syndication

elon-musk-counts-the-cost-of-his-four-month-blitz-through-us-government

Elon Musk counts the cost of his four-month blitz through US government


Term at DOGE did serious damage to his brands, only achieved a fraction of hoped-for savings.

Elon Musk wields a chainsaw at the Conservative Political Action Conference in February to illustrate his aim to cut government waste Credit: Jose Luis Magana/AP

Elon Musk’s four-month blitz through the US government briefly made him Washington’s most powerful businessman since the Gilded Age. But it has done little for his reputation or that of his companies.

Musk this week formally abandoned his role as the head of the so-called Department of Government Efficiency (Doge), which has failed to find even a fraction of the $2 trillion in savings he originally pledged.

On Thursday, Donald Trump lamented his departure but said Musk “will always be with us, helping all the way.”

Yet the billionaire will be left calculating the cost of his involvement with Trump and the meagre return on his $250 million investment in the US president’s election campaign.

“I appreciate the fact that Mr Musk put what was good for the country ahead of what was good for his own bottom line,” Tom Cole, the Republican chair of the House Appropriations Committee, told the Financial Times.

After Doge was announced, a majority of American voters believed Musk would use the body to “enrich himself and undermine his business rivals,” according to a survey, instead of streamlining the government.

Progressive groups warned that he would be “rigging federal procurement for billionaires and their pals” and cut regulations that govern his companies Tesla and SpaceX. Democratic lawmakers said Doge was a “cover-up” of a more sinister, self-serving exercise by the world’s richest person.

Early moves by the Trump administration suggested Musk might get value for money. A lawsuit brought by the Biden administration against SpaceX over its hiring practices was dropped in February, and regulators probing his brain-implant company Neuralink were dismissed.

Musk’s satellite Internet business Starlink was touted by Commerce Secretary Howard Lutnick as a potential beneficiary of a $42 billion rural broadband scheme. An executive order calling for the establishment of a multibillion-dollar Iron Dome defense system in the US looked set to benefit Musk, due to SpaceX’s dominance in rocket launches.

The gutting of various watchdogs across government also benefited Musk’s businesses, while a number of large US companies rushed to ink deals with Starlink or increase their advertising spending on X. Starlink also signed agreements to operate in India, Pakistan, and Vietnam, among other countries it has long wished to expand into.

But while Doge took a scythe to various causes loathed by Musk, most notably international aid spending and government contracts purportedly linked to diversity initiatives or “woke” research, it also caused severe blowback to the billionaire’s businesses, particularly Tesla.

At one point during his Doge tenure, Tesla’s stock had fallen 45 percent from its highest point last year, and reports emerged that the company’s board of directors had sought to replace Musk as chief executive. The 53-year-old’s personal wealth dropped by tens of billions of dollars, while his dealerships were torched and death threats poured in.

Some of the brand damage to Tesla, until recently Musk’s primary source of wealth, could be permanent. “Eighty percent of Teslas in the US were sold in blue zip codes,” a former senior employee said. “Obviously that constituency has been deeply offended.”

Starlink lost lucrative contracts in Canada and Mexico due to Musk’s political activities, while X lost 11 million users in Europe alone.

Probes of Tesla and SpaceX by government regulators also continued apace, while the Trump administration pressed ahead with plans to abolish tax credits for electric vehicles and waged a trade war vehemently opposed by Musk that threatened to further damage car sales.

In the political arena, few people were cheered by Doge’s work. Democrats were outraged by the gutting of foreign aid and by Musk’s 20-something acolytes gaining access to the Treasury’s payment system, along with the ousting of thousands of federal workers. Republicans looked askance at attempts to target defense spending. And true budget hawks were bitter that Musk could only cut a few billion dollars. Bill Gates even accused Musk of “killing the world’s poorest children” through his actions at Doge.

Musk, so used to getting his way at his businesses, struggled for control. At various points in his tenure he took on Treasury Secretary Scott Bessent, Secretary of State Marco Rubio, Transport Secretary Sean Duffy, and trade tsar Peter Navarro, while clashing with several other senior officials.

Far from being laser-focused on eliminating waste, Musk’s foray into government was a “revenge tour” against a bureaucracy the billionaire had come to see as the enemy of innovation, a former senior colleague of Musk’s said, highlighting the entrepreneur’s frustration with COVID-19 regulations in California, his perceived snub by the Biden administration, and his anger over his daughter’s gender transition.

Trump’s AI and crypto tsar, David Sacks, an influential political voice in the tech world, “whipped [Musk] up into a very, very far-right kind of mindset,” the person added, to the extent that was “going to help this administration in crushing the ‘woke’ agenda.”

Neither Musk nor Sacks responded to requests for comment.

Musk, who claimed Doge only acted in an “advisory role,” this week expressed frustration at it being used as a “whipping boy” for unpopular cuts decided by the White House and cabinet secretaries.

“Trump, I think, was very savvy and allowed Doge to kind of take all those headlines for a traditional political scapegoat,” said Sahil Lavingia, head of a commerce start-up who worked for Doge until earlier this month. Musk, he added, might also have been keen to take credit for the gutting of USAID and other moves but ultimately garnered unwanted attention.

“If you were truly evil, [you] would just be more quiet,” said Lavingia, who joined the initiative in order to streamline processes within government. “You would do the evil stuff quietly.”

The noise surrounding Musk, whose ability to dominate news cycles with a single post on his social media site X rivaled Trump’s own hold on the headlines, also frustrated the administration.

This week, White House Deputy Chief of Staff Stephen Miller took to X to indirectly rebut the billionaire’s criticism of Trump’s signature tax bill, which he had lambasted for failing to cut the deficit or codify Doge’s cuts.

Once almost synonymous with Musk, Doge is now being melded into the rest of government. In a briefing on Thursday, White House Press Secretary Karoline Leavitt said that following Musk’s departure, cabinet secretaries would “continue to work with the respective Doge employees who have onboarded as political appointees at all of these agencies.”

She added: “The Doge leaders are each and every member of the President’s Cabinet and the President himself.”

Doge’s aims have also become decidedly more quotidian. Tom Krause, a Musk ally who joined Doge and was installed at Treasury, briefed congressional staff this week on improvements to the IRS’s application program interfaces and customer service, according to a person familiar with the matter. Other Doge staffers are doing audits of IT contracts—work Lavingia compares with that done by McKinsey consultants.

Freed from the constraints of being a government employee, Musk is increasingly threatening to become a thorn in Trump’s side.

Soon after his Doge departure was announced, he again criticized the White House, this time over its plan to cancel clean energy tax credits.

“Teddy Roosevelt had that great adage: ‘speak softly but carry a big stick’,” Fred Thiel, the chief executive of Bitcoin mining company MARA Holdings, told the FT. “Maybe Elon’s approach was a little bit different.”

© 2025 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.

Elon Musk counts the cost of his four-month blitz through US government Read More »

trump-bans-sales-of-chip-design-software-to-china

Trump bans sales of chip design software to China

Johnson, who heads China Strategies Group, a risk consultancy, said that China had successfully leveraged its stranglehold on rare earths to bring the US to the negotiating table in Geneva, which “left the Trump administration’s China hawks eager to demonstrate their export control weapons still have purchase.”

While it accounts for a relatively small share of the overall semiconductor industry, EDA software allows chip designers and manufacturers to develop and test the next generation of chips, making it a critical part in the supply chain.

