta (CVE-2024-3400) käytetään aktiivisesti hyväksi. Haavoittuvuudella on merkittäviä vaikutuksia ja se vaatii laitteiden päivitystä ja tutkintaa. Haavoittuvuudelle alttiita laitteita on syytä epäillä murretuiksi.

Vakava haavoittuvuus PuTTY-ohjelmiston ECDSA-algoritmin toteutuksessa
PuTTY-tietoliikenneasiakasohjelmiston ja sen koodia käyttävien sovellusten heikko NIST P-521 ECDSA-algoritmin toteutus voi paljastaa käyttäjän yksityisen avaimen, mikäli avain on edellä mainittua tyyppiä.

Kriittinen haavoittuvuus Palo Alton GlobalProtect -tuotteessa
Palo Alton PAN-OS-järjestelmän GlobalProtect-ominaisuuden haavoittuvuus mahdollistaa järjestelmän täyden haltuunoton etänä ilman tunnistautumista. Valmistaja on julkaissut ensimmäiset korjaavat päivitykset 14.4. Haavoittuvuutta hyväksikäytetään aktiivisesti ja haavoittuvuuden korjaavat päivitykset on syytä suorittaa välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 15/2024
Tällä viikolla kerromme kotien internetiin kytkettyjen laitteiden, erityisesti televisioiden, tietoturvasta ja haavoittuvuuksista, jotka voivat altistaa laitteet pahantahtoisille hyökkäyksille sekä kerromme, miten kotien laitteet tulee suojata. Muita viikkokatsauksen aiheita ovat maaliskuisen tietoturvaseminaarimme tallenne, NIS2-direktiivi sekä verkkosivujemme palautekysely.

Lausuntopyyntö suositusluonnoksesta NIS2-direktiivin kyberturvallisuuden riskienhallinnan toimenpiteistä
Liikenne- ja viestintävirasto Traficomin Kyberturvallisuuskeskus pyytää lausuntoja suositusluonnoksesta valvoville viranomaisille NIS2-direktiivin mukaisista kyberturvallisuuden riskienhallinnan toimenpiteistä.

TIEDOTE: Kyberturvallisuuskeskus on muuttanut haavoittuvuustiedotteen ulkoasua
Kirjoitamme edelleenkin artikkelin ingressiin kuvauksen haavoittuvuudesta ja sen kriittisyydestä. Halusimme muutoksella jouhevoittaa haavoittuvuustiedottamista.

Maaliskuun Kybersää 2024
Keväiset sateet sävyttivät maaliskuun kybersäätä, mutta aurinkokin pilkahteli. Huijauksissa esillä oli erityisesti ajoneuvoveroteemainen kalastelu. Myös palvelunestohyökkäyksiä ja sähköpostikalastelua nähtiin maaliskuussa. Tässä Kybersäässä mukana ovat myös neljä kertaa vuodessa päivitettävät kvartaalitilastot.

Tietoturva 2024 -seminaarissa puhutti tekoäly ja kvanttiteknologia
Traficomin Kyberturvallisuuskeskuksen sekä Huoltovarmuuskeskuksen järjestämä Tietoturva 2024 -seminaari kokosi maaliskuun puolivälissä tietoturvan tulevaisuuteen liittyvistä aiheista kiinnostuneet jälleen yhteen. Tänä vuonna seminaarin teemoina olivat tekoäly sekä kvanttiteknologia. Seminaarissa jaettiin myös Tietoturvan suunnannäyttäjä -tunnustus, joka myönnettiin tänä vuonna huijauspuhelujen ja -viestien estämiseen tähtäävälle yhteistyölle.

Auta meitä kehittämään verkkosivujamme
Kehitämme Traficomin Kyberturvallisuuskeskuksen verkkosivuja ja haluamme kuulla sinun mielipiteesi verkkosivuston sisällöistä ja arjen tietoturvan viestinnästä. Voit osallistua sekä kyselyyn että käytettävyystutkimukseen tai halutessasi vain toiseen. Palautteesi auttaa meitä kehittämään sisältöä entistä asiakaslähtöisemmäksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 14/2024
Tällä viikolla kerromme mm. Linuxin käyttöjärjestelmän varaantaneesta kriittisestä haavoittuvuudesta ja julkaisimme DeepFake-tietopaketin.

Kun jokainen päivä voi olla aprillipäivä - Mistä deepfakeissa on kysymys?
Olet todennäköisesti törmännyt viime aikoina sanaan "deepfake". Mistä deepfakeissa ja niiden taustalla olevassa teknologioissa ja tekniikoissa on kysymys?

Kriittinen haavoittuvuus Linux-jakeluissa XZ Utils -tiedonpakkausohjelmistossa
Linux-jakeluiden XZ Utils -tiedostonpakkausohjelman 5.6.0 ja 5.6.1 versiot sisältävät haitallista koodia, joka sallii luvattoman pääsyn luoden takaportin järjestelmään. Haitallinen koodi on käytössä useissa Linux-jakeluissa. Valmistaja suosittelee ottamaan käyttöön vanhemman version (5.4.6) XZ Utils -tiedostonpakkausohjelmasta tai poistamaan sen käytöstä kokonaan, sillä korjaavaa ohjelmistopäivitystä ei ole vielä julkaistu.

Kyberturvallisuuskeskuksen viikkokatsaus - 13/2024
Tällä viikolla kerromme mm. verkkotunnusten huolellisesta hallinnasta sekä tulevasta Hack the Networks -hackathon tapahtumasta.

Kyberturvallisuuskeskuksen viikkokatsaus - 12/2024
Tällä viikolla kerromme Tietoturvan vuosi 2023 -katsauksesta sekä kyberturvallisuusaiheiden käsittelystä Futucast-podcastissa. Lisäksi kerromme uusista ohjeista pilvipalveluihin ja tietoturvan vähimmäisvaatimuksiin liittyen.

Tietoturvan vuosi 2023 -katsaus arvioi uhkatason pysyvän kohonneena myös vuonna 2024
Tietoturvan vuosi 2023 kokoaa tietoa, arvioita ja analyysejä menneen vuoden merkittävimmistä kyberilmiöstä, trendeistä ja tietoturvasääntelystä yksiin kansiin.

Harjoittelu ja varautuminen ovat osa yritysten vastuullisuutta
Miten toimitte, jos toimistolla syttyy kesken työpäivän tulipalo? Hätäuloskäynnit, kokoontumispaikat ja muut toimintatavat on luultavasi harjoiteltu yhdessä moneen kertaan. Hyvä! Mutta mitä jos kohdalle osuu tietomurto tai kiristyshaittaohjelma? Myös erilaisiin kyberhäiriöihin kannattaa varautua harjoittelemalla, muistuttaa Traficomin pääjohtaja Jarkko Saarimäki.

Kyberturvallisuuskeskuksen viikkokatsaus - 11/2024
Microsoft 365 -tilimurrot ovat taas kääntyneet nousuun. Tällä kertaa tunnuksia kalastellaan Dropboxin nimissä. Monivaiheinen tunnistautuminen on tehokas keino tietojenkalastelua vastaan.

Helmikuun Kybersää 2024
Helmikuussa vallitseva kybersäätila oli sateinen. Microsoft 365 -tilimurrot jatkuivat helmikuussakin. Myös haktivistit jatkoivat palvelunestohyökkäyksiään, kun kuun alussa suureen määrään suomalaisia organisaatioita kohdistui palvelunestohyökkäyksiä.

Tekoäly on yhä keskeisempi tekijä tulevaisuuden tietoturvaratkaisuissa
Tekoälystä ja sen hyödyntämisestä kyberturvallisuuden edistämisessä keskustellaan paljon. Jo tänä päivänä eri toimialoilla on käytössä erilaisia tekoälypohjaisia tietoturvaratkaisuja. Missä mennään tällä hetkellä ratkaisujen kehittämisessä ja käytössä? Millaisia kehityskulkuja voidaan nähdä tulevaisuudessa? Millaiset ovat ylipäätään tekoälyn mahdollisuudet tietoturvan parantamisessa?

Traficom palkitsee yhteistyön huijauspuheluiden ja huijausviestien estämiseksi Tietoturvan suunnannäyttäjä -tunnustuspalkinnolla
Traficom myönsi Tietoturvan suunnannäyttäjä tunnustuspalkinnon tahoille, jotka ovat olleet yhdessä laatimassa ja toteuttamassa toimenpiteitä kansainvälisten huijauspuheluiden ja huijausviestien estämiseksi. Yhteistyön ansiosta väärennetyillä suomalaisilla numeroilla soitetut huijauspuhelut ovat käytännössä loppuneet. Koska ongelma on maailmanlaajuinen, suomalainen osaaminen ja uranuurtava tekeminen herättää kiinnostusta myös kansainvälisesti.

Kyberhyökkäykset siirtyvät pilveen - Näin suojaudut ja raportoit Kyberturvallisuuskeskukselle
Pilvisiirtymän myötä myös kyberhyökkäykset siirtyvät pilveen. Niin kyberrikolliset kuin valtiolliset toimijat kohdistavat operaatioitaan entistä enemmän organisaatioiden pilviympäristöihin. Esittelemme tyypillisimmät murtautumiskeinot pilvipalveluihin ja neuvomme miten niiltä voi suojautua. Kyberturvallisuuskeskukselle voi ilmoittaa myös pilviympäristöihin kohdistuneista tietomurroista.

Kyberturvallisuuskeskuksen viikkokatsaus - 10/2024
Saitko sinäkin tekstiviestin, joka pelottelee liikennerikkomuksien seurauksilla? Niitä on nyt paljon liikkeellä. Huijauksia liikkuu myös muun muassa suomi.fi-palvelun nimissä.

Riskialttiit verkon reunalaitteet aktiivisten murtoyritysten kohteena
Verkon reunalla sijaitsevat laitteet voivat olla riskialttiita ja tarvitsevat erityistä huomiota organisaatioilta. Haavoittuvuudet, puutteet prosesseissa ja konfiguraatiovirheet altistavat organisaatiot hyökkääjille. Säännöllinen harjoittelu auttaa organisaatioita varautumaan erilaisiin kyberpoikkeamiin.

JetBrains TeamCity -ohjelmistossa kriittinen haavoittuvuus
JetBrains TeamCity -ohjelmistoon on julkaistu päivitys, joka korjaa kaksi tunnistautumisen ohittamisen mahdollistavaa haavoittuvuutta. Haavoittuvuudet koskevat TeamCity On-premises tuotteita. Korjaava päivitys on suositeltavaa asentaa mahdollisimman pian.

Kyberturvallisuuskeskuksen viikkokatsaus - 09/2024
Tällä viikolla kerromme erilaisista rekrytointihuijauksista sekä haitallisten liitetiedostojen vaarallisuudesta.

Anssi Kärkkäinen Liikenne- ja viestintävirasto Traficomin Kyberturvallisuuskeskuksen uusi ylijohtaja
Traficomin Kyberturvallisuuskeskuksen uudeksi ylijohtajaksi on nimitetty TkT, DI, ye.ups. Anssi Kärkkäinen 4.3.2024 alkaen kolmen vuoden määräajaksi. Kärkkäisellä on laaja-alainen tausta kyberturvallisuuden eri johtotehtävistä sekä valtionhallinnon että elinkeinoelämän puolelta.

Kyberturvallisuuskeskuksen viikkokatsaus - 08/2024
Tällä viikolla kerromme mm. sähköpostitilien murtoaallosta ja siitä, miten toimitusjohtajahuijauksia sekä petoksen yrityksiä yritetään tehdä verkossa Matkahuollon ja Postin nimiä käyttäen.

Rikollisten tehtailemat tekstiviestihuijaukset vaikeutuvat - jo 70 lähettäjätunnusta on suojattu
Liikenne- ja viestintävirasto Traficomin ja operaattoreiden työ tekstiviestihuijausten kampittamiseksi kantaa hedelmää. Tähän mennessä eri organisaatiot ovat suojanneet jo 70 tekstiviestin lähettäjätunnusta. Traficom kannustaakin myös muita tekstiviestejä lähettäviä organisaatioita tarkistamaan suojaustarpeensa ja rekisteröimään tarvittavat tunnukset Traficomin palvelussa.

Kyberturvallisuuskeskuksen viikkokatsaus - 07/2024
Tällä viikolla kerromme mm. haavoittuvuuksista, ajankohtaisista tietojenkalastelukampanjoista ja siitä miten presidentinvaalit sujuivat kyberturvallisuuden näkökulmasta.

Kriittisiä haavoittuvuuksia Fortinetin FortiOS -ohjelmistossa
Fortinet julkaisi useita korjauksia FortiOS-ohjelmiston komponenttien haavoittuvuuksiin. Yhtä haavoittuvuuksista on jo todennäköisesti hyväksikäytetty, joten korjaavat päivitykset on suositeltavaa asentaa viipymättä.

