Moscow-to-Mars simulation – to see if you’d last the duration!

The other day I visited a most unusual, unique place – and just down the road too. It’s a space-travel training complex where they do simulations of long missions into space. You may have heard of a small group of volunteers who cut themselves off from the world for a long as it takes to fly to Mars and back? Well, this is the place where that happens…

…In this unassuming building:

…Namely – inside cylindrical chambers like the one in the following pic, whose size is no larger than that of a modern-day space ship. Inside everything’s set up to imitate as closely as possible a space flight: limited space, regeneration of water and oxygen, time delays in communications ‘with Earth’, etc. The only thing that’s not reproduced is weightlessness; oh – and windows through which you can see stars ).

Read on…

From Udomlya with Love – and Fresh Electricity.

There’s a town in Russia that’s situated almost precisely at the mid-point between Moscow and St. Petersburg. It goes by the name of Udomlya. You’ll no doubt not have heard of it. Not many Russians have heard of it; I hadn’t heard of it either until last week when we went there! For I don’t have an encyclopedic memory, and I tend to study geography through personal field visits!

So what were we doing in this little-known town? Well, just to the north of Udomlya there’s a lake of the same name, and on one of its banks is a place to which we paid a visit: the Kalinin Nuclear Power Plant.

// You think Udomlya sounds a little funny/stage in English? It sounds no less funny/strange in Russian! I had a quick look on the net for the etymology, and it claims it comes from the Finno-Ugric, but to me it sounds Slavic. Can any of you, dear readers, confirm the origins?

Now, much as I’d love to show you pics of this fascinating industrial installation, I’m not going to show you one! I didn’t take any! (Blimey: that must be a first.) For this is critical infrastructural object – no photography allowed, not by visitors at least. Some of the nice folks who showed us round – they were permitted to take photos, but even then – only in special designated areas. Accordingly, you’ll just have to settle for their handful of pics (and this here short text of mine)…

Read on…

Enter your email address to subscribe to this blog
(Required)

Ooh-la Yarlu.

Multicolored mountains aren’t the rarest natural phenomenon in the world; however, not every mountain range can boast such a natural oddity…

The most multicolored mountainous paysages on the planet are without a doubt those in Zhangye, China. There are the yellow-red volcanic landscapes of Kambalny and Koshelov on the Kamchatka Peninsula, which are also simply marvelous sights to behold. Then there’s the multicolored Ausangate ‘rainbow’ mountain in Peru, and the Quebrada de Humahuaca in Argentina. And last but not least there’s the Yarlu valley in the Altai Mountains: also brightly colored, only in uniquely pastel hues, and also well worthy of inclusion into the list of the coolest multicolored mountains of the world:

How the soil/rocks/rubble here came to be of such interestingly unusually vivid colors – I still do not know. What I do know is they’re an uncommonly fascinating sight to see.

The marbled mountains came into view en route to the valley – around five kilometers from it:

Read on…

The Amazing Technicolor Altai Mountain Passes.

Another day – another beach, sunlounger, pool, cocktail, cigar… Wait. No! That’s not how we do summer vacations! It was indeed another day – but it was in the Altai Mountains, which one could call the Russian ‘middle of nowhere’ (or at least one of them:). No sandy beaches or cocktails here. Still, the sun was out – and we were two thousand meters nearer to it than down on any beach. No sunloungers or cigars for us today either: we had a full day’s mountain trekking ahead of us…

Once we’d set out, the views of mountains seemingly colored in in pastel shades came into view almost immediately. Clearly, this was going to be another of those walk (better – sit), behold and meditate days )…

Read on…

Altai-2020: meditative-mountain-passive.

Another day, another Altai!…

We were met upon waking on the ninth day of our expedition by a warm sun, as if hinting that the rainy days of our trip were behind us (which turned out to be false). Ahead of us this day – a steady stroll to the musical accompaniment of trickling streams and singing birds. There was a touch of rain ‘insignificant precipitation’ (– D.Y., our main guide, from the tour agency Altai-Geed), but only for a short while later in the day. But early morning, the main thing was that the wind was plentiful enough to blow away the mist, setting up the day to be perfect for walking…

The views – oh my gorges!

No glaciers just yet, but clearly glacial effects all over the barren, rubbly ice-scooped landscapes…

Read on…

Crazy bridge over very troubled water.

The bridge theme has cropped up a few times already in this here Altai-2020 series, but now – finally – the time has come to meet the maddest bridge of them all. But would it still be even there, we thought, waking one morning. Maybe it had been washed away by the fast flow of the Iedygem river?…

Yep – as you can see: still there. Good job; otherwise we’d have had to circle back a real long way and cross a different bridge. Below, the river as high and agitated as ever…

Read on…

Fun and games, laughing and joshing – half-way up an Altai mountain!

Finally!…

Finally, we pulled off getting into a nice straight line for a proper, full-posse, Altai summer trekking photo! Phew! (No, I don’t know why it took so long for it to happen:).