Synopsys, Cadence Design Systems, and Siemens EDA—part of Siemens Digital Industries Software, a subsidiary of Germany’s Siemens AG—account for about 80 percent of China’s EDA market. Synopsys and Cadence did not immediately respond to requests for comment.

In fiscal year 2024, Synopsys reported almost $1 billion in China sales, roughly 16 percent of its revenue. Cadence said China accounted for $550 million or 12 percent of its revenue.

Synopsys shares fell 9.6 percent on Wednesday, while those of Cadence lost 10.7 percent.

Siemens said in a statement the EDA industry had been informed last Friday about new export controls. It said it had supported customers in China “for more than 150 years” and would “continue to work with our customers globally to mitigate the impact of these new restrictions while operating in compliance with applicable national export control regimes.”

In 2022, the Biden administration introduced restrictions on sales of the most sophisticated chip design software to China, but the companies continued to sell export control-compliant products to the country.

In his first term as president, Donald Trump banned China’s Huawei from using American EDA tools. Huawei is seen as an emerging competitor to Nvidia with its “Ascend” AI chips.

Nvidia chief executive Jensen Huang recently warned that successive attempts by American administrations to hamstring China’s AI ecosystem with export controls had failed.

Last year Synopsys entered into an agreement to buy Ansys, a US simulation software company, for $35 billion. The deal still requires approval from Chinese regulators. Ansys shares fell 5.3 percent on Wednesday.

On Wednesday the US Federal Trade Commission announced that both companies would need to divest certain software tools to receive its approval for the deal.

The export restrictions have encouraged Chinese competitors, with three leading EDA companies—Empyrean Technology, Primarius, and Semitronix—significantly growing their market share in recent years.

Shares of Empyrean, Primarius, and Semitronix rose more than 10 percent in early trading in China on Thursday.

© 2025 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.

Trump bans sales of chip design software to China Read More »

how-farmers-can-help-rescue-water-loving-birds

How farmers can help rescue water-loving birds

Not every farmer is thrilled to host birds. Some worry about the spread of avian flu, others are concerned that the birds will eat too much of their valuable crops. But as an unstable climate delivers too little water, careening temperatures and chaotic storms, the fates of human food production and birds are ever more linked—with the same climate anomalies that harm birds hurting agriculture too.

In some places, farmer cooperation is critical to the continued existence of whooping cranes and other wetland-dependent waterbird species, close to one-third of which are experiencing declines. Numbers of waterfowl (think ducks and geese) have crashed by 20 percent since 2014, and long-legged wading shorebirds like sandpipers have suffered steep population losses. Conservation-minded biologists, nonprofits, government agencies, and farmers themselves are amping up efforts to ensure that each species survives and thrives. With federal support in the crosshairs of the Trump administration, their work is more important (and threatened) than ever.

Their collaborations, be they domestic or international, are highly specific, because different regions support different kinds of agriculture—grasslands, or deep or shallow wetlands, for example, favored by different kinds of birds. Key to the efforts is making it financially worthwhile for farmers to keep—or tweak—practices to meet bird forage and habitat needs.

Traditional crawfish-and-rice farms in Louisiana, as well as in Gentz’s corner of Texas, mimic natural freshwater wetlands that are being lost to saltwater intrusion from sea level rise. Rice grows in fields that are flooded to keep weeds down; fields are drained for harvest by fall. They are then re-flooded to cover crawfish burrowed in the mud; these are harvested in early spring—and the cycle begins again.

That second flooding coincides with fall migration—a genetic and learned behavior that determines where birds fly and when—and it lures massive numbers of egrets, herons, bitterns, and storks that dine on the crustaceans as well as on tadpoles, fish, and insects in the water.

On a biodiverse crawfish-and-rice farm, “you can see 30, 40, 50 species of birds, amphibians, reptiles, everything,” says Elijah Wojohn, a shorebird conservation biologist at nonprofit Manomet Conservation Sciences in Massachusetts. In contrast, if farmers switch to less water-intensive corn and soybean production in response to climate pressures, “you’ll see raccoons, deer, crows, that’s about it.” Wojohn often relies on word-of-mouth to hook farmers on conservation; one learned to spot whimbrel, with their large, curved bills, got “fired up” about them and told all his farmer friends. Such farmer-to-farmer dialogue is how you change things among this sometimes change-averse group, Wojohn says.

In the Mississippi Delta and in California, where rice is generally grown without crustaceans, conservation organizations like Ducks Unlimited have long boosted farmers’ income and staying power by helping them get paid to flood fields in winter for hunters. This attracts overwintering ducks and geese—considered an extra “crop”—that gobble leftover rice and pond plants; the birds also help to decompose rice stalks so farmers don’t have to remove them. Ducks Unlimited’s goal is simple, says director of conservation innovation Scott Manley: Keep rice farmers farming rice. This is especially important as a changing climate makes that harder. 2024 saw a huge push, with the organization conserving 1 million acres for waterfowl.

Some strategies can backfire. In Central New York, where dwindling winter ice has seen waterfowl lingering past their habitual migration times, wildlife managers and land trusts are buying less productive farmland to plant with native grasses; these give migratory fuel to ducks when not much else is growing. But there’s potential for this to produce too many birds for the land available back in their breeding areas, says Andrew Dixon, director of science and conservation at the Mohamed Bin Zayed Raptor Conservation Fund in Abu Dhabi, and coauthor of an article about the genetics of bird migration in the 2024 Annual Review of Animal Biosciences. This can damage ecosystems meant to serve them.

Recently, conservation efforts spanning continents and thousands of miles have sprung up. One seeks to protect buff-breasted sandpipers. As they migrate 18,000 miles to and from the High Arctic where they nest, the birds experience extreme hunger—hyperphagia—that compels them to voraciously devour insects in short grasses where the bugs proliferate. But many stops along the birds’ round-trip route are threatened. There are water shortages affecting agriculture in Texas, where the birds forage at turf grass farms; grassland loss and degradation in Paraguay; and in Colombia, conversion of forage lands to exotic grasses and rice paddies these birds cannot use.

Conservationists say it’s critical to protect habitat for “buffies” all along their route, and to ensure that the winters these small shorebirds spend around Uruguay’s coastal lagoons are a food fiesta. To that end, Manomet conservation specialist Joaquín Aldabe, in partnership with Uruguay’s agriculture ministry, has so far taught 40 local ranchers how to improve their cattle grazing practices. Rotationally moving the animals from pasture to pasture means grasses stay the right length for insects to flourish.

There are no easy fixes in the North American northwest, where bird conservation is in crisis. Extreme drought is causing breeding grounds, molting spots, and migration stopover sites to vanish. It is also endangering the livelihoods of farmers, who feel the push to sell land to developers. From Southern Oregon to Central California, conservation allies have provided monetary incentives for water-strapped grain farmers to leave behind harvest debris to improve survivability for the 1 billion birds that pass through every year, and for ranchers to flood-irrigate unused pastures.

One treacherous leg of the northwest migration route is the parched Klamath Basin of Oregon and California. For three recent years, “we saw no migrating birds. I mean, the peak count was zero,” says John Vradenburg, supervisory biologist of the Klamath Basin National Wildlife Refuge Complex. He and myriad private, public, and Indigenous partners are working to conjure more water for the basin’s human and avian denizens, as perennial wetlands become seasonal wetlands, seasonal wetlands transition to temporary wetlands, and temporary wetlands turn to arid lands.

