frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
624•klaussilveira•12h ago•182 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
926•xnx•18h ago•548 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
32•helloplanets•4d ago•24 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
109•matheusalmeida•1d ago•27 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
9•kaonwarb•3d ago•7 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
40•videotopia•4d ago•1 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
219•isitcontent•13h ago•25 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
210•dmpetrov•13h ago•103 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
322•vecti•15h ago•143 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
370•ostacke•18h ago•94 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
358•aktau•19h ago•181 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
477•todsacerdoti•20h ago•232 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
272•eljojo•15h ago•160 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
402•lstoll•19h ago•271 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
85•quibono•4d ago•20 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
14•jesperordrup•2h ago•6 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
25•romes•4d ago•3 comments

Start all of your commands with a comma

https://rhodesmill.org/brandon/2009/commands-with-comma/
3•theblazehen•2d ago•0 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
56•kmm•5d ago•3 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
12•bikenaga•3d ago•2 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
244•i5heu•15h ago•188 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
52•gfortaine•10h ago•21 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
140•vmatsiiako•17h ago•62 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
280•surprisetalk•3d ago•37 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1058•cdrnsf•22h ago•433 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
132•SerCe•8h ago•117 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
70•phreda4•12h ago•14 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
28•gmays•7h ago•11 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
176•limoce•3d ago•96 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
63•rescrv•20h ago•22 comments
Open in hackernews

How are cyber criminals rolling in 2025?

https://vin01.github.io/piptagole/cybcecrime/security/cybersecurity/2025/05/05/state-cyber-security.html
266•vin10•9mo ago

Comments

SoftTalker•9mo ago
Among the common vulnerabilities listed:

> Outdated Wordpress plugins and CMS systems

No surprise, having worked in edu the following scenario was very common:

1) Researcher gets a grant for a project

2) Grad student sets up a Drupal site for the project

3) Things are maintained and updated for a couple of years

4) Grant runs out, project wraps up, student graduates, everyone forgets about the server which sits unattended and unmaintained.

Still happens, but most universites have really clamped down on the ability to just stand up a web server on the network. Many are requiring everything to be on a centrally managed enterprise CMS which is a PITA but that's the fallout for too much sloppy administration.

notyourwork•9mo ago
Yep, I remember having ssh access to production servers from a non-work machine at a well known university.

We could also get external ips and connectivity without much supervision. Core security needs to be prioritized to avoid this from happening.

semi-extrinsic•9mo ago
At my old university ~15 years ago, all IPs of all computers were public IPV4 addresses. Any computer plugged in to any ethernet port on campus was given such a "quasi-static" IP address. All normal ports were open - ssh, http(s), you name it. It was the OG zero trust architecture.
yjftsjthsd-h•9mo ago
> At my old university ~15 years ago, all IPs of all computers were public IPV4 addresses. Any computer plugged in to any ethernet port on campus was given such a "quasi-static" IP address.

Well that's fine; my school did the same thing and other than feeling wasteful there was no-

> All normal ports were open - ssh, http(s), you name it. It was the OG zero trust architecture.

Oh. Yeah, open ports by default is... and interesting life choice.

morkalork•9mo ago
When you're living in the residences and there's a DC++ server running, it's pretty sweet. Ours had a whole 1.5TB of stuff on it!
VoidWhisperer•9mo ago
Was this RIT by any chance?
fecal_henge•9mo ago
This just got cancelled at my institution. I could have retained it if I argued strongly enough.
foobarian•9mo ago
Ah the good old days of putting my head down at my desk lulled into a nap by the once-a-second sounds of ssh login attempt logs being written to the spinning rust drive...
guappa•9mo ago
How am I going to work from home if my computer at university is not recheable?
DaSHacka•9mo ago
My university does the same, except they understand the concept of "firewalls"
rahimnathwani•9mo ago
Only computers?

At my old university even printers had public IP addresses.

dehrmann•9mo ago
I used to have the public IP address of the computer in my dorm room memorized. It's been 20 years, and I still remember it started with 128.211.
pjc50•9mo ago
I loved that era and it was hugely educational to me, but I can understand why it had to end.
akeck•9mo ago
MIT and their /8?
kevin_thibedeau•9mo ago
The low friction solution is to serve public_html from a home dir and direct users to generate static sites.
leftcenterright•9mo ago
> Norton, Kaspersky, Zscaler, F-secure, NordVPN, Virustotal, Palo Alto: all of them marked these links as safe.

