Cyber Attack
Cyber Attack

Scientists create light waves that can pass through even solid objects

The behavior of light can tell scientists several things. Like for example, making sure the sugar is not transparent. That’s because the light that penetrates it is scattered, altered and deflected in a very complicated way.

However, a research team from TU Wien in Vienna and the University of Utrecht in the Netherlands managed to show that there is a class of very special light waves that this normal behavior does not apply to. In this class, bespoke light beams can be created and are practically unaltered by the medium they pass through, just attenuated. The beam of light penetrates into the middle and a light pattern arrives on the other side with the same shape, as if the middle were not there.

These types of scatter-invariant light modes can be used to specifically examine the interior of objects.


Waves on the surface of water can have an infinite number of different shapes. Just like light waves, they can also be made in many different ways. “Each of these light wave patterns is altered and deflected in a very specific way when you send it through a cluttered medium,” explained Professor Stefan Rotter, from the Institute of Theoretical Physics at TU Wien.

Stefan and his team are developing mathematical methods to be able to describe the effects of light scattering . “As a light scattering medium, we use a layer of zinc oxide, an opaque white powder of completely randomly arranged nanoparticles,” explained Allard Mosk, head of the experimental research group.

“As we have been able to show, there is a very special class of light waves, called scattering invariant light modes, which produce exactly the same wave pattern in the detector, regardless of whether the light wave was sent only through the air or if it had to penetrate the complicated zinc oxide layer,” said Rotter.

“In the experiment, we see that zinc oxide doesn’t really change the shape of these light waves at all. They are a little weaker in general”, highlighted Mosk.


And as rare and special as these invariant light modes are, and having a theoretically unlimited number of possible light waves, you can still find many of them. And by combining several of these invariant light modes into a right arrangement, the result will be a scattering invariant waveform.

“This way, at least within certain limits, you have a lot of freedom to choose which image you want to send through the object without interference. For the experiment, we chose a constellation as an example: the Big Dipper. And, in fact, it was possible to determine an invariant wave that sends an image of Ursa Major to the detector, regardless of whether the light wave is scattered through the zinc oxide layer or not. For the detector, the light beam looks almost the same in both cases,” said Jeroen Bosch, who worked on the experiment as a doctoral student.


This method of finding light patterns that penetrate a large, undisturbed object can also be used for imaging procedures.

“In hospitals, X-rays are used to look inside the body. They have a shorter wavelength and therefore can penetrate our skin. But how a wave of light penetrates an object depends not only on the wavelength, but also on the waveform. If you want to focus light into an object at certain points, then our method opens up completely new possibilities. We were able to show that, using our approach, the distribution of light within the zinc oxide layer can also be specifically controlled,” concluded Matthias Kühmayer, who works as a doctoral student in computer simulations of wave propagation.

Stay on top of the worst cyber attack hackers have ever launched

Recently, we’re seeing diplomatic tension between the United States and Russia, right? Yeah, those who haven’t noticed, know: both nations aren’t pecking at each other at the moment. The reason is simple but difficult to swallow. After all, we’re not talking about two boys who fight over a toy and come to terms with each other again, when their parents arrive and put some order in the room. We are talking about two world powers .

To better understand this disagreement, it is necessary to go back to 2020. That’s right. Last year, hackers, directed by the Russian intelligence service, the SVR, in addition to having access to the system of SolarWinds, an American company that basically develops software, were able to insert malicious code into one of their products. This attack, today, is being considered as one of the worst in history.


“We believe that between March and June 2020, eighteen thousand customers may have downloaded this product that has been corrupted,” said Sudhakar Ramakrishna, President and CEO of SolarWinds, in an interview with NPR. “If you take that estimate and start looking at it, the actual number of customers affected will be smaller or larger. We don’t know the exact number, we just have an idea. We are still conducting the investigation.”

The investigation was completed this year. Ramakrishna calculates that the Russians have committed – and successfully – about 100 companies and a dozen government agencies. Companies include Microsoft, Intel and Cisco; and the list of federal agencies so far includes the departments of Treasury, Justice and Energy, and the Pentagon.

Regardless of the damage, on Thursday, April 15, the Biden government announced a list of tough sanctions against Russia – that is, a response to the breach of the SolarWinds system.

Even listing some sanctions, the concern remains, mainly on the part of the Cybersecurity and Infrastructure Security Agency, or CISA – Department of Government Security whose job is to protect federal computer networks from cyber attacks, but that failed.


The action of the hackers involved in the attack was strategic, well thought out. In order for the plan to work, the ‘victims’ needed to first download an update of contaminated software and then update it. Then the compromised networks needed to be connected to the Internet, which would help hackers communicate with servers.

The software that was affected and functioned as a fundamental part of the operations was Orion. The program in question is commonly used by US information technology departments and that’s why hacking it was a more than ingenious strategy.

“This was, without a doubt, our worst nightmare,” said Tim Brown, SolarWinds vice president of security recently. “It’s kind of a horror movie. In addition to affecting thousands of customers, it caused damage that is still unimaginable.”

Cybersecurity experts compare the current damage to an attack that took place in 2017, when the Russian military gained access to a ransomware known as NotPetya. Like Orion, NotPetya software was also corrupted, but the action to date has paralyzed activities of multinational companies and permanently blocked tens of thousands of computers worldwide.


The investigation carried out by the authorities that work in the intelligence departments of the United States indicates that SolarWinds is living the same scenario, after all, the hackers had enough time to cause several damages. Hackers are estimated to have enjoyed American computer networks for nine months. It is not yet known whether the activity was restricted to just reading emails or whether the action boils down to destructive behavior.

The hackers who hacked into the SolarWinds system gave a masterful lesson in new hacking techniques: they modified the Orion software code, created a system that used domains to select targets, mimicked the software’s communication protocols, and finally cleaned up the crime scene so investigators could not definitively prove who was behind the attack.

“The strategy was phenomenal,” said Adam Meyers, a forensic expert appointed by SolarWinds to analyze the corrupted software. “The work was elegant and innovative, which makes it even crazier.”

The conclusion of the current investigation, coordinated by the White House, blames Russian intelligence. Russia, for its part, denied any involvement.