• Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Comments 0 Shares 0 Reviews
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

    Jun 13, 2025Ravie LakshmananWeb Security / Network Security

    Cybersecurity researchers are calling attention to a "large-scale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections.
    According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute code.
    The cybersecurity company has given the technique an alternate name JSFireTruck owing to the profanity involved.
    "Multiple websites have been identified with injected malicious JavaScript that uses JSFireTruck obfuscation, which is composed primarily of the symbols, +, {, and }," security researchers Hardik Shah, Brad Duncan, and Pranay Kumar Chhaparwal said. "The code's obfuscation hides its true purpose, hindering analysis."

    Further analysis has determined that the injected code is designed to check the website referrer, which identifies the address of the web page from which a request originated.
    Should the referrer be a search engine such as Google, Bing, DuckDuckGo, Yahoo!, or AOL, the JavaScript code redirects victims to malicious URLs that can deliver malware, exploits, traffic monetization, and malvertising.

    Unit 42 said its telemetry uncovered 269,552 web pages that have been infected with JavaScript code using the JSFireTruck technique between March 26 and April 25, 2025. A spike in the campaign was first recorded on April 12, when over 50,000 infected web pages were observed in a single day.
    "The campaign's scale and stealth pose a significant threat," the researchers said. "The widespread nature of these infections suggests a coordinated effort to compromise legitimate websites as attack vectors for further malicious activities."
    Say Hello to HelloTDS
    The development comes as Gen Digital took the wraps off a sophisticated Traffic Distribution Servicecalled HelloTDS that's designed to conditionally redirect site visitors to fake CAPTCHA pages, tech support scams, fake browser updates, unwanted browser extensions, and cryptocurrency scams through remotely-hosted JavaScript code injected into the sites.
    The primary objective of the TDS is to act as a gateway, determining the exact nature of content to be delivered to the victims after fingerprinting their devices. If the user is not deemed a suitable target, the victim is redirected to a benign web page.

    "The campaign entry points are infected or otherwise attacker-controlled streaming websites, file sharing services, as well as malvertising campaigns," researchers Vojtěch Krejsa and Milan Špinka said in a report published this month.
    "Victims are evaluated based on geolocation, IP address, and browser fingerprinting; for example, connections through VPNs or headless browsers are detected and rejected."
    Some of these attack chains have been found to serve bogus CAPTCHA pages that leverage the ClickFix strategy to trick users into running malicious code and infecting their machines with a malware known as PEAKLIGHT, which is known to server information stealers like Lumma.

    Central to the HelloTDS infrastructure is the use of .top, .shop, and .com top-level domains that are used to host the JavaScript code and trigger the redirections following a multi-stage fingerprinting process engineered to collect network and browser information.
    "The HelloTDS infrastructure behind fake CAPTCHA campaigns demonstrates how attackers continue to refine their methods to bypass traditional protections, evade detection, and selectively target victims," the researchers said.
    "By leveraging sophisticated fingerprinting, dynamic domain infrastructure, and deception tacticsthese campaigns achieve both stealth and scale."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #over #websites #infected #with #jsfiretruck
    Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
    Jun 13, 2025Ravie LakshmananWeb Security / Network Security Cybersecurity researchers are calling attention to a "large-scale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute code. The cybersecurity company has given the technique an alternate name JSFireTruck owing to the profanity involved. "Multiple websites have been identified with injected malicious JavaScript that uses JSFireTruck obfuscation, which is composed primarily of the symbols, +, {, and }," security researchers Hardik Shah, Brad Duncan, and Pranay Kumar Chhaparwal said. "The code's obfuscation hides its true purpose, hindering analysis." Further analysis has determined that the injected code is designed to check the website referrer, which identifies the address of the web page from which a request originated. Should the referrer be a search engine such as Google, Bing, DuckDuckGo, Yahoo!, or AOL, the JavaScript code redirects victims to malicious URLs that can deliver malware, exploits, traffic monetization, and malvertising. Unit 42 said its telemetry uncovered 269,552 web pages that have been infected with JavaScript code using the JSFireTruck technique between March 26 and April 25, 2025. A spike in the campaign was first recorded on April 12, when over 50,000 infected web pages were observed in a single day. "The campaign's scale and stealth pose a significant threat," the researchers said. "The widespread nature of these infections suggests a coordinated effort to compromise legitimate websites as attack vectors for further malicious activities." Say Hello to HelloTDS The development comes as Gen Digital took the wraps off a sophisticated Traffic Distribution Servicecalled HelloTDS that's designed to conditionally redirect site visitors to fake CAPTCHA pages, tech support scams, fake browser updates, unwanted browser extensions, and cryptocurrency scams through remotely-hosted JavaScript code injected into the sites. The primary objective of the TDS is to act as a gateway, determining the exact nature of content to be delivered to the victims after fingerprinting their devices. If the user is not deemed a suitable target, the victim is redirected to a benign web page. "The campaign entry points are infected or otherwise attacker-controlled streaming websites, file sharing services, as well as malvertising campaigns," researchers Vojtěch Krejsa and Milan Špinka said in a report published this month. "Victims are evaluated based on geolocation, IP address, and browser fingerprinting; for example, connections through VPNs or headless browsers are detected and rejected." Some of these attack chains have been found to serve bogus CAPTCHA pages that leverage the ClickFix strategy to trick users into running malicious code and infecting their machines with a malware known as PEAKLIGHT, which is known to server information stealers like Lumma. Central to the HelloTDS infrastructure is the use of .top, .shop, and .com top-level domains that are used to host the JavaScript code and trigger the redirections following a multi-stage fingerprinting process engineered to collect network and browser information. "The HelloTDS infrastructure behind fake CAPTCHA campaigns demonstrates how attackers continue to refine their methods to bypass traditional protections, evade detection, and selectively target victims," the researchers said. "By leveraging sophisticated fingerprinting, dynamic domain infrastructure, and deception tacticsthese campaigns achieve both stealth and scale." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #over #websites #infected #with #jsfiretruck
    THEHACKERNEWS.COM
    Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
    Jun 13, 2025Ravie LakshmananWeb Security / Network Security Cybersecurity researchers are calling attention to a "large-scale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute code. The cybersecurity company has given the technique an alternate name JSFireTruck owing to the profanity involved. "Multiple websites have been identified with injected malicious JavaScript that uses JSFireTruck obfuscation, which is composed primarily of the symbols [, ], +, $, {, and }," security researchers Hardik Shah, Brad Duncan, and Pranay Kumar Chhaparwal said. "The code's obfuscation hides its true purpose, hindering analysis." Further analysis has determined that the injected code is designed to check the website referrer ("document.referrer"), which identifies the address of the web page from which a request originated. Should the referrer be a search engine such as Google, Bing, DuckDuckGo, Yahoo!, or AOL, the JavaScript code redirects victims to malicious URLs that can deliver malware, exploits, traffic monetization, and malvertising. Unit 42 said its telemetry uncovered 269,552 web pages that have been infected with JavaScript code using the JSFireTruck technique between March 26 and April 25, 2025. A spike in the campaign was first recorded on April 12, when over 50,000 infected web pages were observed in a single day. "The campaign's scale and stealth pose a significant threat," the researchers said. "The widespread nature of these infections suggests a coordinated effort to compromise legitimate websites as attack vectors for further malicious activities." Say Hello to HelloTDS The development comes as Gen Digital took the wraps off a sophisticated Traffic Distribution Service (TDS) called HelloTDS that's designed to conditionally redirect site visitors to fake CAPTCHA pages, tech support scams, fake browser updates, unwanted browser extensions, and cryptocurrency scams through remotely-hosted JavaScript code injected into the sites. The primary objective of the TDS is to act as a gateway, determining the exact nature of content to be delivered to the victims after fingerprinting their devices. If the user is not deemed a suitable target, the victim is redirected to a benign web page. "The campaign entry points are infected or otherwise attacker-controlled streaming websites, file sharing services, as well as malvertising campaigns," researchers Vojtěch Krejsa and Milan Špinka said in a report published this month. "Victims are evaluated based on geolocation, IP address, and browser fingerprinting; for example, connections through VPNs or headless browsers are detected and rejected." Some of these attack chains have been found to serve bogus CAPTCHA pages that leverage the ClickFix strategy to trick users into running malicious code and infecting their machines with a malware known as PEAKLIGHT (aka Emmenhtal Loader), which is known to server information stealers like Lumma. Central to the HelloTDS infrastructure is the use of .top, .shop, and .com top-level domains that are used to host the JavaScript code and trigger the redirections following a multi-stage fingerprinting process engineered to collect network and browser information. "The HelloTDS infrastructure behind fake CAPTCHA campaigns demonstrates how attackers continue to refine their methods to bypass traditional protections, evade detection, and selectively target victims," the researchers said. "By leveraging sophisticated fingerprinting, dynamic domain infrastructure, and deception tactics (such as mimicking legitimate websites and serving benign content to researchers) these campaigns achieve both stealth and scale." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Comments 0 Shares 0 Reviews
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence

    A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan.
    "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets."
    The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites.

    Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets.
    While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases.

    This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server.
    "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said.
    The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button.
    This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification.

    Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts.
    But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them.
    At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks.
    AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file.
    The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms.
    Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office.
    The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook.
    The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain.

    Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times.
    It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom.
    The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past.
    "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers."
    "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #discord #invite #link #hijacking #delivers
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #discord #invite #link #hijacking #delivers
    THEHACKERNEWS.COM
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custom (vanity) invite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite links (e.g., on websites, blogs, or forums) can unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string" (i.e., the PowerShell command), and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-control (C2) server by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery network (CDN) abused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Comments 0 Shares 0 Reviews
  • Probiotics helped great star corals fend off a deadly disease

    Great star corals in the grip of disease have been saved with probiotics — beneficial bacteria that attack or displace invading pathogens or possibly trigger immune responses to them.
    What’s causing this deadly disease remains unidentified. But researchers at the Smithsonian Marine Station in Fort Pierce, Fla., were able to successfully halt progression of the disease’s symptoms, the team reports June 5 in Frontiers in Marine Science.
    The condition is called stony coral tissue loss disease and is characterized by white lesions that lead to the loss of polyps — tiny soft-bodied organisms similar to sea anemones — blanketing coral. Eventually, nothing but the white coral skeleton is left behind. The disease emerged in Florida in 2014 and has spread rampantly throughout the Florida Keys and the Caribbean.
    A great star coralcolony is infected with stony coral tissue loss disease on the coral reef in Fort Lauderdale. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. Kelly Pitts/Smithsonian
    Researchers suspect that the disease is bacterial in nature. Antibiotic treatments can offer a quick fix, but these drugs do not prevent reinfection and carry the risk of the mysterious pathogen building resistance against them. So, in late 2020, the Smithsonian group tried for a more sustainable solution, giving probiotics to 30 infected great star coral colonies.
    The helpful microbes came from corals tested in the lab that showed resistance to the disease. “We noticed that one of the coral fragments would not get infected … so one of the first things we did was try to culture the microbes that are on this coral,” says microbiologist Blake Ushijima, who developed the probiotic used in the team’s experiment. “These microbes produce antibacterial compounds … and one had a high level of activity against bacteria from diseased corals,” acting as a “pro” biotic, by somehow neutralizing pathogens.
    The identified microbe, a bacterium called McH1-7, became the active ingredient in a paste delivered by divers to several infected colonies. They covered these colonies with plastic bags to immerse them in the probiotic solution, injecting the paste into the bags using a syringe. They also applied the paste directly to other colonies, slathering lesions caused by the disease.
    A probiotic paste of McH1-7 is applied to the disease lesion of a great star coralcolony infected with stony coral tissue loss disease. The paste was then smoothed flat with a gloved hand so that all apparently infected tissue was covered by the lesion-specific treatment.Kelly Pitts/Smithsonian
    For two and a half years, the team monitored the corals’ health. The probiotics slowed or stopped the disease from spreading in all eight colonies treated inside bags. On average, the disease’s ugly advance was held to only 7 percent of tissue, compared with an aggressive 30 percent on untreated colonies. The paste put directly on the coral had no beneficial effect.
    The results are encouraging, but coauthor Valerie Paul cautions against declaring the probiotic a cure. She doubts the practicality of swimming around with heavily weighted plastic bags and putting them on corals. And, she points out, the study was limited to one species of coral, when the disease plagues over 30.

    Sponsor Message

    Still, Ushijima considers the study a proof of concept. “The idea of coral probiotics has been thrown around for decades, but no one has directly shown their effects on disease in the wild,” he says. “I think it’s very exciting because it’s actually opening the door to a new field.”
    #probiotics #helped #great #star #corals
    Probiotics helped great star corals fend off a deadly disease
    Great star corals in the grip of disease have been saved with probiotics — beneficial bacteria that attack or displace invading pathogens or possibly trigger immune responses to them. What’s causing this deadly disease remains unidentified. But researchers at the Smithsonian Marine Station in Fort Pierce, Fla., were able to successfully halt progression of the disease’s symptoms, the team reports June 5 in Frontiers in Marine Science. The condition is called stony coral tissue loss disease and is characterized by white lesions that lead to the loss of polyps — tiny soft-bodied organisms similar to sea anemones — blanketing coral. Eventually, nothing but the white coral skeleton is left behind. The disease emerged in Florida in 2014 and has spread rampantly throughout the Florida Keys and the Caribbean. A great star coralcolony is infected with stony coral tissue loss disease on the coral reef in Fort Lauderdale. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. Kelly Pitts/Smithsonian Researchers suspect that the disease is bacterial in nature. Antibiotic treatments can offer a quick fix, but these drugs do not prevent reinfection and carry the risk of the mysterious pathogen building resistance against them. So, in late 2020, the Smithsonian group tried for a more sustainable solution, giving probiotics to 30 infected great star coral colonies. The helpful microbes came from corals tested in the lab that showed resistance to the disease. “We noticed that one of the coral fragments would not get infected … so one of the first things we did was try to culture the microbes that are on this coral,” says microbiologist Blake Ushijima, who developed the probiotic used in the team’s experiment. “These microbes produce antibacterial compounds … and one had a high level of activity against bacteria from diseased corals,” acting as a “pro” biotic, by somehow neutralizing pathogens. The identified microbe, a bacterium called McH1-7, became the active ingredient in a paste delivered by divers to several infected colonies. They covered these colonies with plastic bags to immerse them in the probiotic solution, injecting the paste into the bags using a syringe. They also applied the paste directly to other colonies, slathering lesions caused by the disease. A probiotic paste of McH1-7 is applied to the disease lesion of a great star coralcolony infected with stony coral tissue loss disease. The paste was then smoothed flat with a gloved hand so that all apparently infected tissue was covered by the lesion-specific treatment.Kelly Pitts/Smithsonian For two and a half years, the team monitored the corals’ health. The probiotics slowed or stopped the disease from spreading in all eight colonies treated inside bags. On average, the disease’s ugly advance was held to only 7 percent of tissue, compared with an aggressive 30 percent on untreated colonies. The paste put directly on the coral had no beneficial effect. The results are encouraging, but coauthor Valerie Paul cautions against declaring the probiotic a cure. She doubts the practicality of swimming around with heavily weighted plastic bags and putting them on corals. And, she points out, the study was limited to one species of coral, when the disease plagues over 30. Sponsor Message Still, Ushijima considers the study a proof of concept. “The idea of coral probiotics has been thrown around for decades, but no one has directly shown their effects on disease in the wild,” he says. “I think it’s very exciting because it’s actually opening the door to a new field.” #probiotics #helped #great #star #corals
    WWW.SCIENCENEWS.ORG
    Probiotics helped great star corals fend off a deadly disease
    Great star corals in the grip of disease have been saved with probiotics — beneficial bacteria that attack or displace invading pathogens or possibly trigger immune responses to them. What’s causing this deadly disease remains unidentified. But researchers at the Smithsonian Marine Station in Fort Pierce, Fla., were able to successfully halt progression of the disease’s symptoms, the team reports June 5 in Frontiers in Marine Science. The condition is called stony coral tissue loss disease and is characterized by white lesions that lead to the loss of polyps — tiny soft-bodied organisms similar to sea anemones — blanketing coral. Eventually, nothing but the white coral skeleton is left behind. The disease emerged in Florida in 2014 and has spread rampantly throughout the Florida Keys and the Caribbean. A great star coral (M. cavernosa) colony is infected with stony coral tissue loss disease on the coral reef in Fort Lauderdale. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. Kelly Pitts/Smithsonian Researchers suspect that the disease is bacterial in nature. Antibiotic treatments can offer a quick fix, but these drugs do not prevent reinfection and carry the risk of the mysterious pathogen building resistance against them. So, in late 2020, the Smithsonian group tried for a more sustainable solution, giving probiotics to 30 infected great star coral colonies. The helpful microbes came from corals tested in the lab that showed resistance to the disease. “We noticed that one of the coral fragments would not get infected … so one of the first things we did was try to culture the microbes that are on this coral,” says microbiologist Blake Ushijima, who developed the probiotic used in the team’s experiment. “These microbes produce antibacterial compounds … and one had a high level of activity against bacteria from diseased corals,” acting as a “pro” biotic, by somehow neutralizing pathogens. The identified microbe, a bacterium called McH1-7, became the active ingredient in a paste delivered by divers to several infected colonies. They covered these colonies with plastic bags to immerse them in the probiotic solution, injecting the paste into the bags using a syringe. They also applied the paste directly to other colonies, slathering lesions caused by the disease. A probiotic paste of McH1-7 is applied to the disease lesion of a great star coral (M. cavernosa) colony infected with stony coral tissue loss disease. The paste was then smoothed flat with a gloved hand so that all apparently infected tissue was covered by the lesion-specific treatment.Kelly Pitts/Smithsonian For two and a half years, the team monitored the corals’ health. The probiotics slowed or stopped the disease from spreading in all eight colonies treated inside bags. On average, the disease’s ugly advance was held to only 7 percent of tissue, compared with an aggressive 30 percent on untreated colonies. The paste put directly on the coral had no beneficial effect. The results are encouraging, but coauthor Valerie Paul cautions against declaring the probiotic a cure. She doubts the practicality of swimming around with heavily weighted plastic bags and putting them on corals. And, she points out, the study was limited to one species of coral, when the disease plagues over 30. Sponsor Message Still, Ushijima considers the study a proof of concept. “The idea of coral probiotics has been thrown around for decades, but no one has directly shown their effects on disease in the wild,” he says. “I think it’s very exciting because it’s actually opening the door to a new field.”
    Like
    Love
    Wow
    Sad
    Angry
    291
    0 Comments 0 Shares 0 Reviews
  • Probiotics can help heal ravaged coral reefs

    Get the Popular Science daily newsletter
    Breakthroughs, discoveries, and DIY tips sent every weekday.