Taking down four power dams and one levee has stretched the Klamath River’s water across the landscape, creating new streams and connecting farm fields to long-separated wetlands. But making the most of this requires expansive thinking. Wetland restoration—now endangered by loss of funding from the current administration—would help drought-afflicted farmers by keeping water tables high. But what if farmers could also receive extra money for their businesses via eco-credits, akin to carbon credits, for the work those wetlands do to filter-clean farm runoff? And what if wetlands could function as aquaculture incubators for juvenile fish, before stocking rivers? Klamath tribes are invested in restoring endangered c’waam and koptu sucker fish, and this could help them achieve that goal.

As birds’ traditional resting and nesting spots become inhospitable, a more sobering question is whether improvements can happen rapidly enough. The blistering pace of climate change gives little chance for species to genetically adapt, although some are changing their behaviors. That means that the work of conservationists to find and secure adequate, supportive farmland and rangeland as the birds seek out new routes has become a sprint against time.

This story originally appeared at Knowable Magazine.

How farmers can help rescue water-loving birds Read More »

penguin-poop-may-help-preserve-antarctic-climate

Penguin poop may help preserve Antarctic climate


Ammonia aerosols from penguin guano likely play a part in the formation of heat-shielding clouds.

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers climate, energy, and the environment. Sign up for their newsletter here.

New research shows that penguin guano in Antarctica is an important source of ammonia aerosol particles that help drive the formation and persistence of low clouds, which cool the climate by reflecting some incoming sunlight back to space.

The findings reinforce the growing awareness that Earth’s intricate web of life plays a significant role in shaping the planetary climate. Even at the small levels measured, the ammonia particles from the guano interact with sulfur-based aerosols from ocean algae to start a chemical chain reaction that forms billions of tiny particles that serve as nuclei for water vapor droplets.

The low marine clouds that often cover big tracts of the Southern Ocean around Antarctica are a wild card in the climate system because scientists don’t fully understand how they will react to human-caused heating of the atmosphere and oceans. One recent study suggested that the big increase in the annual global temperature during 2023 and 2024 that has continued into this year was caused in part by a reduction of that cloud cover.

“I’m constantly surprised at the depth of how one small change affects everything else,” said Matthew Boyer, a coauthor of the new study and an atmospheric scientist at the University of Helsinki’s Institute for Atmospheric and Earth System Research. “This really does show that there is a deep connection between ecosystem processes and the climate. And really, it’s the synergy between what’s coming from the oceans, from the sulfur-producing species, and then the ammonia coming from the penguins.”

Climate survivors

Aquatic penguins evolved from flying birds about 60 million years ago, shortly after the age of dinosaurs, and have persisted through multiple, slow, natural cycles of ice ages and warmer interglacial eras, surviving climate extremes by migrating to and from pockets of suitable habitat, called climate refugia, said Rose Foster-Dyer, a marine and polar ecologist with the University of Canterbury in New Zealand.

A 2018 study that analyzed the remains of an ancient “super colony” of the birds suggests there may have been a “penguin optimum” climate window between about 4,000 and 2,000 years ago, at least for some species in some parts of Antarctica, she said. Various penguin species have adapted to different habitat niches and this will face different impacts caused by human-caused warming, she said.

Foster-Dyer has recently done penguin research around the Ross Sea, and said that climate change could open more areas for land-breeding Adélie penguins, which don’t breed on ice like some other species.

“There’s evidence that this whole area used to have many more colonies … which could possibly be repopulated in the future,” she said. She is also more optimistic than some scientists about the future for emperor penguins, the largest species of the group, she added.

“They breed on fast ice, and there’s a lot of publications coming out about how the populations might be declining and their habitat is hugely threatened,” she said. “But they’ve lived through so many different cycles of the climate, so I think they’re more adaptable than people currently give them credit for.”

In total, about 20 million breeding pairs of penguins nest in vast colonies all around the frozen continent. Some of the largest colonies, with up to 1 million breeding pairs, can cover several square miles.There aren’t any solid estimates for the total amount of guano produced by the flightless birds annually, but some studies have found that individual colonies can produce several hundred tons. Several new penguin colonies were discovered recently when their droppings were spotted in detailed satellite images.

A few penguin colonies have grown recently while others appear to be shrinking, but in general, their habitat is considered threatened by warming and changing ice conditions, which affects their food supplies. The speed of human-caused warming, for which there is no precedent in paleoclimate records, may exacerbate the threat to penguins, which evolve slowly compared to many other species, Foster-Dyer said.

“Everything’s changing at such a fast rate, it’s really hard to say much about anything,” she said.

Recent research has shown how other types of marine life are also important to the global climate system. Nutrients from bird droppings help fertilize blooms of oxygen-producing plankton, and huge swarms of fish that live in the middle layers of the ocean cycle carbon vertically through the water, ultimately depositing it in a generally stable sediment layer on the seafloor.

Tricky measurements

Boyer said the new research started as a follow-up project to other studies of atmospheric chemistry in the same area, near the Argentine Marambio Base on an island along the Antarctic Peninsula. Observations by other teams suggested it could be worth specifically trying to look at ammonia, he said.

Boyer and the other scientists set up specialized equipment to measure the concentration of ammonia in the air from January to March 2023. They found that, when the wind blew from the direction of a colony of about 60,000 Adélie penguins about 5 miles away, the ammonia concentration increased to as high as 13.5 parts per billion—more than 1,000 times higher than the background reading. Even after the penguins migrated from the area toward the end of February, the ammonia concentration was still more than 100 times as high as the background level.

“We have one instrument that we use in the study to give us the chemistry of gases as they’re actually clustering together,” he said.

“In general, ammonia in the atmosphere is not well-measured because it’s really difficult to measure, especially if you want to measure at a very high sensitivity, if you have low concentrations like in Antarctica,” he said.

Penguin-scented winds

The goal was to determine where the ammonia is coming from, including testing a previous hypothesis that the ocean surface could be the source, he said.

But the size of the penguin colonies made them the most likely source.

“It’s well known that sea birds give off ammonia. You can smell them. The birds stink,” he said. “But we didn’t know how much there was. So what we did with this study was to quantify ammonia and to quantify its impact on the cloud formation process.”

The scientists had to wait until the wind blew from the penguin colony toward the research station.

“If we’re lucky, the wind blows from that direction and not from the direction of the power generator,” he said. “And we were lucky enough that we had one specific event where the winds from the penguin colony persisted long enough that we were actually able to track the growth of the particles. You could be there for a year, and it might not happen.”

The ammonia from the guano does not form the particles but supercharges the process that does, Boyer said.

“It’s really the dimethyl sulfide from phytoplankton that gives off the sulfur,” he said. “The ammonia enhances the formation rate of particles. Without ammonia, sulfuric acid can form new particles, but with ammonia, it’s 1,000 times faster, and sometimes even more, so we’re talking up to four orders of magnitude faster because of the guano.”

This is important in Antarctica specifically because there are not many other sources of particles, such as pollution or emissions from trees, he added.

“So the strength of the source matters in terms of its climate effect over time,” he said. “And if the source changes, it’s going to change the climate effect.”

It will take more research to determine if penguin guano has a net cooling effect on the climate. But in general, he said, if the particles transport out to sea and contribute to cloud formation, they will have a cooling effect.

“What’s also interesting,” he said, “is if the clouds are over ice surfaces, it could actually lead to warming because the clouds are less reflective than the ice beneath.” In that case, the clouds could actually reduce the amount of heat that brighter ice would otherwise reflect away from the planet. The study did not try to measure that effect, but it could be an important subject for future research, he added.