Kyberturvallisuuskeskuksen viikkokatsaus - 06/2024
Tällä viikolla kerromme mm. pankkitunnusten kalastelusta OmaKannan sekä Suomi.fi-teeman avulla, ja palvelunestohyökkäyshavainnoista alkuvuoden osalta.

Tammikuun Kybersää 2024
Vuosi 2024 alkoi kybersäässä sateisissa merkeissä. Vuoden ensimmäinen kuukausi piti sisällään niin piikin Microsoft 365 -tilimurtojen ilmoitusmäärissä, kuin useampia kriittisiä haavoittuvuuksia. Myös haktivistien tekemät palvelunestohyökkäykset jatkuivat alkuvuonna.

Vieraskynä: Läheistäni huijataan – mitä voin tehdä?
Läheisellä voi olla tärkeä rooli romanssihuijauksen pysäyttämisessä. Taloudellisten menetysten lisäksi huijaus aiheuttaa uhreille ja heidän läheisilleen häpeää ja ahdistusta, kirjoittaa Jimi Tikkanen Nettideittiturva-hankkeesta.

Kriittisiä haavoittuvuuksia GitLabin Community Edition ja Enterprise Edition -tuotteissa
GitLab on julkaissut päivityksen Community Edition (CE) ja Enterprise Edition (EE) -tuotteiden kriittiseen haavoittuvuuteen. Korjaava versiopäivitys kannattaa asentaa mahdollisimman pikaisesti.

Useita kriittisiä haavoittuvuuksia konttiteknologioiden runc ja Moby BuildKit -työkaluissa
runc ja Moby BuildKit ovat konttiteknologian alustaratkaisuissa käytettäviä työkaluja, joihin yläkerrosten sovellukset, kuten Docker ja Kubernetes nojaavat. Työkaluissa on havaittu kriittisiä haavoittuvuuksia, joiden avulla hyökkääjä voi saada pääsyn järjestelmään ja sen arkaluonteisiin tietoihin. Haavoittuvuudet mahdollistavat myös jatkohyökkäyksien tekemisen.

Palvelunestohyökkäykset jatkuvat myös vuonna 2024
Palvelunestohyökkäyksellä pyritään aiheuttamaan hetkellistä haittaa esimerkiksi verkkosivuihin. Erityisesti haktivistien palvelunestohyökkäykset näkyivät Suomessa vuonna 2023. Sama näyttää jatkuvan myös tänä vuonna.

Kyberturvallisuuskeskuksen viikkokatsaus - 05/2024
Tällä viikolla kerromme Poliisin nimissä tehtävistä huijauspuheluista. Muistetaan myös hyvät uutiset – ensi viikolla vietetään Mediataitoviikkoa ja Tietoturva 2024 -seminaarin ilmoittautuminen on avattu.

Merkittävä haavoittuvuus GNU glibc-kirjastossa
GNU glibc-kirjastossa on havaittu puskurin ylivuotohaavoittuvuus, joka vaikuttaa useisiin Linux-jakeluihin. Haavoittuvuus mahdollistaa paikallisille käyttäjille oikeuksien korottamisen pääkäyttäjän (root) tasolle. Linux-jakeluista haavoittuvaiseksi on todettu ainakin Debian (versiot 12 ja 13), Ubuntu (23.04 ja 23.10) ja Fedora (37 - 39). Mainittuihin jakeluihin on tarjolla korjaavat päivitykset.

Kyberturvallisuuskeskuksen viikkokatsaus - 04/2024
Tällä viikolla kerromme voimakkaasti lisääntyneestä veroaiheisista huijauksista ja käyttäjätilien tietomurroista. Huijarit ovat taitavia laatimaan petoksia kulloinkin ajankohtaisista aiheista. Nyt petkutusten aiheiksi ovat valikoituneet tietomurrot ja veronpalautukset. Kyberala murroksessa -seminaarissa yleisöä kiinnosti mm. yritysten EU-sääntely.

Apple julkaisi kriittisiä päivityksiä useisiin tuotteisiinsa, haavoittuvuuksien hyväksikäyttöä on havaittu
Useissa Applen tuotteissa ja Safari-verkkoselaimessa on korjattu kriittisiä haavoittuvuuksia. Haavoittuvuudet korjaavat päivitykset on suositeltavaa asentaa välittömästi, sillä haavoittuvuuksien hyväksikäyttöä on jo havaittu maailmalla.

Kyberturvallisuuskeskuksen viikkokatsaus - 03/2024
Tällä viikolla kerromme pankkitunnuksia havittelevista huijauskampanjoista, vaalien kyberturvallisuudesta sekä syväväärennöksistä, ja siitä miten ne voidaan tunnistaa.

Kriittisiä haavoittuvuuksia Atlassianin tuotteissa
Atlassianin Bitbucket-, Confluence-, Jira-, Bamboo- ja Crowd-tuotteissa on useita haavoittuvuuksia, joista vakavimmat mahdollistavat hyökkääjälle mielivaltaisen koodin suorittamisen (RCE). Valmistaja kehottaa ryhtymään välittömästi toimenpiteisiin haavoittuvuuksien johdosta. Haavoittuviin ohjelmistoihin on olemassa ongelman korjaavat versiot. Haavoittuvuudet eivät koske Atlassianin itse pilvipalveluna tuottamia palveluita.

Vaalit turvataan viranomaisten yhteistyöllä
Alkanut vuosi on todellinen vaalivuosi niin Suomessa kuin maailmallakin. Presidentinvaaleihin ja europarlamenttivaaleihin valmistautuminen on useiden eri toimijoiden pitkäjänteistä varautumistyötä ministeriöistä ja virastoista aina kuntatasolle ja yksittäisille äänestyspaikoille asti. Vaikka jännitteinen kansainvälinen tilanne saattaa herättää kansalaisissa huolta, suomalainen vaalijärjestelmä on vakaa ja turvallinen.

Kyberturvallisuuskeskuksen viikkokatsaus - 02/2024
Tällä viikolla kerromme Ivantin ohjelmistohaavoittuvuuksista, jotka koskevat useita satoja kotimaisia palvelimia. Myös Akira-kiristyshaittaohjelmatapaukset ja OmaVero-huijaukset ovat näkyneet Kyberturvallisuuskeskuksen ilmoituksissa.

Joulukuun kybersäätä synkistivät kiristyshaittaohjelmat
Vuosi 2023 päättyi kyberturvallisuuden osalta sateisissa merkeissä. Jopa salamointia oli ilmassa, kun Kyberturvallisuuskeskus sai kaikkiaan kuusi ilmoitusta Akira-kiristyshaittaohjelmasta. Myös seurauksiltaan vakavien tietomurtojen määrä kasvoi joulukuussa.

Ivantin tuotteissa kriittisiä hyväksikäytettyjä haavoittuvuuksia
PÄIVITYS 31.1.2024: Ivanti julkaisi kaksi uutta haavoittuvuutta Ivanti Connect Secure (tunnettiin aikaisemmin nimellä Pulse Secure) sekä Ivanti Policy Secure -tuotteissaan. Toista 31.1. julkaistua haavoittuvuutta on jo hyväksikäytetty. Lukuisten kotimaisten organisaatioiden on syytä reagoida haavoittuvuuksiin välittömästi.

Suomalaiset organisaatiot Akira-kiristyshaittaohjelmien kohteena
Kyberturvallisuuskeskus vastaanotti 12 ilmoitusta Akira-kiristyshaittaohjelmatapauksista kotimaisilta organisaatioilta vuonna 2023. Tapaukset liittyivät erityisesti heikosti suojattuihin Ciscon VPN-toteutuksiin tai niiden paikkaamatta jääneisiin haavoittuvuuksiin. Toipuminen on yleensä vaikeaa.

Kyberturvallisuuskeskuksen viikkokatsaus - 01/2024
Tällä viikolla kerromme alkuvuonna auki olevista rahoitushauista ja kertaamme vuoden 2023 tärkeimpiä kybertapahtumia.

Osallistu alkuvuodesta 2024 auki olevien kyberturvallisuusrahoitushakujen esittelyn webinaariin 18.1.2024
Kyberturvallisuuden tutkimuksen, kehityksen ja innovaatioiden kansallinen koordinointikeskus esittelee alkuvuodesta 2024 auki olevia, Traficomin ja EU:n kyberturvallisuuden rahoitushakuja torstaina 18.1.2024 klo 10:00–11:30 järjestettävässä webinaarissa. Rahoitusohjelmasta riippuen rahoitusta voivat hakea yritykset, yhdistykset ja säätiöt, yliopistot, tutkimuslaitokset sekä julkisen sektorin toimijat.

Haavoittuvuus SMTP-protokollan toteutuksessa useissa eri sähköpostiohjelmistoissa
Vuoden 2023 lopulla SMTP-protokollan useisiin toteutuksiin julkaistiin nollapäivähaavoittuvuus. Haavoittuvuutta hyödyntämällä uhkatoimijat voivat väärinkäyttää haavoittuvia SMTP-palvelimia maailmanlaajuisesti lähettääkseen haitallisia sähköposteja mielivaltaisista sähköpostiosoitteista, mikä mahdollistaa mm. kohdistettuja tietojenkalasteluhyökkäyksiä. Haavoittuvuus koskee SMTP-ohjelmistoista ainakin Postfixiä, Sendmailia ja Eximiä.

Rahoitustukihaku modernien tietoturvaratkaisujen ja -innovaatioiden käyttöönottoon pk-yrityksissä on avattu
Liikenne- ja viestintävirasto Traficomin Kyberturvallisuuskeskus on avannut mikroyrityksille ja pienille ja keskisuurille yrityksille haettavaksi rahoitustukea modernien tietoturvaratkaisujen ja -innovaatioiden käyttöönottoon. Haku on auki 2.1.–1.3.2024 klo 16:15 asti. Haettavana on yhteensä 1,5 miljoonaa euroa.

Kyberturvallisuuskeskuksen viikkokatsaus - 52/2023
Tällä viikolla kerromme suomalaisiinkin organisaatioihin hyökänneestä Akira-kiristyshaittaohjelmasta sekä Kyberala murroksessa -seminaarista. Vuoden viimeisessä viikkokatsauksessa toivotamme kaikille turvallista uutta vuotta 2024!

Kyberturvallisuuskeskuksen viikkokatsaus - 51/2023
Tällä viikolla kerromme mm. erilaisista petoksista ja elektronisten työkalujen tarjoamista mahdollisuuksista, Digitaalinen Eurooppa -ohjelmasta sekä yksityisten sähköpostitilien kalastelusta.

Traficom laatii suositusta NIS2-direktiivin kyberturvallisuuden riskienhallinnan toimenpiteistä
Liikenne- ja viestintävirasto Traficom valmistelee suositusta kyberturvallisuuden riskienhallinnan toimenpiteistä. Suosituksen taustalla on 16.1.2023 voimaan tullut NIS2-direktiivi, jonka tavoitteena on kyberturvallisuuden yhteisen tason varmistaminen kaikkialla Euroopan unionissa.

EU-rahoitusta kyberturvallisuussektorin eri osa-alueille Digitaalinen Eurooppa -ohjelmasta
Euroopan komission Digitaalinen Eurooppa -rahoitusohjelmassa on julkistettu uusia kyberturvallisuussektoria koskevia hakuja. Hakujen teemoja ovat muun muassa osaamisen kehittäminen sekä tekoälyn, kvanttikryptografian ja kyberkestävyyssäädöksen edistäminen.

Kyberturvallisuuskeskuksen viikkokatsaus - 50/2023
Tällä viikolla kerromme mm. WhatsAppissa liikkuvista rekrytointihuijauksista. Muistutamme myös, mitä tulee ottaa huomioon uuden älylaitteen hankinnassa ja käyttöönotossa.

Marraskuun kybersäässä kiristyshaittaohjelmat aiheuttivat salamointia
Lokakuun myrskyt jäivät varoituksen poistamisen myötä marraskuussa taa, mutta loppusyksyinen kybersää jatkui valtaosin sateisena. Erityisesti haittaohjelmien ja haavoittuvuuksien osalta salamointia aiheuttivat useat ilmoitukset kiristyshaittaohjelmahavainnoista. Kyberrikollisten kyky hyödyntää julki tulleita haavoittuvuuksia on nopeaa. Myös joulun aikaan onkin hyvä muistaa pitää päivityksistä huolta.