    Probiotics are everywhere, claiming to help us poop, restore gut health, and more. They can also be used to help threatened coral reefs. A bacterial probiotic has helped slow the spread of stony coral tissue loss diseasein wild corals in Florida that were already infected with the disease. The findings are detailed in a study published June 5 in the journal Frontiers in Marine Science and show that applying this new probiotic treatment across coral colines helped prevent further tissue loss.
    What is stony coral tissue loss disease?
    SCTLD first emerged in Florida in 2014. In the 11 years since, it has rapidly spread throughout the Caribbean. This mysterious ailment has been confirmed in at least 20 other countries and territories.
    Other coral pathogens typically target specific species. SCTLD infects more than 30 different species of stony corals, including pillar corals and brain corals. The disease causes the soft tissue in the corals to slough off, leaving behind white patches of exposed skeleton. The disease can devastate an entire coral colony in only a few weeks to months. 
    A great star coralcolony infected with stony coral tissue lossdiseaseon the coral reef in Fort Lauderdale, FL. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. CREDIT: KellyPitts, Smithsonian.
    The exact cause of SCTLD is still unknown, but it appears to be linked to some kind of harmful bacteria. Currently, the most common treatment for SCTLD is using a paste that contains the antibiotic amoxicillin on diseased corals. However, antibiotics are not a silver bullet. This amoxicillin balm can temporarily halt SCTLD’s spread, but it needs to be frequently reapplied to the lesions on the corals. This takes time and resources, while increasing the likelihood that the microbes causing SCTLD might develop resistance to amoxicillin and related antibiotics.
    “Antibiotics do not stop future outbreaks,” Valerie Paul, a study co-author and the head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, said in a statement. “The disease can quickly come back, even on the same coral colonies that have been treated.”
    Finding the right probiotic
    Paul and her colleagues have spent over six years investigating whether beneficial microorganismscould be a longer lasting alternative to combat this pathogen.
    Just like humans, corals are host to communities known as microbiomes that are bustling with all different types of bacteria. Some of these miniscule organisms produce antioxidants and vitamins that can help keep their coral hosts healthy. 
    First, the team looked at the microbiomes of corals that are impervious to SCTLD to try and harvest probiotics from these disease-resistant species. In theory, these could be used to strengthen the microbiomes of susceptible corals. 
    They tested over 200 strains of bacteria from disease-resistant corals and published a study in 2023 about the probiotic Pseudoalteromonas sp. McH1-7. Taken from the great star coral, this probiotic produces several antibacterial compounds. Having such a stacked antibacterial toolbox made McH1-7 an ideal candidate to combat a pathogen like SCTLD.
    They initially tested McH1-7 on live pieces of M. cavernosa and found that the probiotic reliably prevented the spread of SCTLD in the lab. After these successful lab tests, the wild ocean called next.
    Testing in the ocean
    The team conducted several field tests on a shallow reef near Fort Lauderdale, focusing on 40 M. cavernosa colonies that showed signs of SCTLD. Some of the corals in these colonies received a paste containing the probiotic McH1-7 that was applied directly to the disease lesions. They treated the other corals with a solution of seawater containing McH1-7 and covered them using weighted plastic bags. The probiotics were administered inside the bag in order to cover the entire coral colony.  
    “This created a little mini-aquarium that kept the probiotics around each coral colony,” Paul said.
    For two and a half years, they monitored the colonies, taking multiple rounds of tissue and mucus samples to see how the corals’ microbiomes were changing over time. They found that  the McH1-7 probiotic successfully slowed the spread of SCTLD when it was delivered to the entire colony using the bag and solution method. According to the samples, the probiotic was effective without dominating the corals’ natural microbes. 
    Kelly Pitts, a research technician with the Smithsonian Marine Station at Ft. Pierce, Floridaand co-lead author of the study treats great star coralcolonies infected with SCTLD with probiotic strain McH1-7 by covering the coral colony in a plastic bag, injecting a probiotic bacteria solution into the bag and leaving the bag for two hours to allow for the bacteria to colonize on the coral. CREDIT: Hunter Noren.
    Fighting nature with nature
    While using this probiotic appears to be an effective treatment for SCTLD among the reefs of northern Florida, additional work is needed to see how it could work in other regions. Similar tests on reefs in the Florida Keys have been conducted, with mixed preliminary results, likely due to regional differences in SCTLD.
    The team believes that probiotics still could become a crucial tool for combatting SCTLD across the Caribbean, especially as scientists fine tune how to administer them. Importantly, these beneficial bacteria support what corals already do naturally. 
    “Corals are naturally rich with bacteria and it’s not surprising that the bacterial composition is important for their health,” Paul said. “We’re trying to figure out which bacteria can make these vibrant microbiomes even stronger.”
    #probiotics #can #help #heal #ravaged
    Probiotics can help heal ravaged coral reefs
    Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. Probiotics are everywhere, claiming to help us poop, restore gut health, and more. They can also be used to help threatened coral reefs. A bacterial probiotic has helped slow the spread of stony coral tissue loss diseasein wild corals in Florida that were already infected with the disease. The findings are detailed in a study published June 5 in the journal Frontiers in Marine Science and show that applying this new probiotic treatment across coral colines helped prevent further tissue loss. What is stony coral tissue loss disease? SCTLD first emerged in Florida in 2014. In the 11 years since, it has rapidly spread throughout the Caribbean. This mysterious ailment has been confirmed in at least 20 other countries and territories. Other coral pathogens typically target specific species. SCTLD infects more than 30 different species of stony corals, including pillar corals and brain corals. The disease causes the soft tissue in the corals to slough off, leaving behind white patches of exposed skeleton. The disease can devastate an entire coral colony in only a few weeks to months.  A great star coralcolony infected with stony coral tissue lossdiseaseon the coral reef in Fort Lauderdale, FL. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. CREDIT: KellyPitts, Smithsonian. The exact cause of SCTLD is still unknown, but it appears to be linked to some kind of harmful bacteria. Currently, the most common treatment for SCTLD is using a paste that contains the antibiotic amoxicillin on diseased corals. However, antibiotics are not a silver bullet. This amoxicillin balm can temporarily halt SCTLD’s spread, but it needs to be frequently reapplied to the lesions on the corals. This takes time and resources, while increasing the likelihood that the microbes causing SCTLD might develop resistance to amoxicillin and related antibiotics. “Antibiotics do not stop future outbreaks,” Valerie Paul, a study co-author and the head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, said in a statement. “The disease can quickly come back, even on the same coral colonies that have been treated.” Finding the right probiotic Paul and her colleagues have spent over six years investigating whether beneficial microorganismscould be a longer lasting alternative to combat this pathogen. Just like humans, corals are host to communities known as microbiomes that are bustling with all different types of bacteria. Some of these miniscule organisms produce antioxidants and vitamins that can help keep their coral hosts healthy.  First, the team looked at the microbiomes of corals that are impervious to SCTLD to try and harvest probiotics from these disease-resistant species. In theory, these could be used to strengthen the microbiomes of susceptible corals.  They tested over 200 strains of bacteria from disease-resistant corals and published a study in 2023 about the probiotic Pseudoalteromonas sp. McH1-7. Taken from the great star coral, this probiotic produces several antibacterial compounds. Having such a stacked antibacterial toolbox made McH1-7 an ideal candidate to combat a pathogen like SCTLD. They initially tested McH1-7 on live pieces of M. cavernosa and found that the probiotic reliably prevented the spread of SCTLD in the lab. After these successful lab tests, the wild ocean called next. Testing in the ocean The team conducted several field tests on a shallow reef near Fort Lauderdale, focusing on 40 M. cavernosa colonies that showed signs of SCTLD. Some of the corals in these colonies received a paste containing the probiotic McH1-7 that was applied directly to the disease lesions. They treated the other corals with a solution of seawater containing McH1-7 and covered them using weighted plastic bags. The probiotics were administered inside the bag in order to cover the entire coral colony.   “This created a little mini-aquarium that kept the probiotics around each coral colony,” Paul said. For two and a half years, they monitored the colonies, taking multiple rounds of tissue and mucus samples to see how the corals’ microbiomes were changing over time. They found that  the McH1-7 probiotic successfully slowed the spread of SCTLD when it was delivered to the entire colony using the bag and solution method. According to the samples, the probiotic was effective without dominating the corals’ natural microbes.  Kelly Pitts, a research technician with the Smithsonian Marine Station at Ft. Pierce, Floridaand co-lead author of the study treats great star coralcolonies infected with SCTLD with probiotic strain McH1-7 by covering the coral colony in a plastic bag, injecting a probiotic bacteria solution into the bag and leaving the bag for two hours to allow for the bacteria to colonize on the coral. CREDIT: Hunter Noren. Fighting nature with nature While using this probiotic appears to be an effective treatment for SCTLD among the reefs of northern Florida, additional work is needed to see how it could work in other regions. Similar tests on reefs in the Florida Keys have been conducted, with mixed preliminary results, likely due to regional differences in SCTLD. The team believes that probiotics still could become a crucial tool for combatting SCTLD across the Caribbean, especially as scientists fine tune how to administer them. Importantly, these beneficial bacteria support what corals already do naturally.  “Corals are naturally rich with bacteria and it’s not surprising that the bacterial composition is important for their health,” Paul said. “We’re trying to figure out which bacteria can make these vibrant microbiomes even stronger.” #probiotics #can #help #heal #ravaged
    WWW.POPSCI.COM
    Probiotics can help heal ravaged coral reefs
    Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. Probiotics are everywhere, claiming to help us poop, restore gut health, and more. They can also be used to help threatened coral reefs. A bacterial probiotic has helped slow the spread of stony coral tissue loss disease (SCTLD) in wild corals in Florida that were already infected with the disease. The findings are detailed in a study published June 5 in the journal Frontiers in Marine Science and show that applying this new probiotic treatment across coral colines helped prevent further tissue loss. What is stony coral tissue loss disease (SCTLD)? SCTLD first emerged in Florida in 2014. In the 11 years since, it has rapidly spread throughout the Caribbean. This mysterious ailment has been confirmed in at least 20 other countries and territories. Other coral pathogens typically target specific species. SCTLD infects more than 30 different species of stony corals, including pillar corals and brain corals. The disease causes the soft tissue in the corals to slough off, leaving behind white patches of exposed skeleton. The disease can devastate an entire coral colony in only a few weeks to months.  A great star coral (Montastraea cavernosa) colony infected with stony coral tissue lossdisease (SCTLD) on the coral reef in Fort Lauderdale, FL. The lesion, where the white band of tissue occurs, typically moves across the coral, killing coral tissue along the way. CREDIT: KellyPitts, Smithsonian. The exact cause of SCTLD is still unknown, but it appears to be linked to some kind of harmful bacteria. Currently, the most common treatment for SCTLD is using a paste that contains the antibiotic amoxicillin on diseased corals. However, antibiotics are not a silver bullet. This amoxicillin balm can temporarily halt SCTLD’s spread, but it needs to be frequently reapplied to the lesions on the corals. This takes time and resources, while increasing the likelihood that the microbes causing SCTLD might develop resistance to amoxicillin and related antibiotics. “Antibiotics do not stop future outbreaks,” Valerie Paul, a study co-author and the head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, said in a statement. “The disease can quickly come back, even on the same coral colonies that have been treated.” Finding the right probiotic Paul and her colleagues have spent over six years investigating whether beneficial microorganisms (aka probiotics) could be a longer lasting alternative to combat this pathogen. Just like humans, corals are host to communities known as microbiomes that are bustling with all different types of bacteria. Some of these miniscule organisms produce antioxidants and vitamins that can help keep their coral hosts healthy.  First, the team looked at the microbiomes of corals that are impervious to SCTLD to try and harvest probiotics from these disease-resistant species. In theory, these could be used to strengthen the microbiomes of susceptible corals.  They tested over 200 strains of bacteria from disease-resistant corals and published a study in 2023 about the probiotic Pseudoalteromonas sp. McH1-7 (or McH1-7 for short). Taken from the great star coral (Montastraea cavernosa), this probiotic produces several antibacterial compounds. Having such a stacked antibacterial toolbox made McH1-7 an ideal candidate to combat a pathogen like SCTLD. They initially tested McH1-7 on live pieces of M. cavernosa and found that the probiotic reliably prevented the spread of SCTLD in the lab. After these successful lab tests, the wild ocean called next. Testing in the ocean The team conducted several field tests on a shallow reef near Fort Lauderdale, focusing on 40 M. cavernosa colonies that showed signs of SCTLD. Some of the corals in these colonies received a paste containing the probiotic McH1-7 that was applied directly to the disease lesions. They treated the other corals with a solution of seawater containing McH1-7 and covered them using weighted plastic bags. The probiotics were administered inside the bag in order to cover the entire coral colony.   “This created a little mini-aquarium that kept the probiotics around each coral colony,” Paul said. For two and a half years, they monitored the colonies, taking multiple rounds of tissue and mucus samples to see how the corals’ microbiomes were changing over time. They found that  the McH1-7 probiotic successfully slowed the spread of SCTLD when it was delivered to the entire colony using the bag and solution method. According to the samples, the probiotic was effective without dominating the corals’ natural microbes.  Kelly Pitts, a research technician with the Smithsonian Marine Station at Ft. Pierce, Floridaand co-lead author of the study treats great star coral (Montaststraea cavernosa) colonies infected with SCTLD with probiotic strain McH1-7 by covering the coral colony in a plastic bag, injecting a probiotic bacteria solution into the bag and leaving the bag for two hours to allow for the bacteria to colonize on the coral. CREDIT: Hunter Noren. Fighting nature with nature While using this probiotic appears to be an effective treatment for SCTLD among the reefs of northern Florida, additional work is needed to see how it could work in other regions. Similar tests on reefs in the Florida Keys have been conducted, with mixed preliminary results, likely due to regional differences in SCTLD. The team believes that probiotics still could become a crucial tool for combatting SCTLD across the Caribbean, especially as scientists fine tune how to administer them. Importantly, these beneficial bacteria support what corals already do naturally.  “Corals are naturally rich with bacteria and it’s not surprising that the bacterial composition is important for their health,” Paul said. “We’re trying to figure out which bacteria can make these vibrant microbiomes even stronger.”
    Like
    Love
    Wow
    Sad
    Angry
    203
    0 Comments 0 Shares 0 Reviews
  • The Last of Us – Season 2: Alex Wang (Production VFX Supervisor) & Fiona Campbell Westgate (Production VFX Producer)

