this post was submitted on 13 Dec 2023
1263 points (99.4% liked)

Technology

59092 readers
6622 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

In one of the coolest and more outrageous repair stories in quite some time, three white-hat hackers helped a regional rail company in southwest Poland unbrick a train that had been artificially rendered inoperable by the train’s manufacturer after an independent maintenance company worked on it. The train’s manufacturer is now threatening to sue the hackers who were hired by the independent repair company to fix it.

After breaking trains simply because an independent repair shop had worked on them, NEWAG is now demanding that trains fixed by hackers be removed from service.

you are viewing a single comment's thread
view the rest of the comments
[–] roguetrick@kbin.social 67 points 10 months ago* (last edited 10 months ago) (2 children)

SPS became desperate and Googled “Polish hackers” and came across a group called Dragon Sector, a reverse-engineering team made up of white hat hackers.

Hilarious. I hope 404 continues with this level of high quality journalism.

Dragon sector, who they hired, is a security capture the flag team.

https://dragonsector.pl/

Edit: Socials of those who worked on it

https://social.hackerspace.pl/@q3k
https://infosec.exchange/@mrtick
https://infosec.exchange/@redford

[–] sukhmel@programming.dev 19 points 10 months ago* (last edited 10 months ago) (1 children)

TIL that [security CTF](https://en.m.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)) is

an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully-vulnerable programs or websites

Never heard of this and I may not be alone in that. Thanks for pointing this out.

[–] khannie@lemmy.world 9 points 10 months ago* (last edited 10 months ago) (1 children)

I did one before. They are SO MUCH FUN. Now I have too many children.

sob

edit: There are other ways of capturing the flag like having your team name on the home page of a local web server or whatever.

[–] Wes_Dev@lemmy.ml 5 points 10 months ago (1 children)

You make it sound like the event ends in an orgy.

[–] trashgirlfriend@lemmy.world 4 points 10 months ago

The good ones do

[–] verity_kindle@sh.itjust.works 8 points 10 months ago (1 children)

Finally, hackers with a cool name, like Bellingcat or Oryx. It's all I'm asking for, but the Russian and North Korean hackers are so disappointing in so many ways.

[–] SnipingNinja@slrpnk.net 6 points 10 months ago

When the government bankrolls you, you're not allowed to have fun.