Apache Struts 2 -ohjelmistokehyksestä korjattu kriittinen haavoittuvuus
Apache-projektin tuottamassa web-sovellusten toteuttamiseen käytettävässä avoimen lähdekoodin Struts 2 -ohjelmistokehyksessä on havaittu kriittinen haavoittuvuus CVE-2023-50164. Haavoittuvuutta hyväksikäyttämällä hyökkääjä voi suorittaa verkon yli kohteessa mielivaltaista koodia ja ottaa mahdollisesti haltuunsa haavoittuvan järjestelmän. Haavoittuvuuden korjaamiseen on julkaistu ohjelmistopäivitys, joka tulee ottaa käyttöön välittömästi.

Lausuntopyyntö luonnoksesta määräykseksi teletoiminnan tietoturvasta
Liikenne- ja viestintävirasto Traficomin määräystä teletoiminnan tietoturvasta päivitetään. Traficom pyytää lausuntoa määräyksen ja perustelumuistion luonnoksista.

Apple julkaisi kriittisiä päivityksiä useisiin tuotteisiinsa
Apple julkaisi useisiin eri tuotteisiinsa monia kriittisiä haavoittuvuuksia korjaavat ohjelmistoversiot. Mukana myös vanhempia edelleen tuettuja ohjelmistoversioita, joihin ei vielä aiemmin ollut haavoittuvuuksia korjaavia versioita saatavilla. Haavoittuvuudet korjaavat ohjelmistoversiot tulee ottaa käyttöön viipymättä, koska osaa haavoittuvuuksista on havaittu jo hyväksikäytettävän.

EU:n Horisontti Eurooppa -rahoitushakuja julkistettu kyberturvallisuussektorille
Euroopan komission Horisontti Eurooppa -rahoitusohjelmassa on julkistettu uusia kyberturvallisuussektoria koskettavia tutkimus-, kehittämis- ja innovaatiohakuja.

Kansallisen koordinointikeskuksen järjestämän ensimmäisen rahoitustukihaun päätökset annettu
Kansallisen koordinointikeskuksen järjestämän ensimmäisen rahoitustukihaun päätökset annettiin 15.11.2023. Rahoitustukea oli haettavissa aikavälillä 16.6.–16.8.2023 yhteensä 500 000 euroa. Tukea myönnettiin yhteensä noin 485 000 euroa pk-yritysten kyberturvallisuutta parantaviin projekteihin.

Kyberturvallisuuskeskuksen viikkokatsaus - 49/2023
Tällä viikolla kerromme huijausviesteistä, joissa vastaanottaja koitetaan pelästyttää veronpalautusten peruutuksella. Muina aiheina ovat Akira-kiristyshaittaohjelma Suomessa sekä sijaisjärjestelyjen tärkeys myös joulupyhien aikana.

Vakavia haavoittuvuuksia Atlassianin tuotteissa
Atlassianin Bitbucket, Confluence ja Jira-tuotteissa on useita haavoittuvuuksia, jotka mahdollistavat hyökkääjälle mielivaltaisen koodin suorittamisen (RCE). Valmistaja kehottaa ryhtymään välittömästi toimenpiteisiin haavoittuvuuksien johdosta. Haavoittuviin ohjelmistoihin on olemassa ongelman korjaavat versiot. Haavoittuvuudet eivät koske Atlassianin itse pilvipalveluna tuottamia palveluita.

Kyberturvallisuuskeskuksen viikkokatsaus - 48/2023
Rikollisten tähtäimessä ovat nyt yritysten ja yhdistysten Facebook-tilit. Messengerin kautta lähetetyissä viesteissä väitetään, että käyttäjän tili aiotaan sulkea esimerkiksi tekijänoikeusrikkomuksen vuoksi.

Kriittinen haavoittuvuus Qlik Sense -tuotteessa
Kriittiseksi luokiteltu haavoittuvuus Qlik Sense -tuotteessa mahdollistaa hyökkääjälle oikeuksien korottamisen sekä mielivaltaisen koodin suorittamisen Qlik Sensen arkiston (repository) taustapalvelimella. Kyberturvallisuuskeskus varoittaa haavoittuvuudesta nyt, sillä kiristyshaittaohjelmatoimijan on havaittu hyväksikäyttävän sitä.

Kyberturvallisuuskeskuksen viikkokatsaus - 47/2023
Tällä viikolla kerromme mm. liikkeellä olevista Signal- ja Telegram-huijausviesteistä sekä siitä, miten Kelan nimissä lähetetään aktiivisesti huijaustekstiviestejä.

Kriittinen haavoittuvuus ownCloud -tuotteessa
ownCloud-tiedostonjako-ohjelmiston valmistaja on ilmoittanut tuotteessa havaitusta kriittisestä haavoittuvuudesta. Haavoittuvuus mahdollistaa hyökkääjälle pääsyn järjestelmässä olevaan osoitteeseen, josta saa luettua arkaluonteista tietoa.

Osallistu verkkotilaisuuteen EU:n uusista rahoitushauista kyberturvallisuussektorille
Kyberturvallisuussektorin osaamisen kehittämiseen on avautumassa uusia Euroopan komission rahoitushakuja. Hakujen yhteenlaskettu arvo on 46 miljoonaa euroa. Komissio esittelee hakuja 12.12.2023 verkkotilaisuudessa, johon hauista kiinnostuneet voivat osallistua. Kyberturvallisuuskeskuksen kansallinen koordinointikeskus (NCC-FI) tukee suomalaisia hakijoita hakemusvalmistelussa ja konsortion muodostamisessa.

Kyberturvallisuuskeskuksen viikkokatsaus - 46/2023
Tällä viikolla kerromme kiristyshaittaohjelmien uusista tuulista ja tilanteesta kotimaassa. Muistutamme myös virheellisestä oletuskonfiguraatiosta suositussa ServiceNow-alustassa.

Tietoturvan kehittämisen tukea 24 yritykselle - enintään 100 000 euron tuet jaettiin loppuun
Tietoturvan kehittämisen tuen enintään 100 000 euron tukina myönnettäväksi varattu 2 miljoonan euron määräraha on nyt myönnetty kokonaan. Tukea myönnettiin lopulta 24 yritykselle, kun kaiken kaikkiaan enintään 100 000 euron tukea haki 150 yritystä. Suuri määrä tukea hakeneista yrityksistä jäi siten ilman tukea. Liikenne- ja viestintävirasto Traficom tulee antamaan kyseisille yrityksille vielä erillisen päätöksen asiassa.

Kiristyshaittaohjelmissa uusia toimijoita ja toimintatapoja
Kuluneen vuoden aikana eri kiristyshaittaohjelmat ovat levinneet yhä nopeammin ympäri maailmaa. Myös kiristyshaittaohjelmien variaatiot sekä toimijoiden määrä ovat kasvaneet.

Kyberturvallisuuskeskuksen viikkokatsaus - 45/2023
Tällä viikolla kerromme muun muassa Microsoft 365 -tietomurtoaallon varoituksen päättymisestä, sekä OnniTV:llä esitettävästä Turvallisesti netissä -sarjastamme.

Lokakuun kybersäässä myrskysi monella rintamalla
Lokakuun kybersää oli myrskyvoittoinen. Erityisesti myrskyisyyttä selittää lokakuussa julkaistu vakava varoitus 1/2023, jossa varoitettiin Microsoft 365 -tietojenkalastelu- sekä tietomurtoaallosta. Aalto poiki Suomessa satoja ilmoituksia sähköpostitilimurroista. Lisäksi lokakuussa julkaistiin useita kriittisiä haavoittuvuuksia, joista monia oli myös käytetty jo hyväksi.

Microsoft 365 -tietomurtoaallosta kertova varoitus on poistettu
Suomalaisten organisaatioiden sähköpostitilejä kaapannut tietojenkalastelukampanja on hiipunut, ja ilmoitusmäärät Microsoft 365 -tilimurroista ovat kääntyneet laskuun. Vastaavia laajoja tietojenkalastelu- ja tietomurtokampanjoita nähtäneen tulevaisuudessakin, mutta tällä hetkellä syytä varoitukseen ei ole.

Kriittisiä haavoittuvuuksia Veeam ONE -ohjelmistossa
Veeam on ilmoittanut kahdesta kriittisestä haavoittuvuudesta Veeam ONE ohjelmistossa. Ensimmäinen haavoittuvuus (CVE-2023-38547) mahdollistaa koodin etäsuorittamiseen Veeam ONE -ohjelmiston asetustietokantanaan käyttämällä SQL-palvelimella. Toisessa haavoittuvuudessa (CVE-2023-38548) hyökkääjän on mahdollista saada käyttöönsä Veeam ONE -raportointipalvelussa käytetyn tilin NTLM-tiivisteen (hash). Haavoittuvat Veeam-versiot ovat Veeam ONE 11, 11a ja 12. Haavoittuvuuksiin on saatavilla korjaava päivitys.

Kriittisiä haavoittuvuuksia QNAP NAS -laitteissa
QNAP on julkaissut korjaavia ohjelmistopäivityksiä kahteen kriittiseen haavoittuvuuteen. Haavoittuvuudet mahdollistavat hyökkääjälle haavoittuvan järjestelmän etäkäytön. Ylläpitäjiä suositellaan asentamaan korjaava ohjelmistopäivitys mahdollisimman pian.

F5 BIG-IP tuotteissa kriittinen haavoittuvuus - Hyväksikäyttöä havaittu
F5 on julkaissut päivitykset kahteen haavoittuvuuteen CVE-2023-46747 ja CVE-2023-46748, joiden avulla hyökkääjä voi suorittaa etänä komentoja järjestelmässä. Toinen haavoittuvuuksista on luokiteltu kriittiseksi. F5 suosittelee haavoittuvien järjestelmien päivittämistä.

Kyberturvallisuuskeskuksen viikkokatsaus - 44/2023
Tällä viikolla kerromme vuokra- ja vastikerahojen perässä olevasta huijauskampanjasta sekä ServiceNow-alustassa havaitusta virhekonfiguraatiosta, joka on altistanut organisaatioita tietovuodoille. Muina aiheina ovat Kyberturvallisuuskeskuksen tulevaisuuten keskittyvä teemakuukausi sekä Digi- ja väestötietoviraston Taisto-harjoitus.

Virheellinen oletuskonfiguraatio ServiceNow -alustalla mahdollistaa tietovuodon
ServiceNow ilmoitti noin viikko sitten tukisivustollaan, että alustan virheelliset konfiguraatiot voivat mahdollistaa arkaluonteisen tiedon vuotamisen. Kyseinen tietoturva-aukko on palvelua käyttäville organisaatioille kriittinen huolenaihe, sillä se voi johtaa arkaluonteisten yritystietojen merkittävään tietovuotoon. Kyberturvallisuuskeskuksella on tiedossa tapauksia, joissa tätä tietoturva-aukkoa on hyödynnetty.

Kriittinen etäkäytön mahdollistava haavoittuvuus Apache ActiveMQ tuotteessa
Apache on julkaissut korjaavan ohjelmistopäivityksen ActiveMQ tuotteesta löytyneeseen etäkäytön mahdollistavaan haavoittuvuuteen. Ylläpitäjiä suositellaan asentamaan korjaava ohjelmistopäivitys mahdollisimman pian.

Kriittinen haavoittuvuus Atlassian Confluence -tuotteissa - Hyväksikäyttöä havaittu
Atlassian Confluence Data Center ja Server tuotteiden paikallisesti asennetuissa versioissa on havaittu kriittinen virheelliseen valtuuttamiseen liittyvä haavoittuvuus. Atlassian suosittelee asentamaan päivitykset välittömästi tai rajoittamaan haavoittuvuuden hyväksikäyttömahdollisuuksia estämällä palvelun näkyvyys julkiseen verkkoon. Haavoittuvuutta on hyväksikäytetty.

Euroopan kyberturvallisuuskuukauden teemana on sosiaalinen manipulointi
Internetissä kohtaamamme henkilöt voivat olla myös aivan muuta kuin mitä he väittävät. Henkilöt ja henkilöllisyydet voivat olla tekaistuja, digitaalisin keinoin muunneltuja tai siellä voidaan esiintyä sinulle tuttuna henkilönä, vaikkapa äitinäsi. Meitä yritetään huijata sosiaalisen manipuloinnin keinoin. Se on Euroopan tietoturvakuukauden teema tänä vuonna. Esittelemme vinkkejä ja neuvoja, miten sinä voi suojautua sosiaaliselta manipuloinnilta.

Kyberturvallisuuskeskuksen viikkokatsaus - 43/2023
Tällä viikolla kertaamme Microsoft 365 -tilien tietomurtoaallon tilannetta, sekä kerromme tietomurtojen aallosta haavoittuvissa Ciscon verkkolaitteissa. Lisäksi muistutamme, että Tietoturva 2023 -seminaarin sekä Ketjutonttu-kampanjan tuloskatsauswebinaarin tallenteet ja aineistot ovat saatavilla verkkosivuillamme.