    After detailing the VFX work on The Last of Us Season 1 in 2023, Alex Wang returns to reflect on how the scope and complexity have evolved in Season 2.
    With close to 30 years of experience in the visual effects industry, Fiona Campbell Westgate has contributed to major productions such as Ghost in the Shell, Avatar: The Way of Water, Ant-Man and the Wasp: Quantumania, and Nyad. Her work on Nyad earned her a VES Award for Outstanding Supporting Visual Effects in a Photoreal Feature.
    Collaboration with Craig Mazin and Neil Druckmann is key to shaping the visual universe of The Last of Us. Can you share with us how you work with them and how they influence the visual direction of the series?
    Alex Wang // Craig visualizes the shot or scene before putting words on the page. His writing is always exceptionally detailed and descriptive, ultimately helping us to imagine the shot. Of course, no one understands The Last of Us better than Neil, who knows all aspects of the lore very well. He’s done much research and design work with the Naughty Dog team, so he gives us good guidance regarding creature and environment designs. I always try to begin with concept art to get the ball rolling with Craig and Neil’s ideas. This season, we collaborated with Chromatic Studios for concept art. They also contributed to the games, so I felt that continuity was beneficial for our show.
    Fiona Campbell Westgate // From the outset, it was clear that collaborating with Craig would be an exceptional experience. Early meetings revealed just how personable and invested Craig is. He works closely with every department to ensure that each episode is done to the highest level. Craig places unwavering trust in our VFX Supervisor, Alex Wang. They have an understanding between them that lends to an exceptional partnership. As the VFX Producer, I know how vital the dynamic between the Showrunner and VFX Supervisor is; working with these two has made for one of the best professional experiences of my career. 
    Photograph by Liane Hentscher/HBO
    How has your collaboration with Craig evolved between the first and second seasons? Were there any adjustments in the visual approach or narrative techniques you made this season?
    Alex Wang // Since everything was new in Season 1, we dedicated a lot of time and effort to exploring the show’s visual language, and we all learned a great deal about what worked and what didn’t for the show. In my initial conversations with Craig about Season 2, it was clear that he wanted to expand the show’s scope by utilizing what we established and learned in Season 1. He felt significantly more at ease fully committing to using VFX to help tell the story this season.
    The first season involved multiple VFX studios to handle the complexity of the effects. How did you divide the work among different studios for the second season?
    Alex Wang // Most of the vendors this season were also in Season 1, so we already had a shorthand. The VFX Producer, Fiona Campbell Westgate, and I work closely together to decide how to divide the work among our vendors. The type of work needs to be well-suited for the vendor and fit into our budget and schedule. We were extremely fortunate to have the vendors we did this season. I want to take this opportunity to thank Weta FX, DNEG, RISE, Distillery VFX, Storm Studios, Important Looking Pirates, Blackbird, Wylie Co., RVX, and VDK. We also had ILM for concept art and Digital Domain for previs.
    Fiona Campbell Westgate // Alex Wang and I were very aware of the tight delivery schedule, which added to the challenge of distributing the workload. We planned the work based on the individual studio’s capabilities, and tried not to burden them with back to back episodes wherever possible. Fortunately, there was shorthand with vendors from Season One, who were well-acquainted with the process and the quality of work the show required.

    The town of Jackson is a key location in The Last of Us. Could you explain how you approached creating and expanding this environment for the second season?
    Alex Wang // Since Season 1, this show has created incredible sets. However, the Jackson town set build is by far the most impressive in terms of scope. They constructed an 822 ft x 400 ft set in Minaty Bay that resembled a real town! I had early discussions with Production Designer Don MacAulay and his team about where they should concentrate their efforts and where VFX would make the most sense to take over. They focused on developing the town’s main street, where we believed most scenes would occur. There is a big reveal of Jackson in the first episode after Ellie comes out of the barn. Distillery VFX was responsible for the town’s extension, which appears seamless because the team took great pride in researching and ensuring the architecture aligned with the set while staying true to the tone of Jackson, Wyoming.
    Fiona Campbell Westgate // An impressive set was constructed in Minaty Bay, which served as the foundation for VFX to build upon. There is a beautiful establishing shot of Jackson in Episode 1 that was completed by Distillery, showing a safe and almost normal setting as Season Two starts. Across the episodes, Jackson set extensions were completed by our partners at RISE and Weta. Each had a different phase of Jackson to create, from almost idyllic to a town immersed in Battle. 
    What challenges did you face filming Jackson on both real and virtual sets? Was there a particular fusion between visual effects and live-action shots to make it feel realistic?
    Alex Wang // I always advocate for building exterior sets outdoors to take advantage of natural light. However, the drawback is that we cannot control the weather and lighting when filming over several days across two units. In Episode 2, there’s supposed to be a winter storm in Jackson, so maintaining consistency within the episode was essential. On sunny and rainy days, we used cranes to lift large 30x60ft screens to block the sun or rain. It was impossible to shield the entire set from the rain or sun, so we prioritized protecting the actors from sunlight or rain. Thus, you can imagine there was extensive weather cleanup for the episode to ensure consistency within the sequences.
    Fiona Campbell Westgate // We were fortunate that production built a large scale Jackson set. It provided a base for the full CG Jackson aerial shots and CG Set Extensions. The weather conditions at Minaty Bay presented a challenge during the filming of the end of the Battle sequence in Episode 2. While there were periods of bright sunshine, rainfall occurred during the filming of the end of the Battle sequence in Episode 2. In addition to the obvious visual effects work, it became necessary to replace the ground cover.
    Photograph by Liane Hentscher/HBO
    The attack on Jackson by the horde of infected in season 2 is a very intense moment. How did you approach the visual effects for this sequence? What techniques did you use to make the scale of the attack feel as impressive as it did?
    Alex Wang // We knew this would be a very complex sequence to shoot, and for it to be successful, we needed to start planning with the HODs from the very beginning. We began previs during prep with Weta FX and the episode’s director, Mark Mylod. The previs helped us understand Mark and the showrunner’s vision. This then served as a blueprint for all departments to follow, and in many instances, we filmed the previs.
    Fiona Campbell Westgate // The sheer size of the CG Infected Horde sets the tone for the scale of the Battle. It’s an intimidating moment when they are revealed through the blowing snow. The addition of CG explosions and atmospheric effects contributed in adding scale to the sequence. 

    Can you give us an insight into the technical challenges of capturing the infected horde? How much of the effect was done using CGI, and how much was achieved with practical effects?
    Alex Wang // Starting with a detailed previs that Mark and Craig approved was essential for planning the horde. We understood that we would never have enough stunt performers to fill a horde, nor could they carry out some stunts that would be too dangerous. I reviewed the previs with Stunt Coordinator Marny Eng numerous times to decide the best placements for her team’s stunt performers. We also collaborated with Barrie Gower from the Prosthetics team to determine the most effective allocation of his team’s efforts. Stunt performers positioned closest to the camera would receive the full prosthetic treatment, which can take hours.
    Weta FX was responsible for the incredible CG Infected horde work in the Jackson Battle. They have been a creative partner with HBO’s The Last of Us since Season 1, so they were brought on early for Season 2. I began discussions with Weta’s VFX supervisor, Nick Epstein, about how we could tackle these complex horde shots very early during the shoot.
    Typically, repetition in CG crowd scenes can be acceptable, such as armies with soldiers dressed in the same uniform or armour. However, for our Infected horde, Craig wanted to convey that the Infected didn’t come off an assembly line or all shop at the same clothing department store. Any repetition would feel artificial. These Infected were once civilians with families, or they were groups of raiders. We needed complex variations in height, body size, age, clothing, and hair. We built our base library of Infected, and then Nick and the Weta FX team developed a “mix and match” system, allowing the Infected to wear any costume and hair groom. A procedural texturing system was also developed for costumes, providing even greater variation.
    The most crucial aspect of the Infected horde was their motion. We had numerous shots cutting back-to-back with practical Infected, as well as shots where our CG Infected ran right alongside a stunt horde. It was incredibly unforgiving! Weta FX’s animation supervisor from Season 1, Dennis Yoo, returned for Season 2 to meet the challenge. Having been part of the first season, Dennis understood the expectations of Craig and Neil. Similar to issues of model repetition within a horde, it was relatively easy to perceive repetition, especially if they were running toward the same target. It was essential to enhance the details of their performances with nuances such as tripping and falling, getting back up, and trampling over each other. There also needed to be a difference in the Infected’s running speed. To ensure we had enough complexity within the horde, Dennis motion-captured almost 600 unique motion cycles.
    We had over a hundred shots in episode 2 that required CG Infected horde.
    Fiona Campbell Westgate // Nick Epstein, Weta VFX Supervisor, and Dennis Yoo, Weta Animation Supervisor, were faced with having to add hero, close-up Horde that had to integrate with practical Stunt performers. They achieved this through over 60 motion capture sessions and running it through a deformation system they developed. Every detail was applied to allow for a seamless blend with our practical Stunt performances. The Weta team created a custom costume and hair system that provided individual looks to the CG Infected Horde. We were able to avoid the repetitive look of a CG crowd due to these efforts.

    The movement of the infected horde is crucial for the intensity of the scene. How did you manage the animation and simulation of the infected to ensure smooth and realistic interaction with the environment?
    Fiona Campbell Westgate // We worked closely with the Stunt department to plan out positioning and where VFX would be adding the CG Horde. Craig Mazin wanted the Infected Horde to move in a way that humans cannot. The deformation system kept the body shape anatomically correct and allowed us to push the limits from how a human physically moves. 
    The Bloater makes a terrifying return this season. What were the key challenges in designing and animating this creature? How did you work on the Bloater’s interaction with the environment and other characters?
    Alex Wang // In Season 1, the Kansas City cul-de-sac sequence featured only a handful of Bloater shots. This season, however, nearly forty shots showcase the Bloater in broad daylight during the Battle of Jackson. We needed to redesign the Bloater asset to ensure it looked good in close-up shots from head to toe. Weta FX designed the Bloater for Season 1 and revamped the design for this season. Starting with the Bloater’s silhouette, it had to appear large, intimidating, and menacing. We explored enlarging the cordyceps head shape to make it feel almost like a crown, enhancing the Bloater’s impressive and strong presence.
    During filming, a stunt double stood in for the Bloater. This was mainly for scale reference and composition. It also helped the Infected stunt performers understand the Bloater’s spatial position, allowing them to avoid running through his space. Once we had an edit, Dennis mocapped the Bloater’s performances with his team. It is always challenging to get the motion right for a creature that weighs 600 pounds. We don’t want the mocap to be overly exaggerated, but it does break the character if the Bloater feels too “light.” The brilliant animation team at Weta FX brought the Bloater character to life and nailed it!
    When Tommy goes head-to-head with the Bloater, Craig was quite specific during the prep days about how the Bloater would bubble, melt, and burn as Tommy torches him with the flamethrower. Important Looking Pirates took on the “Burning Bloater” sequence, led by VFX Supervisor Philip Engstrom. They began with extensive R&D to ensure the Bloater’s skin would start to bubble and burn. ILP took the final Bloater asset from Weta FX and had to resculpt and texture the asset for the Bloater’s final burn state. Craig felt it was important for the Bloater to appear maimed at the end. The layers of FX were so complex that the R&D continued almost to the end of the delivery schedule.

    Fiona Campbell Westgate // This season the Bloater had to be bigger, more intimidating. The CG Asset was recreated to withstand the scrutiny of close ups and in daylight. Both Craig Mazin and Neil Druckmann worked closely with us during the process of the build. We referenced the game and applied elements of that version with ours. You’ll notice that his head is in the shape of crown, this is to convey he’s a powerful force. 
    During the Burning Bloater sequence in Episode 2, we brainstormed with Philip Engström, ILP VFX Supervisor, on how this creature would react to the flamethrower and how it would affect the ground as it burns. When the Bloater finally falls to the ground and dies, the extraordinary detail of the embers burning, fluid draining and melting the surrounding snow really sells that the CG creature was in the terrain. 

    Given the Bloater’s imposing size, how did you approach its integration into scenes with the actors? What techniques did you use to create such a realistic and menacing appearance?
    Fiona Campbell Westgate // For the Bloater, a stunt performer wearing a motion capture suit was filmed on set. This provided interaction with the actors and the environment. VFX enhanced the intensity of his movements, incorporating simulations to the CG Bloater’s skin and muscles that would reflect the weight and force as this terrifying creature moves. 

    Seattle in The Last of Us is a completely devastated city. Can you talk about how you recreated this destruction? What were the most difficult visual aspects to realize for this post-apocalyptic city?
    Fiona Campbell Westgate // We were meticulous in blending the CG destruction with the practical environment. The flora’s ability to overtake the environment had to be believable, and we adhered to the principle of form follows function. Due to the vastness of the CG devastation it was crucial to avoid repetitive effects. Consequently, our vendors were tasked with creating bespoke designs that evoked a sense of awe and beauty.
    Was Seattle’s architecture a key element in how you designed the visual effects? How did you adapt the city’s real-life urban landscape to meet the needs of the story while maintaining a coherent aesthetic?
    Alex Wang // It’s always important to Craig and Neil that we remain true to the cities our characters are in. DNEG was one of our primary vendors for Boston in Season 1, so it was natural for them to return for Season 2, this time focusing on Seattle. DNEG’s VFX Supervisor, Stephen James, who played a crucial role in developing the visual language of Boston for Season 1, also returns for this season. Stephen and Melaina Maceled a team to Seattle to shoot plates and perform lidar scans of parts of the city. We identified the buildings unique to Seattle that would have existed in 2003, so we ensured these buildings were always included in our establishing shots.
    Overgrowth and destruction have significantly influenced the environments in The Last of Us. The environment functions almost as a character in both Season 1 and Season 2. In the last season, the building destruction in Boston was primarily caused by military bombings. During this season, destruction mainly arises from dilapidation. Living in the Pacific Northwest, I understand how damp
    it can get for most of the year. I imagined that, over 20 years, the integrity of the buildings would be compromised by natural forces. This abundant moisture creates an exceptionally lush and vibrant landscape for much of the year. Therefore, when designing Seattle, we ensured that the destruction and overgrowth appeared intentional and aesthetically distinct from those of Boston.
    Fiona Campbell Westgate // Led by Stephen James, DNEG VFX Supervisor, and Melaina Mace, DNEG DFX Supervisor, the team captured photography, drone footage and the Clear Angle team captured LiDAR data over a three-day period in Seattle. It was crucial to include recognizable Seattle landmarks that would resonate with people familiar with the game. 

