6.9 C
New York
Friday, March 28, 2025
Home Blog Page 3832

Robots-Weblog | Vention demokratisiert die industrielle Automatisierung  mithilfe von NVIDIA-KI-Technologien

0


MONTREAL/BERLIN, Juni 2024 – Vention, das Unternehmen hinter der  cloudbasierten Manufacturing Automation Platform (MAP), gibt eine Zusammenarbeit  mit NVIDIA bekannt. Das Ziel ist, kleinen und mittleren Unternehmen (KMU) industrielle Automatisierungstechnologie zugänglich zu machen. Um die Cloud Robotik voranzutreiben, sollen KI-Technologien von NVIDIA und beschleunigtes  Computing genutzt werden.  

Robots-Weblog | Vention demokratisiert die industrielle Automatisierung  mithilfe von NVIDIA-KI-Technologien

Die Ankündigung markiert ein Jahr gemeinsamer Bemühungen, künstliche Intelligenz (KI) zu  nutzen, um die Realisierung von industriellen Automatisierungs- und Robotikprojekten – vom  Design bis zum Betrieb – zu vereinfachen.  

Die Vention Plattform ist KI-fähig und basiert auf einem proprietären Datensatz mit mehreren  hunderttausend Roboterzellendesigns, die seit der Gründung des Unternehmens 2016  erstellt wurden. Vention beabsichtigt, dieses einzigartige Potenzial zu nutzen, um das  Benutzererlebnis in der Cloud und beim Edge Computing zu vereinfachen. Die  Zusammenarbeit mit NVIDIA konzentriert sich darauf, mithilfe von KI digitale Zwillinge  deutlich schneller und effizienter zu erstellen, damit Unternehmen ihre Projekte testen  können, bevor sie investieren. Zu den Entwicklungsbereichen gehören generative Designs  für Roboterzellen, Co-Pilot-Programmierung, physikbasierte Simulation und autonome  Roboter.  

In Kombination mit Ventions modularer {Hardware} und Plug-and-Play  Bewegungssteuerungstechnologie wird die Zusammenarbeit mit NVIDIA modernste KI in  den Vordergrund der Fertigung rücken und darauf abzielen, KMU den Zugang zu industrieller  Automatisierungstechnologie zu erleichtern. Vention ist bereits für seine  benutzerfreundlichen Softwareprodukte und -schnittstellen bekannt und möchte KMU auch  weiterhin Lösungen anbieten, die es ermöglichen, die Automatisierung schneller und  effizienter umzusetzen.  

Eine Reihe neuer Vention-Produkte, die aus dieser Zusammenarbeit hervorgehen, wird voraussichtlich im dritten Quartal 2024 angekündigt. 

„Das Vention Ökosystem wird zusammen mit NVIDIAs Robotertechnologie und KI-Experience  dazu beitragen, Innovationen in der Fertigungsindustrie entscheidend voranzubringen. Jetzt  können selbst die komplexesten Anwendungsfälle für kleine und mittlere Hersteller  umgesetzt werden.“ – Etienne Lacroix, Gründer und CEO von Vention.  

„Ventions cloudbasierte Roboterplattform, die von NVIDIA KI angetrieben wird, wird es  Herstellern von Industrieanlagen überall ermöglichen, Roboterzellen nahtlos zu entwerfen,  einzusetzen und zu betreiben und so die Branche voranzubringen.“ – Deepu Talla,  Vizepräsident für Robotik und Edge Computing bei NVIDIA. 



Direct remark of electron switch in solids achieved


Direct remark of electron switch in solids achieved

by Riko Seibo

Tokyo, Japan (SPX) Jun 05, 2024






Electron switch (ET) is a course of the place an electron strikes from one atom or molecule to a different, basic to electrochemical reactions with purposes throughout numerous fields. Nanoscale ET, involving electron switch within the 1-100 nanometer vary inside solids, is essential for designing multifunctional supplies however stays not absolutely understood.