The guano effect lingers even after the birds leave the breeding areas. A month after they were gone, Boyer said ammonia levels in the air were still 1,000 times higher than the baseline.

“The emission of ammonia is a temperature-dependent process, so it’s likely that once wintertime comes, the ammonia gets frozen in,” he said. “But even before the penguins come back, I would hypothesize that as the temperature warms, the guano starts to emit ammonia again. And the penguins move all around the coast, so it’s possible they’re just fertilizing an entire coast with ammonia.”

Photo of Inside Climate News

Penguin poop may help preserve Antarctic climate Read More »

feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying

Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying

The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals and the takedown of their sprawling botnet offers the clearest example in years of how a single malware operation allegedly enabled hacking operations as varied as ransomware, wartime cyberattacks in Ukraine, and spying against foreign governments.

The US Department of Justice today announced criminal charges today against 16 individuals law enforcement authorities have linked to a malware operation known as DanaBot, which according to a complaint infected at least 300,000 machines around the world. The DOJ’s announcement of the charges describes the group as “Russia-based,” and names two of the suspects, Aleksandr Stepanov and Artem Aleksandrovich Kalinkin, as living in Novosibirsk, Russia. Five other suspects are named in the indictment, while another nine are identified only by their pseudonyms. In addition to those charges, the Justice Department says the Defense Criminal Investigative Service (DCIS)—a criminal investigation arm of the Department of Defense—carried out seizures of DanaBot infrastructure around the world, including in the US.

Aside from alleging how DanaBot was used in for-profit criminal hacking, the indictment also makes a rarer claim—it describes how a second variant of the malware it says was used in espionage against military, government, and NGO targets. “Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,” US attorney Bill Essayli wrote in a statement.

Since 2018, DanaBot—described in the criminal complaint as “incredibly invasive malware”—has infected millions of computers around the world, initially as a banking trojan designed to steal directly from those PCs’ owners with modular features designed for credit card and cryptocurrency theft. Because its creators allegedly sold it in an “affiliate” model that made it available to other hacker groups for $3,000 to $4,000 a month, however, it was soon used as a tool to install different forms of malware in a broad array of operations, including ransomware. Its targets, too, quickly spread from initial victims in Ukraine, Poland, Italy, Germany, Austria, and Australia to US and Canadian financial institutions, according to an analysis of the operation by cybersecurity firm Crowdstrike.

Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying Read More »

authorities-carry-out-global-takedown-of-infostealer-used-by-cybercriminals

Authorities carry out global takedown of infostealer used by cybercriminals


Authorities, along with tech companies including Microsoft and Cloudflare, say they’ve disrupted Lumma.

A consortium of global law enforcement agencies and tech companies announced on Wednesday that they have disrupted the infostealer malware known as Lumma. One of the most popular infostealers worldwide, Lumma has been used by hundreds of what Microsoft calls “cyber threat actors” to steal passwords, credit card and banking information, and cryptocurrency wallet details. The tool, which officials say is developed in Russia, has provided cybercriminals with the information and credentials they needed to drain bank accounts, disrupt services, and carry out data extortion attacks against schools, among other things.

Microsoft’s Digital Crimes Unit (DCU) obtained an order from a United States district court last week to seize and take down about 2,300 domains underpinning Lumma’s infrastructure. At the same time, the US Department of Justice seized Lumma’s command and control infrastructure and disrupted cybercriminal marketplaces that sold the Lumma malware. All of this was coordinated, too, with the disruption of regional Lumma infrastructure by Europol’s European Cybercrime Center and Japan’s Cybercrime Control Center.

Microsoft lawyers wrote on Wednesday that Lumma, which is also known as LummaC2, has spread so broadly because it is “easy to distribute, difficult to detect, and can be programmed to bypass certain security defenses.” Steven Masada, assistant general counsel at Microsoft’s DCU, says in a blog post that Lumma is a “go-to tool,” including for the notorious Scattered Spider cybercriminal gang. Attackers distribute the malware using targeted phishing attacks that typically impersonate established companies and services, like Microsoft itself, to trick victims.

“In 2025, probably following Redline’s disruption and Lumma’s own development, it has ranked as the most active module, indicating its growing popularity and widespread adoption among cybercriminals,” says Victoria Kivilevich, director of threat research at security firm Kela.

Microsoft says that more than 394,000 Windows computers were infected with the Lumma malware between March 16 and May 16 this year. And Lumma was mentioned in more than 21,000 listings on cybercrime forums in the spring of 2024, according to figures cited in a notice published today by the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA). The malware has been spotted bundled in fake AI video generators, fake “deepfake” generation websites, and distributed by fake CAPTCHA pages.

Law enforcement’s collaboration with Microsoft’s DCU and other tech companies like Cloudflare focused on disrupting Lumma’s infrastructure in multiple ways, so its developers could not simply hire new providers or create parallel systems to rebuild.

“Cloudflare’s role in the disruption included blocking the command and control server domains, Lumma’s Marketplace domains, and banning the accounts that were used to configure the domains,” the company wrote in a blog post on Wednesday. “Microsoft coordinated the takedown of Lumma’s domains with multiple relevant registries in order to ensure that the criminals could not simply change the name servers and recover their control.”

While infostealing malware has been around for years, its use by cybercriminals and nation-state hackers has surged since 2020. Typically, infostealers find their way onto people’s computers through downloads of pirated software or through targeted phishing attacks that impersonate established companies and services, like Microsoft itself, to trick victims. Once on a computer it is able to grab sensitive information—such as usernames and passwords, financial information, browser extensions, multifactor authentication details and more—and send it back to the malware’s operators.

Some infostealer operators bundle and sell this stolen data. But increasingly the compromised details have acted as a gateway for hackers to launch further attacks, providing them with the details needed to access online accounts and the networks of multi-billion dollar corporations.

“It’s clear that infostealers have become more than just grab-and-go malware,” says Patrick Wardle, CEO of the Apple device-focused security firm DoubleYou. “In many campaigns they really act as the first stage, collecting credentials, access tokens, and other foothold-enabling data, which is then used to launch more traditional, high-impact attacks such as lateral movement, espionage, or ransomware.”

The Lumma infostealer first emerged on Russian-language cybercrime forums in 2022, according to the FBI and CISA. Since then its developers have upgraded its capabilities and released multiple different versions of the software.

Since 2023, for example, they have been working to integrate AI into the malware platform, according to findings from the security firm Trellix. Attackers want to add these capabilities to automate some of the work involved in cleaning up the massive amounts of raw data collected by infostealers, including identifying and separating “bot” accounts that are less valuable for most attackers.

One administrator of Lumma told 404Media and WIRED last year that they encouraged both seasoned hackers and new cybercriminals to use their software. “This brings us good income,” the administrator said, referring to the resale of stolen login data.

Microsoft says that the main developer behind Lumma goes by the online handle “Shamel” and is based in Russia.

“Shamel markets different tiers of service for Lumma via Telegram and other Russian-language chat forums,” Microsoft’s Masada wrote on Wednesday. “Depending on what service a cybercriminal purchases, they can create their own versions of the malware, add tools to conceal and distribute it, and track stolen information through an online portal.”

Kela’s Kivilevich says that in the days leading up to the takedown, some cybercriminals started to complain on forums that there had been problems with Lumma. They even speculated that the malware platform had been targeted in a law enforcement operation.