Tietoturva 2023 -seminaarissa katsottiin tietoturvan tulevaisuuteen
Tietoturva 2023 -seminaari pidettiin torstaina 12.10.2023 Helsingissä sekä verkossa. Seminaarin teemana oli tänä vuonna kyberturvallisuuden ja -uhkien tulevaisuus. Erityisesti tekoäly ja toimitusketjut nousivat puheeksi monessa eri puheenvuorossa.

Keltainen varoitus: Tietojenkalastelun seurauksena Microsoft 365 -tilien tietomurtoaalto
Rikolliset kalastelevat väärennetyillä sähköpostiviesteillä Microsoft 365 -ympäristön salasanoja. Tietojenkalastelulla saatujen käyttäjätunnusten ja salasanojen avulla rikollisten on mahdollista murtautua M365-tilille. Kalasteluviestejä ja uusia tilimurtoja on kuluvalla viikolla raportoitu kymmenistä suomalaisista organisaatioista. Kalastelukampanja leviää organisaatiosta toiseen hyödyntämällä murrettujen käyttäjätilien yhteystietolistoja.

Kyberturvallisuuskeskuksen viikkokatsaus - 42/2023
Tällä viikolla kerromme Microsoft 365 -tilien tietomurtoaallosta ja annamme ohjeita kotiverkon ja reitittimien suojaamiseen.

Tietomurtoaalto leviää organisaatiosta toiseen – katkaise tietojenkalastelu
Suomalaisten organisaatioiden sähköpostitilejä kaapataan laajalle levinneen tietojenkalastelukampanjan avulla. Rikolliset ovat kalastelleet yritysten työntekijöiden käyttäjätunnuksia ja salasanoja sähköpostitse ja huijaussivujen avulla, sekä kirjautuneet saamillaan tunnuksilla Microsoft 365 -sähköpostijärjestelmiin. Kaapattuja tilejä käytetään uusien tietojenkalasteluviestien lähettämiseen sekä sisäisesti että muihin organisaatioihin.

Kriittistä Citrix Netscaler ja ADC -haavoittuvuutta käytetty hyväksi
Citrix julkaisi 10.10.2023 päivityksen haavoittuvuuteen CVE-2023-4966, jota on hyväksikäytetty jo elokuusta asti. Organisaatioiden tulee päivittää tuote viimeistään nyt ja tarkastaa, ettei hyväksikäyttöä ole tapahtunut.

Miten ohjelmistokehityksen turvallisuutta voidaan kehittää? Tuore selvitys kartoitti ohjelmistokehityksen nykytilaa ja kehittämistarpeita
Mikä on ohjelmistokehityksen turvallisuuden taso Suomessa tänään? Miten turvallista ohjelmistokehitystä ja ohjelmiston hankintaa voidaan kehittää kansallisella tasolla? Muun muassa näitä kysymyksiä tarkastellaan Traficomin ja Huoltovarmuuskeskuksen tuoreessa selvityksessä.

Osaamisyhteisö ja yhteistyö kansallisen koordinointikeskuksen ensimmäisen toimintavuoden toiminnan keskiössä
Liikenne- ja viestintävirastossa sijaitsevaan Kyberturvallisuuskeskukseen perustettiin tämän vuoden alussa uusi Kyberturvallisuuden tutkimuksen, kehityksen ja innovaatioiden Suomen kansallinen koordinointikeskus (National Coordination Centre Finland, NCC-FI ), jonka tehtävänä on luoda edellytyksiä suomalaiselle kyberturvallisuustoimialalle, kuten yrityksille, korkeakouluille ja tutkimuslaitoksille osallistua kansainväliseen tutkimus- ja kehitystoimintaan. Ensimmäinen toimintavuotemme alkaa olemaan muutamaa kuukautta vaille valmis, joten on hyvä aika pysähtyä ja tehdä yleiskatsaus kansallisen koordinointikeskuksen työntäyteiseen vuoteen.

Cisco IOS XE ohjelmiston web-käyttöliittymässä käyttöoikeuksien laajentamisen mahdollistava haavoittuvuus
Cisco julkaisi tiedotteen haavoittuvuudesta CVE-2023-20198, joka vaikuttaa Cisco IOS XE -ohjelmiston web-käyttöliittymään. Hyökkääjä voi käyttää haavoittuvuutta hyväkseen saadakseen haavoittuvan laitteen hallintaansa. Päivitys 23.10.2023: Tiedotteeseen lisätty myös järjestelmätason pääsyn mahdollistava haavoittuvuus CVE-2023-20273. Osaan IOS XE -järjestelmäversioista on saatavilla korjaukset.

Kansallisen koordinointikeskuksen rahoitustuki kannustaa pk-yrityksiä kyberturvallisuuden vahvistamisessa
Kansallisen koordinointikeskuksen ensimmäinen rahoitustukihaku pk-yritysten kyberturvallisuusprojekteille päättyi 16.8.2023. Vastaa palautekyselyyn ja vaikuta seuraaviin rahoitustukihakuihin! Seuraava rahoitustukihaku pk-yrityksille järjestetään alkuvuodesta 2024.

Kyberturvallisuuskeskuksen viikkokatsaus - 41/2023
Tällä viikolla kerromme mm. Suomeen kohdistuneista palvelunestohyökkäyksistä, sekä Veron nimissä tapahtuvasta pankkitunnuskalastelusta.

Tietoturvan suunnannäyttäjä -tunnustus Keski-Uudenmaan koulutuskuntayhtymä Keudalle
Liikenne- ja viestintävirasto Traficomin jakaman Tietoturvan suunnannäyttäjä -tunnustuksen sai tänä vuonna Keski-Uudenmaan koulutuskuntayhtymä Keuda. Tunnustuksen perusteluissa Keudaa kiitettiin muun muassa avoimesta viestinnästä, sen jouduttua marraskuussa 2022 kiristyshaittaohjelmalla tehdyn verkkohyökkäyksen kohteeksi.

Syyskuun Kybersäässä sateisuutta aiheuttivat huijauspuhelut sekä palvelunestohyökkäykset
Syyskuu oli huijauspuhelujen sekä palvelunestohyökkäysten värittämä. Väärennetyistä numeroista soitettuja huijauspuheluja ilmoitettiin jopa ennätysmäärä ennen lokakuun alussa voimaantullutta Traficomin määräystä. Kuukauden valonpilkahduksena olivat vähentyneet ilmoitusmäärät tietomurroista, tietomurron yrityksistä ja tietovuodoista.

Kyberturvallisuuskeskuksen viikkokatsaus - 40/2023
Tällä viikolla kerromme täysimääräisesti voimaantulleesta Traficomin määräyksestä, joka on antanut teleoperaattoreille uudet velvoitteet soittajan puhelinnumeron väärentämisen estämiseksi. Muina aiheina ovat QR-koodipohjaiset kalasteluviestit, NIS2-direktiivin kansallisen toimeenpanon eteneminen sekä onnistunut Ketjutonttu-kampanja.

Atlassian Confluence -tuotteissa kriittinen haavoittuvuus
Atlassian Confluence Data Center ja Server tuotteissa on havaittu kriittinen käyttöoikeuksien korottamisen mahdollistava haavoittuvuus. Haavoittuvuutta on Atlassianin tietojen mukaan havaittu jo hyväksikäytettävän rajatun asiakasjoukon piirissä. Atlassian suosittelee asentamaan päivitykset välittömästi tai rajoittamaan haavoittuvuuden hyväksikäyttömahdollisuuksia rajaamalla palvelun näkyvyyttä julkiseen verkkoon.

Lokakuussa esittelemme tietoturvan tekijöitämme kyberilmiöiden takana - sarjan ensimmäinen video julkaistu!
Ehkä sinäkin olet joutunut joko tietämättäsi tai tietoisesti kyberhyökkäyksen kohteeksi. Ne ovat voineet näkyä outoina viesteinä, puheluina tai häiriöinä palveluiden saatavuudessa ja toimivuudessa. Traficomin Kyberturvallisuuskeskus selvittää ja torjuu kyberhäiriöitä yhteistyössä muiden viranomaisten ja organisaatioiden kanssa. Päätimme avata muutamia viimeaikaisia kybertapahtumia tietoturva-asiantuntijoiden silmin ja videon keinoin. Näillä videoilla haluamme valottaa, mitä kyberhäiriöt ovat ja miten tietoturva-asiantuntijat ottavat niistä niskalenkin, usein yhteistyössä muiden toimijoiden kanssa.

Kampanja tunnisti ja korjasi toimitusketjuihin liittyviä kyberriskejä
Traficomin Kyberturvallisuuskeskuksen Ketjutonttu-kampanja paransi suomalaisen yrityskentän tietoturvaa tunnistamalla ja korjaamalla riskejä niiden toimitusketjuissa. Huoltovarmuuskeskuksen Digitaalinen turvallisuus 2030 -ohjelmasta rahoitettuun kampanjaan osallistui 150 organisaatiota ja yritystä.

Traficomin määräys lopettaa suomalaisiksi naamioidut valepuhelut lähes kokonaan
Huijaussoittojen estämistä on taklattu viranomaisten ja teleoperaattorien tiiviillä yhteistyöllä. Lokakuun alussa voimaan tulleella Traficomin määräyksellä teleoperaattorit velvoitetaan torjumaan yhä paremmin ulkomailta tulevia, mutta suomalaisiksi naamioituja puheluita, myös mobiilinumeroiden osalta. Soittojen suodatus on nyt käytössä kaikilla suomalaisilla, ulkomailta liikennettä vastaanottavilla teleoperaattoreilla. Työ puhelinnumeroita käyttävien huijausten estämiseksi jatkuu - Traficomissa on valmisteilla määräys, jonka avulla torjutaan tekstiviestihuijauksia.

Exim julkaisi korjauksia useisiin vakaviin haavoittuvuuksiin
Exim sähköpostin välitysohjelmistossa (Mail transfer agent - MTA) raportoitiin kuusi kappaletta nollapäivähaavoittuvuuksia Zero Day Initiative (ZDI) julkaisemana 27.9.2023. Tuolloin ohjelmiston kehittäjät eivät olleet vielä julkaisseet haavoittuvuuksiin liittyen mitään tiedotetta tai tarkempia tietoa haavoittuvuuksista eikä niiden hyväksikäytön estämisestä. 1.10.2023 Exim julkaisi tiedotteen haavoittuvuuksista sivuillaan, jossa kerrottiin aikataulu korjausten julkaisulle 2.10.2023 klo 15:00 sekä hyväksikäytön rajoituskeinoja.

Kyberturvallisuuskeskuksen viikkokatsaus - 39/2023
Tällä viikolla pankkiasiakkaita on yritetty huijata tuhansilla kalasteluviesteillä. Huijausviestien tarkoituksena on saada asiakkaita syöttämään pankkitunnuksensa huijarien tekemille valesivuille. Lisäksi annamme arvokkaita toimintaohjeita pilviympäristön poikkeamanhallintaan.

Vakava haavoittuvuus libwebp-kirjastossa
Google on julkaissut haavoittuvuuden (CVE-2023-4863) libwebp-ohjelmistokirjastossa. Haavoittuvuus mahdollistaa mielivaltaisen koodin suorittamisen käyttäjän tietokoneessa, jos haavoittuvaa kirjastoa käyttävällä selaimella lataa haitallisen verkkosivun. Google on arvioinut haavoittuvuuden vakavuudeksi (CVSS) täydet 10 pistettä.

Kyberturvallisuuskeskuksen viikkokatsaus - 38/2023
Tällä viikolla kerromme muun muassa haktivismista ja palvelunestohyökkäyksistä informaatiovaikuttamisen keinona. Lisäksi mukana on tietoa Ketjutonttu-kampanjan tulevasta tuloskatsauswebinaarista.

Useita haavoittuvuuksia Applen tuotteissa
Useissa Applen tuotteissa sekä Safari verkkoselaimessa on korjattu kriittisiä haavoittuvuuksia. Haavoittuvuudet korjaavat päivitykset on suositeltavaa asentaa välittömästi, sillä haavoittuvuuksien hyväksikäyttöä on jo havaittu maailmalla.

Kyberturvallisuuskeskuksen viikkokatsaus - 37/2023
Tällä viikolla kerromme aktiivisesta huijauspuhelukampanjasta, josta olemme saaneet lukuisia ilmoituksia kansalaisilta ja organisaatioista. Kerromme myös kiristyshaittaohjelmista ja kuntasektorille suunnatusta HYÖKY-palvelusta.

