Vivaldi has long billed itself as a browser for advanced users who want to be able to customize their browser to their heart’s content. With that mission, it managed to get a foothold in the desktop market, but until now, the browser company co-founded by Opera’s former CEO Jon von Tetzchner, didn’t have a presence on mobile. That’s changing today with the launch of Vivaldi for Android, which retains the browser’s look, feel and speed without getting bogged down in trying to bring all of its myriad features to mobile.
For the most part, I like to use the same browser on desktop and mobile, simply to keep my bookmarks in sync (and Vivaldi says it doesn’t use Google’s servers to sync, in case you’re worried about being tracked). For the longest time, that was one of the reasons why I always switched away from Vivaldi on the desktop again, despite the fact that the browser is essentially made for a user like me. With the mobile version, I think that’ll change.
The overall browser experience is pretty straightforward. I appreciate the fact that the Vivaldi team put all of the standard UI features (backwards, forward, tab switcher and URL/search) at the bottom. You can still use the address bar at the top of the screen and the menu, too, of course, but in this age of giant screens, I appreciate a browser that can be used with one hand for much of the time.
As far as features go, Vivaldi covers all the bases, with speed dials and bookmarks, some advanced tab management features that aren’t usually available on mobile, including the ability to clone tabs, and a screenshots feature that lets you capture either the full page or just the visible area. If you regularly use different search engines, you can also use Vivaldi’s shortcuts in the address bar (think ‘d’ for DuckDuckGo, for example). There’s also a reader view and pretty much everything else you expect from a modern mobile browser.
One area where I’d like to see a bit more work from Vivaldi in general, both on mobile and desktop, is tracking protection. That’s been a focus for Firefox in many of its recent releases and even Microsoft’s new Chrome-based Edge browser is offering the ability to block trackers by default. Vivaldi, at least in its current form, doesn’t yet any tracking protection by default. That’s not much of an issue on the desktop, where you can easily install an extension, but on mobile, I’d like the company to do a bit more.
Overall, Vivaldi on Android is a worthwhile contender. It’s fast and easy to use — and if you’re already using Vivaldi on the desktop, it’s a no-brainer. Even if you’re not, it’s still worth a shot and may just get you to try the desktop version, too.
Ukrainian police have arrested members of a notorious ransomware gang that recently targeted American universities, as pressure mounts on global law enforcement to crack down on cybercriminals.
The Ukraine National Police said in a statement on Wednesday that it had worked with Interpol and the US and South Korean authorities to charge six members of the Ukraine-based Cl0p hacker group, which it claimed had inflicted a half-billion dollars in damages on victims based in the US and South Korea.
The move marks the first time that a national law enforcement agency has carried out mass arrests of a ransomware gang, adding to pressure on other countries to follow suit. Russia, a hub for ransomware gangs, has been blamed for harbouring cybercriminals by failing to prosecute or extradite them.
Cl0P is one of several ransomware cartels that seize a target’s data, demanding a ransom to release it. The group has also increasingly threatened to leak sensitive information online if a target refuses to pay, a tactic known as “double extortion.”
Recent targets have included oil company Shell and international law firm Jones Day, as well as several US universities including Stanford and the University of California. In most cases, the hackers wielded a vulnerability in a file transfer product run by Accellion to compromise their victims.
The arrests come as ransomware has been thrust into the spotlight in recent weeks, following a number of audacious attacks hitting critical infrastructure. Last month, hackers disrupted the Colonial Pipeline supplying petroleum to much of the US East Coast—an attack the White House has attributed to a Russian-based group.
As a result, governments are under increasing pressure to curb the activities of cybercriminals. This week, US President Joe Biden attended a summit in Geneva with Russia’s President Vladimir Putin, in which both parties were expected to discuss the threat of ransomware.
Some experts allege Moscow allows ransomware criminals to operate with impunity in the country on the understanding that hackers will not target Russian-speaking organizations and will share access with the government if called upon to do so. Ahead of the summit, however, both Putin and Biden suggested they were open to exchanging cybercriminals.
As part of its Cl0P takedown, the Ukrainian police on Wednesday said that it had conducted 21 searches in the Kyiv region of homes and cars of those arrested, seizing computer equipment, 5 million Ukrainian hryvnias (around $185,000), and property. Video footage shared by the police showed officers raiding homes in what appeared to be wealthy neighborhoods, and towing luxury cars including Teslas.
The police also said it had “managed to shut down” some of the group’s digital infrastructure.
It is unclear whether those arrested were core members of the group or affiliates. The defendants face eight years in prison, the statement said.
A researcher has uncovered one of the more unusual finds in the annals of malware: boobytrapped files available on sites frequented by software pirates that rat out downloaders and try to prevent unauthorized downloading in the future.