This is sad to see, these tools are forced down so many companies in name of "compliance" while totally not worth the maintenance and cost overhead. Apparently they haven't got any better in the last decade.

charcircuit•9mo ago
I'm curious if the link inside the pdf would have been detected.
vin10•9mo ago
It is the same for nested links as well. They mostly have a chain of links, each one taking you to a new one with hop count ranging anywhere from 5 up to 10 or more.
Muromec•9mo ago
Well, that's exactly the difference between complience and security
markbeare•9mo ago
I work for a cybersecurity company, and I think that the method they used to check these links with the mentioned security companies was not a reflection of how they detect. I'm sure that many of these companies do not have these domains in their DBs of bad sites but if you were to run these products and then visit the site then heuristic detection would have likely flagged the sites.
vin10•9mo ago
I would have expected at least Virustotal to flag them if that were the case. It does more than just looking up in a database of known malicious URLs and I think the reputation of the domains is the key factor here.

https://www.virustotal.com/gui/url/6dd23e90ee436e1ff066725aa...

> BitDefender - government

> Sophos - government

> Forcepoint ThreatSeeker - government

- https://docs.virustotal.com/docs/how-it-works

superkuh•9mo ago
These days most "cyber" crimes are commited by corporations against their customers/users (just like most theft is wage theft). These small fish/phish putting sites on exploited servers are a drop in the bucket. It is sad when some university resource gets shut down because they didn't mantain it after the grad student that set it up graduates though. We really need to teach the people that set up these things to use .html pages instead of dynamic languages and databases.
neffy•9mo ago
Sure. Corporations commit ransomware attacks all the time.
gitroom•9mo ago
damn, i remember seeing old servers just getting dusty and full of holes after the student left. kinda crazy how much messy stuff is hiding in corners like that lol
3abiton•9mo ago
>

I have been advised not to disclose specific vulnerabilities since the parties involved are not most friendly and transparent in handling security reports. While most of these got reported and some even got fixed, I can only disclose high-level details of the compromise path. Some just ghosted me after conveniently fixing the flaws, and one even gave me a phone call, which was somewhat scary and perhaps not worth the adrenaline.

What an unprofessional sysadmin move, borderline infuriating.

fckgw•9mo ago
I've noticed on some scam forums and subreddits I frequent that scammers have been using target site's own support searches to redirect users to scam phone numbers.

On both Ticketmaster and Facebook, and many other sites, when you perform a search on their support site it spits back your query in big letters at the top of the page. If you craft the correct search and then buy Google Ads pretending to be Ticketmaster, then you can redirect users to your call center and scam them. And because they link for your ad actually links to Ticketmaster the ad passes validation and appears to be a legit link in the eyes of Google.

Example of a crafted search term: https://help.ticketmaster.com/hc/en-us/search?utf8=%E2%9C%93...

lifeisstillgood•9mo ago
So, I craft a search where the search query is “call 1 800 scam”, then I buy a google ad with key word of “ticketmaster help”, the ad links to real ticketmaster with my query, and google shows that ad to someone having trouble and hey presto they call my scam line at 4 quid a minute from their mobile?

Yuck all round. I mean ticketmaster is just a sin eater for greedy popstars but yuck ..

albertgoeswoof•9mo ago
But why does google allow unverified owners of a domain to buy ads for it? Surely only ticketmaster or agencies approved by ticket master should be allowed to do this?
fckgw•9mo ago
Not necessarily, if you have an affiliate program or something like that you could buy ads for, say, eBay using your affiliate link in the hopes of you generating more profit than the ads cost.
superb_dev•9mo ago
There are also still plenty of businesses with a Facebook page as their homepage
progbits•9mo ago
Because most of the ads are created by external ad agencies, and the people involved are not competent enough to do any verification.

Source: I've also thought this was ridiculous and asked someone working on the adsense team. Apparently tried enforcing some domain verification mechanism in an experiment, but most companies and agencies struggled to get the verification done and of course the $ metrics on this launch dropped, causing execs to force them to stop.

simonw•9mo ago
Maybe a partial solution here would be to offer some kind of "domain locking" option?