Tietomurrot ja tietojenkalastelu tekivät elokuun kybersäästä myrskyisän
Elokuussa kybersää oli jo syksyisen sateinen. Tietojenkalastelu oli hyvin vilkasta, ja Citrix Netscaler -haavoittuvuus johti useisiin tietomurtoihin Suomessa. Haavoittuvuuden hyödyntäminen vaikutti olleen nopeaa ja automatisoitua. Päivitykset olisikin hyvä asentaa mahdollisimman nopeasti aina kun niitä tarjotaan.

Traficomin Kyberturvallisuuskeskus tukee kuntien kyberturvallisuuden parantamista
Kunnilla on keskeinen rooli ja tehtävä erilaisten julkisten palveluiden tuottamisessa. Kuntien tietoverkoissa käsitellään ja hallinnoidaan suurta määrää erilaista tietoa. Mitä enemmän yhteiskunnan palvelut digitalisoituvat, sitä tärkeämpää on kiinnittää huomiota sähköisten palveluiden, tietoverkkojen ja -varantojen kyberturvallisuuteen. Tärkein tietoturvateko on tiedostaa, mikä on organisaation nykyinen tietoturvallisuuden taso. Mitä tulisi kehittää? Tämän jälkeen pitäisi myös viedä läpi tarvittavat kehitystoimet.

Kyberturvallisuuskeskuksen viikkokatsaus - 36/2023
Tällä viikolla Traficom sai osansa palvelunestohyökkäyksistä, mikä aiheutti palveluiden toimintaan lyhyen katkon. Kerromme myös Postin nimissä lähetetyistä huijausviesteistä.

Syyskuun teemakuukausi: Tietoturvailmiöt tutuksi
Loppuvuoden aikana Kyberturvallisuuskeskuksessa vietetään teemakuukausia. Teemakuukausien sarjan käynnistää syyskuussa Tietoturvailmiöt tutuksi -teemakuukausi, jonka aikana tarjoamme arvokasta tietoa yleisimmistä tietoturvauhkista ja siitä, miten voit suojata itsesi verkossa. Jatka lukemista ja ota ensimmäinen askel kohti turvallisempaa digitaalista elämää!

Miten pyydän tietojeni poistamista Yango-taksipalvelulta?
Oletko käyttänyt Yango-taksipalvelua ja toivot että Yango poistaisi palvelimiltaan itsestäsi kertyneet tiedot? Tiesitkö, että voit pyytää tietojen poistoa suoraan Yangolta EU:n tietosuoja-asetuksen (ns. GDPR) nojalla.

Kyberturvallisuuskeskuksen viikkokatsaus - 35/2023
Tällä viikolla muistutamme nopean reagoinnin tärkeydestä tietoturvapoikkeamatilanteessa. Esimerkiksi tietojenkalasteluun langetessa vakavat vahingot on vielä mahdollista estää nopeilla toimilla. Kerromme myös romanssipetoksista ja varoitamme veronpalautusaiheisista huijauksista.

Kriittisiä haavoittuvuuksia VMware Aria Operations for Networks -ohjelmistossa
VMware on julkaissut päivityksen, joka korjaa kaksi kriittistä haavoittuvuutta Aria Operations for Networks -ohjelmassa. Haavoittuvuuksien ansiosta hyökkääjät voivat ohittaa todennuksen ja saada koodin etäsuorittamisen korjaamattomissa laitteissa.

Kyberturvallisuuskeskuksen viikkokatsaus - 34/2023
Aggressiivinen tunnusten kalastelu piinaa sähköpostin käyttäjiä. Olkaa valppaina! Hälytyskellojen pitäisi soida, jos turvaposti-linkin takana kysellään erikseen käyttäjätunnusta ja salasanaa.

Kriittinen haavoittuvuus Juniperin Junos OS-järjestelmää käyttävissä SRX- ja EX-sarjan laitteissa
Juniper on julkaissut normaalista päivitystahdista poikkeavan turvallisuuspäivityksen SRX- ja EX-sarjan laitteilleen. Päivitys korjaa mainituilla laitteilla Junos OS-järjestelmässä havaitun ongelman, jossa neljää eri haavoittuvuutta ketjuttamalla hyökkääjä voi suorittaa laitteella verkon yli mielivaltaista koodia ilman kirjautumista. Päivitys on syytä suorittaa välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 33/2023
Kuluvan kesän aikana on tullut julki useita kriittisiä ohjelmistohaavoittuvuuksia. Onhan organisaatiossasi huolehdittu järjestelmien päivittämisestä myös lomien aikana?

Kyberturvallisuuskeskuksen viikkokatsaus - 32/2023
Viime aikoina huijaussivustoja on rekisteröity myös Suomen kansalliseen .fi-verkkotunnukseen. Sivustoilla pyritään .fi-verkkotunnuksen mainetta hyväksikäyttämällä kalastelemaan ihmisten verkkopankkitunnuksia.

Heinäkuun kybersäässä haavoittuvuudet aiheuttivat sateisuutta
Kyberrikolliset eivät lomaile, joten heinäkuussakin nähtiin monenlaisia tapahtumia tietoturvan maailmassa. Esimerkiksi viime kuun aikana julkaistiin useita kriittisiä haavoittuvuuksia. Myös pankkitunnuksia kalasteltiin ahkerasti suomi.fi-viranomaispalvelun sekä pankkien nimissä.

Kyberturvallisuuskeskuksen viikkokatsaus - 31/2023
Huijausviestejä on viime viikkoina ollut liikkeellä mm. Suomi.fi-palvelun ja Osuuspankin nimissä. Myös turvapostiksi naamioitujen sähköpostiviestien kanssa kannattaa olla tarkkana.

Uusi työkalu helpottaa kyberharjoituksen suunnittelua
Olitpa suunnittelemassa kyberharjoitusta ensimmäistä kertaa tai jo harjoittelun konkari, Kyberturvallisuuskeskuksen uusi harjoituksen suunnittelun työkalu auttaa muotoilemaan organisaatiollenne tarkoituksenmukaisen ja toimivan kyberharjoituksen.

Kyberturvallisuuskeskuksen viikkokatsaus - 30/2023
Tällä viikolla kerromme Kyberturvallisuuskeskuksen ajankohtaisten ohjelmistohaavoittuvuuksien kartoitustyöstä ja edelleen aktiivisista sosiaalisen median tilimurroista.

Useita kriittisiä haavoittuvuuksia Applen tuotteissa
Useissa Applen tuotteissa sekä Safari verkkoselaimessa on korjattu kriittisiä haavoittuvuuksia. Haavoittuvuudet korjaavat päivitykset on suositeltavaa asentaa välittömästi, sillä haavoittuvuuksien hyväksikäyttöä on jo havaittu maailmalla.

Kriittinen haavoittuvuus Ivanti Endpoint Manager Mobile (MobileIron Core) -tuotteessa
Ivanti on julkaissut Endpoint Manager Mobile -tuotteeseen päivityksiä, joilla korjataan kriittinen haavoittuvuus (CVE-2023-35078). Haavoittuvuutta hyväksikäyttämällä hyökkääjä voi päästä käsiksi järjestelmässä oleviin tietoihin ja tehdä joitakin muutoksia järjestelmään. Haavoittuvuuden hyväksikäyttöä on jo havaittu. Ivanti suosittelee järjestelmän päivittämistä välittömästi.

Kyberturvallisuuskeskuksen viikkokatsaus - 29/2023
Tällä viikolla kerromme USB-tikkujen avulla levitettävistä haittaohjelmista ja lisäksi kesäkuun Kybersäästä, annamme vinkkejä puhelimen tietoturvalliseen käyttöön sekä tietoturvalliseen kesään.

Kyberrikolliset eivät lomaile - Vinkit tietoturvalliseen kesään
Kesä on monelle meistä rentoutumisen ja henkisten akkujen lataamisen aikaa. Kun hyvät tietoturvataidot ovat osa arkisia rutiineja, ei kesäiltoja tarvitse käyttää salasanoista ja päivityksistä huolehtimiseen.

Kriittinen haavoittuvuus Citrix Netscaler Gateway ja ADC -ohjelmistoissa
Citrix on julkaissut tietoturvapäivityksiä korjatakseen yhden kriittisen (CVE-2023-3519) ja kaksi vakavaa haavoittuvuutta Citrix Netscaler ADC - ja Gateway -tuotteissaan. Citrix kehottaa kyseisten tuotteiden järjestelmänvalvojia päivittämään tuotteiden ohjelmistoversiot uusimpiin versioihin viipymättä. Haavoittuvuuksien hyväksikäyttöä on jo havaittu.

Kyberturvallisuuskeskuksen viikkokatsaus - 28/2023
Tällä viikolla kerromme kyberturvallisuustilanteesta Nato-huippukokousviikolla ja siitä, miten haittaohjelmatartunnat ovat yhä yleisempiä.

Kesäkuun kybersäässä nähtiin kesäsateita usealla rintamalla
Kesäkuun kybersää oli sateinen. Ilmoitukset sometilien murroista ovat jatkuneet korkealla tasolla. Tietojenkalastelussa käytetään yhä useammin hyväksi QR-koodien taakse laitettuja tietojenkalastelusivuja. Valonpilkahduksiakin kuitenkin mahtui joukkoon esimerkiksi pk-yrityksille suunnatun rahoitushaun auettua.

Haittaohjelmatartunnat ovat yhä yleisempiä
Haittaohjelmia ovat esimerkiksi erilaiset madot, virukset, sekä vakoilu- ja kiristysohjelmat. Rikolliset keksivät jatkuvasti uusia tapoja tartuttaa laitteita haittaohjelmilla ja kätkeä niiden haitallisuus. Haittaohjelmaa voi olla vaikea havaita, ennen kuin tartunta on jo tapahtunut.

Kyberturvallisuuskeskuksen viikkokatsaus - 27/2023
Tällä viikolla kerromme tietojenkalastelun tuoreesta ilmiöstä, jossa QR-koodia käytetään kalastelun toteutuksessa. Lue myös, miten rikolliset hyödyntävät elektronista SIM-korttia huijauksissaan.

QR-koodin käyttö tietojenkalastelussa yleistyy
QR-koodien käyttö lisääntyi koronapandemian aikana, kun esimerkiksi monet ravintolat ja yritykset pyrkivät vähentämään kontakteja. Samalla QR-koodien käyttö on yleistynyt myös huijauksissa.

Elektroninen SIM tarjoaa uuden hyökkäysvektorin rikollisille
SIM-kortin vaihtaminen puhelimesta toiseen on helppoa ja mutkatonta. Valitettavasti myös rikolliset osaavat hyödyntää tätä ominaisuutta.

Kyberturvallisuuskeskuksen viikkokatsaus - 26/2023
Toimitusjohtajahuijaukset aktivoituvat erityisesti kesällä. Microsoft 365 -tilejä on murrettu aktiivisesti viime kuukausina. Kirjoitimme uuden ohjeen, jotta tilin turvaaminen olisi entistäkin helpompaa.

Kriittinen haavoittuvuus FortiNAC -tuotteessa
Fortinetin on julkaissut FortiNAC -tuotteeseen päivityksen, jotka korjaavat kriittiseksi luokitellun haavoittuvuuden. Haavoittuvuutta hyväksikäyttämällä hyökkääjä voi suorittaa mielivaltaisia komentoja tai koodia tcp/1050 palveluun erityisesti muodostetun pyynnön kautta. Fortinet suosittelee päivittämään haavoittuvat tuotteet pikaisesti.

Kyberturvallisuuskeskuksen viikkokatsaus - 25/2023
Tietojenkalastelu- ja huijausviestit kehittyvät jatkuvasti. Arviomme mukaan noin sadan organisaation sähköpostitilejä on murrettu onnistuneesti lähikuukausien aikana. Tällä viikolla muistutamme myös verkkolaitteiden päivittämisen tärkeydestä.

Tietojenkalastelu- ja huijausviestien kanssa tulee olla yhä tarkempi
Tietojenkalastelu- ja huijausviestit kehittyvät jatkuvasti. Erilaiset teknologiat, kuten koneoppiminen ja tekoäly sekä psykologiset keinot auttavat rikollisia pyrkimyksissään voittaa uhrin luottamus. Kalastelukampanjat tuottavatkin jatkuvasti tulosta rikollisille ja Kyberturvallisuuskeskuksen arvion mukaan noin sadan organisaation sähköpostitilejä on murrettu onnistuneesti lähikuukausien aikana.

Zyxel korjasi kriittisen haavoittuvuuden verkkolevyasemissaan (NAS)
Verkkolaitevalmistaja Zyxel julkaisi korjaavat päivitykset kriittisiin haavoihin verkkolevyasemissa (NAS). Kyberturvallisuuskeskus suosittelee omistajia päivittämään kyseiset laitteet välittömästi.