    The devastated city almost becomes a character in itself this season. What aspects of the visual effects did you have to enhance to increase the immersion of the viewer into this hostile and deteriorated environment?
    Fiona Campbell Westgate // It is indeed a character. Craig wanted it to be deteriorated but to have moments where it’s also beautiful in its devastation. For instance, in the Music Store in Episode 4 where Ellie is playing guitar for Dina, the deteriorated interior provides a beautiful backdrop to this intimate moment. The Set Decorating team dressed a specific section of the set, while VFX extended the destruction and overgrowth to encompass the entire environment, immersing the viewer in strange yet familiar surroundings.
    Photograph by Liane Hentscher/HBO
    The sequence where Ellie navigates a boat through a violent storm is stunning. What were the key challenges in creating this scene, especially with water simulation and the storm’s effects?
    Alex Wang // In the concluding episode of Season 2, Ellie is deep in Seattle, searching for Abby. The episode draws us closer to the Aquarium, where this area of Seattle is heavily flooded. Naturally, this brings challenges with CG water. In the scene where Ellie encounters Isaac and the W.L.F soldiers by the dock, we had a complex shoot involving multiple locations, including a water tank and a boat gimbal. There were also several full CG shots. For Isaac’s riverine boat, which was in a stormy ocean, I felt it was essential that the boat and the actors were given the appropriate motion. Weta FX assisted with tech-vis for all the boat gimbal work. We began with different ocean wave sizes caused by the storm, and once the filmmakers selected one, the boat’s motion in the tech-vis fed the special FX gimbal.
    When Ellie gets into the Jon boat, I didn’t want it on the same gimbal because I felt it would be too mechanical. Ellie’s weight needed to affect the boat as she got in, and that wouldn’t have happened with a mechanical gimbal. So, we opted to have her boat in a water tank for this scene. Special FX had wave makers that provided the boat with the appropriate movement.
    Instead of guessing what the ocean sim for the riverine boat should be, the tech- vis data enabled DNEG to get a head start on the water simulations in post-production. Craig wanted this sequence to appear convincingly dark, much like it looks out on the ocean at night. This allowed us to create dramatic visuals, using lightning strikes at moments to reveal depth.
    Were there any memorable moments or scenes from the series that you found particularly rewarding or challenging to work on from a visual effects standpoint?
    Alex Wang // The Last of Us tells the story of our characters’ journey. If you look at how season 2 begins in Jackson, it differs significantly from how we conclude the season in Seattle. We seldom return to the exact location in each episode, meaning every episode presents a unique challenge. The scope of work this season has been incredibly rewarding. We burned a Bloater, and we also introduced spores this season!
    Photograph by Liane Hentscher/HBO
    Looking back on the project, what aspects of the visual effects are you most proud of?
    Alex Wang // The Jackson Battle was incredibly complex, involving a grueling and lengthy shoot in quite challenging conditions, along with over 600 VFX shots in episode 2. It was truly inspiring to witness the determination of every department and vendor to give their all and create something remarkable.
    Fiona Campbell Westgate // I am immensely proud of the exceptional work accomplished by all of our vendors. During the VFX reviews, I found myself clapping with delight when the final shots were displayed; it was exciting to see remarkable results of the artists’ efforts come to light. 
    How long have you worked on this show?
    Alex Wang // I’ve been on this season for nearly two years.
    Fiona Campbell Westgate // A little over one year; I joined the show in April 2024.
    What’s the VFX shots count?
    Alex Wang // We had just over 2,500 shots this Season.
    Fiona Campbell Westgate // In Season 2, there were a total of 2656 visual effects shots.
    What is your next project?
    Fiona Campbell Westgate // Stay tuned…
    A big thanks for your time.
    WANT TO KNOW MORE?Blackbird: Dedicated page about The Last of Us – Season 2 website.DNEG: Dedicated page about The Last of Us – Season 2 on DNEG website.Important Looking Pirates: Dedicated page about The Last of Us – Season 2 website.RISE: Dedicated page about The Last of Us – Season 2 website.Weta FX: Dedicated page about The Last of Us – Season 2 website.
    © Vincent Frei – The Art of VFX – 2025
    #last #season #alex #wang #production
    The Last of Us – Season 2: Alex Wang (Production VFX Supervisor) & Fiona Campbell Westgate (Production VFX Producer)
    After detailing the VFX work on The Last of Us Season 1 in 2023, Alex Wang returns to reflect on how the scope and complexity have evolved in Season 2. With close to 30 years of experience in the visual effects industry, Fiona Campbell Westgate has contributed to major productions such as Ghost in the Shell, Avatar: The Way of Water, Ant-Man and the Wasp: Quantumania, and Nyad. Her work on Nyad earned her a VES Award for Outstanding Supporting Visual Effects in a Photoreal Feature. Collaboration with Craig Mazin and Neil Druckmann is key to shaping the visual universe of The Last of Us. Can you share with us how you work with them and how they influence the visual direction of the series? Alex Wang // Craig visualizes the shot or scene before putting words on the page. His writing is always exceptionally detailed and descriptive, ultimately helping us to imagine the shot. Of course, no one understands The Last of Us better than Neil, who knows all aspects of the lore very well. He’s done much research and design work with the Naughty Dog team, so he gives us good guidance regarding creature and environment designs. I always try to begin with concept art to get the ball rolling with Craig and Neil’s ideas. This season, we collaborated with Chromatic Studios for concept art. They also contributed to the games, so I felt that continuity was beneficial for our show. Fiona Campbell Westgate // From the outset, it was clear that collaborating with Craig would be an exceptional experience. Early meetings revealed just how personable and invested Craig is. He works closely with every department to ensure that each episode is done to the highest level. Craig places unwavering trust in our VFX Supervisor, Alex Wang. They have an understanding between them that lends to an exceptional partnership. As the VFX Producer, I know how vital the dynamic between the Showrunner and VFX Supervisor is; working with these two has made for one of the best professional experiences of my career.  Photograph by Liane Hentscher/HBO How has your collaboration with Craig evolved between the first and second seasons? Were there any adjustments in the visual approach or narrative techniques you made this season? Alex Wang // Since everything was new in Season 1, we dedicated a lot of time and effort to exploring the show’s visual language, and we all learned a great deal about what worked and what didn’t for the show. In my initial conversations with Craig about Season 2, it was clear that he wanted to expand the show’s scope by utilizing what we established and learned in Season 1. He felt significantly more at ease fully committing to using VFX to help tell the story this season. The first season involved multiple VFX studios to handle the complexity of the effects. How did you divide the work among different studios for the second season? Alex Wang // Most of the vendors this season were also in Season 1, so we already had a shorthand. The VFX Producer, Fiona Campbell Westgate, and I work closely together to decide how to divide the work among our vendors. The type of work needs to be well-suited for the vendor and fit into our budget and schedule. We were extremely fortunate to have the vendors we did this season. I want to take this opportunity to thank Weta FX, DNEG, RISE, Distillery VFX, Storm Studios, Important Looking Pirates, Blackbird, Wylie Co., RVX, and VDK. We also had ILM for concept art and Digital Domain for previs. Fiona Campbell Westgate // Alex Wang and I were very aware of the tight delivery schedule, which added to the challenge of distributing the workload. We planned the work based on the individual studio’s capabilities, and tried not to burden them with back to back episodes wherever possible. Fortunately, there was shorthand with vendors from Season One, who were well-acquainted with the process and the quality of work the show required. The town of Jackson is a key location in The Last of Us. Could you explain how you approached creating and expanding this environment for the second season? Alex Wang // Since Season 1, this show has created incredible sets. However, the Jackson town set build is by far the most impressive in terms of scope. They constructed an 822 ft x 400 ft set in Minaty Bay that resembled a real town! I had early discussions with Production Designer Don MacAulay and his team about where they should concentrate their efforts and where VFX would make the most sense to take over. They focused on developing the town’s main street, where we believed most scenes would occur. There is a big reveal of Jackson in the first episode after Ellie comes out of the barn. Distillery VFX was responsible for the town’s extension, which appears seamless because the team took great pride in researching and ensuring the architecture aligned with the set while staying true to the tone of Jackson, Wyoming. Fiona Campbell Westgate // An impressive set was constructed in Minaty Bay, which served as the foundation for VFX to build upon. There is a beautiful establishing shot of Jackson in Episode 1 that was completed by Distillery, showing a safe and almost normal setting as Season Two starts. Across the episodes, Jackson set extensions were completed by our partners at RISE and Weta. Each had a different phase of Jackson to create, from almost idyllic to a town immersed in Battle.  What challenges did you face filming Jackson on both real and virtual sets? Was there a particular fusion between visual effects and live-action shots to make it feel realistic? Alex Wang // I always advocate for building exterior sets outdoors to take advantage of natural light. However, the drawback is that we cannot control the weather and lighting when filming over several days across two units. In Episode 2, there’s supposed to be a winter storm in Jackson, so maintaining consistency within the episode was essential. On sunny and rainy days, we used cranes to lift large 30x60ft screens to block the sun or rain. It was impossible to shield the entire set from the rain or sun, so we prioritized protecting the actors from sunlight or rain. Thus, you can imagine there was extensive weather cleanup for the episode to ensure consistency within the sequences. Fiona Campbell Westgate // We were fortunate that production built a large scale Jackson set. It provided a base for the full CG Jackson aerial shots and CG Set Extensions. The weather conditions at Minaty Bay presented a challenge during the filming of the end of the Battle sequence in Episode 2. While there were periods of bright sunshine, rainfall occurred during the filming of the end of the Battle sequence in Episode 2. In addition to the obvious visual effects work, it became necessary to replace the ground cover. Photograph by Liane Hentscher/HBO The attack on Jackson by the horde of infected in season 2 is a very intense moment. How did you approach the visual effects for this sequence? What techniques did you use to make the scale of the attack feel as impressive as it did? Alex Wang // We knew this would be a very complex sequence to shoot, and for it to be successful, we needed to start planning with the HODs from the very beginning. We began previs during prep with Weta FX and the episode’s director, Mark Mylod. The previs helped us understand Mark and the showrunner’s vision. This then served as a blueprint for all departments to follow, and in many instances, we filmed the previs. Fiona Campbell Westgate // The sheer size of the CG Infected Horde sets the tone for the scale of the Battle. It’s an intimidating moment when they are revealed through the blowing snow. The addition of CG explosions and atmospheric effects contributed in adding scale to the sequence.  Can you give us an insight into the technical challenges of capturing the infected horde? How much of the effect was done using CGI, and how much was achieved with practical effects? Alex Wang // Starting with a detailed previs that Mark and Craig approved was essential for planning the horde. We understood that we would never have enough stunt performers to fill a horde, nor could they carry out some stunts that would be too dangerous. I reviewed the previs with Stunt Coordinator Marny Eng numerous times to decide the best placements for her team’s stunt performers. We also collaborated with Barrie Gower from the Prosthetics team to determine the most effective allocation of his team’s efforts. Stunt performers positioned closest to the camera would receive the full prosthetic treatment, which can take hours. Weta FX was responsible for the incredible CG Infected horde work in the Jackson Battle. They have been a creative partner with HBO’s The Last of Us since Season 1, so they were brought on early for Season 2. I began discussions with Weta’s VFX supervisor, Nick Epstein, about how we could tackle these complex horde shots very early during the shoot. Typically, repetition in CG crowd scenes can be acceptable, such as armies with soldiers dressed in the same uniform or armour. However, for our Infected horde, Craig wanted to convey that the Infected didn’t come off an assembly line or all shop at the same clothing department store. Any repetition would feel artificial. These Infected were once civilians with families, or they were groups of raiders. We needed complex variations in height, body size, age, clothing, and hair. We built our base library of Infected, and then Nick and the Weta FX team developed a “mix and match” system, allowing the Infected to wear any costume and hair groom. A procedural texturing system was also developed for costumes, providing even greater variation. The most crucial aspect of the Infected horde was their motion. We had numerous shots cutting back-to-back with practical Infected, as well as shots where our CG Infected ran right alongside a stunt horde. It was incredibly unforgiving! Weta FX’s animation supervisor from Season 1, Dennis Yoo, returned for Season 2 to meet the challenge. Having been part of the first season, Dennis understood the expectations of Craig and Neil. Similar to issues of model repetition within a horde, it was relatively easy to perceive repetition, especially if they were running toward the same target. It was essential to enhance the details of their performances with nuances such as tripping and falling, getting back up, and trampling over each other. There also needed to be a difference in the Infected’s running speed. To ensure we had enough complexity within the horde, Dennis motion-captured almost 600 unique motion cycles. We had over a hundred shots in episode 2 that required CG Infected horde. Fiona Campbell Westgate // Nick Epstein, Weta VFX Supervisor, and Dennis Yoo, Weta Animation Supervisor, were faced with having to add hero, close-up Horde that had to integrate with practical Stunt performers. They achieved this through over 60 motion capture sessions and running it through a deformation system they developed. Every detail was applied to allow for a seamless blend with our practical Stunt performances. The Weta team created a custom costume and hair system that provided individual looks to the CG Infected Horde. We were able to avoid the repetitive look of a CG crowd due to these efforts. The movement of the infected horde is crucial for the intensity of the scene. How did you manage the animation and simulation of the infected to ensure smooth and realistic interaction with the environment? Fiona Campbell Westgate // We worked closely with the Stunt department to plan out positioning and where VFX would be adding the CG Horde. Craig Mazin wanted the Infected Horde to move in a way that humans cannot. The deformation system kept the body shape anatomically correct and allowed us to push the limits from how a human physically moves.  The Bloater makes a terrifying return this season. What were the key challenges in designing and animating this creature? How did you work on the Bloater’s interaction with the environment and other characters? Alex Wang // In Season 1, the Kansas City cul-de-sac sequence featured only a handful of Bloater shots. This season, however, nearly forty shots showcase the Bloater in broad daylight during the Battle of Jackson. We needed to redesign the Bloater asset to ensure it looked good in close-up shots from head to toe. Weta FX designed the Bloater for Season 1 and revamped the design for this season. Starting with the Bloater’s silhouette, it had to appear large, intimidating, and menacing. We explored enlarging the cordyceps head shape to make it feel almost like a crown, enhancing the Bloater’s impressive and strong presence. During filming, a stunt double stood in for the Bloater. This was mainly for scale reference and composition. It also helped the Infected stunt performers understand the Bloater’s spatial position, allowing them to avoid running through his space. Once we had an edit, Dennis mocapped the Bloater’s performances with his team. It is always challenging to get the motion right for a creature that weighs 600 pounds. We don’t want the mocap to be overly exaggerated, but it does break the character if the Bloater feels too “light.” The brilliant animation team at Weta FX brought the Bloater character to life and nailed it! When Tommy goes head-to-head with the Bloater, Craig was quite specific during the prep days about how the Bloater would bubble, melt, and burn as Tommy torches him with the flamethrower. Important Looking Pirates took on the “Burning Bloater” sequence, led by VFX Supervisor Philip Engstrom. They began with extensive R&D to ensure the Bloater’s skin would start to bubble and burn. ILP took the final Bloater asset from Weta FX and had to resculpt and texture the asset for the Bloater’s final burn state. Craig felt it was important for the Bloater to appear maimed at the end. The layers of FX were so complex that the R&D continued almost to the end of the delivery schedule. Fiona Campbell Westgate // This season the Bloater had to be bigger, more intimidating. The CG Asset was recreated to withstand the scrutiny of close ups and in daylight. Both Craig Mazin and Neil Druckmann worked closely with us during the process of the build. We referenced the game and applied elements of that version with ours. You’ll notice that his head is in the shape of crown, this is to convey he’s a powerful force.  During the Burning Bloater sequence in Episode 2, we brainstormed with Philip Engström, ILP VFX Supervisor, on how this creature would react to the flamethrower and how it would affect the ground as it burns. When the Bloater finally falls to the ground and dies, the extraordinary detail of the embers burning, fluid draining and melting the surrounding snow really sells that the CG creature was in the terrain.  Given the Bloater’s imposing size, how did you approach its integration into scenes with the actors? What techniques did you use to create such a realistic and menacing appearance? Fiona Campbell Westgate // For the Bloater, a stunt performer wearing a motion capture suit was filmed on set. This provided interaction with the actors and the environment. VFX enhanced the intensity of his movements, incorporating simulations to the CG Bloater’s skin and muscles that would reflect the weight and force as this terrifying creature moves.  Seattle in The Last of Us is a completely devastated city. Can you talk about how you recreated this destruction? What were the most difficult visual aspects to realize for this post-apocalyptic city? Fiona Campbell Westgate // We were meticulous in blending the CG destruction with the practical environment. The flora’s ability to overtake the environment had to be believable, and we adhered to the principle of form follows function. Due to the vastness of the CG devastation it was crucial to avoid repetitive effects. Consequently, our vendors were tasked with creating bespoke designs that evoked a sense of awe and beauty. Was Seattle’s architecture a key element in how you designed the visual effects? How did you adapt the city’s real-life urban landscape to meet the needs of the story while maintaining a coherent aesthetic? Alex Wang // It’s always important to Craig and Neil that we remain true to the cities our characters are in. DNEG was one of our primary vendors for Boston in Season 1, so it was natural for them to return for Season 2, this time focusing on Seattle. DNEG’s VFX Supervisor, Stephen James, who played a crucial role in developing the visual language of Boston for Season 1, also returns for this season. Stephen and Melaina Maceled a team to Seattle to shoot plates and perform lidar scans of parts of the city. We identified the buildings unique to Seattle that would have existed in 2003, so we ensured these buildings were always included in our establishing shots. Overgrowth and destruction have significantly influenced the environments in The Last of Us. The environment functions almost as a character in both Season 1 and Season 2. In the last season, the building destruction in Boston was primarily caused by military bombings. During this season, destruction mainly arises from dilapidation. Living in the Pacific Northwest, I understand how damp it can get for most of the year. I imagined that, over 20 years, the integrity of the buildings would be compromised by natural forces. This abundant moisture creates an exceptionally lush and vibrant landscape for much of the year. Therefore, when designing Seattle, we ensured that the destruction and overgrowth appeared intentional and aesthetically distinct from those of Boston. Fiona Campbell Westgate // Led by Stephen James, DNEG VFX Supervisor, and Melaina Mace, DNEG DFX Supervisor, the team captured photography, drone footage and the Clear Angle team captured LiDAR data over a three-day period in Seattle. It was crucial to include recognizable Seattle landmarks that would resonate with people familiar with the game.  The devastated city almost becomes a character in itself this season. What aspects of the visual effects did you have to enhance to increase the immersion of the viewer into this hostile and deteriorated environment? Fiona Campbell Westgate // It is indeed a character. Craig wanted it to be deteriorated but to have moments where it’s also beautiful in its devastation. For instance, in the Music Store in Episode 4 where Ellie is playing guitar for Dina, the deteriorated interior provides a beautiful backdrop to this intimate moment. The Set Decorating team dressed a specific section of the set, while VFX extended the destruction and overgrowth to encompass the entire environment, immersing the viewer in strange yet familiar surroundings. Photograph by Liane Hentscher/HBO The sequence where Ellie navigates a boat through a violent storm is stunning. What were the key challenges in creating this scene, especially with water simulation and the storm’s effects? Alex Wang // In the concluding episode of Season 2, Ellie is deep in Seattle, searching for Abby. The episode draws us closer to the Aquarium, where this area of Seattle is heavily flooded. Naturally, this brings challenges with CG water. In the scene where Ellie encounters Isaac and the W.L.F soldiers by the dock, we had a complex shoot involving multiple locations, including a water tank and a boat gimbal. There were also several full CG shots. For Isaac’s riverine boat, which was in a stormy ocean, I felt it was essential that the boat and the actors were given the appropriate motion. Weta FX assisted with tech-vis for all the boat gimbal work. We began with different ocean wave sizes caused by the storm, and once the filmmakers selected one, the boat’s motion in the tech-vis fed the special FX gimbal. When Ellie gets into the Jon boat, I didn’t want it on the same gimbal because I felt it would be too mechanical. Ellie’s weight needed to affect the boat as she got in, and that wouldn’t have happened with a mechanical gimbal. So, we opted to have her boat in a water tank for this scene. Special FX had wave makers that provided the boat with the appropriate movement. Instead of guessing what the ocean sim for the riverine boat should be, the tech- vis data enabled DNEG to get a head start on the water simulations in post-production. Craig wanted this sequence to appear convincingly dark, much like it looks out on the ocean at night. This allowed us to create dramatic visuals, using lightning strikes at moments to reveal depth. Were there any memorable moments or scenes from the series that you found particularly rewarding or challenging to work on from a visual effects standpoint? Alex Wang // The Last of Us tells the story of our characters’ journey. If you look at how season 2 begins in Jackson, it differs significantly from how we conclude the season in Seattle. We seldom return to the exact location in each episode, meaning every episode presents a unique challenge. The scope of work this season has been incredibly rewarding. We burned a Bloater, and we also introduced spores this season! Photograph by Liane Hentscher/HBO Looking back on the project, what aspects of the visual effects are you most proud of? Alex Wang // The Jackson Battle was incredibly complex, involving a grueling and lengthy shoot in quite challenging conditions, along with over 600 VFX shots in episode 2. It was truly inspiring to witness the determination of every department and vendor to give their all and create something remarkable. Fiona Campbell Westgate // I am immensely proud of the exceptional work accomplished by all of our vendors. During the VFX reviews, I found myself clapping with delight when the final shots were displayed; it was exciting to see remarkable results of the artists’ efforts come to light.  How long have you worked on this show? Alex Wang // I’ve been on this season for nearly two years. Fiona Campbell Westgate // A little over one year; I joined the show in April 2024. What’s the VFX shots count? Alex Wang // We had just over 2,500 shots this Season. Fiona Campbell Westgate // In Season 2, there were a total of 2656 visual effects shots. What is your next project? Fiona Campbell Westgate // Stay tuned… A big thanks for your time. WANT TO KNOW MORE?Blackbird: Dedicated page about The Last of Us – Season 2 website.DNEG: Dedicated page about The Last of Us – Season 2 on DNEG website.Important Looking Pirates: Dedicated page about The Last of Us – Season 2 website.RISE: Dedicated page about The Last of Us – Season 2 website.Weta FX: Dedicated page about The Last of Us – Season 2 website. © Vincent Frei – The Art of VFX – 2025 #last #season #alex #wang #production