Allow sites that are heavy targets of this kind of scam - like ticketmaster - to add a "AdSense: locked" line to their robots.txt (or similar) - if that line is present then advertisers have to go through an additional domain verification step in order to place an ad.

stevenjgarner•9mo ago
I like this idea. I would love to hear from Google why they would not do this. Anyone know why Google / Facebook et al would not want to do this?
sceptic123•9mo ago
Money
SeriousM•9mo ago
Money. And no one died because of this behaviour. So why change a running cash-machine...
charlieyu1•9mo ago
There was a time when you search for WhatsApp in Google the first sponsored result is a scam site
fckgw•9mo ago
If you search for "HP Support" or "Dell Phone Number" you will get a scam site 50% of the time now.
netsharc•9mo ago
One time an article about Facebook logins got to #1 and its comments were full of people mad that Facebook changed their website yet again, how can they login to Facebook, waah, waah!
jancsika•9mo ago
> Yuck all round.

Yes, but also it's an impressive digital Jedi mind trick on a website.

signs a question mark with hand

"This is the support number you're looking for."

And the victim is extra primed here because so many companies make it nearly impossible to talk to a human. Yikes!

Almost seems like there's room here for a grey hat to come in and use this trick to do a good faith job trying to help the customer through their problem. Then tell them at the end that a recent anti-trust suit requires them to tell the customer about alternate independent venues in their area where they can support live music.

inetknght•9mo ago
> Then tell them at the end that a recent anti-trust suit requires them to...

Bonus points if you point to the actual anti-trust suit!

https://www.justice.gov/archives/opa/pr/justice-department-s...

potholereseller•9mo ago
> Almost seems like there's room here for a grey hat to come in and ...

... call the scam numbers to tie up their staff and prevent them from talking to potential victims. Someone like Kitboga could do this at scale. Where there's a phone number, there's a way.

fckgw•9mo ago
Exactly. And when you try and help these people and explain that you didn't actually call Ticketmaster support they will tell you that they found the phone number on the official Ticketmaster website and Google said it was a verified link.

Here's a real example from the same thing happening on FB (don't call that number) https://i.redd.it/w9htjqflgjle1.jpeg

ninkendo•9mo ago
Completely unrelated tangent: Jesus Christ Reddit is such a cesspit.

Tried tapping that link on mobile, got a screen to view the corresponding post. Tapped it, and I got taken to the App Store. No thanks, force quit the App Store and go back.

Now I get a full screen notice on the original Reddit tab saying “didn’t go where you expected? Next time try the long press!” With instructions to not use private browsing and to long press any link and open in safari. (Wha? You, Reddit, are what are trying to force me to use your app!)

So I long press like they say, open in new tab, and what do I see? A large blank page that just says “REDDIT” in all caps, with the button “Get the app” on the bottom. The link was just to “reddit.app.link” the whole time.

Can’t a company who has a website, just … let me use the website? At every possible turn, Reddit HATES anyone using Reddit from a browser. They will ruin every single aspect of the website they possibly can to try to push you to the app. The entirety of reddit.com seems to be just a broken honeypot to get you to use the app instead. I just can’t fathom how a company can be that broken.

Just delete the Reddit website, it would make more sense.

KronisLV•9mo ago
> The entirety of redit.com seems to be just a broken honeypot to get you to use the app instead. I just can’t fathom how a company can be that broken.

It's their intention to have the website be a funnel so that they can get more mobile users.

I sometimes use https://old.reddit.com, though it doesn't look that great on mobile, maybe there are some other alternatives.

pjc50•9mo ago
I still don't understand why mobile users are so much more valuable to them, is it just the inability to block ads?
razakel•9mo ago
>is it just the inability to block ads?

Of course it is.

swarnie•9mo ago
I know reddit will connect accounts together based on device ID, i wonder if their data becomes more valuable if you can tie multiple independent accounts together in to one profile?

Its a site where users will often have multiple login for different subjects of discussion.

sizzle•9mo ago
Your phone has sensors and superior data they can track/sell
inejge•9mo ago
> Tried tapping that link on mobile, got a screen to view the corresponding post. Tapped it, and I got taken to the App Store.

It's obnoxious, but if you really want to view the post you can switch the screenshot page to desktop mode, and the "View post" button shouldn't redirect to the App Store. The result isn't pretty but it's readable in a pinch.

(They're still not desperate enough to track the UA and detect the switch.)

tim333•9mo ago
Using Reddit on the laptop seems ok if you set it to the old version.

All websites seem to freak out over you not getting their damn app if you visit on a phone. I just don't use the phone for browsing if I can help it.

acomjean•9mo ago
I used to rely on google filtering when searching for sites. Then on the google search page I fell for an add.

I caught it right after I tried to log in (one of the few sites I remember the password and didn’t have it in a manager). Reset password.

Man did I feel dumb.

