Topics

late

AI

Amazon

Article image

Image Credits:Lorenzo Franceschi-Bicchierai / TechCrunch

Apps

Biotech & Health

clime

a photo showing the entrance of the business hall at the Black Hat security conference in Las Vegas in August 2024

Image Credits:Lorenzo Franceschi-Bicchierai / TechCrunch

Cloud Computing

Commerce

Crypto

A dog seen through a hacked Ecovacs device.

A dog seen through a hacked Ecovacs device.Image Credits:Dennis Giese and Braelynn Luedtke

initiative

EVs

Fintech

fund raise

gizmo

Gaming

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

protection

Social

Space

inauguration

TikTok

Transportation

speculation

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

TV

Partner Content

TechCrunch Brand Studio

Crunchboard

adjoin Us

Thousands of hack , researchers and security professionals descended on the Black Hat and Def Con security conferences in Las Vegas this week , an annual pilgrim’s journey aimed at share the latest enquiry , hack and cognition across the security residential area . And TechCrunch was on the ground to cover on the back - to - back shows and to track some of the recent enquiry .

CrowdStrike take in center stage , andpicked up an “ larger-than-life fail ” awardit certainly did n’t want . But the company acknowledged it messed up andhandled its scandalseveral workweek after let go of a bats software update that sparked a spherical IT outage . Hackers and security researchers seemed for the most part willing to forgive , though peradventure not easily forget .

As another round of golf of Black Hat and Def Con conferences wrap up , we look back at some of the high spot and the expert in research from the show that you might ’ve missed .

Hacking Ecovac robots to spy on their owners over the internet

security measure researchersrevealed in a Def Con talkthat it was potential to commandeer a reach of Ecovacs menage vacuum and lawnmower robots by sending a malicious Bluetooth signal to a vulnerable golem within a close law of proximity . From there , the on - gameboard microphone and camera can be remotely spark off over the net , allowing the attacker to spy on anyone within ear- and camera - shot of the robot .

The unfit news is that Ecovacs never respond to the researchers , or TechCrunch ’s postulation for remark , and there is no evidence that the bugs were ever fixed . The in effect intelligence is thatwe still get this unbelievable screenshotof a wienerwurst take from the on - board photographic camera of a cut up Ecovacs robot .

The long game of infiltrating the LockBit ransomware game and doxing its ringleader

An intense Caterpillar and mouse plot betweensecurity research worker Jon DiMaggioand the ringleader of the LockBit ransomware and extortion racket , have it away only as LockBitSupp , lead DiMaggio down a coney hole of open source intelligence information gathering to identify the real - earth identity of the notorious hacker .

Inhis highly elaborate journal series , DiMaggio , spurred on by an anon. gratuity of an e-mail address allegedly used by LockBitSupp and a deeply - rooted desire to get Department of Justice for the gang ’s victims , at last identified the human , and got there even before federal agents publically named the hack as the Russian subject , Dmitry Khoroshev . At Def Con , DiMaggiotold his storyfrom his perspective to a crowded room for the first time .

Hacker develops laser microphone that can hear your keyboard taps

noted hack Samy Kamkar developed a new technique direct at stealthily determining each wiretap from a laptop ’s keyboard by aiming an unseeable laser through a nearby window . The proficiency , demonstrated at Def Con andas explained by Wired , “ takes advantage of the subtle acoustic created by tap unlike keys on a computer , ” and work so long as the hacker has a line - of - lot from the laser to the target laptop itself .

Prompt injections can easily trick Microsoft Copilot

A new prompt injection techniquedeveloped by Zenityshows it ’s potential to extract sensible information from Microsoft ’s AI - powered chatbot associate , Copilot . Zenity main technology officer Michael Bargury demonstrated the exploit atthe Black Hat group discussion , showing how to manipulate Copilot AI ’s prompt to change its output .

In one examplehe tweeted out , Bargury show it was potential to fertilize in HTML code containing a bank story number controlled by a malicious attacker and trick co-pilot into return that bank explanation routine in responses returned to ordinary user . That can be used to play a trick on unsuspecting people into sending money to the wrong home , thebasis of some pop business cozenage .

we make an ~RCE on M365 Copilot by send an emailby ~RCE I mean full remote control overits actions – search for sensitive content ( sharepoint , email , calendar , team ) , execute pluginsand yield – ringway DLP control , manipulate references , societal railroad engineer its users on our…pic.twitter.com/r1yMRLXKAG

Six companies saved from hefty ransoms, thanks to ransomware flaws in ransomware leak sites

Security researcher Vangelis Stykas gear up out to scope dozens of ransomware gangs and identify potential holes in their public - facing substructure , such as their extortion news leak site . Inhis Black Hat talk , Stykas explained how he discover vulnerabilities in the web infrastructure of three ransomware gangs — Mallox , BlackCat and Everest — allowing him to get decoding winder to two company and send word four others before the gangs could deploy ransomware , savingin total six companies from tidy ransom .

Ransomware is n’t getting better , but the tactics jurisprudence enforcement are using against gang that encrypt and extort their victims are getting more novel and interesting , and this could be an approach to believe with gang going onwards .