When it comes to bringing an idea to life it’s best to have both a sense of purpose, and an eagerness to apply whatever is on hand in order to get results. YouTube’s favorite Ukrainians [KREOSAN] are chock full of both in their journey to create this incredible DIY e-bike using an angle grinder with a friction interface to the rear wheel, and a horrifying battery pack made of cells salvaged from what the subtitles describe as “defective smartphone charging cases”.
What’s great to see is the methodical approach taken to creating the bike. [KREOSAN] began with an experiment consisting of putting a shaft on the angle grinder and seeing whether a friction interface between that shaft and the tire could be used to move the rear wheel effectively. After tweaking the size of the shaft, a metal clamp was fashioned to attach the grinder to the bike. The first test run simply involved a long extension cord. From there, they go on to solve small problems encountered along the way and end up with a simple clutch system and speed control.
The end result appears to work very well, but the best part is the pure joy (and sometimes concern) evident in the face of the test driver as he reaches high speeds on a homemade bike with a camera taped to his chest. Video is embedded below.
The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.
The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.
This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.