    WWW.ARTOFVFX.COM
    The Last of Us – Season 2: Alex Wang (Production VFX Supervisor) & Fiona Campbell Westgate (Production VFX Producer)
    After detailing the VFX work on The Last of Us Season 1 in 2023, Alex Wang returns to reflect on how the scope and complexity have evolved in Season 2. With close to 30 years of experience in the visual effects industry, Fiona Campbell Westgate has contributed to major productions such as Ghost in the Shell, Avatar: The Way of Water, Ant-Man and the Wasp: Quantumania, and Nyad. Her work on Nyad earned her a VES Award for Outstanding Supporting Visual Effects in a Photoreal Feature. Collaboration with Craig Mazin and Neil Druckmann is key to shaping the visual universe of The Last of Us. Can you share with us how you work with them and how they influence the visual direction of the series? Alex Wang // Craig visualizes the shot or scene before putting words on the page. His writing is always exceptionally detailed and descriptive, ultimately helping us to imagine the shot. Of course, no one understands The Last of Us better than Neil, who knows all aspects of the lore very well. He’s done much research and design work with the Naughty Dog team, so he gives us good guidance regarding creature and environment designs. I always try to begin with concept art to get the ball rolling with Craig and Neil’s ideas. This season, we collaborated with Chromatic Studios for concept art. They also contributed to the games, so I felt that continuity was beneficial for our show. Fiona Campbell Westgate // From the outset, it was clear that collaborating with Craig would be an exceptional experience. Early meetings revealed just how personable and invested Craig is. He works closely with every department to ensure that each episode is done to the highest level. Craig places unwavering trust in our VFX Supervisor, Alex Wang. They have an understanding between them that lends to an exceptional partnership. As the VFX Producer, I know how vital the dynamic between the Showrunner and VFX Supervisor is; working with these two has made for one of the best professional experiences of my career.  Photograph by Liane Hentscher/HBO How has your collaboration with Craig evolved between the first and second seasons? Were there any adjustments in the visual approach or narrative techniques you made this season? Alex Wang // Since everything was new in Season 1, we dedicated a lot of time and effort to exploring the show’s visual language, and we all learned a great deal about what worked and what didn’t for the show. In my initial conversations with Craig about Season 2, it was clear that he wanted to expand the show’s scope by utilizing what we established and learned in Season 1. He felt significantly more at ease fully committing to using VFX to help tell the story this season. The first season involved multiple VFX studios to handle the complexity of the effects. How did you divide the work among different studios for the second season? Alex Wang // Most of the vendors this season were also in Season 1, so we already had a shorthand. The VFX Producer, Fiona Campbell Westgate, and I work closely together to decide how to divide the work among our vendors. The type of work needs to be well-suited for the vendor and fit into our budget and schedule. We were extremely fortunate to have the vendors we did this season. I want to take this opportunity to thank Weta FX, DNEG, RISE, Distillery VFX, Storm Studios, Important Looking Pirates, Blackbird, Wylie Co., RVX, and VDK. We also had ILM for concept art and Digital Domain for previs. Fiona Campbell Westgate // Alex Wang and I were very aware of the tight delivery schedule, which added to the challenge of distributing the workload. We planned the work based on the individual studio’s capabilities, and tried not to burden them with back to back episodes wherever possible. Fortunately, there was shorthand with vendors from Season One, who were well-acquainted with the process and the quality of work the show required. The town of Jackson is a key location in The Last of Us. Could you explain how you approached creating and expanding this environment for the second season? Alex Wang // Since Season 1, this show has created incredible sets. However, the Jackson town set build is by far the most impressive in terms of scope. They constructed an 822 ft x 400 ft set in Minaty Bay that resembled a real town! I had early discussions with Production Designer Don MacAulay and his team about where they should concentrate their efforts and where VFX would make the most sense to take over. They focused on developing the town’s main street, where we believed most scenes would occur. There is a big reveal of Jackson in the first episode after Ellie comes out of the barn. Distillery VFX was responsible for the town’s extension, which appears seamless because the team took great pride in researching and ensuring the architecture aligned with the set while staying true to the tone of Jackson, Wyoming. Fiona Campbell Westgate // An impressive set was constructed in Minaty Bay, which served as the foundation for VFX to build upon. There is a beautiful establishing shot of Jackson in Episode 1 that was completed by Distillery, showing a safe and almost normal setting as Season Two starts. Across the episodes, Jackson set extensions were completed by our partners at RISE and Weta. Each had a different phase of Jackson to create, from almost idyllic to a town immersed in Battle.  What challenges did you face filming Jackson on both real and virtual sets? Was there a particular fusion between visual effects and live-action shots to make it feel realistic? Alex Wang // I always advocate for building exterior sets outdoors to take advantage of natural light. However, the drawback is that we cannot control the weather and lighting when filming over several days across two units. In Episode 2, there’s supposed to be a winter storm in Jackson, so maintaining consistency within the episode was essential. On sunny and rainy days, we used cranes to lift large 30x60ft screens to block the sun or rain. It was impossible to shield the entire set from the rain or sun, so we prioritized protecting the actors from sunlight or rain. Thus, you can imagine there was extensive weather cleanup for the episode to ensure consistency within the sequences. Fiona Campbell Westgate // We were fortunate that production built a large scale Jackson set. It provided a base for the full CG Jackson aerial shots and CG Set Extensions. The weather conditions at Minaty Bay presented a challenge during the filming of the end of the Battle sequence in Episode 2. While there were periods of bright sunshine, rainfall occurred during the filming of the end of the Battle sequence in Episode 2. In addition to the obvious visual effects work, it became necessary to replace the ground cover. Photograph by Liane Hentscher/HBO The attack on Jackson by the horde of infected in season 2 is a very intense moment. How did you approach the visual effects for this sequence? What techniques did you use to make the scale of the attack feel as impressive as it did? Alex Wang // We knew this would be a very complex sequence to shoot, and for it to be successful, we needed to start planning with the HODs from the very beginning. We began previs during prep with Weta FX and the episode’s director, Mark Mylod. The previs helped us understand Mark and the showrunner’s vision. This then served as a blueprint for all departments to follow, and in many instances, we filmed the previs. Fiona Campbell Westgate // The sheer size of the CG Infected Horde sets the tone for the scale of the Battle. It’s an intimidating moment when they are revealed through the blowing snow. The addition of CG explosions and atmospheric effects contributed in adding scale to the sequence.  Can you give us an insight into the technical challenges of capturing the infected horde? How much of the effect was done using CGI, and how much was achieved with practical effects? Alex Wang // Starting with a detailed previs that Mark and Craig approved was essential for planning the horde. We understood that we would never have enough stunt performers to fill a horde, nor could they carry out some stunts that would be too dangerous. I reviewed the previs with Stunt Coordinator Marny Eng numerous times to decide the best placements for her team’s stunt performers. We also collaborated with Barrie Gower from the Prosthetics team to determine the most effective allocation of his team’s efforts. Stunt performers positioned closest to the camera would receive the full prosthetic treatment, which can take hours. Weta FX was responsible for the incredible CG Infected horde work in the Jackson Battle. They have been a creative partner with HBO’s The Last of Us since Season 1, so they were brought on early for Season 2. I began discussions with Weta’s VFX supervisor, Nick Epstein, about how we could tackle these complex horde shots very early during the shoot. Typically, repetition in CG crowd scenes can be acceptable, such as armies with soldiers dressed in the same uniform or armour. However, for our Infected horde, Craig wanted to convey that the Infected didn’t come off an assembly line or all shop at the same clothing department store. Any repetition would feel artificial. These Infected were once civilians with families, or they were groups of raiders. We needed complex variations in height, body size, age, clothing, and hair. We built our base library of Infected, and then Nick and the Weta FX team developed a “mix and match” system, allowing the Infected to wear any costume and hair groom. A procedural texturing system was also developed for costumes, providing even greater variation. The most crucial aspect of the Infected horde was their motion. We had numerous shots cutting back-to-back with practical Infected, as well as shots where our CG Infected ran right alongside a stunt horde. It was incredibly unforgiving! Weta FX’s animation supervisor from Season 1, Dennis Yoo, returned for Season 2 to meet the challenge. Having been part of the first season, Dennis understood the expectations of Craig and Neil. Similar to issues of model repetition within a horde, it was relatively easy to perceive repetition, especially if they were running toward the same target. It was essential to enhance the details of their performances with nuances such as tripping and falling, getting back up, and trampling over each other. There also needed to be a difference in the Infected’s running speed. To ensure we had enough complexity within the horde, Dennis motion-captured almost 600 unique motion cycles. We had over a hundred shots in episode 2 that required CG Infected horde. Fiona Campbell Westgate // Nick Epstein, Weta VFX Supervisor, and Dennis Yoo, Weta Animation Supervisor, were faced with having to add hero, close-up Horde that had to integrate with practical Stunt performers. They achieved this through over 60 motion capture sessions and running it through a deformation system they developed. Every detail was applied to allow for a seamless blend with our practical Stunt performances. The Weta team created a custom costume and hair system that provided individual looks to the CG Infected Horde. We were able to avoid the repetitive look of a CG crowd due to these efforts. The movement of the infected horde is crucial for the intensity of the scene. How did you manage the animation and simulation of the infected to ensure smooth and realistic interaction with the environment? Fiona Campbell Westgate // We worked closely with the Stunt department to plan out positioning and where VFX would be adding the CG Horde. Craig Mazin wanted the Infected Horde to move in a way that humans cannot. The deformation system kept the body shape anatomically correct and allowed us to push the limits from how a human physically moves.  The Bloater makes a terrifying return this season. What were the key challenges in designing and animating this creature? How did you work on the Bloater’s interaction with the environment and other characters? Alex Wang // In Season 1, the Kansas City cul-de-sac sequence featured only a handful of Bloater shots. This season, however, nearly forty shots showcase the Bloater in broad daylight during the Battle of Jackson. We needed to redesign the Bloater asset to ensure it looked good in close-up shots from head to toe. Weta FX designed the Bloater for Season 1 and revamped the design for this season. Starting with the Bloater’s silhouette, it had to appear large, intimidating, and menacing. We explored enlarging the cordyceps head shape to make it feel almost like a crown, enhancing the Bloater’s impressive and strong presence. During filming, a stunt double stood in for the Bloater. This was mainly for scale reference and composition. It also helped the Infected stunt performers understand the Bloater’s spatial position, allowing them to avoid running through his space. Once we had an edit, Dennis mocapped the Bloater’s performances with his team. It is always challenging to get the motion right for a creature that weighs 600 pounds. We don’t want the mocap to be overly exaggerated, but it does break the character if the Bloater feels too “light.” The brilliant animation team at Weta FX brought the Bloater character to life and nailed it! When Tommy goes head-to-head with the Bloater, Craig was quite specific during the prep days about how the Bloater would bubble, melt, and burn as Tommy torches him with the flamethrower. Important Looking Pirates took on the “Burning Bloater” sequence, led by VFX Supervisor Philip Engstrom. They began with extensive R&D to ensure the Bloater’s skin would start to bubble and burn. ILP took the final Bloater asset from Weta FX and had to resculpt and texture the asset for the Bloater’s final burn state. Craig felt it was important for the Bloater to appear maimed at the end. The layers of FX were so complex that the R&D continued almost to the end of the delivery schedule. Fiona Campbell Westgate // This season the Bloater had to be bigger, more intimidating. The CG Asset was recreated to withstand the scrutiny of close ups and in daylight. Both Craig Mazin and Neil Druckmann worked closely with us during the process of the build. We referenced the game and applied elements of that version with ours. You’ll notice that his head is in the shape of crown, this is to convey he’s a powerful force.  During the Burning Bloater sequence in Episode 2, we brainstormed with Philip Engström, ILP VFX Supervisor, on how this creature would react to the flamethrower and how it would affect the ground as it burns. When the Bloater finally falls to the ground and dies, the extraordinary detail of the embers burning, fluid draining and melting the surrounding snow really sells that the CG creature was in the terrain.  Given the Bloater’s imposing size, how did you approach its integration into scenes with the actors? What techniques did you use to create such a realistic and menacing appearance? Fiona Campbell Westgate // For the Bloater, a stunt performer wearing a motion capture suit was filmed on set. This provided interaction with the actors and the environment. VFX enhanced the intensity of his movements, incorporating simulations to the CG Bloater’s skin and muscles that would reflect the weight and force as this terrifying creature moves.  Seattle in The Last of Us is a completely devastated city. Can you talk about how you recreated this destruction? What were the most difficult visual aspects to realize for this post-apocalyptic city? Fiona Campbell Westgate // We were meticulous in blending the CG destruction with the practical environment. The flora’s ability to overtake the environment had to be believable, and we adhered to the principle of form follows function. Due to the vastness of the CG devastation it was crucial to avoid repetitive effects. Consequently, our vendors were tasked with creating bespoke designs that evoked a sense of awe and beauty. Was Seattle’s architecture a key element in how you designed the visual effects? How did you adapt the city’s real-life urban landscape to meet the needs of the story while maintaining a coherent aesthetic? Alex Wang // It’s always important to Craig and Neil that we remain true to the cities our characters are in. DNEG was one of our primary vendors for Boston in Season 1, so it was natural for them to return for Season 2, this time focusing on Seattle. DNEG’s VFX Supervisor, Stephen James, who played a crucial role in developing the visual language of Boston for Season 1, also returns for this season. Stephen and Melaina Mace (DFX Supervisor) led a team to Seattle to shoot plates and perform lidar scans of parts of the city. We identified the buildings unique to Seattle that would have existed in 2003, so we ensured these buildings were always included in our establishing shots. Overgrowth and destruction have significantly influenced the environments in The Last of Us. The environment functions almost as a character in both Season 1 and Season 2. In the last season, the building destruction in Boston was primarily caused by military bombings. During this season, destruction mainly arises from dilapidation. Living in the Pacific Northwest, I understand how damp it can get for most of the year. I imagined that, over 20 years, the integrity of the buildings would be compromised by natural forces. This abundant moisture creates an exceptionally lush and vibrant landscape for much of the year. Therefore, when designing Seattle, we ensured that the destruction and overgrowth appeared intentional and aesthetically distinct from those of Boston. Fiona Campbell Westgate // Led by Stephen James, DNEG VFX Supervisor, and Melaina Mace, DNEG DFX Supervisor, the team captured photography, drone footage and the Clear Angle team captured LiDAR data over a three-day period in Seattle. It was crucial to include recognizable Seattle landmarks that would resonate with people familiar with the game.  The devastated city almost becomes a character in itself this season. What aspects of the visual effects did you have to enhance to increase the immersion of the viewer into this hostile and deteriorated environment? Fiona Campbell Westgate // It is indeed a character. Craig wanted it to be deteriorated but to have moments where it’s also beautiful in its devastation. For instance, in the Music Store in Episode 4 where Ellie is playing guitar for Dina, the deteriorated interior provides a beautiful backdrop to this intimate moment. The Set Decorating team dressed a specific section of the set, while VFX extended the destruction and overgrowth to encompass the entire environment, immersing the viewer in strange yet familiar surroundings. Photograph by Liane Hentscher/HBO The sequence where Ellie navigates a boat through a violent storm is stunning. What were the key challenges in creating this scene, especially with water simulation and the storm’s effects? Alex Wang // In the concluding episode of Season 2, Ellie is deep in Seattle, searching for Abby. The episode draws us closer to the Aquarium, where this area of Seattle is heavily flooded. Naturally, this brings challenges with CG water. In the scene where Ellie encounters Isaac and the W.L.F soldiers by the dock, we had a complex shoot involving multiple locations, including a water tank and a boat gimbal. There were also several full CG shots. For Isaac’s riverine boat, which was in a stormy ocean, I felt it was essential that the boat and the actors were given the appropriate motion. Weta FX assisted with tech-vis for all the boat gimbal work. We began with different ocean wave sizes caused by the storm, and once the filmmakers selected one, the boat’s motion in the tech-vis fed the special FX gimbal. When Ellie gets into the Jon boat, I didn’t want it on the same gimbal because I felt it would be too mechanical. Ellie’s weight needed to affect the boat as she got in, and that wouldn’t have happened with a mechanical gimbal. So, we opted to have her boat in a water tank for this scene. Special FX had wave makers that provided the boat with the appropriate movement. Instead of guessing what the ocean sim for the riverine boat should be, the tech- vis data enabled DNEG to get a head start on the water simulations in post-production. Craig wanted this sequence to appear convincingly dark, much like it looks out on the ocean at night. This allowed us to create dramatic visuals, using lightning strikes at moments to reveal depth. Were there any memorable moments or scenes from the series that you found particularly rewarding or challenging to work on from a visual effects standpoint? Alex Wang // The Last of Us tells the story of our characters’ journey. If you look at how season 2 begins in Jackson, it differs significantly from how we conclude the season in Seattle. We seldom return to the exact location in each episode, meaning every episode presents a unique challenge. The scope of work this season has been incredibly rewarding. We burned a Bloater, and we also introduced spores this season! Photograph by Liane Hentscher/HBO Looking back on the project, what aspects of the visual effects are you most proud of? Alex Wang // The Jackson Battle was incredibly complex, involving a grueling and lengthy shoot in quite challenging conditions, along with over 600 VFX shots in episode 2. It was truly inspiring to witness the determination of every department and vendor to give their all and create something remarkable. Fiona Campbell Westgate // I am immensely proud of the exceptional work accomplished by all of our vendors. During the VFX reviews, I found myself clapping with delight when the final shots were displayed; it was exciting to see remarkable results of the artists’ efforts come to light.  How long have you worked on this show? Alex Wang // I’ve been on this season for nearly two years. Fiona Campbell Westgate // A little over one year; I joined the show in April 2024. What’s the VFX shots count? Alex Wang // We had just over 2,500 shots this Season. Fiona Campbell Westgate // In Season 2, there were a total of 2656 visual effects shots. What is your next project? Fiona Campbell Westgate // Stay tuned… A big thanks for your time. WANT TO KNOW MORE?Blackbird: Dedicated page about The Last of Us – Season 2 website.DNEG: Dedicated page about The Last of Us – Season 2 on DNEG website.Important Looking Pirates: Dedicated page about The Last of Us – Season 2 website.RISE: Dedicated page about The Last of Us – Season 2 website.Weta FX: Dedicated page about The Last of Us – Season 2 website. © Vincent Frei – The Art of VFX – 2025
    Like
    Love
    Wow
    Sad
    Angry
    192
    0 Comments 0 Shares 0 Reviews
  • A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution?