Rahoitustukihaku pk-yrityksille modernien kyberturvallisuusratkaisujen käyttöönottoon on avattu
Kyberturvallisuuskeskuksen Kansallinen koordinointikeskus (NCC-FI) on avannut ensimmäisen rahoitustukihakunsa modernien kyberturvallisuusratkaisujen ja -innovaatioiden käyttöönottoon pk-yrityksissä. Rahoitustuella vahvistetaan ensisijaisesti pk-yritysten omia valmiuksia sekä Suomen kansallista kapasiteettia ja infrastruktuuria kyberhyökkäyksiltä suojautumiseen. Tukea voivat hakea Suomeen rekisteröidyt pienet ja keskisuuret yritykset. Haku on auki 16.6.–16.8.2023 klo 16:15.

Kyberturvallisuuskeskuksen viikkokatsaus - 24/2023
Tällä viikolla kerromme kiristyshaittaohjelmien kehittyvistä trendeistä ja muistutamme kyberturvallisuuden huomioimisesta myös alkaneella lomakaudella. Yhä useammin kiristyshaittaohjelmat kohdistuvat palautumisen mahdollistaviin varmuuskopioihin, ja tietojen salaamisen lisäksi hyökkääjät kiristävät varastetun tiedon julkaisulla.

Kyberturvallisuuskeskus CVE-tunnisteita jakavaksi CNA-toimijaksi
Kyberturvallisuuskeskus on hyväksytty haavoittuvuuksille CVE (Common Vulnerabilities and Exposures) -tunnisteita jakavaksi CNA-toimijaksi (CVE Numbering Authority).

Kriittinen haavoittuvuus Fortinetin FortiOS ja FortiProxy -ohjelmistoissa
Fortinetin FG-IR-23-097 päivitys korjaa kriittisen haavoittuvuuden FortiOS ja FortiProxy -ohjelmistojen SSL-VPN -komponentissa. Muistin käsittelyyn liittyvää kriittistä haavoittuvuutta hyväksikäyttämällä hyökkääjä voi suorittaa mielivaltaisia komentoja kohdelaitteella. Fortinet suosittelee päivittämään haavoittuvat ohjelmistot pikaisesti.

Kyberturvallisuuskeskuksen viikkokatsaus - 23/2023
Kesäkuun toisessa viikkokatsauksessa kerromme ikäviä uutisia väärennetyistä puhelinnumeroista, saastutetuista verkkopeleistä ja rikotuista palomuureista. Onneksi hyviäkin asioita tapahtuu: Keskusrikospoliisi ja Lounais-Suomen poliisilaitos ovat saaneet valmiiksi verkkopankkipetoksiin liittyvän esitutkinnan.

Toukokuun kybersäässä sosiaalisen median tilimurrot aiheuttivat salamointia
Toukokuun kybersää oli huijauspuhelujen ja erilaisten haavoittuvuuksien myötä sateinen. Myös myrskyä oli ilmassa, kun ilmoitusmäärät sosiaalisen median tilien murroista kasvoivat merkittävästi. Toukokuun kybersään pitkän aikavälin tarkastelussa on vuorossa puolijohdepula.

Post-Quantum Crypto -aikaan valmistautuminen on käynnissä myös Suomessa
Yhdysvaltalainen matemaatikko Peter Shor esitti vuonna 1994 kvanttitietokoneille algoritmin, jolla voidaan tehokkaasti jakaa isoja kokonaislukuja tekijöihinsä. Kvanttitietokoneiden kehitys on kovassa vauhdissa ja kun riittävän tehokas kvanttitietokone saadaan rakennettua, voidaan Shorin algoritmia käyttäen murtaa nykyiset julkisen avaimen salausalgoritmit, jotka ovat välttämättömiä mm. internetin turvalliselle toiminnalle.

Kyberturvallisuuskeskuksen viikkokatsaus - 22/2023
Tällä viikolla kerromme eri pankkien nimissä tapahtuvasta kalastelusta sekä sähköpostien mukana leviävistä haittaohjelmista. Muistutamme myös, mitä on hyvä ottaa huomioon, kun lapsi saa ensimmäisen älylaitteensa.

VISA OTP palvelinten päivitys ke 31.5. klo 9:30-16


Kybermittarista apua kyberturvallisuusriskien hahmottamiseen
Kybermittarin uutta versiota on kehitetty käyttäjiltä saadun palautteen perusteella. Kybermittarin uusi versio sekä uudet tukimateriaalit ovat saatavilla Kyberturvallisuuskeskuksen verkkosivuilla. Ilmoittaudu kesän ja syksyn esittely- ja koulutustapahtumiin!

Kyberturvallisuuskeskuksen viikkokatsaus - 21/2023
Tällä viikolla kerromme Facebookissa laajalle levinneestä huijauksesta, jossa tilejä kaapataan tekaistun rahapalkinnon verukkeella. Muina aiheina ovat uudet ylätason verkkopäätetunnukset ja Kyberturvallisuuskeskuksen asiantuntijat Disobey hakkeritapahtumassa.

Kriittinen haavoittuvuus GitLabin Community Edition ja Enterprise Edition tuotteissa
GitLab on julkaissut päivityksen Community Edition (CE) ja Enterprise Edition (EE) tuotteissa olevaan kriittiseen haavoittuvuuteen. Korjaava versiopäivitys kannattaa asentaa mahdollisimman pian.

Kriittisiä haavoittuvuuksia Zyxelin palomuurituotteissa - Hyväksikäytöstä viitteitä
Zyxel on julkaissut korjauspäivitykset kahteen kriittiseen haavoittuvuuteen. Haavoittuvuudet koskevat useita Zyxelin palomuurituoteperheitä. Korjaavat päivitykset kannattaa asentaa haavoittuviin tuotteisiin mahdollisimman pian.

Kyberturvallisuuskeskuksen viikkokatsaus - 20/2023
Tällä viikolla kerromme palvelunestohyökkäystilanteesta ja neuvomme teollisuusorganisaatioita suojautumaan kyberpoikkeamilta. Huoltovarmuuskeskus on julkaissut oppaan pilvipalveluihin liittyen.

Teollisuuden järjestelmätoimittajaan kohdistunut tietomurto edellyttää myös sen asiakkailta ripeitä toimenpiteitä
Organisaatioiden varautumisen tulee kattaa myös toimittajiin kohdistuvat poikkeamat. Pahimmillaan tärkeä toimittaja voi joutua kyberhyökkäyksen uhriksi, mikä vaatii pikaisia toimia myös asiakasorganisaatiossa.

Kyberturvallisuuskeskuksen viikkokatsaus - 19/2023
Tällä viikolla kerromme turvapostiteemaisista kalasteluviesteistä ja vahvan sähköisen tunnistuksen uusista vaatimuksista. Tutustu myös huhtikuun kybersäähän ja päivitystiistain mukanaan tuomiin korjauspäivityksiin.

Sähköpostikalastelut ja huijauspuhelut toivat huhtikuun kybersäähän epävakautta
Huhtikuussa kybersäässä havaittiin sekä keväisiä auringon pilkahduksia että perinteisiä sateitakin. Sähköpostikalastelut ja huijauspuhelut toivat kybersäähän epävakautta, kun taas esimerkiksi haittaohjelmien osalta mennyt kuukausi oli edellistä valoisampi ilmoitusmäärän ollessa hieman pienempi kuin maaliskuussa. Tässä kybersäässä ovat mukana myös neljä kertaa vuodessa päivitettävät TOP5-uhat.

Vahvan sähköisen tunnistuksen uudet vaatimukset tekevät asioinnista entistä turvallisempaa
Liikenne- ja viestintäviraston määräys koskien vahvaa sähköistä tunnistusta ja luottamuspalveluita astuu täysimääräisinä voimaan kesäkuussa 2023. Uudessa määräyksessä on kaksi tärkeää kohtaa, jotka tekevät sähköisestä asioinnista entistä turvallisempaa.

Vahva sähköinen tunnistus uudistuu - tietoa asiointipalveluille
Liikenne- ja viestintäviraston määräys M72B koskien vahvaa sähköistä tunnistusta ja luottamuspalveluita astuu voimaan täysimääräisenä kesällä 2023. Uudistetussa määräyksessä on vaatimuksia, jotka heijastuvat myös asiointipalvelutoteutuksiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 18/2023
Tällä viikolla kerromme suomalaisesta huippukyberosaamisesta ja yhteistyöstä, joka pääsi lavalle eräässä maailman suurimmista tietoturvatapahtumista. Kokosimme yhteen myös ajankohtaiset huijaukset ja kalastelut.

Turvapostiteemaiset kalasteluviestit johtavat sähköpostitilimurtoihin
Kyberturvallisuuskeskus on vastaanottanut alkuvuonna merkittävän määrän ilmoituksia turvapostiteemaisista kalasteluviesteistä. Uusi kampanja käynnistyi aktiivisena huhtikuun puolivälissä ja murrettuja sähköpostitilejä on havaittu Kyberturvallisuuskeskuksen tilastojen mukaan 20:ssa eri organisaatiossa. Turvapostiteemaisia kalasteluviestejä on lähetetty Suomessa huhtikuussa Kyberturvallisuuskeskuksen arvion mukaan viisinumeroinen määrä. Monivaiheisen tunnistautumisen käyttöönotto on edelleen tehokas keino tilimurtojen estämiseen.

Kyberturvallisuuskeskuksen viikkokatsaus - 17/2023
Tällä viikolla kerromme teknisen tuen huijauspuheluista ja suomi.fi-palvelun nimissä lähetetyistä kalasteluviesteistä.

Haavoittuvuuksien ilmoittamista helpottavaa käytäntöä ei vielä täysin hyödynnetä Suomessa
Miten saan tiedon, kun joku löytää haavoittuvuuden organisaationi verkkopalvelusta? Entä kuinka tiedän, kenelle ja miten ilmoitan löytämästäni haavoittuvuudesta? Kuinka organisaationi voi sopia haavoittuvuuden löytäjän kanssa yhteisistä pelisäännöistä, kun emme edes tunne toisiamme? Avuksi on ehdotettu käytäntöä, jossa yhteystiedot ja pelisäännöt julkaistaisiin aina samassa paikassa. Kyberturvallisuuskeskukselle tehdyssä opinnäytetyössä tutkittiin kyseistä käytäntöä. Artikkelissa on myös tutkimuksen tulosten valossa laadittuja neuvoja käyttöönottoon.

Kyberturvallisuuden uhkataso pysynyt kohonneena - kohdistettujen hyökkäysten määrä noussut
Suomalaisiin organisaatioihin kohdistuu nyt jatkuvasti kasvavaa kiinnostusta. Kyberhyökkäysten luonne on muuttunut. Erityisesti kohdistettujen kyberhyökkäysten määrä, joissa kohdeorganisaatio on tarkkaan valittu, on kasvanut. Tapausmäärän kasvusta huolimatta Traficom ja Suojelupoliisi pitävät yhteiskuntaa lamauttavaa kyberhyökkäystä epätodennäköisenä.

Kyberturvallisuuskeskuksen viikkokatsaus - 16/2023
Tällä viikolla kerromme aktiivisesta turvapostiteemaisesta kalastelukampanjasta ja kyberuhkatason noususta Euroopassa.

Selvitämme ohjelmistoturvallisuuden tilaa - vastaa kyselyyn
Kyberturvallisuuskeskus kartoittaa ohjelmistoturvallisuuden tilaa Suomessa. Nykytilanteen kartoittamisen lisäksi toivomme tietoa kipukohteista ja hyvistä käytännöistä, joilla voisimme tukea yrityksiä ja muita organisaatioita.

Kyberturvallisuuskeskuksen viikkokatsaus - 15/2023
Tällä viikolla kerromme mm. sosiaalisen median tilien tietomurroista sekä Microsoftin M365-käyttäjätilien tunnusten kalasteluista. Päivitystiistai toi mukanaan paljon päivityksiä - muistathan päivittää laitteesi!

Tietomurtojen ja huijausten määrät tekivät maaliskuun kybersäästä sateisen
Maaliskuun kybersää oli helmikuuta sateisempi. Tietomurtoilmoitusten noussut määrä ja alkukuun runsaat vuokranmaksuhuijausviestit toivat ilmaan pieniä myrskyn merkkejä. Vuoden alussa uudistuneessa kybersäässä on tässä kuussa mukana vuoden ensimmäisen kvartaalin päivitetyt tilastot huijausten, palvelunestohyökkäysten sekä Autoreporterin osalta.

Kriittisiä haavoittuvuuksia Applen tuotteissa - päivitä heti
Uusia ja kriittisiä päivityksiä Applen iOS, macOS Ventura, macOS Monterey, macOS Big sur ja iPadOS-laitteissa, sekä Safari verkkoselaimessa. Päivitykset tulee asentaa välittömästi, sillä hyväksikäyttöä on havaittu maailmalla.