Nanotubes, with distinctive cylindrical nanostructures, exhibit various ET properties by electron and gap injections, making them very best for learning nanoscale ET. Nevertheless, carbon-based nanotubes current challenges in controlling form and measurement as a consequence of excessive synthesis circumstances.



A bottom-up fabrication method for non-covalent nanotubes, generally leading to crystalline types, presents an answer. Non-covalent nanotubes, fashioned by engaging non-covalent interactions, will not be sturdy sufficient to face up to electron and gap injections, which may break their construction.



Researchers from the Division of Utilized Chemistry at Tokyo College of Science, led by Professor Junpei Yuasa and together with Dr. Daiji Ogata, Mr. Shota Koide, and Mr. Hiroyuki Kishi, have developed a novel method to straight observe solid-state ET. Prof. Yuasa acknowledged, “We have now developed crystalline nanotubes with a particular double-walled construction.



By incorporating electron donor molecules into the pores of those crystalline nanotubes by a solid-state oxidation response, we succeeded in straight observing the electron switch response within the stable utilizing X-ray crystal construction evaluation.” Their findings had been revealed within the journal Nature Communications on Might 23, 2024.



The workforce employed a novel supramolecular crystallization methodology, involving oxidation-based crystallization, to manufacture zinc-based double-walled crystalline nanotubes. This construction, with giant home windows within the nanotube partitions, is powerful and versatile sufficient to keep up its crystalline state throughout ET oxidation processes.



The nanotubes absorbed electron donor molecules, corresponding to ferrocene and tetrathiafulvalene, by these home windows, facilitating solid-state ET oxidation reactions and creating holes within the donors throughout the nanotube. The robustness of the crystals allowed direct remark of this ET oxidation course of utilizing X-ray crystal construction evaluation, revealing key insights.



This method is efficacious for straight observing ET in stable nanomaterials. Prof. Yuasa emphasised, “Understanding ET can result in the event of novel useful supplies, which in flip can result in the design of extra environment friendly semiconductors, transistors, and different digital units. Optoelectronic units, corresponding to photo voltaic cells, rely closely on ET. Therefore, direct remark of ET might help enhance these units’ efficiency. Moreover, this method can result in developments in vitality storage, nanotechnology, and supplies science analysis.”



This examine exemplifies the direct remark of solid-state ET, doubtlessly increasing to watch ET and associated phenomena in different nanomaterials.



Analysis Report:Direct remark of electron switch in solids by X-ray crystallography


Associated Hyperlinks

Tokyo College of Science

Understanding Time and Area



Hydrogen on the excessive seas: Crusing vessel secures £4.65 million seed capital



Hydrogen on the excessive seas: Crusing vessel secures £4.65 million seed capital
Picture credit score: Drift Power.

The UK startup behind a system to make inexperienced vitality at sea utilizing hi-tech crusing vessels has secured £4.65 million in seed capital, enabling it to scale and realise its ambition to start out vessel manufacturing subsequent 12 months.

The seed funding spherical for DRIFT Power was led by enterprise capital agency Octopus Ventures, with assist from Blue Motion Accelerator.

DRIFT mentioned it’s creating renewable vitality partnerships that may profit coastal and island communities world wide. Ben Medland, Founder and CEO, just lately attended the United Nations’ 4th Worldwide Convention on Small Island Growing States, the place he mentioned he noticed big alternative for the corporate to assist the vitality transition for the 65+ million people who dwell throughout greater than 1000 islands on the planet.

He mentioned the funding “allows us to drive with momentum into the subsequent part of our mission. We are going to work intently with Octopus and our advisory groups to deliver our imaginative and prescient of ‘Oceans of Power’ to life with that all-important first net-positive ship.”

Mat Munro, Investor at Octopus Ventures, mentioned: “We’re extremely enthusiastic about DRIFT and the staff’s potential to cleared the path in creating a really revolutionary supply of renewable vitality. At Octopus Ventures, we’re backing the businesses constructing a sustainable planet, and DRIFT’s ambitions are precisely what we’re on the lookout for. We will’t anticipate the day its first vessel units out on its maiden voyage.”