    A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution?
    New research suggests the probiotic McH1-7 could help stop the spread of stony coral tissue loss disease among wild corals near Fort Lauderdale, Florida

    Scientists determined the most effective method of halting the disease was covering a coral colony with a weighted plastic bag, then injecting a seawater solution that contains the probiotic. They left the colony covered for two hours to allow the probiotic bacteria to colonize the coral.
    Hunter Noren

    Probiotics can be good for human health. Now, new research suggests they might also help protect coral reefs.
    A bacterial probiotic helped slow the advance of stony coral tissue loss disease—a fast-spreading and deadly condition—among wild corals in Florida, researchers report today in a new study published in the journal Frontiers in Marine Science.
    The probiotic may be a good alternative to antibiotics like amoxicillin, which temporarily curb the spread of the disease but must be reapplied frequently. In addition, scientists fear stony coral tissue loss disease may one day become resistant to these antibiotic treatments—just as “superbugs” that infect humans are building resistance to our own drugs.
    Antibiotics are meant to kill microorganisms, but probiotics are beneficial living microbes. The idea is that a probiotic can be incorporated into corals’ natural microbiomes, ideally offering them longer-lasting protection.
    First discovered in Florida in 2014, stony coral tissue loss disease attacks the soft tissue of more than 30 different species of coral. Without treatment, the disease eventually kills the corals, and their soft tissue falls off, revealing the white calcium carbonate skeleton below. In just weeks or months, it can devastate a whole colony.
    Stony coral tissue loss disease can be spread by fish that eat coral, as well as by boaters and divers who do not disinfect their gear. The condition has since expanded its range beyond Florida to reefs throughout the Caribbean.
    Several years ago, researchers looking at the great star coral discovered a probiotic called Pseudoalteromonas sp. strain McH1-7. Laboratory tests showed McH1-7 stopped or slowed the progression of stony coral tissue loss disease in infected corals. It also helped prevent the disease from spreading to healthy corals.
    But that was in the lab. Would McH1-7 be similarly effective in the ocean? Researchers were eager to find out, so they set up an experiment on a shallow reef off the coast of Fort Lauderdale.

    Study co-author Kelly Pitts, a research technician with the Smithsonian Marine Station, applies a paste containing the probiotic directly onto the disease lesion of an infected coral.

    Hunter Noren

    Experimenting with wild corals
    For the study, the scientists focused on 40 great star coral colonies that were showing symptoms of stony coral tissue loss disease. In one experimental condition, the researchers made a paste that contained McH1-7 and applied it directly onto the disease lesions. For comparison, they also applied the same paste, minus the probiotic, to some corals.
    In another condition, they covered infected coral colonies with weighted plastic bags, then filled the bags with seawater solutions made with and without McH1-7. They left the corals covered for two hours.
    “This created a little mini-aquarium that kept the probiotics around each coral colony,” says study co-author Valerie Paul, head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, in a statement.
    The scientists completed all the treatments within the first 4.5 months of the project. Then, they returned periodically to gather tissue and mucus samples from the corals to measure changes to their microbiomes. Over the next 2.5 years, they took photos from a variety of different angles, which they then used to create 3D models that could track the disease’s progression.
    In the end, the results suggest covering the corals with plastic bags filled with the probiotic seawater solution was the most effective method. More than two years post-treatment, the colonies that received the probiotic bag had lost just 7 percent of their tissue, while colonies in the control bag condition faced 35 percent tissue loss.

    Scientists applied a probiotic paste directly to disease lesions on some corals.

    Kelly Pitts

    The probiotic paste, by contrast, appears to have made the situation worse: The corals that had the probiotic paste applied directly to their lesions lost more tissue than those treated with the control paste, which did not contain McH1-7.
    “We do not really know what is going on with the probiotic paste treatment,” Paul tells Smithsonian magazine in an email.
    But she has a few theories. It’s possible the high concentrations of McH1-7 contributed to localized hypoxia, or low-oxygen conditions that further harmed the already stressed corals, she says. Or, the probiotic could have changed the microbiome at the lesion site in some negative way. Another possibility is that McH1-7 produces antibiotics or other substances that were harmful at high concentrations.
    Amanda Alker, a marine microbiologist at the University of Rhode Island who was not involved with the study, wonders if this finding suggests McH1-7 is beneficial at specific dosages—a question future laboratory research might be able to answer, she tells Smithsonian magazine in an email. She’s also curious to know which specific molecular components of the probiotic are responsible for the increased tissue loss when applied as a paste.
    More broadly, Alker would like to see additional experiments validating the bag treatment method, but she says this “inventive” technique seems promising.
    “Their approach is a safer solution than antibiotic treatment methods that have been deployed to combatin the field so far,” she says. “Further, this is a practical solution that could be implemented widely because it doesn’t require highly specialized equipment and has the ability to be used with any type of microbial solution.”
    Looking ahead to save reefs
    Probiotics are likely not a silver bullet for protecting corals. For one, researchers still don’t know exactly what causes stony coral tissue loss disease, which makes it difficult to determine how or why the probiotic works, Paul says. In addition, since the disease has spread to many different parts of the Caribbean, it might be challenging to use the bag treatment technique on all affected colonies.
    “We would need to develop better methods of deploying the probiotic through time release formulations or other ways to scale up treatments,” Paul says. “Right now, having divers swim around underwater with weighted bags is not a very scalable method.”
    The researchers have also conducted similar experiments on infected corals located farther south, in the Florida Keys. However, these tests have produced mixed results, probably because of regional differences in stony coral tissue loss disease. This is another hurdle scientists will likely need to overcome if they hope to expand the use of probiotics.
    “We probably need to develop different probiotics for different coral species and different regions of the Caribbean,” Paul says.

    Researchers returned to gather samples of tissues and mucus to see how the corals' microbiomes had changed.

    Hunter Noren

    Even so, scientists are heartened by the results of the experiments conducted near Fort Lauderdale. With more research, the findings suggest probiotics could be a promising tool for combatting the disease elsewhere.
    “Coral probiotics is a challenging field, because there are hundreds of different types of bacteria that associate with corals, and there are limitless experiments that need to be performed,” Amy Apprill, a marine chemist at Woods Hole Oceanographic Institution who was not involved with the research, tells Smithsonian magazine in an email. “These researchers made a major advance with their study by demonstrating the utility of whole colony treatment as well as the specific probiotic tested.”
    Apprill adds that, while antibiotics have been widely used to control stony coral tissue loss disease, scientists haven’t conducted much research to see how these treatments are affecting the plants and creatures that live nearby.
    “Using a naturally occurring bacterium for disease treatment may result in lessened impacts to other members of the coral reef ecosystem,” she says.
    Amid rising ocean temperatures, scientists expect to find even more diseased coral colonies in the future. Warmer waters may also allow other pathogens to thrive and proliferate. Against that backdrop, Apprill adds, probiotics and the different methods of applying them will be “major allies” in the fight to save coral reefs.
    Paul is also optimistic. Through research and field studies, she’s confident researchers will be able to develop interventions that can “help corals better survive changing environments and respond better to diseases and bleaching,” she says.