Kyberturvallisuuskeskuksen viikkokatsaus - 14/2023
Tällä viikolla kerromme suomalaisten puhelinnumeroiden väärentämisestä. Muistutamme myös, että palvelunestohyökkäyksistä ei kannata huolestua, sillä niiden vaikutukset jäävät usein vähäisiksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 13/2023
Tällä viikolla kerromme Hack and Leak -ilmiöstä sekä 3CXDesktopApp-videoneuvotteluohjelmistoon kohdistuneesta toimitusketjuhyökkäyksestä.

Toimitusketjuhyökkäys 3CXDesktopApp-videoneuvotteluohjelmistoon
Tietoturvayhtiöiden havaintojen mukaan maailmalla laajasti käytetyn 3CXDesktopApp-videoneuvotteluohjelman asennuspakettiin on ujutettu haitallista koodia, joka asentuu laitteelle ohjelmiston päivityksen tai asennuksen yhteydessä. Haitalliset ohjelmaversiot ovat Windows 3CX Desktop App 18.12.407 ja 18.12.416 sekä Mac 3CX Desktop App 18.11.1213, 18.12.402, 18.12.407 ja 18.12.416. Haitallisia versiopäivityksiä on ollut saatavilla maaliskuun 2023 aikana.

Hack and Leak -ilmiö yhdistää kyber- ja informaatiovaikuttamisen
Hack and Leak -ilmiöissä on kyse tapauksista, joissa hyökkääjän pyrkimyksenä on toteuttaa kohteelleen tietomurto ja tämän jälkeen varastaa ja hyödyntää uhrille kriittistä tietoa. Voidaan puhua niin sanotusta hybridihyökkäyksestä.

Varo, varmista, varoita -kampanja: Digihuijausten määrä kasvoi selvästi vuoden 2022 jälkipuoliskolla
Vuonna 2022 suomalaiset menettivät digihuijauksissa rikollisille yhteensä 32,4 miljoonaa euroa. Varo, varmista, varoita -kampanja muistuttaa, että huijauksia on mahdollista välttää.

Kyberturvallisuuskeskuksen viikkokatsaus - 12/2023
Tällä viikolla kerromme Postin nimissä lähetetyistä tekstiviesteistä, joiden avulla kalastellaan pankkitietoja sekä siitä, miten yritykset voivat parantaa M365-järjestelmiensä tietoturvaa.

Useita kriittisiä haavoittuvuuksia Samsung Exynos -piirisarjassa
Samsung Exynos -piirisarjassa olevassa baseband -komponentissa on havaittu neljä kriittistä haavoittuvuutta. Haavoittuvuuksien hyväksikäyttö mahdollistaa pahimmillaan komentojen suorittamisen etänä kohdelaitteeseen. Samsung on julkaissut korjaavan päivityksen, mutta sen saatavuus vaihtelee laitekohtaisesti.

Kyberturvallisuuskeskuksen viikkokatsaus – 11/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 10.3. - 16.3.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kriittinen haavoittuvuus Microsoft Outlookissa
Microsoft tiedotti Outlookin vakavasta haavoittuvuudesta, jonka avulla on mahdollista korottaa käyttöoikeuksia. Haavoittuvuus mahdollistaa NTLM Relay -hyökkäyksen. Haavoittuvuutta hyödynnetään lähettämällä tietynlainen sähköpostiviesti Outlook-ohjelmaan. Hyökkäys aktivoituu sähköpostiviestin saapuessa Outlook-ohjelmaan jo ennen sähköpostiviestin avaamista tai sen esikatselua.

Tietoturvan kehittämisen tuen hakijoiden joukossa eri kokoisia ja eri toimialoja edustavia yhteiskunnan kannalta kriittisiä yrityksiä
Tietoturvan kehittämisen tukea on myönnetty noin 1,8 miljoonaa euroa ja 77 yritykselle. Tukea saaneiden joukossa on monen kokoisia ja eri toimialoja edustavia yrityksiä. Kaiken kaikkiaan 86 yrityksen tukihakemuset on käsitelty. Hakemuksia on tullut tähän mennessä 656. Tukea myönnetään niin kauan kuin tuen myöntämiseksi varattu 6 miljoonan euron määräraha riittää.

Kyberturvallisuuskeskuksen viikkokatsaus - 10/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 3.3. - 9.3.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Helmikuun kybersäähän vakoilu toi myrskyn merkkejä
Helmikuun kybersäähän mahtui niin aurinkoa, sadetta kuin myrskyäkin. Myrskyn merkkejä havaittiin vakoilupuolella. Aurinko paistoi varsinkin automaation ja IoT:n maailmassa, johon sijoittuu myös helmikuussa julkaistu uusi ohje teollisuusautomaation kyberturvallisuuskontrolleihin liittyen.

Kriittinen haavoittuvuus Fortinetin FortiOS-käyttöjärjestelmässä
Fortinet julkaisi FortiOS-ohjelmistoon päivityspaketit, jotka korjaavat kriittiseksi luokitellun haavoittuvuuden.

Kyberturvallisuuskeskuksen viikkokatsaus - 9/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 24.2. - 2.3.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 8/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 17. - 23.2.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 7/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 10. - 16.2.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Sosiaali- ja terveydenhuoltoalalla kyberturvallisuutta parannetaan monessa verkostossa
Sote-alan toiminnan jatkuvuus riippuu entistä enemmän kyberturvallisuudesta. Suomessa ja maailmalla alan kyberturvallisuuden parantamiseksi tehdään yhteistyötä monella rintamalla. Kyberturvallisuuskeskus on mukana useissa verkostoissa, joista osaa se fasilitoi itse ja osaan osallistuu kutsuttuna. Suuri osa yhteistyöstä tapahtuu vapaaehtoisissa yhteenliittymissä.

Apple julkaisi korjaavan päivityksen kriittiseen haavoittuvuuteen tuotteissaan
Applen korjaamat haavoittuvuudet koskevat useita Applen laitteita sekä Safari-selainta. Applen julkaisemat päivitykset on syytä asentaa laitteille heti.

Käyttökatkot verkkopalveluissa ovat yleisiä ja usein vaarattomia
Palvelunestohyökkäykset organisaatioiden verkkosivuja ja -palveluja kohtaan ovat yleisiä. Käytännössä hyökkäyksiä tapahtuu koko ajan, kaikkialla. Niihin myös varaudutaan ja niitä torjutaan päivittäin. Sinulle palvelunestohyökkäys näkyy siten, että esimerkiksi pankin tai terveydenhuollon verkkosivu ei ole käytössä. Myös huoltokatkokset tai muut häiriöt voivat aiheuttaa katkoksia verkkosivulla.

Uudessa ohjeessa tietoa paikallisiin matkaviestinverkkoihin liittyvistä kyberuhkista ja riskienhallinasta
Millaisia kyberuhkia ja riskejä paikallisiin matkaviestinverkkoihin liittyy? Mitä verkkoja rakennettaessa pitää ottaa huomioon? Uudesta ohjeesta tietoa paikallisia matkaviestinverkkoja harkitseville organisaatioille.

Kyberturvallisuuskeskuksen viikkokatsaus - 6/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 3. - 9.2.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Tammikuun uudistettu Kybersää julkaistu
Kybersää uudistui vuodelle 2023. Mukana on päivitetyn ilmeen lisäksi niin uutta kuin vanhaa tuttua sisältöä. Tuote on suunnattu organisaatioille. Kybersään tavoitteena on kertoa kybermaailman tapahtumista mahdollisimman ymmärrettävästi ja entistä tiiviimmässä paketissa. Kybersää täydentää Viikkokatsausta ja koostaa kuukauden keskeiset tapaukset yhteen.

Eurooppalaisen Galileo-satelliittipaikannusjärjestelmän tarkkuuspalvelu on nyt käytössä
Galileon tarkkuuspalvelu on kaikille avoin ja sen käyttö on maksutonta. Uuden palvelun hyödyntämismahdollisuuksia löytyy esimerkiksi maa- ja metsätaloudesta.

Kyberturvallisuuskeskuksen viikkokatsaus - 5/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 27.1. - 2.2.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuden tutkimus- ja kehitystoimintaan vahvistusta Suomessa ja Euroopassa - EU:n kyberturvallisuuden osaamiskeskuksen Suomen kansallinen koordinointikeskus aloitti toimintansa
Euroopan kyberturvallisuuden teollisuus-, teknologia- ja tutkimusosaamiskeskuksen Suomen kansallinen koordinointikeskus aloitti virallisesti toimintansa vuoden 2023 alusta Liikenne- ja viestintävirastossa. Virastoon perustettu toiminto on osa EU:n laajuista koordinointikeskusten verkostoa. EU-laajuisen verkoston tehtävänä on parantaa kyberomavaraisuutta, tukea kyberturvallisuusalan tutkimusta ja vauhdittaa teknologian kehittämistä koko EU:ssa.

Tietoturvan kehittämisen tukea myönnetty ensimmäisille yrityksille vauhdittamaan tietoturvaa parantavien toimenpiteiden toimeenpanoa
Liikenne- ja viestintävirasto Traficom on myöntänyt tietoturvan kehittämisen tukea ensimmäisille yrityksille. Muiden yritysten hakemusten käsittely on täydessä vauhdissa. Viimeisten joukossa hakemuksensa jättäneet yritykset joutuvat kuitenkin vielä odottamaan päätöksiä hakemistaan tuista.

Kyberturvallisuuskeskuksen viikkokatsaus - 4/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 20.1. - 26.1.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Älylaitteiden heikko tietoturva sääntelyllä kuriin
Kaupan hyllystä mukaan voi tarttua laite, jonka tietoturva on heikko. Tilanne muuttuu 1.8.2024, kun tietoturvavaatimusten vastaiset laitteet voidaan poistaa myynnistä. Tulevaa sääntelyä silmällä pitäen valmistajien, maahantuojien ja myyjien pitää varmistaa tuotteiden tietoturvataso heti.

Kyberturvallisuuskeskuksen viikkokatsaus - 3/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 13.1. - 19.1.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 2/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 6.1. - 12.1.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Joulukuun kybersää oli pääosin sateinen, vaikka mukaan mahtui myös positiivisia uutisia
Vuosi 2022 päätettiin sateisessa kybersäässä. Viestintäverkkojen toimivuus oli joulukuussakin hyvällä tasolla, mutta palvelunestohyökkäykset lisääntyivät voimakkaasti. Sosiaalisen median tilimurtoja ilmoitetaan tasaista tahtia, ja tilien suojaamiseen kannattaakin kiinnittää huomiota. Lääkinnällisten laitteiden ylläpidon jatkuvuus puolestaan on tärkeää niin tietoturvan kuin eettisyyden vuoksi.

Kyberturvallisuuskeskuksen viikkokatsaus - 1/2023
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 30.12.2022 - 5.1.2023). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 52/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 23.12. - 29.12.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 51/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 16.12. - 22.12.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 50/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 9.12. - 15.12.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Loppusyksyiset tuulet pitivät marraskuun kybersään koleana
Marraskuun tuomat kyberilmiöt pitivät loppusyksyn kybersään koleana. Kiristyshaittaohjelmien määrän on havaittu lisääntyneen syksyllä niin Suomessa kuin maailmalla. Kiristyshuijauksissa puolestaan on näkynyt uudenlaisia teemoja. Auringonpilkahduksena Euroopan neuvosto hyväksyi uuden NIS2-direktiivin, joka tulee parantamaan EU:n kyberturvallisuutta tulevina vuosina.

Muista tietoturva myös joululahjaostoksilla
Harkitsetko älylelun ostamista pukinkonttiin? Ennen ostopäätöksen tekemistä kannattaa tutustua laitteen tietoturvaominaisuuksiin.

Palvelunestohyökkäyksissä selvää kasvua joulukuussa
Kyberturvallisuuskeskus on saanut joulukuussa poikkeuksellisen paljon ilmoituksia palvelunestohyökkäyksistä. Suurin osa hyökkäyksistä ei ole aiheuttanut näkyvää haittaa.

Apple julkaisi kriittisen haavoittuvuuden korjaavan päivityksen tuotteisiinsa
Applen korjaamat haavoittuvuudet koskevat useita Applen laitteita sekä Safari-selainta. Applen julkaisemat päivitykset on syytä asentaa laitteille heti.

Useita kriittisiä haavoittuvuuksia VMwaren virtualisointiohjelmistoissa
Useita kriittisiä haavoittuvuuksia VMwaren vRealize Network Insight (vRNI), ESXi, Workstation Pro / Player (Workstation), Fusion Pro / Fusion (Fusion) ja Cloud Foundation virtualisointiohjelmistoissa

Tukes varoittaa vaarallisista joululeluista
Myös Liikenne- ja viestintävirasto Traficom tutustui Tukesin pyynnöstä muutaman älylelun tietoihin.