George Northcott, Co-Founding father of Blue Motion Accelerator added: “Blue Motion Accelerator’s mission is to assist scale groundbreaking applied sciences that protect marine environments and assist coastal-dependent communities. DRIFT is the final word instance of that – creating a brand new class of cell renewable vitality from the world’s seas and delivering it to the place it’s wanted – from island nation communities to energy hungry ports. We’re thrilled to be supporting them as they construct their first vessels and produce a imaginative and prescient to life.”

DRIFT Power has additionally just lately been awarded funding from Innovate UK, the UK’s innovation company, by its Investor Partnership Programme, which is designed to drive funding into high- progress, revolutionary UK corporations engaged on cutting-edge know-how. The grant will help the analysis and growth programme and speed up the design technique of the primary vessel.

Keyboard shortcuts for Export Unmodified Authentic in Images for Mac – Ole Begemann


Drawback

  1. The Images app on macOS doesn’t present a keyboard shortcut for the Export Unmodified Authentic command.
  2. macOS means that you can add your individual app-specific keyboard shortcuts by way of System Settings > Keyboard > Keyboard Shortcuts > App Shortcuts. It is advisable enter the precise spelling of the menu merchandise you need to invoke.
  3. Images renames the command relying on what’s chosen: Export Unmodified Authentic For 1 Photograph“ turns into ”… Authentics For two Videos” turns into “… For 3 Objects” (for blended choices), and so forth. Argh!
  4. The System Settings UI for assigning keyboard shortcuts is extraordinarily tedious to make use of if you wish to add a couple of or two shortcuts.

Keyboard shortcuts for Export Unmodified Authentic in Images for Mac – Ole Begemann
Dynamically renaming menu instructions is cute, nevertheless it turns into an issue whenever you need to assign keyboard shortcuts.

Resolution: shell script

Right here’s a Bash script that assigns Ctrl + Decide + Cmd + E to Export Unmodified Originals for as much as 20 chosen gadgets:

#!/bin/bash

# Assigns a keyboard shortcut to the Export Unmodified Originals
# menu command in Images.app on macOS.

# @ = Command
# ^ = Management
# ~ = Choice
# $ = Shift
shortcut='@~^e'

# Set shortcut for 1 chosen merchandise
echo "Setting shortcut for 1 merchandise"
defaults write com.apple.Images NSUserKeyEquivalents -dict-add "Export Unmodified Authentic For 1 Photograph" "$shortcut"
defaults write com.apple.Images NSUserKeyEquivalents -dict-add "Export Unmodified Authentic For 1 Video" "$shortcut"

# Set shortcut for 2-20 chosen gadgets
objects=(Images Movies Objects)
for i in {2..20}
do
  echo "Setting shortcut for $i gadgets"
  for object in "${objects[@]}"
  do
    defaults write com.apple.Images NSUserKeyEquivalents -dict-add "Export Unmodified Originals For $i $object" "$shortcut"
  completed
completed

# Use this command to confirm the consequence:
# defaults learn com.apple.Images NSUserKeyEquivalents

The script is additionally accessible on GitHub.

Utilization:

  1. Stop Images.app.
  2. Run the script. Be at liberty to alter the important thing combo or rely increased than 20.
  3. Open Images.app.

Be aware: There’s a bug in Images.app on macOS 13.2 (and not less than some earlier variations). Customized keyboard shortcuts don’t work till you’ve opened the menu of the respective command not less than as soon as. So you could manually open the File > Export as soon as earlier than the shortcut will work. (For Apple of us: FB11967573.)

Phishing focusing on Polish SMBs continues by way of ModiLoader

0


ESET Analysis

ESET researchers detected a number of, widespread phishing campaigns focusing on SMBs in Poland throughout Could 2024, distributing varied malware households

Phishing targeting Polish SMBs continues via ModiLoader

Only a few months again, ESET Analysis printed a blogpost about large phishing campaigns throughout Central and Jap Europe carried out through the second half of 2023. In these campaigns Rescoms malware (often known as Remcos), protected by AceCryptor, was delivered to potential victims with the targets of credential theft and potential acquire of preliminary entry to firm networks.

