What can we draw from SpaceX’s latest announcement about the rocket explosion?

On September 23, SpaceX made a new announcement about the cause of the Falcon 9 explosion in early September. However, ignoring the literary and diplomatic language, what did the announcement say?

SpaceX rocket launch of Falcon 9 on September 1

Originally posted notice of SpaceX: (extracting main ideas)

Three weeks ago, SpaceX experienced an “anomaly” at the launch complex 40 (LC-40) at Canaveral Air Force Base. This caused a loss of a Falcon 9 rocket and the cargo in it.

The investigation team, including FAA, NASA, the United States Air Force and industry experts, is researching 3,000 data channels, including video, audio and images – focusing on about 93 milliseconds (less than 1/10 of a second). ) of the rocket explosion. The debris was recovered, photographed, labeled and classified for investigation.

At this stage, the initial cause was determined to be due to a large “breach” in the frozen helium system of the second floor liquid oxygen tank. We have ruled out all contact with the CRS-7 rocket accident last year.

Groups are continuing to investigate in the LC-40 area and surrounding facilities. The launch pad area was badly affected, but the surrounding areas were unaffected.

At SpaceX headquarters in Hawthorne, California, our production continues; The groups are still installing engines, tanks, and other systems because they have been excluded from the investigation.

We will continue the work as soon as possible, as soon as the cause of this extraordinary incident was concluded by the investigation team. In the meantime, we look forward to the next launch activities that can take place as early as November.

What is the conclusion?

The good news for SpaceX is that they can continue flying tests as early as November. Perhaps SpaceX initially proved the crash was not caused by the airline’s fault, and was not related to last year’s incident. , which could be some unusual objective cause.

The cause of the “large breach” in the frozen helium system “is still quite vague, seemingly only determining where the rocket explosion began but not explaining what caused the” hole “.

SpaceX continues to call this anomaly, showing the company’s position from the outset of the bizarre nature of the explosion. “It is important that the explosion occurs when the rocket is being regularly refueled. The engine is not working and no heat source is present, ”Elon Musk said via Twitter.

Russian hackers attacked 85 large companies including Amazon and Apple Pay

A group of Russian hackers are launching an attack to steal user information from at least 85 companies. Targets include Amazon, American Airlines, AT&T, Best Buy, Wells Fargo, DropBox, Dunking Donuts, Ebay, GoDaddy, Uber, Match.com, McDonald’s, Office Depot, PayPal, Pizza Hut, Steam, Apple Pay and more. another company.

A private darknet security group managed to gain access to the files used in the attacks, the copies provided to Epoch Times. There is still too little data to identify the individuals behind the attacks, which appear as normal cybercrime criminal groups and are not tied to any government. Hackers use Russian to chat online and they also use servers from Russia.

Ed Alexander, an investigator on the Darknet, who provided the information, said he saw Russian hackers “” obtaining a user’s credit card number and the user’s full identity “in the attacks. Apple Pay, even the answers used to recover a user’s password.

“When I saw this file earlier in the week, I turned off the Apple Pay app on my iPhone,” Ed Alexander said.

With the attack on Steam, one of the world’s most popular online gaming platforms with approximately 125 million active users, Russian hackers stole users’ emails and passwords. By accessing the account, hackers gained access to virtual items in the user’s account, sold them in exchange for virtual currency, or transacted through online auction websites for cash.

The hacked files are customized for each company they target, containing the configuration for a black market cracking tool called Sentry MBA.

The Sentry MBA is extremely effective because it is very common for users to use the same username and password for multiple services.

The Sentry MBA uses a “credential stuffing” technique that takes advantage of Internet users using the same username and password for multiple websites. For example, if a website were hacked, thousands of account information would be sold on the hacker’s website, one could buy these accounts and use them with the Sentry MBA tool to see if the Can that account information be logged into other websites or services?

The Sentry MBA tool is now primarily used as an alternative to the old “brute force” attack method that generates large numbers of random passwords and tries them to find the right password for that account.

The Sentry MBA configuration files are customized to bypass the specific security protocols of each site, such as the CAPTCHA used to ensure that the login information is from humans and not robots, or systems. The system prevents multiple logins to a website.

The Sentry MBA is extremely effective because it is very common for users to use the same username and password for multiple services. For example, in 2010, data of nearly 1.5 million users became public online after the Gawker site was hacked; In 2011, information on more than 93,000 users was stolen by hackers on Sony’s PlayStation network. According to the OWASP software security community, about two thirds of the victims of the attack on Sony use the same login information on Gawker.