“Based on what we see, there is a wide range of cybercriminals admitting they are using Lumma, such as actors involved in credit card fraud, initial access sales, cryptocurrency theft, and more,” Kivilevich says.

Among other tools, the Scattered Spider hacking group—which has attacked Caesars Entertainment, MGM Resorts International, and other victims—has been spotted using the Lumma stealer. Meanwhile, according to a report from TechCrunch, the Lumma malware was allegedly used in the build-up to the December 2024 hack of education tech firm PowerSchool, in which more than 70 million records were stolen.

“We’re now seeing infostealers not just evolve technically, but also play a more central role operationally,” says DoubleYou’s Wardle. “Even nation-state actors are developing and deploying them.”

Ian Gray, director of analysis and research at the security firm Flashpoint, says that while infostealers are only one tool that cybercriminals will use, their prevalence may make it easier for cybercriminals to hide their tracks. “Even advanced threat actor groups are leveraging infostealer logs, or they risk burning sophisticated tactics, techniques, and procedures (TTPs),” Gray says.

Lumma isn’t the first infostealer to be targeted by law enforcement. In October last year, the Dutch National Police, along with international partners, took down the infrastructure linked to the RedLine and MetaStealer malware, and the US Department of Justice unsealed charges against Maxim Rudometov, one of the alleged developers and administrators of the RedLine infostealer.

Despite the international crackdown, infostealers have proven too useful and effective for attackers to abandon. As Flashpoint’s Gray puts it, “Even if the landscape ultimately shifts due to the evolution of defenses, the growing prominence of infostealers over the past few years suggests they are likely here to stay for the foreseeable future. Usage of them has exploded.”

This story originally appeared at wired.com.

Photo of WIRED

Wired.com is your essential daily guide to what’s next, delivering the most original and complete take you’ll find anywhere on innovation’s impact on technology, science, business and culture.

Authorities carry out global takedown of infostealer used by cybercriminals Read More »

paris-agreement-target-won’t-protect-polar-ice-sheets,-scientists-warn

Paris Agreement target won’t protect polar ice sheets, scientists warn

“I think we’ve known for a long time that we’re interfering with the climate system in a very dangerous way,” he said. “And one of the points of our paper is to demonstrate that one part of the climate system, the ice sheets, are showing some very disturbing signals right now.”

Some of the most vulnerable places are far from any melting ice sheets, including Belize City, home to about 65,000 people, where just 3 feet of sea level rise would swamp 500 square miles of land.

In some low-lying tropical regions around the equator, sea level is rising three times as fast as the global average. That’s because the water is expanding as it warms, and as the ice sheets melt, their gravitational pull is reduced, allowing more water to flow away from the poles toward the equator.

“At low latitudes, it goes up more than the average,” Bamber said. “It’s bad news for places like Bangladesh, India, Vietnam, and the Nile Delta.”

Global policymakers need to be more aware of the effects of a 1.5° C temperature increase, Ambassador Carlos Fuller, long-time climate negotiator for Belize, said of the new study.

Belize already moved its capital inland, but its largest city will be inundated at just 1 meter of sea-level rise, he said.

“Findings such as these only sharpen the need to remain within the 1.5° Paris Agreement limit, or as close as possible, so we can return to lower temperatures and protect our coastal cities,” Fuller said.

While the new study is focused on ice sheets, Durham University’s Stokes notes that recent research shows other parts of the Earth system are already at, or very near, tipping points that are irreversible on a timescale relevant to human civilizations. That includes changes to freshwater systems and ocean acidification.

“I think somebody used the analogy that it’s like you’re wandering around in a dark room,” he said. “You know there’s a monster there, but you don’t know when you’re going to encounter it. It’s a little bit like that with these tipping points. We don’t know exactly where they are. We may have even crossed them, and we do know that we will hit them if we keep warming.”

Paris Agreement target won’t protect polar ice sheets, scientists warn Read More »

how-3d-printing-is-personalizing-health care

How 3D printing is personalizing health care


Prosthetics are becoming increasing affordable and accessible thanks to 3D printers.

Three-dimensional printing is transforming medical care, letting the health care field shift from mass-produced solutions to customized treatments tailored to each patient’s needs. For instance, researchers are developing 3D-printed prosthetic hands specifically designed for children, made with lightweight materials and adaptable control systems.

These continuing advancements in 3D-printed prosthetics demonstrate their increasing affordability and accessibility. Success stories like this one in personalized prosthetics highlight the benefits of 3D printing, in which a model of an object produced with computer-aided design software is transferred to a 3D printer and constructed layer by layer.

We are a biomedical engineer and a chemist who work with 3D printing. We study how this rapidly evolving technology provides new options not just for prosthetics but for implants, surgical planning, drug manufacturing, and other health care needs. The ability of 3D printing to make precisely shaped objects in a wide range of materials has led to, for example, custom replacement joints and custom-dosage, multidrug pills.

Better body parts

Three-dimensional printing in health care started in the 1980s with scientists using technologies such as stereolithography to create prototypes layer by layer. Stereolithography uses a computer-controlled laser beam to solidify a liquid material into specific 3D shapes. The medical field quickly saw the potential of this technology to create implants and prosthetics designed specifically for each patient.

One of the first applications was creating tissue scaffolds, which are structures that support cell growth. Researchers at Boston Children’s Hospital combined these scaffolds with patients’ own cells to build replacement bladders. The patients remained healthy for years after receiving their implants, demonstrating that 3D-printed structures could become durable body parts.

As technology progressed, the focus shifted to bioprinting, which uses living cells to create working anatomical structures. In 2013, Organovo created the world’s first 3D-bioprinted liver tissue, opening up exciting possibilities for creating organs and tissues for transplantation. But while significant advances have been made in bioprinting, creating full, functional organs such as livers for transplantation remains experimental. Current research focuses on developing smaller, simpler tissues and refining bioprinting techniques to improve cell viability and functionality. These efforts aim to bridge the gap between laboratory success and clinical application, with the ultimate goal of providing viable organ replacements for patients in need.

Three-dimensional printing already has revolutionized the creation of prosthetics. It allows prosthetics makers to produce affordable custom-made devices that fit the patient perfectly. They can tailor prosthetic hands and limbs to each individual and easily replace them as a child grows.

Three-dimensionally printed implants, such as hip replacements and spine implants, offer a more precise fit, which can improve how well they integrate with the body. Traditional implants often come only in standard shapes and sizes.

Some patients have received custom titanium facial implants after accidents. Others had portions of their skulls replaced with 3D-printed implants.

Additionally, 3D printing is making significant strides in dentistry. Companies such as Invisalign use 3D printing to create custom-fit aligners for teeth straightening, demonstrating the ability to personalize dental care.

Scientists are also exploring new materials for 3D printing, such as self-healing bioglass that might replace damaged cartilage. Moreover, researchers are developing 4D printing, which creates objects that can change shape over time, potentially leading to medical devices that can adapt to the body’s needs.

For example, researchers are working on 3D-printed stents that can respond to changes in blood flow. These stents are designed to expand or contract as needed, reducing the risk of blockage and improving long-term patient outcomes.

Simulating surgeries

Three-dimensionally printed anatomical models often help surgeons understand complex cases and improve surgical outcomes. These models, created from medical images such as X-rays and CT scans, allow surgeons to practice procedures before operating.

For instance, a 3D-printed model of a child’s heart enables surgeons to simulate complex surgeries. This approach can lead to shorter operating times, fewer complications, and lower costs.