Vigilante, as SophosLabs Principal Researcher Andrew Brandt is calling the malware, gets installed when victims download and execute what they think is pirated software or games. Behind the scenes, the malware reports the file name that was executed to an attacker-controlled server along with the IP address of the victims’ computers. As a finishing touch, Vigilante tries to modify the victims’ computers so they can no longer access thepiratebay.com and as many as 1,000 other pirate sites.
Not your typical malware
“It’s really unusual to see something like this, because there’s normally just one motive behind most malware: stealing stuff,” Brandt wrote on Twitter. “Whether that’s passwords, or keystrokes, or cookies, or intellectual property, or access, or even CPU cycles to mine cryptocurrency, theft is the motive. But not in this case. These samples really only did a few things, none of which fit the typical motive for malware criminals.”
But not in this case. These samples really only did a few things, none of which fit the typical motive for malware criminals.
For one thing, they modify the HOSTS file on the PC to add entries. A lot of entries.
Once victims have executed the trojanized file, the file name and IP address are sent in the form of an HTTP GET request to the attacker-controlled 1flchier[.]com, which can easily be confused with the cloud-storage provider 1fichier (spelled with an L as the third character in the name instead of an I). The malware in the files is largely identical except for the file names it generates in the web requests.
Vigilante goes on to update a file on the infected computer that prevents it from connecting to The Pirate Bay and other Internet destinations known to be used by people trading pirated software. Specifically, the malware updates Hosts.txt, a file that pairs one or more domain addresses to distinct IP addresses. As the image below shows, the malware pairs thepiratebay.com to 127.0.0.1, a special-purpose IP address, often called the localhost or loopback address, that computers use to identify their real IP address to other systems.
By mapping the domains to the local host, the malware ensures that the computer can no longer access the sites. The only way to reverse the blocking is to edit the Hosts file to remove the entries.
Brandt found some of the trojans lurking in software packages available on a Discord-hosted chat service. He found others masquerading as popular games, productivity tools and security products available through BitTorrent.
There are other oddities. Many of the trojanized executables are digitally signed using a fake code signing tool. The signatures contain a string of randomly generated 18-character uppercase and lowercase letters. The certificate validity began on the day the files became available and is set to expire in 2039. Additionally, the properties sheets of the executables don’t align with the file name.
Executables, when viewed through a hex editor, also contain a racial epithet that’s repeated more than 1,000 times followed by a large, randomly sized block of alphabetical characters.
“Padding out the archive with purposeless files of random length may simply be done to modify the archive’s hash value,” Brandt wrote. “Padding it out with racist slurs told me all I needed to know about its creator.”
Vigilante has no persistence method, meaning it has no way to remain installed. That means people who have been infected need only edit their Hosts file to be disinfected. SophosLabs provides indicators of compromise here.
A Starlink beta user in Arizona said he lost Internet service for over seven hours yesterday when the satellite dish overheated, demonstrating one of the drawbacks of SpaceX’s broadband service. When the user’s Internet service was disrupted, the Starlink app provided an error message saying, “Offline: Thermal shutdown.” The dish “overheated” and “Starlink will reconnect after cooling down,” the error message said.
The user, named Martin, posted a screenshot of the error message on Reddit. He contacted Starlink support, which told him, “Dishy will go into thermal shutdown at 122F and will restart when it reaches 104F.” Martin decided to give the dish a little water so it could cool down. He pointed a sprinkler at Dishy, and once it cooled enough to turn back on, “I immediately heard YouTube resume playback,” he wrote yesterday.
But the Internet restoration was short-lived, Martin told Ars in a chat today.
“The fix was temporary,” he told us. “When I stopped the sprinkler, [the dish] heated back up and would cycle back on for a few minutes and go back down for thermal shutdown. The overheating started that day about 11:30 am and came back for good about 7 pm… I’m currently headed to a hardware store to get materials to build a solar shade/sail around the dish to see if it doesn’t impact connection and speed.”
Martin uses the ground behind his house to set up his dish because it is the only spot with no obstructions. But there’s “no shade to speak of,” he wrote in the Reddit comment thread.
Thermal shutdowns affect other users
Officially, SpaceX has said that “Dishy McFlatface” is certified to operate from 22° below zero up to 104° Fahrenheit. Temperatures reached about 120° yesterday in Martin’s town of Topock, near Arizona’s border with California, he said. Though Dishy doesn’t go into thermal shutdown until it hits 122°, the dish can obviously get hotter than the air temperature.
“I’m thinking the radiating heat from the ground is effectively cooking the bottom of the dish, [while] the top of the dish is cooked by the sun,” Martin told Ars. In addition to the shade he’s building, Martin said he is “waiting for permitting for a HAM radio tower” that would lift the dish off the ground to help keep it cool enough to operate.