I searched the financial institution a few times and the fake ad came up a bunch. I reported but the trust has been broken.

foobahhhhh•9mo ago
Hah. I'd make tbe text:

    search all of your friends and connections". You may have lost access to your friends and family. To fix this you need to call ....
amelius•9mo ago
On top of that, you receive private information about people from Google, because if someone calls your number, then you know that they were on ticketmaster. Replace ticketmaster by e.g. a swingers club, and now Google's ad businessmodel is in real trouble because it leaks sensitive information.
nothrabannosir•9mo ago
> ticketmaster is just a sin eater for greedy popstars

Apparently Live Nation owns many performance venues and leverages their power in that market to gain an advantage in the ticket sales market. “Sell through us or you won’t be allowed to play at any famous venue in this city” kind of deal.

Don’t have any sources beyond “heard it on a podcast” though ¯\_(ツ)_/¯

RGamma•9mo ago
How desperate one has to be...
OkGoDoIt•9mo ago
Have you tried getting ticketing support from Ticketmaster? Even a sketchy phone number is better than no option at all…
RGamma•9mo ago
I don't mean reaching for support. I mean setting up a scam like this. It seems so bottom of the barrel scummy, creative too, but mostly scummy.

Imagine you have the creativity and criminal energy to conceptualize and operate something like this (and the rat tail of justice evasion, laundering money, etc). It seems so much easier to make money in the honest economy.

Unless of course you're operating for a rogue state...

advael•9mo ago
You've got a shocking amount of faith in the honest economy for this moment in time
genewitch•9mo ago
"This moment" that has lasted about 22 years or so. There were two good runs if you had money to invest, but whatever.
AngryData•9mo ago
People do this sort of thing specifically because the "honest" economy is not really that great except for a small percentage of people.
levocardia•9mo ago
Wow. Programmatic SEO and its consequences. Genius...
miki123211•9mo ago
This actually makes sense to me; if you're an artist selling tickets on Ticketmaster, it's in everybody's interests to let you show ads for those tickets to your fans.

If only the Ticketmaster team could show ads on that domain, all these ads would have to go through their marketing team (and use ticketmaster's budget, with all the accounting and invoicing this requires), which would massively slow things down.

Instead, it seems that Google has some kind of protection where ads mentioning Ticketmaster must link to their official domain, to prevent things like this from happening. The scammers just found a way for that domain to display arbitrary text.

redeux•9mo ago
I found and removed one of these from my company's forums. When I Googled the number I could see it was on a ton of other support forums.
Cyphase•9mo ago
I've been seeing similar scams via PayPal. The scammers apparently add the target email address as a forwarding address on a compromised or created-for-purpose email account. And that bouncer email address is signed up for PayPal. So the scam email is actually from PayPal, bounced through some other inbox. The To name and address is of the bouncer email address PayPal sent it to.

One version involves sending money to someone with the PayPal account (so the target might think it was sent from their own account) with a "note" to the transaction recipient, which the target sees, which says PayPal has detected unusual activity and please call this phone number to request a refund.

Another involves a "Your ITEM NAME order is on its way" email where the item being ordered is called something like, "Some Company, Inc: Don't recognize the seller? Call us at SOME PHONE NUMBER".

A third is like the second, except it's a "You paid CURRENCY to SELLER" email. This one has the PayPal user's name at the top, so not as convincing perhaps.

pnw•9mo ago
FWIW I sent this to a friend on the dev team at Ticketmaster and they escalated it.
araes•9mo ago
Its cool you at least attempted to do something with a bit of social connection at such a heavily targeted website.

Having personal issues with Ticketmaster's pricing methods (causing many to probably never want to do anything that might help) is a different issue than the website being used as a source for redirecting calls to fake call centers.

Since they escalated maybe something will get done. Ticketmaster would have a motivation, if large numbers fall prey to diverted call center scams it only makes their reputation flounder even worse.