Phishing campaigns focusing on the area didn’t cease in 2024. On this blogpost we current what latest phishing campaigns appeared like and the way the selection of supply mechanism shifted away from AceCryptor to ModiLoader.

Key factors of this blogpost:

  • ESET detected 9 notable ModiLoader phishing campaigns throughout Could 2024 in Poland, Romania, and Italy.
  • These campaigns focused small and medium-sized companies.
  • Seven of the campaigns focused Poland, the place ESET merchandise protected over 21,000 customers.
  • Attackers deployed three malware households by way of ModiLoader: Rescoms, Agent Tesla, and Formbook.
  • Attackers used beforehand compromised e-mail accounts and firm servers, not solely to unfold malicious emails but in addition to host malware and accumulate stolen knowledge.

Overview

Regardless that the phishing campaigns have been ongoing all through the primary half of 2024, this blogpost focuses simply on Could 2024, as this was an eventful month. Throughout this era, ESET merchandise protected over 26,000 customers, over 21,000 (80%) of whom had been in Poland. Along with Poland, the place over 80% of potential victims had been situated, Italy and Romania had been additionally focused by the phishing campaigns. In complete we registered 9 phishing campaigns, seven of which focused Poland all through Could, as could be seen in Determine 1.

figure1_ModiLoader hits by date chart
Determine 1. Hits of ModiLoader phishing campaigns in Poland throughout Could 2024

Compared with the campaigns that passed off through the finish of 2023, we see a shift away from utilizing AceCryptor as a device of selection to guard and efficiently ship the malware. As an alternative, in all 9 campaigns, attackers used ModiLoader (aka DBatLoader) as the popular supply device of selection. The ultimate payload to be delivered and launched on the compromised machines diverse; we’ve detected campaigns delivering:

  • Formbook – info stealing malware found in 2016,
  • Agent Tesla – a distant entry trojan and knowledge stealer, and
  • Rescoms RAT – distant management and surveillance software program, in a position to steal delicate info.

Campaigns

On the whole, all campaigns adopted an identical situation. The focused firm obtained an e-mail message with a enterprise supply that might be so simple as “Please present your greatest value supply for the hooked up order no. 2405073”, as could be seen in Determine 2.

Figure 2. Example of a phishing email containing ModiLoader in the attachment
Determine 2. Instance of a phishing e-mail containing ModiLoader within the attachment

In different campaigns, e-mail messages had been extra verbose, such because the phishing e-mail in Determine 3, which could be translated as follows:

Hello,

We want to buy your product for our consumer.

Please discover the hooked up inquiry for step one of this buy.

The hooked up sheet comprises goal costs for many merchandise. I highlighted 10 components to concentrate on pricing – the remainder of the gadgets are elective to cost (we are going to apply related value degree primarily based on different costs).

Please get again to me earlier than 28/05/2024

In the event you want extra time, please let me know the way a lot you will want.

When you’ve got any questions, please additionally let me know.

Figure 3. A more verbose phishing email example containing ModiLoader in the attachment
Determine 3. A extra verbose phishing e-mail instance containing ModiLoader within the attachment

As within the phishing campaigns of H2 2023, attackers impersonated current firms and their staff because the strategy of selection to extend marketing campaign success fee. On this approach, even when the potential sufferer appeared for the same old pink flags (apart from potential translation errors), they had been simply not there, and the e-mail appeared as reputable because it may have.

Contained in the attachments

Emails from all campaigns contained a malicious attachment that the potential sufferer was incentivized to open, primarily based on the textual content of the e-mail. These attachments had names like RFQ8219000045320004.tar (as in Request for Citation) or ZAMÓWIENIE_NR.2405073.IMG (translation: ORDER_NO) and the file itself was both an ISO file or archive.

In campaigns the place an ISO file was despatched as an attachment, the content material was the ModiLoader executable (named equally or the identical because the ISO file itself) that might be launched if a sufferer tried to open the executable.