Personalized pharmaceuticals

In the pharmaceutical industry, drugmakers can three-dimensionally print personalized drug dosages and delivery systems. The ability to precisely layer each component of a drug means that they can make medicines with the exact dose needed for each patient. The 3D-printed anti-epileptic drug Spritam was approved by the Food and Drug Administration in 2015 to deliver very high dosages of its active ingredient.

Drug production systems that use 3D printing are finding homes outside pharmaceutical factories. The drugs potentially can be made and delivered by community pharmacies. Hospitals are starting to use 3D printing to make medicine on-site, allowing for personalized treatment plans based on factors such as the patient’s age and health.

However, it’s important to note that regulations for 3D-printed drugs are still being developed. One concern is that postprinting processing may affect the stability of drug ingredients. It’s also important to establish clear guidelines and decide where 3D printing should take place – whether in pharmacies, hospitals or even at home. Additionally, pharmacists will need rigorous training in these new systems.

Printing for the future

Despite the extraordinarily rapid progress overall in 3D printing for health care, major challenges and opportunities remain. Among them is the need to develop better ways to ensure the quality and safety of 3D-printed medical products. Affordability and accessibility also remain significant concerns. Long-term safety concerns regarding implant materials, such as potential biocompatibility issues and the release of nanoparticles, require rigorous testing and validation.

While 3D printing has the potential to reduce manufacturing costs, the initial investment in equipment and materials can be a barrier for many health care providers and patients, especially in underserved communities. Furthermore, the lack of standardized workflows and trained personnel can limit the widespread adoption of 3D printing in clinical settings, hindering access for those who could benefit most.

On the bright side, artificial intelligence techniques that can effectively leverage vast amounts of highly detailed medical data are likely to prove critical in developing improved 3D-printed medical products. Specifically, AI algorithms can analyze patient-specific data to optimize the design and fabrication of 3D-printed implants and prosthetics. For instance, implant makers can use AI-driven image analysis to create highly accurate 3D models from CT scans and MRIs that they can use to design customized implants.

Furthermore, machine learning algorithms can predict the long-term performance and potential failure points of 3D-printed prosthetics, allowing prosthetics designers to optimize for improved durability and patient safety.

Three-dimensional printing continues to break boundaries, including the boundary of the body itself. Researchers at the California Institute of Technology have developed a technique that uses ultrasound to turn a liquid injected into the body into a gel in 3D shapes. The method could be used one day for delivering drugs or replacing tissue.

Overall, the field is moving quickly toward personalized treatment plans that are closely adapted to each patient’s unique needs and preferences, made possible by the precision and flexibility of 3D printing.The Conversation

Anne Schmitz, Associate Professor of Engineering, University of Wisconsin-Stout and Daniel Freedman, Dean of the College of Science, Technology, Engineering, Mathematics & Management, University of Wisconsin-Stout. This article is republished from The Conversation under a Creative Commons license. Read the original article.

Photo of The Conversation

The Conversation is an independent source of news and views, sourced from the academic and research community. Our team of editors work with these experts to share their knowledge with the wider public. Our aim is to allow for better understanding of current affairs and complex issues, and hopefully improve the quality of public discourse on them.

How 3D printing is personalizing health care Read More »

trump-has-“a-little-problem”-with-apple’s-plan-to-ship-iphones-from-india

Trump has “a little problem” with Apple’s plan to ship iPhones from India

Analysts estimate it would cost tens of billions of dollars and take years for Apple to increase iPhone manufacturing in the US, where it at present makes only a very limited number of products.

US Commerce Secretary Howard Lutnick said last month that Cook had told him the US would need “robotic arms” to replicate the “scale and precision” of iPhone manufacturing in China.

“He’s going to build it here,” Lutnick told CNBC. “And Americans are going to be the technicians who drive those factories. They’re not going to be the ones screwing it in.”

Lutnick added that his previous comments that an “army of millions and millions of human beings screwing in little screws to make iPhones—that kind of thing is going to come to America” had been taken out of context.

“Americans are going to work in factories just like this on great, high-paying jobs,” he added.

For Narendra Modi’s government, the shift by some Apple suppliers into India is the highest-profile success of a drive to boost local manufacturing and attract companies seeking to diversify away from China.

Mobile phones are now one of India’s top exports, with the country selling more than $7 billion worth of them to the US in the 2024-25 financial year, up from $4.7 billion the previous year. The majority of these were iPhones, which Apple’s suppliers Foxconn and Tata Electronics make at plants in southern India’s Tamil Nadu and Karnataka states.

Modi and Trump are ideologically aligned and personally friendly, but India’s high tariffs are a point of friction and Washington has threatened to hit it with a 26 percent tariff.

India and the US—its biggest trading partner—are negotiating a bilateral trade agreement, the first tranche of which they say they will be agreed by autumn.

“India’s one of the highest-tariff nations in the world, it’s very hard to sell into India,” Trump also said in Qatar on Thursday. “They’ve offered us a deal where basically they’re willing to literally charge us no tariff… they’re the highest and now they’re saying no tariff.”

© 2025 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.

Trump has “a little problem” with Apple’s plan to ship iPhones from India Read More »

incorporated-in-us:-$8.4b-money-launderer-for-chinese-speaking-crypto-scammers

Incorporated in US: $8.4B money launderer for Chinese-speaking crypto scammers


Before crackdown, this was one of the ‘Net’s biggest markets for Chinese-speaking scammers.

As the underground industry of crypto investment scams has grown into one of the world’s most lucrative forms of cybercrime, the secondary market of money launderers for those scammers has grown to match it. Amid that black market, one such Chinese-language service on the messaging platform Telegram blossomed into an all-purpose underground bazaar: It has offered not only cash-out services to scammers but also money laundering for North Korean hackers, stolen data, targeted harassment-for-hire, and even what appears to be sex trafficking. And somehow, it’s all overseen by a company legally registered in the United States.

According to new research released today by crypto-tracing firm Elliptic, a company called Xinbi Guarantee has since 2022 facilitated no less than $8.4 billion in transactions via its Telegram-based marketplace prior to Telegram’s actions in recent days to remove its accounts from the platform. Money stolen from scam victims likely represents the “vast majority” of that sum, according to Elliptic’s cofounder Tom Robinson. Yet even as the market serves Chinese-speaking scammers, it also boasts on the top of its website—in Mandarin—that it’s registered in Colorado.

“Xinbi Guarantee has served as a giant, purportedly US-incorporated illicit online marketplace for online scams that primarily offers money laundering services,” says Robinson. He adds, though, that Elliptic has also found a remarkable variety of other criminal offerings on the market: child-bearing surrogacy and egg donors, harassment services that offer to threaten or throw feces at any chosen victim, and even sex workers in their teens who are likely trafficking victims.

Xinbi Guarantee is the second such crime-friendly Chinese-language market that Robinson and his team of researchers have uncovered over the past year. Last July, they published a report on Huione Guarantee, a similar Cambodia-based service that Elliptic said in January had facilitated $24 billion in transactions—largely from crypto scammers—making it the biggest illicit online marketplace in history by Elliptic’s accounting. That market’s parent company, Huione Group, was added to a list of known money laundering operations by the US Treasury’s Financial Crimes Enforcement Network earlier this month in an attempt to limit its access to US financial institutions.