    Get the latest stories in your inbox every weekday.
    #deadly #disease #eating #away #caribbean
    A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution?
    A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution? New research suggests the probiotic McH1-7 could help stop the spread of stony coral tissue loss disease among wild corals near Fort Lauderdale, Florida Scientists determined the most effective method of halting the disease was covering a coral colony with a weighted plastic bag, then injecting a seawater solution that contains the probiotic. They left the colony covered for two hours to allow the probiotic bacteria to colonize the coral. Hunter Noren Probiotics can be good for human health. Now, new research suggests they might also help protect coral reefs. A bacterial probiotic helped slow the advance of stony coral tissue loss disease—a fast-spreading and deadly condition—among wild corals in Florida, researchers report today in a new study published in the journal Frontiers in Marine Science. The probiotic may be a good alternative to antibiotics like amoxicillin, which temporarily curb the spread of the disease but must be reapplied frequently. In addition, scientists fear stony coral tissue loss disease may one day become resistant to these antibiotic treatments—just as “superbugs” that infect humans are building resistance to our own drugs. Antibiotics are meant to kill microorganisms, but probiotics are beneficial living microbes. The idea is that a probiotic can be incorporated into corals’ natural microbiomes, ideally offering them longer-lasting protection. First discovered in Florida in 2014, stony coral tissue loss disease attacks the soft tissue of more than 30 different species of coral. Without treatment, the disease eventually kills the corals, and their soft tissue falls off, revealing the white calcium carbonate skeleton below. In just weeks or months, it can devastate a whole colony. Stony coral tissue loss disease can be spread by fish that eat coral, as well as by boaters and divers who do not disinfect their gear. The condition has since expanded its range beyond Florida to reefs throughout the Caribbean. Several years ago, researchers looking at the great star coral discovered a probiotic called Pseudoalteromonas sp. strain McH1-7. Laboratory tests showed McH1-7 stopped or slowed the progression of stony coral tissue loss disease in infected corals. It also helped prevent the disease from spreading to healthy corals. But that was in the lab. Would McH1-7 be similarly effective in the ocean? Researchers were eager to find out, so they set up an experiment on a shallow reef off the coast of Fort Lauderdale. Study co-author Kelly Pitts, a research technician with the Smithsonian Marine Station, applies a paste containing the probiotic directly onto the disease lesion of an infected coral. Hunter Noren Experimenting with wild corals For the study, the scientists focused on 40 great star coral colonies that were showing symptoms of stony coral tissue loss disease. In one experimental condition, the researchers made a paste that contained McH1-7 and applied it directly onto the disease lesions. For comparison, they also applied the same paste, minus the probiotic, to some corals. In another condition, they covered infected coral colonies with weighted plastic bags, then filled the bags with seawater solutions made with and without McH1-7. They left the corals covered for two hours. “This created a little mini-aquarium that kept the probiotics around each coral colony,” says study co-author Valerie Paul, head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, in a statement. The scientists completed all the treatments within the first 4.5 months of the project. Then, they returned periodically to gather tissue and mucus samples from the corals to measure changes to their microbiomes. Over the next 2.5 years, they took photos from a variety of different angles, which they then used to create 3D models that could track the disease’s progression. In the end, the results suggest covering the corals with plastic bags filled with the probiotic seawater solution was the most effective method. More than two years post-treatment, the colonies that received the probiotic bag had lost just 7 percent of their tissue, while colonies in the control bag condition faced 35 percent tissue loss. Scientists applied a probiotic paste directly to disease lesions on some corals. Kelly Pitts The probiotic paste, by contrast, appears to have made the situation worse: The corals that had the probiotic paste applied directly to their lesions lost more tissue than those treated with the control paste, which did not contain McH1-7. “We do not really know what is going on with the probiotic paste treatment,” Paul tells Smithsonian magazine in an email. But she has a few theories. It’s possible the high concentrations of McH1-7 contributed to localized hypoxia, or low-oxygen conditions that further harmed the already stressed corals, she says. Or, the probiotic could have changed the microbiome at the lesion site in some negative way. Another possibility is that McH1-7 produces antibiotics or other substances that were harmful at high concentrations. Amanda Alker, a marine microbiologist at the University of Rhode Island who was not involved with the study, wonders if this finding suggests McH1-7 is beneficial at specific dosages—a question future laboratory research might be able to answer, she tells Smithsonian magazine in an email. She’s also curious to know which specific molecular components of the probiotic are responsible for the increased tissue loss when applied as a paste. More broadly, Alker would like to see additional experiments validating the bag treatment method, but she says this “inventive” technique seems promising. “Their approach is a safer solution than antibiotic treatment methods that have been deployed to combatin the field so far,” she says. “Further, this is a practical solution that could be implemented widely because it doesn’t require highly specialized equipment and has the ability to be used with any type of microbial solution.” Looking ahead to save reefs Probiotics are likely not a silver bullet for protecting corals. For one, researchers still don’t know exactly what causes stony coral tissue loss disease, which makes it difficult to determine how or why the probiotic works, Paul says. In addition, since the disease has spread to many different parts of the Caribbean, it might be challenging to use the bag treatment technique on all affected colonies. “We would need to develop better methods of deploying the probiotic through time release formulations or other ways to scale up treatments,” Paul says. “Right now, having divers swim around underwater with weighted bags is not a very scalable method.” The researchers have also conducted similar experiments on infected corals located farther south, in the Florida Keys. However, these tests have produced mixed results, probably because of regional differences in stony coral tissue loss disease. This is another hurdle scientists will likely need to overcome if they hope to expand the use of probiotics. “We probably need to develop different probiotics for different coral species and different regions of the Caribbean,” Paul says. Researchers returned to gather samples of tissues and mucus to see how the corals' microbiomes had changed. Hunter Noren Even so, scientists are heartened by the results of the experiments conducted near Fort Lauderdale. With more research, the findings suggest probiotics could be a promising tool for combatting the disease elsewhere. “Coral probiotics is a challenging field, because there are hundreds of different types of bacteria that associate with corals, and there are limitless experiments that need to be performed,” Amy Apprill, a marine chemist at Woods Hole Oceanographic Institution who was not involved with the research, tells Smithsonian magazine in an email. “These researchers made a major advance with their study by demonstrating the utility of whole colony treatment as well as the specific probiotic tested.” Apprill adds that, while antibiotics have been widely used to control stony coral tissue loss disease, scientists haven’t conducted much research to see how these treatments are affecting the plants and creatures that live nearby. “Using a naturally occurring bacterium for disease treatment may result in lessened impacts to other members of the coral reef ecosystem,” she says. Amid rising ocean temperatures, scientists expect to find even more diseased coral colonies in the future. Warmer waters may also allow other pathogens to thrive and proliferate. Against that backdrop, Apprill adds, probiotics and the different methods of applying them will be “major allies” in the fight to save coral reefs. Paul is also optimistic. Through research and field studies, she’s confident researchers will be able to develop interventions that can “help corals better survive changing environments and respond better to diseases and bleaching,” she says. Get the latest stories in your inbox every weekday. #deadly #disease #eating #away #caribbean
    WWW.SMITHSONIANMAG.COM
    A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution?
    A Deadly Disease Is Eating Away at Caribbean Corals and Wreaking Havoc on Reefs. Could Probiotics Be the Solution? New research suggests the probiotic McH1-7 could help stop the spread of stony coral tissue loss disease among wild corals near Fort Lauderdale, Florida Scientists determined the most effective method of halting the disease was covering a coral colony with a weighted plastic bag, then injecting a seawater solution that contains the probiotic. They left the colony covered for two hours to allow the probiotic bacteria to colonize the coral. Hunter Noren Probiotics can be good for human health. Now, new research suggests they might also help protect coral reefs. A bacterial probiotic helped slow the advance of stony coral tissue loss disease—a fast-spreading and deadly condition—among wild corals in Florida, researchers report today in a new study published in the journal Frontiers in Marine Science. The probiotic may be a good alternative to antibiotics like amoxicillin, which temporarily curb the spread of the disease but must be reapplied frequently. In addition, scientists fear stony coral tissue loss disease may one day become resistant to these antibiotic treatments—just as “superbugs” that infect humans are building resistance to our own drugs. Antibiotics are meant to kill microorganisms, but probiotics are beneficial living microbes. The idea is that a probiotic can be incorporated into corals’ natural microbiomes, ideally offering them longer-lasting protection. First discovered in Florida in 2014, stony coral tissue loss disease attacks the soft tissue of more than 30 different species of coral. Without treatment, the disease eventually kills the corals, and their soft tissue falls off, revealing the white calcium carbonate skeleton below. In just weeks or months, it can devastate a whole colony. Stony coral tissue loss disease can be spread by fish that eat coral, as well as by boaters and divers who do not disinfect their gear. The condition has since expanded its range beyond Florida to reefs throughout the Caribbean. Several years ago, researchers looking at the great star coral (Montastraea cavernosa) discovered a probiotic called Pseudoalteromonas sp. strain McH1-7. Laboratory tests showed McH1-7 stopped or slowed the progression of stony coral tissue loss disease in infected corals. It also helped prevent the disease from spreading to healthy corals. But that was in the lab. Would McH1-7 be similarly effective in the ocean? Researchers were eager to find out, so they set up an experiment on a shallow reef off the coast of Fort Lauderdale. Study co-author Kelly Pitts, a research technician with the Smithsonian Marine Station, applies a paste containing the probiotic directly onto the disease lesion of an infected coral. Hunter Noren Experimenting with wild corals For the study, the scientists focused on 40 great star coral colonies that were showing symptoms of stony coral tissue loss disease. In one experimental condition, the researchers made a paste that contained McH1-7 and applied it directly onto the disease lesions. For comparison, they also applied the same paste, minus the probiotic, to some corals. In another condition, they covered infected coral colonies with weighted plastic bags, then filled the bags with seawater solutions made with and without McH1-7. They left the corals covered for two hours. “This created a little mini-aquarium that kept the probiotics around each coral colony,” says study co-author Valerie Paul, head scientist at the Smithsonian Marine Station at Fort Pierce, Florida, in a statement. The scientists completed all the treatments within the first 4.5 months of the project. Then, they returned periodically to gather tissue and mucus samples from the corals to measure changes to their microbiomes. Over the next 2.5 years, they took photos from a variety of different angles, which they then used to create 3D models that could track the disease’s progression. In the end, the results suggest covering the corals with plastic bags filled with the probiotic seawater solution was the most effective method. More than two years post-treatment, the colonies that received the probiotic bag had lost just 7 percent of their tissue, while colonies in the control bag condition faced 35 percent tissue loss. Scientists applied a probiotic paste directly to disease lesions on some corals. Kelly Pitts The probiotic paste, by contrast, appears to have made the situation worse: The corals that had the probiotic paste applied directly to their lesions lost more tissue than those treated with the control paste, which did not contain McH1-7. “We do not really know what is going on with the probiotic paste treatment,” Paul tells Smithsonian magazine in an email. But she has a few theories. It’s possible the high concentrations of McH1-7 contributed to localized hypoxia, or low-oxygen conditions that further harmed the already stressed corals, she says. Or, the probiotic could have changed the microbiome at the lesion site in some negative way. Another possibility is that McH1-7 produces antibiotics or other substances that were harmful at high concentrations. Amanda Alker, a marine microbiologist at the University of Rhode Island who was not involved with the study, wonders if this finding suggests McH1-7 is beneficial at specific dosages—a question future laboratory research might be able to answer, she tells Smithsonian magazine in an email. She’s also curious to know which specific molecular components of the probiotic are responsible for the increased tissue loss when applied as a paste. More broadly, Alker would like to see additional experiments validating the bag treatment method, but she says this “inventive” technique seems promising. “Their approach is a safer solution than antibiotic treatment methods that have been deployed to combat [stony coral tissue loss disease] in the field so far,” she says. “Further, this is a practical solution that could be implemented widely because it doesn’t require highly specialized equipment and has the ability to be used with any type of microbial solution.” Looking ahead to save reefs Probiotics are likely not a silver bullet for protecting corals. For one, researchers still don’t know exactly what causes stony coral tissue loss disease, which makes it difficult to determine how or why the probiotic works, Paul says. In addition, since the disease has spread to many different parts of the Caribbean, it might be challenging to use the bag treatment technique on all affected colonies. “We would need to develop better methods of deploying the probiotic through time release formulations or other ways to scale up treatments,” Paul says. “Right now, having divers swim around underwater with weighted bags is not a very scalable method.” The researchers have also conducted similar experiments on infected corals located farther south, in the Florida Keys. However, these tests have produced mixed results, probably because of regional differences in stony coral tissue loss disease. This is another hurdle scientists will likely need to overcome if they hope to expand the use of probiotics. “We probably need to develop different probiotics for different coral species and different regions of the Caribbean,” Paul says. Researchers returned to gather samples of tissues and mucus to see how the corals' microbiomes had changed. Hunter Noren Even so, scientists are heartened by the results of the experiments conducted near Fort Lauderdale. With more research, the findings suggest probiotics could be a promising tool for combatting the disease elsewhere. “Coral probiotics is a challenging field, because there are hundreds of different types of bacteria that associate with corals, and there are limitless experiments that need to be performed,” Amy Apprill, a marine chemist at Woods Hole Oceanographic Institution who was not involved with the research, tells Smithsonian magazine in an email. “These researchers made a major advance with their study by demonstrating the utility of whole colony treatment as well as the specific probiotic tested.” Apprill adds that, while antibiotics have been widely used to control stony coral tissue loss disease, scientists haven’t conducted much research to see how these treatments are affecting the plants and creatures that live nearby. “Using a naturally occurring bacterium for disease treatment may result in lessened impacts to other members of the coral reef ecosystem,” she says. Amid rising ocean temperatures, scientists expect to find even more diseased coral colonies in the future. Warmer waters may also allow other pathogens to thrive and proliferate. Against that backdrop, Apprill adds, probiotics and the different methods of applying them will be “major allies” in the fight to save coral reefs. Paul is also optimistic. Through research and field studies, she’s confident researchers will be able to develop interventions that can “help corals better survive changing environments and respond better to diseases and bleaching,” she says. Get the latest stories in your inbox every weekday.
    Like
    Love
    Wow
    Angry
    Sad
    282
    0 Comments 0 Shares 0 Reviews
  • How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases

    Posted on : June 3, 2025

    By

    Tech World Times

    Technology 

    Rate this post

    This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries.
    Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data.
    That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology.
    Step 1: Assess and Map Your Current Network
    Start by figuring out what’s on your network and how it communicates.

    Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets.
    Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used?
    Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property.

    Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss.
    Step 2: Define Segmentation Goals and Policies
    Once you understand your environment, it’s time to set your objectives.

    Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate?
    Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense.
    Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation.

    Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems.
    Step 3: Choose the Right Segmentation Method
    Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types:
    a. Physical Segmentation
    Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale.
    b. Logical SegmentationGroup devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments.
    c. Micro segmentation
    Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control.
    d. Cloud Segmentation
    In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules.
    Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters.
    Step 4: Implement Controls and Monitor Traffic
    Time to put those policies into action.

    Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed.
    Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions.
    Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations.

    Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose.
    Step 5: Test, Validate, and Fine-Tune
    Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected.

    Penetration Testing: Simulate attacks to check if boundaries hold.
    Review Policies: Business needs to change your segmentation strategy too.
    Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance.

    Automation tools can help simplify this process and ensure consistency.
    Real-World Use Cases of Network Segmentation
    1. Healthcare – Protecting Patient Data and Devices
    Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems.
    Result: Reduced attack surface and HIPAA compliance.
    2. Manufacturing – Isolating Industrial Systems
    Production environments often have fragile legacy systems. Segmenting OTfrom IT ensures ransomware or malware doesn’t disrupt manufacturing lines.
    Result: More uptime and fewer operational risks.
    3. Finance – Securing Payment Systems
    Banks and payment providers use segmentation to isolate cardholder data environmentsfrom the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected.
    Result: Easier audits and stronger data security.
    4. Education – Managing High-Volume BYOD Traffic
    Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems.
    Result: Safer environment for open access campuses.
    5. Cloud – Segmenting Apps and Microservices
    In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised.
    Result: Controlled access and better cloud hygiene.
    Common Challenges

    Legacy Tech: Older devices may not support modern segmentation.
    Lack of Visibility: Hard to secure what you don’t know exists.
    Operational Hiccups: Poorly planned segmentation can block business workflows.
    Policy Complexity: Keeping access rules up to date across dynamic environments takes effort.

    Best Practices

    Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems.
    Keep Documentation Updated: Maintain clear diagrams and policy records.
    Align Teams: Get buy-in from IT, security, and business units.
    Automate Where You Can: Especially for monitoring and policy enforcement.
    Review Regularly: Networks evolve- so should your segmentation.

    Final Thoughts
    Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong.
    It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind.
    About the Author:
    Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #how #effectively #implement #network #segmentation
    How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases
    Posted on : June 3, 2025 By Tech World Times Technology  Rate this post This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries. Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data. That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology. Step 1: Assess and Map Your Current Network Start by figuring out what’s on your network and how it communicates. Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets. Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used? Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property. Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss. Step 2: Define Segmentation Goals and Policies Once you understand your environment, it’s time to set your objectives. Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate? Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense. Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation. Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems. Step 3: Choose the Right Segmentation Method Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types: a. Physical Segmentation Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale. b. Logical SegmentationGroup devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments. c. Micro segmentation Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control. d. Cloud Segmentation In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules. Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters. Step 4: Implement Controls and Monitor Traffic Time to put those policies into action. Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed. Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions. Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations. Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose. Step 5: Test, Validate, and Fine-Tune Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected. Penetration Testing: Simulate attacks to check if boundaries hold. Review Policies: Business needs to change your segmentation strategy too. Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance. Automation tools can help simplify this process and ensure consistency. Real-World Use Cases of Network Segmentation 1. Healthcare – Protecting Patient Data and Devices Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems. Result: Reduced attack surface and HIPAA compliance. 2. Manufacturing – Isolating Industrial Systems Production environments often have fragile legacy systems. Segmenting OTfrom IT ensures ransomware or malware doesn’t disrupt manufacturing lines. Result: More uptime and fewer operational risks. 3. Finance – Securing Payment Systems Banks and payment providers use segmentation to isolate cardholder data environmentsfrom the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected. Result: Easier audits and stronger data security. 4. Education – Managing High-Volume BYOD Traffic Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems. Result: Safer environment for open access campuses. 5. Cloud – Segmenting Apps and Microservices In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised. Result: Controlled access and better cloud hygiene. Common Challenges Legacy Tech: Older devices may not support modern segmentation. Lack of Visibility: Hard to secure what you don’t know exists. Operational Hiccups: Poorly planned segmentation can block business workflows. Policy Complexity: Keeping access rules up to date across dynamic environments takes effort. Best Practices Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems. Keep Documentation Updated: Maintain clear diagrams and policy records. Align Teams: Get buy-in from IT, security, and business units. Automate Where You Can: Especially for monitoring and policy enforcement. Review Regularly: Networks evolve- so should your segmentation. Final Thoughts Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong. It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind. About the Author: Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #how #effectively #implement #network #segmentation
    TECHWORLDTIMES.COM
    How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases
    Posted on : June 3, 2025 By Tech World Times Technology  Rate this post This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries. Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data. That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology. Step 1: Assess and Map Your Current Network Start by figuring out what’s on your network and how it communicates. Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets. Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used? Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property. Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss. Step 2: Define Segmentation Goals and Policies Once you understand your environment, it’s time to set your objectives. Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate? Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense. Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation. Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems. Step 3: Choose the Right Segmentation Method Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types: a. Physical Segmentation Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale. b. Logical Segmentation (VLANs/Subnets) Group devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments. c. Micro segmentation Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control. d. Cloud Segmentation In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules. Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters. Step 4: Implement Controls and Monitor Traffic Time to put those policies into action. Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed. Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions. Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations. Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose. Step 5: Test, Validate, and Fine-Tune Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected. Penetration Testing: Simulate attacks to check if boundaries hold. Review Policies: Business needs to change your segmentation strategy too. Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance. Automation tools can help simplify this process and ensure consistency. Real-World Use Cases of Network Segmentation 1. Healthcare – Protecting Patient Data and Devices Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems. Result: Reduced attack surface and HIPAA compliance. 2. Manufacturing – Isolating Industrial Systems Production environments often have fragile legacy systems. Segmenting OT (Operational Technology) from IT ensures ransomware or malware doesn’t disrupt manufacturing lines. Result: More uptime and fewer operational risks. 3. Finance – Securing Payment Systems Banks and payment providers use segmentation to isolate cardholder data environments (CDE) from the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected. Result: Easier audits and stronger data security. 4. Education – Managing High-Volume BYOD Traffic Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems. Result: Safer environment for open access campuses. 5. Cloud – Segmenting Apps and Microservices In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised. Result: Controlled access and better cloud hygiene. Common Challenges Legacy Tech: Older devices may not support modern segmentation. Lack of Visibility: Hard to secure what you don’t know exists. Operational Hiccups: Poorly planned segmentation can block business workflows. Policy Complexity: Keeping access rules up to date across dynamic environments takes effort. Best Practices Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems. Keep Documentation Updated: Maintain clear diagrams and policy records. Align Teams: Get buy-in from IT, security, and business units. Automate Where You Can: Especially for monitoring and policy enforcement. Review Regularly: Networks evolve- so should your segmentation. Final Thoughts Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong. It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind. About the Author: Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    0 Comments 0 Shares 0 Reviews
  • Trump officials plan to destroy a critical government program they probably know nothing about