Martin said he also had very short outages on several days since last week, but service came back before he had time to confirm whether they were caused by heat. SpaceX told users to expect periodic outages during beta, so Martin’s previous outages could have been due either to heat or satellite availability.
Another user in Virginia experienced a half-hour outage due to overheating on a day with temperatures in the low 80s, according to a Reddit post two months ago.
Martin’s post spurred a response from a beta user who also reported thermal shutdowns. “You’re not the only one. My Starlink is located 50 miles south of Grand Canyon in remote area,” one person wrote yesterday. “It’s been off and on also. It stopped today one hour after cool down period but quit again as [of] ~12:30. Last reported temp at my weather station was 103 degrees.”
The 122° F shutdown temperature was mentioned three weeks ago in a Reddit post by a user who had also been given the figure by Starlink support. “‘That’s it??’ was my thought. On a 90 degree day, the rooftop of my house can be around 125 degrees,” that user wrote.
“Are you sure that wasn’t Celsius?” another asked. (122° C converts to 251.6° F.)
Like Martin, other Starlink users may have to find creative ways to keep their dishes cool as the summer months arrive.
Dishy’s heat management
As we wrote in December, a teardown of Dishy McFlatface showed some of its heat-management components, including a metal shield that’s peppered with blue dots made of thermally conductive material that conducts heat away from the PCB and into the shield.
Ken Keiter, the engineer who performed the teardown, was interviewed by Vice’s Motherboard section for a story about the Arizona resident today:
Keiter told Motherboard that while reasonable consideration was given to heat dissipation in Dishy’s design, he could see the potential for problems.
“The phased array assembly comprises a PCBA (printed circuit board assembly) adhered to an aluminum backplate which serves several purposes—acting as RF shielding, providing structural rigidity and, most relevantly, acting as a radiative thermal mass (heat sink) for the components on the PCBA,” Keiter said.
Heat is funneled from the circuit board to the aluminum backplate using a foam-like thermal interface material (TIM). The backplate itself resides in a weather-sealed cavity containing a small amount of air. As this backplate heats up, the air surrounding it also heats, transferring thermal energy via the plastic enclosure to the outside environment, Keiter said.
“Here’s the problem: at some point, the combined thermal energy being absorbed by Dishy’s face and being dumped by the components into the backplate, the air surrounding it, and the enclosure exceeds the amount that is being dissipated to the outside environment,” he noted.
Keiter said that software changes could “make the system more thermally efficient” but that it’s possible SpaceX will need to make “a significant hardware revision for the commercial launch.” He called it “a really tricky engineering problem with some insanely tight constraints.”
We contacted SpaceX today and will update this article if we get a response.
SpaceX seeks stability before exiting beta
The Starlink public beta began in October 2020, and there’s still no word on when exactly it will hit commercial availability. But the service could happen within months, as SpaceX CEO Elon Musk has said that Starlink will be available to “most of Earth” by the end of 2021 and the whole planet by next year. Still, SpaceX expects to have a limited number of slots in each geographic region because of capacity constraints.
SpaceX is seeking Federal Communications Commission permission to deploy up to 5 million user terminals in the US. Over 500,000 people have ordered Starlink, and Musk has said he expects all of those users to get service. But he also said that SpaceX will face “more of a challenge when we get into the several million user range.” The biggest limitation would be in densely populated urban areas; rural users would have better odds of getting service.
As noted earlier, Starlink warns beta users to expect “brief periods of no connectivity at all”—even if they don’t run into thermal shutdowns. “We still have a lot of work to do to make the network reliable,” SpaceX president and COO Gwynne Shotwell said in April. “We still have drops, not necessarily just because of where the satellites are in the sky.” SpaceX will keep the service in beta “until the network is reliable and great and something we’d be proud of,” Shotwell said.
The Verge reviewed Starlink last month and found frustrating reliability problems. “Like the similarly over-hyped mmWave 5G, Starlink is remarkably delicate. Even a single tree blocking the dish’s line of sight to the horizon will degrade and interrupt your Starlink signal,” The Verge wrote.
Starlink is only part of the solution
The service will surely become more stable by the time SpaceX moves it from beta to general availability, as Shotwell promised. Even in beta, Starlink is providing much-needed connectivity to people with no other options. If SpaceX brings reliable broadband to a few million users, that would be a success, but there may be tens of millions of Americans without access to high-speed broadband. Tens of millions of others have to pay whatever the cable company demands because there’s no competition where they live.
Widespread fiber-to-the-home deployment would make a bigger difference for more Internet users than Starlink. President Joe Biden pledged to lower prices and deploy “future-proof” broadband to all Americans, but he’s already scaled back his plan in the face of opposition from Republicans and incumbent ISPs. AT&T has been lobbying against nationwide fiber and funding for municipal networks, and AT&T CEO John Stankey expressed confidence last week that Congress will steer legislation in the direction that AT&T favors.