Telegram bans

After WIRED reached out to Telegram last week about the illicit activity taking place on Xinbi Guarantee’s and Huione Guarantee’s channels on its messaging platform, Telegram appears to have responded Monday by banning many of the central channels and administrator accounts used by both Xinbi Guarantee and Huione Guarantee. “Criminal activities like scamming or money laundering are forbidden by Telegram’s terms of service and are always removed whenever discovered,” Telegram spokesperson Remi Vaughn wrote to WIRED in a statement. “Communities previously reported to us by WIRED or included in reports published by Elliptic have all been taken down.”

Telegram had banned several of Huione Guarantee’s channels in February following an earlier Elliptic report on the marketplace, but Huione Guarantee quickly re-created them, and it’s not clear whether the new removals will prevent the two companies from rebuilding their presence on Telegram again, perhaps with new accounts or even new branding. “These are very lucrative businesses, and they’ll attempt to rebuild in some way,” Robinson said of the two marketplaces following Telegram’s latest purge.

Elliptic’s accounting of the total lifetime revenue of the biggest online black markets.Courtesy of Elliptic

Xinbi Guarantee didn’t respond to multiple requests for comment on Elliptic’s findings that WIRED sent to the market’s administrators on Telegram.

Like Huione Guarantee, Xinbi Guarantee has offered a similar “guarantee” model of enabling third-party vendors to offer services by requiring a deposit from them to prevent fraud. Yet it’s flown under the radar, even as it grew into one of the biggest hubs for crypto crime on the Internet. In terms of scale of transactions prior to Telegram’s crackdown, it was second only to Huione’s market, according to Elliptic.

Both services “offer a window into the China-based underground banking network,” Robinson says. “It’s another example of these huge Chinese-language ‘guaranteed’ marketplaces that have thrived for years.”

On Xinbi Guarantee, Elliptic found numerous posts from vendors offering to accept funds related to “quick kills,” “slow kills,” and “pig butchering” transactions, all different terms for crypto investment scams and other forms of fraud. In some cases, Robinson explains, these Xinbi Guarantee vendors offer bank accounts in the same country as the victim so that they can receive whatever payment they’re tricked into making, then pay the scammer in the cryptocurrency Tether. In other cases, the Xinbi Guarantee merchants offer to receive cryptocurrency payments and cash them out in the scammer’s local currency, such as Chinese renminbi.

Not just money laundering

Aside from Xinbi Guarantee’s central use as a cash-out point for crypto scammers, Elliptic also found that the market’s vendors offered other wares for scammers such as stolen data that could be used for finding victims, as well as services for registering SIM cards and Starlink Internet subscriptions through proxies.

North Korean state-sponsored cybercriminals also appear to have used the platform for money laundering. Elliptic found through blockchain analysis, for instance, that about $220,000 stolen from the Indian cryptocurrency exchange WazirX—the victim of a $235 million theft in July 2024, widely attributed to North Korean hackers—had flowed into Xinbi Guarantee in a series of transactions in November.

Those money-laundering and scam-enabling services, however, are far from the only shady offerings found on Xinbi Guarantee’s market. Elliptic also found listings for surrogate mothers and egg donors, with one post showing faceless pictures of the donor’s body. Other accounts have offered services that will, for a payment in Tether, place a funeral wreath at a target’s door, deface their home with graffiti, post damaging statements around their home, have someone verbally threaten them, throw feces at them, or even, most bizarrely, surround their home with AIDS patients. One posting suggested these AIDS patients would carry “case reports and needles for intimidation.”

Other listings have offered sex workers as young as 18 years old, noting the specific sex acts that are allowed and forbidden. Elliptic says that one of its researchers was even offered a 14-year-old by a Xinbi Guarantee merchant. (The account holder noted, however, that no transaction for sex with someone below the age of 18 would be guaranteed by Xinbi. The legal age of consent in China is 14.)

Exactly why Xinbi Guarantee is legally registered in the US remains a mystery. Its incorporation record on the Colorado Secretary of State’s website shows an address at an office park in the city of Aurora that has no external Xinbi branding. The company appears to have been registered there in August of 2022 by someone named “Mohd Shahrulnizam Bin Abd Manap.” (WIRED connected that name with several people in Malaysia but couldn’t determine which one might be Xinbi Guarantee’s registrant.) The listing is currently marked as “delinquent,” perhaps due to failure to file more recent paperwork to renew it.

For fledgling Chinese companies—legitimate and illegitimate—incorporating in the US is an increasingly common tactic for “projecting legitimacy,” says Jacob Sims, a visiting fellow at Harvard’s Asia Center who focuses on transnational Chinese crime. “If you have a US presence, you can also open US bank accounts,” Sims says. “You could potentially hire staff in the US. You could in theory have more formalized connections to US entities.” But he notes that the registration’s delinquent status may mean Xinbi Guarantee tried to make some sort of inroads in the US in the past but gave up.

While Telegram has served as the chief means of communication for the two markets, the stablecoin cryptocurrency Tether has served as their primary means of payment, Elliptic found. And despite Telegram’s new round of removals of their channels and accounts, Xinbi Guarantee and Huione Guarantee are far from the only companies to use Tether and Telegram to create essentially a new, largely Chinese-language darknet: Elliptic is tracking close to 30 similar marketplaces, Robinson says, though he declined to name others in the midst of the company’s investigations.

Just as Telegram shows new signs of cracking down on that sprawling black market, Tether, too, has the ability to disrupt criminal use of its services. Unlike other more decentralized cryptocurrencies such as Bitcoin, Tether can freeze payments when it identifies bad actors. Yet it’s not clear to what degree Tether has taken measures to stop Chinese-language crypto scammers and others on Xinbi Guarantee and Huione Guarantee from using its currency.

When WIRED wrote to Tether to ask about its role in those black markets, the company responded in a statement that it encourages “firms like Elliptic and other blockchain intelligence providers to share critical data with law enforcement so we can act swiftly and in coordination.”

“We are not passive observers—we are active players in the global fight against financial crime,” the Tether statement continued. “If you’re considering using Tether for illicit purposes, think again: it is the most traceable asset in existence. We will identify you, and we will work to ensure you are brought to justice.”

Despite that promise—and Telegram’s new effort to remove Huione Guarantee and Xinbi Guarantee from its platform—both tools have already been used to facilitate tens of billions of dollars in theft and other black market deals, much of it occurring in plain sight. The two largely illegal and very public markets have been “remarkable for both the scale at which they’re operating and also the brazenness,” says Harvard’s Jacob Sims.

Given that brazenness and the massive criminal fortunes at stake, expect both markets to attempt a revival in some form—and plenty of competitors to try to take their place atop the Chinese-language crypto crime economy.

This story originally appeared on wired.com.

Photo of WIRED

Wired.com is your essential daily guide to what’s next, delivering the most original and complete take you’ll find anywhere on innovation’s impact on technology, science, business and culture.

Incorporated in US: $8.4B money launderer for Chinese-speaking crypto scammers Read More »

us-warns-companies-around-the-world-to-stay-away-from-huawei-chips

US warns companies around the world to stay away from Huawei chips

President Donald Trump’s administration has taken a tougher stance on Chinese technology advances, warning companies around the world that using artificial intelligence chips made by Huawei could trigger criminal penalties for violating US export controls.

The commerce department issued guidance to clarify that Huawei’s Ascend processors were subject to export controls because they almost certainly contained, or were made with, US technology.

Its Bureau of Industry and Security, which oversees export controls, said on Tuesday it was taking a more stringent approach to foreign AI chips, including “issuing guidance that using Huawei Ascend chips anywhere in the world violates US export controls.”