Kriittinen haavoittuvuus Citrix Gateway ja Citrix ADC -ohjelmistoissa
Haavoittuvuutta hyväksikäyttämällä on mahdollista suorittaa mielivaltaisia komentoja etänä. Haavoittuvuutta hyväksikäytetään aktiivisesti, joten päivittäminen on erityisen tärkeää.

Tekoäly tulee muuttamaan myös kyberhyökkäyksiä
Miten tekoäly muuttaa kyberhyökkäysten luonnetta? Millaisia uhkia tekoäly muodostaa kyberturvallisuudelle lähivuosien aikana? Mitä uhkiin varautumisessa on hyvä ottaa huomioon?

Kriittinen haavoittuvuus Fortinetin FortiOS-ohjelmistossa
Fortinet julkaisi päivityspaketit FortiOS-ohjelmistoon, joka korjaa kriittiseksi luokitellun haavoittuvuuden.

Tietoturvasetelin valtava suosio oli iloinen yllätys
Tietoturvan kehittämisen tukea eli tietoturvaseteliä on voinut hakea Liikenne- ja viestintävirasto Traficomista 1.12. alkaen, ja jo nyt haettu rahoitus on ylittänyt myönnettävänä olevan rahoituksen.

Useita kriittisiä haavoittuvuuksia Neutrinolabsin xrdp etätyöpöytäprotokollan toteutuksessa
Useita kriittisiä haavoittuvuuksia Neutrinolabsin xrdp etätyöpöytäprotokollan toteutuksessa.

Kaksi haavoittuvuutta Linux Debian Cacti Web-rajapinnan palvelussa
Linux Debian Cacti Web-rajapinnan palvelussa on kaksi haavoittuvuutta. Haavoittuvuudet mahdollistavat hyökkääjän ohittaa LDAP-tunnistautumisen tai tietyillä injektionneilla mielivaltaisen koodin suorittamisen. Cacti -palveluun on korjaus 1.2.x ja 1.3.x versioissa.

Kyberturvallisuuskeskuksen viikkokatsaus - 49/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 2.12. - 8.12.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 48/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 25.11. - 1.12.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 47/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 18.11. - 24.11.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kyberturvallisuuskeskuksen viikkokatsaus - 46/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 11.11. - 17.11.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Tietoturvasetelin haku aukeaa pian - tutustu tietoturvan kehittämisen tuen ehtoihin ja hakemiseen
Valtioneuvosto teki lokakuussa päätöksen määräaikaisesta yrityksille myönnettävästä tietoturvan kehittämisen tuesta eli niin sanotusta tietoturvasetelistä. Tietoturvaseteliä voivat hakea yhteiskunnan kannalta elintärkeät yritykset eli niin sanotut huoltovarmuuskriittiset yritykset. Tietoturvasetelin tavoitteena on nostaa näiden yritysten tietoturvallisuuden tasoa ja sitä kautta parantaa koko yhteiskunnan kykyä suojautua kyberturvallisuusuhkia vastaan.

Kyberturvallisuuskeskuksen viikkokatsaus - 45/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 4.11. - 10.11.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Lokakuun kybersää synkisti syksyä
Lokakuun kybersää ei juuri tuonut auringonpilkahduksia. Olemme vastaanottaneet muutamia ilmoituksia kiristyshaittaohjelmista. Palvelunestohyökkäyksistä ilmoituksia on tullut selvästi tavallista enemmän. Myös lääkinnällisten laitteiden tietoturvallisuus on puhuttanut Yhdysvalloissa, ja asia onkin huomioitu myös Suomessa.

Kriittisiä haavoittuvuuksia VMware Workspace ONE Assist -ohjelmistossa
VMware on julkaissut päivityksen, joka korjaa kolme kriittistä haavoittuvuutta VMware Workspace ONE Assist -ohjelmassa. Haavoittuuvuuksien hyväksikäyttö saattaa mahdollistaa hyökkääjälle pääsyn verkkoon sekä järjestelmänvalvojan oikeuksien saamisen ilman tunnistautumista.

Kriittinen haavoittuvuus Citrix Gateway ja Citrix ADC -tuotteissa
Citrix on julkaissut tietoturvapäivityksiä korjatakseen kriittisen haavoittuvuuden (CVE-2022-27510) Citrix Application Delivery Controller (ADC) - ja Citrix Gateway -tuotteissaan. Citrix kehottaa kyseisten tuotteiden järjestelmänvalvojia päivittämään tuotteiden ohjelmistoversiot uusimpiin versioihin viipymättä.

Finanssialan kyberharjoituksessa vaihdettiin oppeja ja parhaita käytäntöjä
Toimialojen yhteiset työpöytäharjoitukset sopivat monenlaisille organisaatioille. Tällä kertaa finanssialan yhteisessä harjoituksessa treenattiin organisaatioiden välistä tiedonvaihtoa ja tutustuttiin viranomaisten rooleihin kyberhäiriössä.

Kyberturvallisuuskeskuksen viikkokatsaus - 44/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 28.10. - 3.11.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Tunnista turvallinen verkkosivu osoitteen perusteella!
Nettisivuja ja sähköpostia käyttäessä tärkeintä on säilyttää arkijärki ja pitää pää kylmänä. Hätiköityjä päätöksiä ei pidä tehdä, vaikka sinulle luvattaisiin satumaisia voittoja tai uhattaisiin "pankkitilin jäädyttämisellä" tai syytteellä laittomuudesta (joita et edes ole tehnyt).

Kaksi vakavaa haavoittuvuutta OpenSSL 3.0 -versiossa
Tietojen salaamiseen ja salattuun välittämiseen käytetyn OpenSSL-kirjaston versiosta 3.0 on löydetty kaksi vakavaa haavoittuvuutta. Uusin versio 3.0.7 on syytä päivittää mahdollisimman pian. Haavoittuvuudet eivät koske vanhempia 1.1.1 tai sitä edeltäneitä versioita.

Palvelunestohyökkäysten määrä on kasvussa - vaikutukset vähäisiä
Kyberturvallisuuskeskus on vastaanottanut syksyllä kasvavissa määrin ilmoituksia palvelunestohyökkäyksistä. Lokakuussa ilmoituksia on tehty enemmän kuin aiempina kuukausina. Nyt ilmoitetuilla palvelunestohyökkäyksillä on ollut vain vähäisiä vaikutuksia niiden kohteisiin.

Kiertävät sähkökatkot vaikuttavat myös teleyritysten verkkojen ja palvelujen toimivuuteen
Sähkön kantaverkkoyhtiö Fingrid Oyj on kertonut, että tämänhetkisessä maailmantilanteessa on järkevää varautua sähkön niukkuuteen ja siihen, että talvella sähköpula voi aiheuttaa sähkökatkoksia. Tässä artikkelissa kerromme, miten mahdolliset kiertävät sähkökatkot vaikuttavat mobiiliyhteyksien, kiinteiden laajakaistojen sekä televisio- ja radiopalvelujen toimintaan.

Kyberturvallisuuskeskuksen viikkokatsaus - 43/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 21.10. - 27.10.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Ohje välitystietojen käsittelyä koskevien tietojen tallentamisesta astuu voimaan 27.10.2022


Tietoturvan suunnannäyttäjä -tunnustus STT:lle - avoin tiedon jakaminen tukee kyberuhkiin varautumista
Liikenne- ja viestintävirasto Traficomin jakaman Tietoturvan suunnannäyttäjä -tunnustuksen sai tänä vuonna Suomen tietotoimisto STT. Tunnustuksen perusteluissa STT:tä kiitettiin avoimesta viestinnästä, sen jouduttua kyberhyökkäyksen kohteeksi kesällä 2022.

Kyberturvallisuuskeskuksen viikkokatsaus - 42/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 14.10. - 20.10.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Kriittinen haavoittuvuus Apache Commons Text -komponentissa
Apache Commons Text -komponentissa oleva haavoittuvuus mahdollistaa mielivaltaisen koodin suorittamisen etänä.

Kyberturvallisuuskeskuksen viikkokatsaus - 41/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 7.10. - 13.10.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin.

Syyskuun kybersää jatkui vuodenaikaan nähden tavanomaisena
Nord Stream -kaasuputkien vuodot herättivät keskustelua mahdollisista vaikutuksista Suomen kansainvälisiin tietoliikenneyhteyksiin, jotka kulkevat merikaapeleissa. Exchange-palvelimien nollapäivähaavoittuvuus puolestaan tulee huomioida organisaatioiden turvallisuudessa, vaikka se ei olekaan yhtä vakava kuin viimevuotinen laajempi haavoittuvuus. Kuluttajien taas kannattaa huomioida jouluostoksia tehdessä myös älylelujen tietoturvallisuus. Lelujen ominaisuuksiin on hyvä tutustua ennen ostopäätöstä.

Kriittinen haavoittuvuus Adobe Acrobat ja Reader tuotteissa
Adobe Acrobat ja Reader tuotteissa on havaittu kriittinen haavoittuvuus Windows ja macOS käyttöjärjestelmissä. Onnistunut hyväksikäyttö voi johtaa mielivaltaisen koodin suoritukseen.

Kriittinen haavoittuvuus Adobe Commerce- ja Magento-verkkokauppa-alustoissa
Adobe on julkaissut korjauksen kriittiseksi luokiteltuun haavoittuvuuteen, joka antaa hyökkääjälle mahdollisuuden suorittaa komentoja etänä verkkokauppapalvelimella. Haavoittuvien ohjelmistojen päivittäminen on suositeltavaa.

Kysy kiristyshaittaohjelmista - me vastaamme!
Miten kiristyshaittaohjelmahyökkäys voi alkaa? Keille hyökkäyksestä on syytä kertoa? Lokakuussa ratkotaan yhdessä kiristyshaittaohjelmiin liittyviä kysymyksiä.

Kriittisiä haavoittuvuuksia Fortinetin FortiOS, FortiProxy, FortiSwitchManager ja FortiTester-ohjelmistoissa
Fortinet julkaisi päivityspaketit FortiOS, FortiProxy, FortiSwitchManager ja FortiTester -ohjelmistoihin, jotka korjaavat kriittiseksi luokiteltuja haavoittuvuuksia

Kriittinen haavoittuvuus Zimbra Collaboration (ZCS) -ohjelmistossa
Zimbra Collaboration Suite -tuottavuusohjelmistossa on havaittu haavoittuvuus, joka mahdollistaa mielivaltaisen koodin suorittamisen isäntäpalvelimella. Haavoittuvuutta käytetään aktiivisesti hyväksi, mutta sen väliaikaiseen korjaamiseen on jo keinoja. Kyseessä on nollapäivähaavoittuvuus, eikä varsinaista korjaavaa päivitystä ole vielä saatavilla. Ubuntu-järjestelmät eivät lähtökohtaisesti ole haavoittuvia.

Kybermittarin uusi versio saatavilla - syksyn koulutukset käynnistyvät viikolla 41
Traficomin Kyberturvallisuuskeskus julkaisi vuonna 2020 organisaatioiden kyberturvallisuuden arviointiin ja kehittämiseen Kybermittarin, jonka avulla organisaatiot voivat arvioida kyberturvallisuutensa nykytilaa ja tunnistaa kehityskohteita. Palvelua on kehitetty ja työkalun uusi versio on nyt saatavilla Kyberturvallisuuskeskuksen verkkosivuilta. Ilmoittautuminen kaikille avoimiin Kybermittarin esittely- ja koulutustapahtumiin on avoinna.

Kyberturvallisuuskeskuksen viikkokatsaus - 40/2022
Tämä on Kyberturvallisuuskeskuksen viikkokatsaus (raportointijakso 29.9. - 6.10.2022). Viikkokatsauksessa jaamme tietoa ajankohtaisista kyberilmiöistä. Viikkokatsaus on tarkoitettu laajalle yleisölle kyberturvallisuuden ammattilaisista tavallisiin kansalaisiin. TLP:CLEAR

Euroopan kyberturvallisuuskuukausi alkaa - ota käyttöön parhaat tietoturvavinkit
Lokakuussa laitetaan kyberturvallisuuden perustaidot kuntoon. Seuraa kampanjaa sosiaalisessa mediassa tunnisteilla #Choose2BeSafeOnline #ThinkB4UClick.

Tunnistautumista vaativa etäkäytön mahdollistava haavoittuvuus Microsoft Exchangessa
Microsoft Exchange-sähköpostipalvelimessa on havaittu haavoittuvuuksia, jotka mahdollistavat mielivaltaisen koodin suorittamisen. Haavoittuvuuksia käytetään aktiivisesti hyväksi. Microsoft on julkaissut korjaavat päivitykset.



Back to top