Within the different case, when a RAR archive was despatched as an attachment, the content material was a closely obfuscated batch script, with the identical title because the archive and with the .cmd file extension. This file additionally contained a base64-encoded ModiLoader executable, disguised as a PEM-encoded certificates revocation record. The script is accountable for decoding and launching the embedded ModiLoader (Determine 4).

Figure 4. File with .cmd extension containing heavily obfuscated batch script (top) that decodes base64-encoded ModiLoader binary (bottom)
Determine 4. File with .cmd extension containing closely obfuscated batch script (prime) that decodes base64-encoded ModiLoader binary (backside)

When ModiLoader is launched

ModiLoader is a Delphi downloader with a easy process – to obtain and launch malware. In two of the campaigns, ModiLoader samples had been configured to obtain the next-stage malware from a compromised server belonging to a Hungarian firm. In the remainder of the campaigns ModiLoader downloaded the following stage from Microsoft’s OneDrive cloud storage. We noticed 4 accounts the place second-stage malware was hosted. The entire chain of compromise from receiving the malicious e-mail till launching the ultimate payload is summarized in Determine 5.

Figure 5. Chain of compromise of ModiLoader phishing campaigns in Poland during May 2024
Determine 5. Chain of compromise of ModiLoader phishing campaigns in Poland throughout Could 2024

Knowledge exfiltration

Three completely different malware households had been used as a closing payload: Agent Tesla, Rescoms, and Formbook. All these households are able to info stealing and thus enable attackers not solely to increase their datasets of stolen info, but in addition to organize the bottom for his or her subsequent campaigns. Regardless that the exfiltration mechanisms differ between malware households and campaigns, it’s price mentioning two examples of those mechanisms.

In a single marketing campaign, info was exfiltrated by way of SMTP to an handle utilizing a site just like that of a German firm. Notice that typosquatting was a preferred approach used within the Rescoms campaigns from the tip of final yr. These older campaigns used typosquatted domains for sending phishing emails. One of many new campaigns used a typosquatted area for exfiltrating knowledge. When somebody tried to go to net pages of this typosquatted area, they’d be instantly redirected to the online web page of the reputable (impersonated) firm.

In one other marketing campaign, we noticed knowledge being exfiltrated to an internet server of a visitor home situated in Romania (a rustic focused now and up to now by such campaigns). On this case, the online server appears reputable (so no typosquatting) and we imagine that the lodging’s server had been compromised throughout earlier campaigns and abused for malicious actions.

Conclusion

Phishing campaigns focusing on small and medium-sized companies in Central and Jap Europe are nonetheless going sturdy within the first half of 2024. Moreover, attackers make the most of beforehand profitable assaults and actively use compromised accounts or machines to additional unfold malware or accumulate stolen info. In Could alone, ESET detected 9 ModiLoader phishing campaigns, and much more outdoors this timeframe. Not like the second half of 2023, when Rescoms packed by AceCryptor was the popular malware of selection of the attackers, they didn’t hesitate to vary the malware they use to be extra profitable. As we introduced, there are a number of different malware households like ModiLoader or Agent Tesla within the arsenal of those attackers, prepared for use.

ESET Analysis provides personal APT intelligence studies and knowledge feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.

IoCs

A complete record of indicators of compromise (IoCs) could be present in our GitHub repository.

Recordsdata

SHA-1

Filename

Detection

Description

E7065EF6D0CF45443DEF
30D3A3A35FD7300C4A56

doc023561361500.img

Win32/TrojanDownloader.
ModiLoader.ACM

Malicious attachment from phishing marketing campaign carried out in Poland throughout Could 2024.

31672B52259B4D514E68
DA5D199225FCFA72352B

doc023561361500__
079422732__202410502__
000023.pdf.exe

Win32/TrojanDownloader.
ModiLoader.ACM

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Could 2024.