But people familiar with the matter stressed that the bureau had not issued a new rule, but was making it clear to companies that Huawei chips are likely to have violated a measure that requires hard-to-get licenses to export US technology to the Chinese company.

“The guidance is not a new control, but rather a public confirmation of an interpretation that even the mere use anywhere by anyone of a Huawei-designed advanced computing [integrated circuit] would violate export control rules,” said Kevin Wolf, a veteran export control lawyer at Akin Gump.

The bureau said three Huawei Ascend chips—the 910B, 910C, and 910D—were subject to the regulations, noting that such chips are likely to have been “designed with certain US software or technology or produced with semiconductor manufacturing equipment that is the direct produce of certain US-origin software or technology, or both.”

The guidance comes as the US has become increasingly concerned at the speed at which Huawei has developed advanced chips and other AI hardware.

Huawei has begun delivering AI chip “clusters” to clients in China that it claims outperform leading US AI chipmaker Nvidia’s comparable product on key metrics such as total compute and memory. The system relies on a large number of 910C chips, which individually fall short of Nvidia’s most advanced offering but collectively deliver superior performance to a rival Nvidia cluster product.

US warns companies around the world to stay away from Huawei chips Read More »

welcome-to-the-age-of-paranoia-as-deepfakes-and-scams-abound

Welcome to the age of paranoia as deepfakes and scams abound


AI-driven fraud is leading people to verify every online interaction they have.

These days, when Nicole Yelland receives a meeting request from someone she doesn’t already know, she conducts a multistep background check before deciding whether to accept. Yelland, who works in public relations for a Detroit-based nonprofit, says she’ll run the person’s information through Spokeo, a personal data aggregator that she pays a monthly subscription fee to use. If the contact claims to speak Spanish, Yelland says, she will casually test their ability to understand and translate trickier phrases. If something doesn’t quite seem right, she’ll ask the person to join a Microsoft Teams call—with their camera on.

If Yelland sounds paranoid, that’s because she is. In January, before she started her current nonprofit role, Yelland says, she got roped into an elaborate scam targeting job seekers. “Now, I do the whole verification rigamarole any time someone reaches out to me,” she tells WIRED.

Digital imposter scams aren’t new; messaging platforms, social media sites, and dating apps have long been rife with fakery. In a time when remote work and distributed teams have become commonplace, professional communications channels are no longer safe, either. The same artificial intelligence tools that tech companies promise will boost worker productivity are also making it easier for criminals and fraudsters to construct fake personas in seconds.

On LinkedIn, it can be hard to distinguish a slightly touched-up headshot of a real person from a too-polished, AI-generated facsimile. Deepfake videos are getting so good that longtime email scammers are pivoting to impersonating people on live video calls. According to the US Federal Trade Commission, reports of job and employment related scams nearly tripled from 2020 to 2024, and actual losses from those scams have increased from $90 million to $500 million.

Yelland says the scammers that approached her back in January were impersonating a real company, one with a legitimate product. The “hiring manager” she corresponded with over email also seemed legit, even sharing a slide deck outlining the responsibilities of the role they were advertising. But during the first video interview, Yelland says, the scammers refused to turn their cameras on during a Microsoft Teams meeting and made unusual requests for detailed personal information, including her driver’s license number. Realizing she’d been duped, Yelland slammed her laptop shut.

These kinds of schemes have become so widespread that AI startups have emerged promising to detect other AI-enabled deepfakes, including GetReal Labs and Reality Defender. OpenAI CEO Sam Altman also runs an identity-verification startup called Tools for Humanity, which makes eye-scanning devices that capture a person’s biometric data, create a unique identifier for their identity, and store that information on the blockchain. The whole idea behind it is proving “personhood,” or that someone is a real human. (Lots of people working on blockchain technology say that blockchain is the solution for identity verification.)

But some corporate professionals are turning instead to old-fashioned social engineering techniques to verify every fishy-seeming interaction they have. Welcome to the Age of Paranoia, when someone might ask you to send them an email while you’re mid-conversation on the phone, slide into your Instagram DMs to ensure the LinkedIn message you sent was really from you, or request you text a selfie with a time stamp, proving you are who you claim to be. Some colleagues say they even share code words with each other, so they have a way to ensure they’re not being misled if an encounter feels off.

“What’s funny is, the lo-fi approach works,” says Daniel Goldman, a blockchain software engineer and former startup founder. Goldman says he began changing his own behavior after he heard a prominent figure in the crypto world had been convincingly deepfaked on a video call. “It put the fear of god in me,” he says. Afterward, he warned his family and friends that even if they hear what they believe is his voice or see him on a video call asking for something concrete—like money or an Internet password—they should hang up and email him first before doing anything.

Ken Schumacher, founder of the recruitment verification service Ropes, says he’s worked with hiring managers who ask job candidates rapid-fire questions about the city where they claim to live on their résumé, such as their favorite coffee shops and places to hang out. If the applicant is actually based in that geographic region, Schumacher says, they should be able to respond quickly with accurate details.

Another verification tactic some people use, Schumacher says, is what he calls the “phone camera trick.” If someone suspects the person they’re talking to over video chat is being deceitful, they can ask them to hold up their phone camera to show their laptop. The idea is to verify whether the individual may be running deepfake technology on their computer, obscuring their true identity or surroundings. But it’s safe to say this approach can also be off-putting: Honest job candidates may be hesitant to show off the inside of their homes or offices, or worry a hiring manager is trying to learn details about their personal lives.

“Everyone is on edge and wary of each other now,” Schumacher says.

While turning yourself into a human captcha may be a fairly effective approach to operational security, even the most paranoid admit these checks create an atmosphere of distrust before two parties have even had the chance to really connect. They can also be a huge time suck. “I feel like something’s gotta give,” Yelland says. “I’m wasting so much time at work just trying to figure out if people are real.”

Jessica Eise, an assistant professor studying climate change and social behavior at Indiana University Bloomington, says her research team has been forced to essentially become digital forensics experts due to the amount of fraudsters who respond to ads for paid virtual surveys. (Scammers aren’t as interested in the unpaid surveys, unsurprisingly.) For one of her research projects, which is federally funded, all of the online participants have to be over the age of 18 and living in the US.

“My team would check time stamps for when participants answered emails, and if the timing was suspicious, we could guess they might be in a different time zone,” Eise says. “Then we’d look for other clues we came to recognize, like certain formats of email address or incoherent demographic data.”

Eise says the amount of time her team spent screening people was “exorbitant” and that they’ve now shrunk the size of the cohort for each study and have turned to “snowball sampling,” or recruiting people they know personally to join their studies. The researchers are also handing out more physical flyers to solicit participants in person. “We care a lot about making sure that our data has integrity, that we’re studying who we say we’re trying to study,” she says. “I don’t think there’s an easy solution to this.”

Barring any widespread technical solution, a little common sense can go a long way in spotting bad actors. Yelland shared with me the slide deck that she received as part of the fake job pitch. At first glance, it seemed legit, but when she looked at it again, a few details stood out. The job promised to pay substantially more than the average salary for a similar role in her location and offered unlimited vacation time, generous paid parental leave, and fully covered health care benefits. In today’s job environment, that might have been the biggest tipoff of all that it was a scam.

This story originally appeared on wired.com.

Photo of WIRED

Wired.com is your essential daily guide to what’s next, delivering the most original and complete take you’ll find anywhere on innovation’s impact on technology, science, business and culture.

Welcome to the age of paranoia as deepfakes and scams abound Read More »