And here’s an action shot – us doing the Altai trekking thing, on a beautiful sunny day, trekking sticks in hand, heading to our next river, mountain or mountain pass! ->

Ahhh. So nice to walk in these here wilds under such clear blue skies amid such lush landscapes all around!

Read on…

Ransomware: no more jokes.

First: brief backgrounder…

On September 10, the ransomware-malware DoppelPaymer encrypted 30 servers of a hospital in the German city of Dusseldorf, due to which throughput of sick patients fell dramatically. A week ago, due to this fall, the hospital wasn’t able to accept a patient who was in need of an urgent operation, and had to send her to a hospital in a neighboring city. She died on the way. It was the first known case of loss of human life as a result of a ransomware attack.

A very sad case indeed – especially when you look closer: there was the fatal ‘accident’ itself (presuming the attackers didn’t foresee a fatality caused by their ghastly actions); there was also a clear neglect of the following of basic rules of cybersecurity hygiene; and there was also an inability on the part of the law enforcement authorities to successfully counter the organized criminals involved.

The hackers attacked the hospital’s network via a vulnerability (aka Shitrix) on the Citrix Netscaler servers, which was patched as far back as January. It appears that the system administrators waited way too long before finally getting round to installing the patch, and in the meantime the bad guys were able to penetrate the network and install a backdoor.

Up to here – that’s all fact. From here on in: conjecture that can’t be confirmed – but which does look somewhat likely…

It can’t be ruled out that after some time access to the backdoor was sold to other hackers on underground forums as ‘access to a backdoor at a university’. The attack indeed was initially aimed at the nearby Heinrich Heine University. It was this university that was specified in the extortionists’ email demanding a ransom for the return of the data they’d encrypted. When the hackers found out that it was a hospital – not a university – they were quick to hand it all the encryption keys (and then they disappeared). It looks like Trojan’ed hospitals aren’t all that attractive to cybercriminals – they’re deemed assets that are too ‘toxic’ (as has been demonstrated in the worst – mortal – way).

It’s likely that the Russian-speaking Evil Corp hacker group is behind DoppelPaymer, a group with dozens of other high-profile hacks and shakedowns (including on Garmin‘s network) to its name. In 2019 the US government issued a indictment for individuals involved in Evil Corp, and offered a reward of five million dollars for help in catching them. What’s curious is that the identities of the criminals are known, and up until recently they’d been swaggering about and showing off their blingy gangster-style lifestyles – including on social media.

Source

What’s the world come to? There’s so much wrong here. First, there’s the fact that hospitals are suffering at the hands of ransomware hackers in the first place – even though, at least in this deadly case in Dusseldorf, it looks like it was a case of mistaken identity (hospital – not a university). Second, there’s the fact that universities are being targeted (often to steal research data – including COVID-19 related). But here’s my ‘third’ – from the cybersecurity angle…

How can a hospital be so careless? Not patching a vulnerability on time – leaving the door wide open for cyber-scum to walk right through it and backdoor everything? How many times have we repeated that FreeBSD (which is what Netscaler works on) is in no way a guarantee of security, and in fact is just the opposite: a cybersecurity expert’s faux ami? This operating system is far from being immune and has weaknesses that can be used in sophisticated cyberattacks. And then of course there’s the fact that such a critical institution as a hospital (also infrastructural organizations), need to have multi-level protection, where each level backs up the others: if the hospital had had reliable protection installed on its network the hackers would probably never have managed to pull off what they did.

The German police are now investigating the chain of events that led up to the death of the patient. And I hope that the German authorities will turn to those of Russia with a formal request for cooperation in detaining the criminals involved.

See, for police to open a criminal case, a formal statement/request or subject matter of a crime committed needs to be presented at the very least. This or that article in the press or some other kind of non-formal comments or announcement aren’t recognized by the legal system. No formal request – no case. Otherwise attorneys would easily cause the case to collapse in the blink of an eye. However, if there is what looks like credible evidence of a crime committed, there’s an inter-governmental interaction procedure in place that needs to be followed. OTT-formal: yes; but that’s ‘just the way it is’. Governments need to get past their political prejudices and act together. Folks are dying already – and while international cooperation is largely frozen by geopolitics, cybercriminals will keep on reaching new heights lows of depraved actions against humanity.

UPD: The first step toward reinstating cooperation in cybersecurity has been taken. Fingers crossed…

Btw: Have you noticed how there’s hardly ever any news of successful attacks by ransomware hackers against Russian organizations? Have you ever wondered why? I personally won’t entertain for a moment the silly conspiracy theories about these hackers working for Russian secret services – as there are many ransomware groups around the world. Here’s why, IMHO: Because most Russian companies are protected by good quality cyber-protection, and soon they will be protected by a cyber-immune operating system – yep, that very protection that’s been banned for use in U.S. state institutions. Go figure.

UPD2: Just yesterday a ransomware attack was reported on one of America’s largest hospital chains, UHS: its computers – which serve ~250 facilities across the whole country – were shut down, which led to cancelled surguries, diverted ambulances, and patient registrations having to be completed oin paper. There are no further details as yet…