B71070F9ADB17C942CB6
92566E6020ACCA93726A

N/A

MSIL/Spy.Agent.CVT

Agent Tesla executable from phishing marketing campaign carried out in Poland throughout Could 2024.

D7561594C7478C4FE37C
26684005268EB582E13B

ZAMÓWIENIE_NR.2405073.
IMG

Win32/TrojanDownloader.
ModiLoader.ACR

Malicious attachment from phishing marketing campaign carried out in Poland throughout Could 2024.

47AF4CFC9B250AC4AE8C
DD0A2D2304D7CF60AACE

ZAMÓWIENIE_NR.2405073.
exe

Win32/TrojanDownloader.
ModiLoader.ACR

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Could 2024.

2963AF32AB4D497CB41F
C85E54A9E5312D28BCDE

N/A

Win32/Formbook.AA

Formbook executable from phishing marketing campaign carried out in Poland throughout Could 2024.

5DAB001A2025AA91D278
163F39E7504004354F01

RFQ8219000045320004.
tar

Win32/TrojanDownloader.
ModiLoader.ACP.Gen

Malicious attachment from phishing marketing campaign carried out in Poland throughout Could 2024.

D88B10E4FD487BFCCA6A
711A9E33BB153674C757

RFQ8219000045320004.
cmd

Win32/TrojanDownloader.
ModiLoader.ACP.Gen

Malicious batch script from phishing marketing campaign carried out in Poland throughout Could 2024.

F0295F2E46CEBFFAF789
2A5B33BA54122781C20B

N/A

Win32/TrojanDownloader.
ModiLoader.ADB

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Could 2024.

3C0A0EC8FE9EB3E5DAB2
018E94CEB4E29FD8DD33

N/A

Win32/Rescoms.B

Rescoms executable from phishing marketing campaign carried out in Poland throughout Could 2024.

9B5AF677E565FFD4B15D
EE283D46C2E60E1E31D8

DOCUMENT_BT24PDF.IMG

Win32/TrojanDownloader.
ModiLoader.ADB

Malicious attachment from phishing marketing campaign carried out in Romania throughout Could 2024.

738CFBE52CFF57098818
857930A7C1CF01DB0519

DOCUMENT_BT24PDF.exe

Win32/TrojanDownloader.
ModiLoader.ADB

ModiLoader executable from phishing marketing campaign carried out in Romania throughout Could 2024.

843CE8848BCEEEF16D07
041A97417882DBACB93F

N/A

Win32/Formbook.AA

Formbook executable from phishing marketing campaign carried out in Romania throughout Could 2024.

MITRE ATT&CK strategies

This desk was constructed utilizing model 15 of the MITRE ATT&CK framework.

Tactic

ID

Identify

Description

Reconnaissance

T1589.002

Collect Sufferer Id Info: E-mail Addresses

E-mail addresses and speak to info (both purchased or gathered from publicly out there sources) had been utilized in phishing campaigns to focus on firms throughout a number of nations.

Useful resource Growth

T1586.002

Compromise Accounts: E-mail Accounts

Attackers used compromised e-mail accounts to ship malicious emails in phishing campaigns to extend their phishing e-mail’s credibility.

T1588.001

Get hold of Capabilities: Malware

Attackers purchased licenses and used a number of malware households for phishing campaigns.

T1583.006

Purchase Infrastructure: Net Providers

Attackers used Microsoft OneDrive to host malware.

T1584.004

Compromise Infrastructure: Server

Attackers used beforehand compromised servers to host malware and retailer stolen info.

Preliminary Entry

T1566

Phishing

Attackers used phishing messages with malicious attachments to compromise computer systems and steal info from firms in a number of European nations.

T1566.001

Phishing: Spearphishing Attachment

Attackers used spearphishing messages to compromise computer systems and steal info from firms in a number of European nations.

Execution

T1204.002

Consumer Execution: Malicious File

Attackers relied on customers opening archives containing malware and launching a ModiLoader executable.

Credential Entry

T1555.003

Credentials from Password Shops: Credentials from Net Browsers

Attackers tried to steal credential info from browsers and e-mail shoppers.