(...obvious joke here would be if the scammers actually offer better support, they're just trying to steal call center business)

pnw•9mo ago
Looks like they already tweaked it so the result is less useful to the scammers.
luma•9mo ago
Terry Davis would never have let this slide
temp0826•9mo ago
A family member fell for this while trying to recover their hacked fb account. I was around and caught wind of the call and some of the absurd steps (absurd to me, anyways) they were proposing and pulled the plug on the "support" call. The phone number was in what seemed to be a cached result of a bad search or something. '"Call us at xxx-xxxx..." not found' is what I saw. (Finding a real support number is either difficult or impossible, which makes this a good trap)
madacol•9mo ago
This one is even more believable

    https://help.ticketmaster.com/hc/en-us/search?utf8=%E2%9C%93&query=help%22%20%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%20Need+Ticketmaster+Support%3F+Call+this+phone+number+-%3E+1-888-BIG-SCAM.
DyslexicAtheist•9mo ago
john wick site:europa.eu https://www.google.com/search?q=john+wick+site%3Aeuropa.eu&h...

gta 5 site:europa.eu https://www.google.com/search?q=gta+5+site%3Aeuropa.eu&hl=en

Watch full site:europa.eu https://www.google.com/search?q=Watch+full+site%3Aeuropa.eu&...

leftcenterright•9mo ago
could someone with legal/data-privacy expertise comment if this would be something they have to disclose under data breach disclosure laws?

Technically it might not be a "data leak", but it very well could result in one if arbitrary content (including js?) can be uploaded to these webpages?

DyslexicAtheist•9mo ago
they've been contacted through the "proper channels" over 18 months ago by several (more than 1) security researchers.

After some people started publicly naming and shaming on LinkedIn and tagging ENISA, the issue got some exposure, but still was not fixed. It only made it more evident that several people independently reported these issues, and they became aware of peers stumbling over the issue. Still nothing happened.

ENISA is supposed to act as a CNA and expects to be notified of data breaches from EU based orgs for PSIRT / CSIRT as part of the Cybersec Resiliance Act and other laws.

Would I trust that vulnerability data that gets reported as a CVE, or a breach notification is safe with ENSIA ?

... feck no!

Would I trust that documents that europa.eu hosts on its infra are authentic? (such as security-compliance documents telling orgs how to properly implement security, but literally any public communication under one of the domains)

... hecking heck no!

... At this stage I think everyone else except ENISA has control over their infrastructure.

b0m•9mo ago
When clicked, all show: page not found

So, fixed now?

mmsc•9mo ago
They're usually designed so only Google sees it. It's for SEO, not to trick people.
Alex-Programs•9mo ago
Is it just me or is cybersecurity... Calming down? I feel like a few years ago there was constant news of ransomware, intrusions, vulnerabilities, etc, but more recently the defensive side seems to have the upper hand.
chelmzy•9mo ago
Not particularly. The only thing I have noticed in the past decade is the decline of the "American Hacker". Most groups are foreign but will partner with younger Americans for social engineering (ex. Scattered Spider). You just don't have people like Albert Gonzalez/Stephen Watt in America now. However, I suspect that many American hackers have shifted to targeting overseas countries that are not friendly with the US.
alcover•9mo ago
> You just don't have people like Albert Gonzalez/Stephen Watt in America now

I don't know what the state of big corps netsec is today but these guys had it somewhat easy. They got initial access through weak wifi then pivoted with SQL injects and such.

candiddevmike•9mo ago
You only hear about the offensive side winning when the company can't prevent it from leaking. Rest assured, the only thing "calming down" in cybersecurity is the nihilism that nothing involving a human will ever be secure.
pjc50•9mo ago
There's a lot of other stuff in the news.
wood_spirit•9mo ago
They create meme coins etc?
tim333•9mo ago
It's the way forward but not actually a crime. In the future we'll live by selling meme coins to each other while AIs do the actual work.
mhuffman•9mo ago
I am surprised no one mentioned using LLMs to spell and grammar check their emails and vibe-code bank landing-pages to continue a more polished version of scamming elderly people out of their life savings.
curiousgal•9mo ago
The misspellings/shitty grammar are on purpose.
mhuffman•9mo ago
I have heard that theory from some cybersecurity experts online but have never seen it substantiated in any way (by interviewing some scammers, for example) and frankly don't believe it.

The misspellings and grammatical errors (used to?) continue on the fake sites that are created to steal credentials, and the excuses for most of the reasoning regarding emails do not hold there.

1dom•9mo ago
Why wouldn't you believe it? It makes economic sense. The most expensive part for a scammer in any automated scam is the part which can't be automated, where a human has to get involved for e.g. a phonecall.

Economically, the scammer wants to do everything they can to get rid of smart or diligent people who might be harder to scam at the expensive part. It feels like it would cost scammers to not have typos.

Also, anecdotal, but the rise of autocorrect, spell checking and LLMs doesn't seem to have made any impact on the quality of spelling in my spam folder over the past 20 years.

mhuffman•9mo ago
>Why wouldn't you believe it?