    Nearly two decades ago, scientists made an alarming discovery in upstate New York: Bats, the world’s only flying mammal, were becoming infected with a new, deadly fungal disease that, in some cases, could wipe out an entire colony in a matter of months. Since then, the disease — later called white-nose syndrome — has spread across much of the country, utterly decimating North American bats that hibernate in caves and killing over 90 percent of three bat species. According to some scientists, WNS has caused “the most precipitous wildlife decline in the past century in North America.” These declines have clear consequences for human populations — for you, even if you don’t like bats or visit caves. Bats eat insect pests, such as moths and beetles. And as they decline, farmers need to spray more pesticides. Scientists have linked the loss of bats in the US to an increase in insecticide use on farmland and, remarkably, to a rise in infant deaths. Insecticide chemicals are known to harm the health of newborns. The only reason we know any of this is because of a somewhat obscure government program in the US Geological Survey, an agency nested within the Interior Department. That program, known as the Ecosystems Mission Area, is the biological research division of Interior. Among other functions, it monitors environmental contaminants, the spread of invasive species, and the health of the nation’s wildlife, including bees, birds, and bats.White-nose syndrome, a fungal disease, has caused massive declines in a handful of bat species, including the tricolored bat, shown here in flight. J. Scott Altenbach/Bat Conservation InternationalThe Ecosystems Mission Area, which has around 1,200 employees, produces the premier science revealing how animals and ecosystems that Americans rely on are changing and what we can do to keep them intact — or risk our own health and economy. This program is now at an imminent risk of disappearing.Send us a confidential tipAre you a current or former federal employee with knowledge about the Trump administration’s attacks on wildlife protections? Reach out to Vox environmental correspondent Benji Jones on Signal at benji.90 or at benji.jones@vox.com or at benjijones@protonmail.com.In the White House’s 2026 budget request, the Trump administration asked Congress to slash funding for EMA by about 90 percent, from million in 2025 to million next year. Such cuts are also in line with Project 2025, the Heritage Foundation’s conservative policy roadmap, which calls for the government to “abolish” Interior’s Biological Resources Division, an outdated name for the Ecosystems Mission Area.Meanwhile, the Trump administration is also reportedly trying to fire government employees in the Ecosystems Mission Area, though a federal judge has so far blocked those efforts. Eliminating biological research is not good. In fact, it’s very bad.For a decade now, EMA’s North American Bat Monitoring Program, or NABat, has been gathering and analyzing data on bats and the threats they face. NABat produces research using data from hundreds of partner organizations showing not only how white-nose syndrome is spreading — which scientists are using to develop and deploy vaccines — but also how bats are affected by wind turbines, another known threat. Energy companies can and do use this research to develop safer technologies and avoid delays caused by wildlife regulations, such as the Endangered Species Act. The irony, an Interior Department employee told me, is that NABat makes wildlife management more efficient. It also helps reveal where declines are occurring before they become severe, potentially helping avoid the need to grant certain species federal protection — something the Trump administration would seem to want. The employee, who’s familiar with Interior’s bat-monitoring efforts, spoke on the condition of anonymity for fear of retaliation by the Trump administration. A northern long-eared bat with white-nose syndrome. Steve Taylor/University of IllinoisA dead bat infected with white-nose syndrome under UV light. USGS“If they want to create efficiencies in the government, they should ask us,” another Interior employee told Vox. “The damage that can be done by one administration takes decades to rebuild.”In response to a request for comment, an Interior Department spokesperson told Vox that “USGS remains committed to its congressional mandate as the science arm of the Department of the Interior.” The White House did not respond to a request for comment. In a Senate appropriations hearing last week, Interior Secretary Doug Burgum refused to commit to maintaining funding for EMA.“There’s no question that they don’t know what EMA does,” said a third Interior employee, who has knowledge of the Ecosystems Mission Area.Ultimately, it’s not clear why the administration has targeted Interior’s biological research. EMA does, however, do climate science, such as studying how plants and animals are responding to rising temperatures. That’s apparently a no-go for the Trump administration. It also gathers information that sometimes indicates that certain species need federal protections, which come with regulations.What’s especially frustrating for environmental advocates is that NABat, now 10 years old, is starting to hit its stride.“We should be celebrating the 10-year anniversary of this very successful program that started from scratch and built this robust, vibrant community of people all collecting data,” said Winifred Frick, the chief scientist at Bat Conservation International, an environmental group. “We have 10 years of momentum, and so to cut it off now sort of wastes all that investment. That feels like a tremendous loss.” Meanwhile, the cost of maintaining the program is less than 1 percent of Interior’s overall budget.The government’s wildlife monitoring programs are “jewels of the country,” said Hollis Woodard, an associate professor of entomology at University of California Riverside who works with USGS on bee monitoring. “These birds and bats perform services for us that are important for our day-to-day lives. Literally everything I value, including food, comes down to keeping an eye on these populations. The idea that we’re just going to wipe them out is just terrifying.”Update, June 2, 12:58 pm ET: This article was originally published on May 29, 2025, and has been updated to include newly public details on the 2026 White House budget request.See More:
    #trump #officials #plan #destroy #critical
    Trump officials plan to destroy a critical government program they probably know nothing about
    Nearly two decades ago, scientists made an alarming discovery in upstate New York: Bats, the world’s only flying mammal, were becoming infected with a new, deadly fungal disease that, in some cases, could wipe out an entire colony in a matter of months. Since then, the disease — later called white-nose syndrome — has spread across much of the country, utterly decimating North American bats that hibernate in caves and killing over 90 percent of three bat species. According to some scientists, WNS has caused “the most precipitous wildlife decline in the past century in North America.” These declines have clear consequences for human populations — for you, even if you don’t like bats or visit caves. Bats eat insect pests, such as moths and beetles. And as they decline, farmers need to spray more pesticides. Scientists have linked the loss of bats in the US to an increase in insecticide use on farmland and, remarkably, to a rise in infant deaths. Insecticide chemicals are known to harm the health of newborns. The only reason we know any of this is because of a somewhat obscure government program in the US Geological Survey, an agency nested within the Interior Department. That program, known as the Ecosystems Mission Area, is the biological research division of Interior. Among other functions, it monitors environmental contaminants, the spread of invasive species, and the health of the nation’s wildlife, including bees, birds, and bats.White-nose syndrome, a fungal disease, has caused massive declines in a handful of bat species, including the tricolored bat, shown here in flight. J. Scott Altenbach/Bat Conservation InternationalThe Ecosystems Mission Area, which has around 1,200 employees, produces the premier science revealing how animals and ecosystems that Americans rely on are changing and what we can do to keep them intact — or risk our own health and economy. This program is now at an imminent risk of disappearing.Send us a confidential tipAre you a current or former federal employee with knowledge about the Trump administration’s attacks on wildlife protections? Reach out to Vox environmental correspondent Benji Jones on Signal at benji.90 or at benji.jones@vox.com or at benjijones@protonmail.com.In the White House’s 2026 budget request, the Trump administration asked Congress to slash funding for EMA by about 90 percent, from million in 2025 to million next year. Such cuts are also in line with Project 2025, the Heritage Foundation’s conservative policy roadmap, which calls for the government to “abolish” Interior’s Biological Resources Division, an outdated name for the Ecosystems Mission Area.Meanwhile, the Trump administration is also reportedly trying to fire government employees in the Ecosystems Mission Area, though a federal judge has so far blocked those efforts. Eliminating biological research is not good. In fact, it’s very bad.For a decade now, EMA’s North American Bat Monitoring Program, or NABat, has been gathering and analyzing data on bats and the threats they face. NABat produces research using data from hundreds of partner organizations showing not only how white-nose syndrome is spreading — which scientists are using to develop and deploy vaccines — but also how bats are affected by wind turbines, another known threat. Energy companies can and do use this research to develop safer technologies and avoid delays caused by wildlife regulations, such as the Endangered Species Act. The irony, an Interior Department employee told me, is that NABat makes wildlife management more efficient. It also helps reveal where declines are occurring before they become severe, potentially helping avoid the need to grant certain species federal protection — something the Trump administration would seem to want. The employee, who’s familiar with Interior’s bat-monitoring efforts, spoke on the condition of anonymity for fear of retaliation by the Trump administration. A northern long-eared bat with white-nose syndrome. Steve Taylor/University of IllinoisA dead bat infected with white-nose syndrome under UV light. USGS“If they want to create efficiencies in the government, they should ask us,” another Interior employee told Vox. “The damage that can be done by one administration takes decades to rebuild.”In response to a request for comment, an Interior Department spokesperson told Vox that “USGS remains committed to its congressional mandate as the science arm of the Department of the Interior.” The White House did not respond to a request for comment. In a Senate appropriations hearing last week, Interior Secretary Doug Burgum refused to commit to maintaining funding for EMA.“There’s no question that they don’t know what EMA does,” said a third Interior employee, who has knowledge of the Ecosystems Mission Area.Ultimately, it’s not clear why the administration has targeted Interior’s biological research. EMA does, however, do climate science, such as studying how plants and animals are responding to rising temperatures. That’s apparently a no-go for the Trump administration. It also gathers information that sometimes indicates that certain species need federal protections, which come with regulations.What’s especially frustrating for environmental advocates is that NABat, now 10 years old, is starting to hit its stride.“We should be celebrating the 10-year anniversary of this very successful program that started from scratch and built this robust, vibrant community of people all collecting data,” said Winifred Frick, the chief scientist at Bat Conservation International, an environmental group. “We have 10 years of momentum, and so to cut it off now sort of wastes all that investment. That feels like a tremendous loss.” Meanwhile, the cost of maintaining the program is less than 1 percent of Interior’s overall budget.The government’s wildlife monitoring programs are “jewels of the country,” said Hollis Woodard, an associate professor of entomology at University of California Riverside who works with USGS on bee monitoring. “These birds and bats perform services for us that are important for our day-to-day lives. Literally everything I value, including food, comes down to keeping an eye on these populations. The idea that we’re just going to wipe them out is just terrifying.”Update, June 2, 12:58 pm ET: This article was originally published on May 29, 2025, and has been updated to include newly public details on the 2026 White House budget request.See More: #trump #officials #plan #destroy #critical
    WWW.VOX.COM
    Trump officials plan to destroy a critical government program they probably know nothing about
    Nearly two decades ago, scientists made an alarming discovery in upstate New York: Bats, the world’s only flying mammal, were becoming infected with a new, deadly fungal disease that, in some cases, could wipe out an entire colony in a matter of months. Since then, the disease — later called white-nose syndrome — has spread across much of the country, utterly decimating North American bats that hibernate in caves and killing over 90 percent of three bat species. According to some scientists, WNS has caused “the most precipitous wildlife decline in the past century in North America.” These declines have clear consequences for human populations — for you, even if you don’t like bats or visit caves. Bats eat insect pests, such as moths and beetles. And as they decline, farmers need to spray more pesticides. Scientists have linked the loss of bats in the US to an increase in insecticide use on farmland and, remarkably, to a rise in infant deaths. Insecticide chemicals are known to harm the health of newborns. The only reason we know any of this is because of a somewhat obscure government program in the US Geological Survey (USGS), an agency nested within the Interior Department. That program, known as the Ecosystems Mission Area (EMA), is the biological research division of Interior. Among other functions, it monitors environmental contaminants, the spread of invasive species, and the health of the nation’s wildlife, including bees, birds, and bats.White-nose syndrome, a fungal disease, has caused massive declines in a handful of bat species, including the tricolored bat, shown here in flight. J. Scott Altenbach/Bat Conservation InternationalThe Ecosystems Mission Area, which has around 1,200 employees, produces the premier science revealing how animals and ecosystems that Americans rely on are changing and what we can do to keep them intact — or risk our own health and economy. This program is now at an imminent risk of disappearing.Send us a confidential tipAre you a current or former federal employee with knowledge about the Trump administration’s attacks on wildlife protections? Reach out to Vox environmental correspondent Benji Jones on Signal at benji.90 or at benji.jones@vox.com or at benjijones@protonmail.com.In the White House’s 2026 budget request, the Trump administration asked Congress to slash funding for EMA by about 90 percent, from $293 million in 2025 to $29 million next year. Such cuts are also in line with Project 2025, the Heritage Foundation’s conservative policy roadmap, which calls for the government to “abolish” Interior’s Biological Resources Division, an outdated name for the Ecosystems Mission Area.Meanwhile, the Trump administration is also reportedly trying to fire government employees in the Ecosystems Mission Area, though a federal judge has so far blocked those efforts. Eliminating biological research is not good. In fact, it’s very bad.For a decade now, EMA’s North American Bat Monitoring Program, or NABat, has been gathering and analyzing data on bats and the threats they face. NABat produces research using data from hundreds of partner organizations showing not only how white-nose syndrome is spreading — which scientists are using to develop and deploy vaccines — but also how bats are affected by wind turbines, another known threat. Energy companies can and do use this research to develop safer technologies and avoid delays caused by wildlife regulations, such as the Endangered Species Act. The irony, an Interior Department employee told me, is that NABat makes wildlife management more efficient. It also helps reveal where declines are occurring before they become severe, potentially helping avoid the need to grant certain species federal protection — something the Trump administration would seem to want. The employee, who’s familiar with Interior’s bat-monitoring efforts, spoke on the condition of anonymity for fear of retaliation by the Trump administration. A northern long-eared bat with white-nose syndrome. Steve Taylor/University of IllinoisA dead bat infected with white-nose syndrome under UV light. USGS“If they want to create efficiencies in the government, they should ask us,” another Interior employee told Vox. “The damage that can be done by one administration takes decades to rebuild.”In response to a request for comment, an Interior Department spokesperson told Vox that “USGS remains committed to its congressional mandate as the science arm of the Department of the Interior.” The White House did not respond to a request for comment. In a Senate appropriations hearing last week, Interior Secretary Doug Burgum refused to commit to maintaining funding for EMA.“There’s no question that they don’t know what EMA does,” said a third Interior employee, who has knowledge of the Ecosystems Mission Area.Ultimately, it’s not clear why the administration has targeted Interior’s biological research. EMA does, however, do climate science, such as studying how plants and animals are responding to rising temperatures. That’s apparently a no-go for the Trump administration. It also gathers information that sometimes indicates that certain species need federal protections, which come with regulations (also a no-go for President Donald Trump’s agenda).What’s especially frustrating for environmental advocates is that NABat, now 10 years old, is starting to hit its stride.“We should be celebrating the 10-year anniversary of this very successful program that started from scratch and built this robust, vibrant community of people all collecting data,” said Winifred Frick, the chief scientist at Bat Conservation International, an environmental group. “We have 10 years of momentum, and so to cut it off now sort of wastes all that investment. That feels like a tremendous loss.” Meanwhile, the cost of maintaining the program is less than 1 percent of Interior’s overall budget.The government’s wildlife monitoring programs are “jewels of the country,” said Hollis Woodard, an associate professor of entomology at University of California Riverside who works with USGS on bee monitoring. “These birds and bats perform services for us that are important for our day-to-day lives. Literally everything I value, including food, comes down to keeping an eye on these populations. The idea that we’re just going to wipe them out is just terrifying.”Update, June 2, 12:58 pm ET: This article was originally published on May 29, 2025, and has been updated to include newly public details on the 2026 White House budget request.See More:
    0 Comments 0 Shares 0 Reviews
CGShares https://cgshares.com