Lots of reasons, but here are a few:

1. The misspellings and grammar issues (used to) continue beyond emails into the websites, etc.

2. The grammar issues, magically, seem to mimic the the same grammar differences between certain countries typical language constructions and those of standard American English

3. Check your spam folder right now if you have gmail. Where did this 4-D chess triage of illiterate potential dupes go? Spelling and grammar are suddenly almost perfect! Also, many of the older scams seem to be replaced with romance or family impersonation scams.

>It makes economic sense. The most expensive part for a scammer in any automated scam is the part which can't be automated, where a human has to get involved for e.g. a phonecall.

Perhaps you haven't heard, but this can also be automated as well, cheaply. Works particularly well on the elderly!

>Economically, the scammer wants to do everything they can to get rid of smart or diligent people who might be harder to scam at the expensive part. It feels like it would cost scammers to not have typos.

I think you are giving too much credit to the spammers. Economically, the easiest thing to do is to send out endless emails and wait for responses. Those people, regardless of diligence or literacy, are already self-selecting and you can let them talk to LLMs to winnow the rest.

>Also, anecdotal, but the rise of autocorrect, spell checking and LLMs doesn't seem to have made any impact on the quality of spelling in my spam folder over the past 20 years.

I agree ... up until the rise of LLM's. Now (outside of more use of emojis) it is very good.

1dom•9mo ago
> 1. The misspellings and grammar issues (used to) continue beyond emails into the websites, etc.

Again, economically, why wouldn't they? It costs them to use perfect grammar in material by increasing the chance someone with half a braincell would get through to them.

> 2. The grammar issues, magically, seem to mimic the the same grammar differences between certain countries typical language constructions and those of standard American English

If you accept they're intentionally making mistakes for a moment, then wouldn't you expect the mistakes they intentionally make to include some of the ones they see accidentally made?

> 3. Check your spam folder right now if you have gmail. Where did this 4-D chess triage of illiterate potential dupes go?

Done. First time I did it in a while, was surprising to see how few legitimate spam e-mails are sent now (I found 3 out of about 50 "spam" old newsletter subscriptions). The ones I did find still had a bunch of obvious grammar and structural issues with it. 3 exerts:

> I am David C. Lee, Chief Inspection Agent- United Nations Inspection Unit at John F Kennedy International airport New York- , During our investigation, I discovered An abandoned shipment through a Diplomat from the United Kingdom

> Greetings I am contacting you regarding the role of ICPM (fund manager), Kindly revert back for more details.

> We are unable to verify your wallet due to some miss-match code error found during your last transaction. You are strongly required to verify your wallet to avoid limitation on your account.

Don't get me wrong, not as in-your-face spelling errors as I remember, but still enough to see that a modern spelling/grammar checker/LLM hasn't been used.

> Perhaps you haven't heard, but this can also be automated as well, cheaply. Works particularly well on the elderly!

I know this area far better than average - I was building some pretty large automated IVRs until recently. The idea that a cheap and easy voice automation works particularly well on the elderly is wrong. It's only sufficient for part of the process - any complex interaction like collecting a full set of card details or login details - it is far, far cheaper, easier, faster and more reliable when done with a human.

> Economically, the easiest thing to do is to send out endless emails and wait for responses. Those people, regardless of diligence or literacy, are already self-selecting and you can let them talk to LLMs to winnow the rest.

If it was economical for them to try get their spelling/grammar accurate, then they would use modern spelling/grammar checks, and I wouldn't have been able to trivially pull a sentence from the last 3 legitimate spam e-mails I've had.

Look, your own arguments even rely on the assumption that they're economically motivated. There's clearly and economic argument and motivation for making mistakes. There's clearly evidence mistakes are still being widely made despite the widespread availability of spelling/grammar checking. Why are you so sceptical of this?

Again, I'm not saying there's clear written confessions of this happening, but I can't see a reason for you _not_ to believe it at all given your reasoning. It just seems a bit contrarian.

andrewflnr•9mo ago
I think the time for that has passed. The trend of the last few years has been scarily realistic phishing emails.
yapyap•9mo ago
Honestly you are always (half) a step behind and that’s for the worst cyber criminals cause the state sponsored ones are multiple steps ahead.

It’s very interesting to look at from the outside, thanks for sharing.

ValdikSS•9mo ago
Once upon a time I typed something like `r57shell gov` and got a PHP webshell on *.gov.br
kazinator•9mo ago
https://i.ibb.co/7NZR08TL/Screenshot-2025-05-06-at-5-05-39-P...