New Rover to Make Moon Landing Next Year

Science fiction movies often contain imaginary technology. But now a real life moon rover has made it onto the big screen. Not only is it a star in a new film, but it will also play a starring role on a private mission to the moon next year. VOA’s Deborah Block has the story.

Global Cyberattack in Brief: Ransomware, a Vision of Future?, Seeking Culprits

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack continued causing problems Saturday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies. Businesses and computer security organizations await problems in the new workweek.

Ransomware Attack Could Herald Future Problems — Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

Worldwide Cyberattack Spreads Further in Second Day — A cyberattack against tens of thousands of data networks in scores of countries, all infected by malware that locks computer files unless a ransom is paid, spread further in its second day Saturday, with no progress reported in efforts to determine who launched the plot.

Authorities Seek Clues On Culprits Behind Global Cyberattack — The British government said on Saturday it does not yet know who was behind a massive global cyberattack that disrupted Britain’s health care services, but Interior Minister Amber Rudd said the country’s National Crime Agency is investigating where the attacks came from.

Europol Working on Probe Into Massive Cyberattack — The European Union’s police agency, Europol, says it is working with countries hit by the global ransomware cyberattack to rein in the threat and help victims.

‘Perfect Storm’ of Conditions Helped Cyberattack Succeed — The cyberextortion attack that hit dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Where Global Cyberattack Has Hit Hardest — A look at some of the countries and organizations hardest hit during the global cyberattack.

What Is the Digital Currency Bitcoin? — In the news now after a cyberextortion attack this weekend, bitcoin has a fuzzy history, but it’s a type of currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties.

 

Ransomware Attack Could Herald Future Problems

Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

The United States suffered relatively few effects from the ransomware that appeared on tens of thousands of computer systems across Europe and into Asia, beginning Friday. Security experts remained cautious, however, and stressed there was a continuing threat.

In contrast to reports from several European security firms, a researcher at the Tripwire company on the U.S. West Coast said late Saturday that the attack could be diminishing.

“It looks like it’s tailing off,” said Travis Smith of Tripwire.

“I hope that’s the case,” Smith added. The Oregon firm protects large enterprises and governments from computer security threats.

Ransomware attack

The code for the ransomware unleashed Friday remains freely available on the internet, experts said, so those behind the WannaCry attack — also known as WanaCryptor 2.0 and a variety of other names — could launch new strikes in coming days or weeks. Copycat attacks by other high-tech criminals also are possible.

“We are not out of the woods yet,” said Gary Davis, chief consumer security evangelist at McAfee, the global computer security software company in Santa Clara, California. “We think it’s going to be the footprint for other kinds of attacks in the future.”

The attack hit scores of countries — more than 100, by some experts’ count — and infected tens of thousands of computer networks.

Industry reports indicate Russia, Taiwan, Ukraine and Britain were among the countries hit hardest, and more hacking reports can be expected when offices reopen for the new workweek Monday or, in some parts of the world, Sunday.

One of the weapons used in the current attack is a software tool reportedly stolen from the U.S. National Security Agency and published on the internet by hackers last month.

The tool affords hackers undetected entry into many Microsoft computer operating systems, which is what they need to plant their ransomware. However, Microsoft issued patches to fix that vulnerability in its software weeks ago that could greatly reduce the chances of intrusion.

Outdated operating systems

The crippling effects of WannaCry highlight a problem that experts have long known about, and one that appears to have hit developing countries harder.

Some organizations are more vulnerable to intrusion because they use older or outdated operating systems, usually due to the cost of upgrading software or buying modern hardware needed to install better-protected operating systems. Companies like Microsoft eventually stop updating or supporting older versions of their software, so customers using those programs do not receive software patches or security upgrades.

Much of the ransomware’s spread around the world occurred without any human involvement. The WannaCry malware self-propagates, copying itself to all computers on a network automatically.

When a demand for ransom payments appears on a user’s screen — $300 at first, doubling to $600 in a few days — it’s usually too late: All files on that computer have been encrypted and are unreadable by their owners.

The hackers said they would reverse the effect of their software once they received the payments they demanded.

Microsoft patched the “hole” in the newest versions of its operating software — Windows 10 for most home users — in March, three weeks before the stolen NSA exploit software was published on the internet. Since Friday, the company dropped its refusal to update old versions of its programs and issued patches specifically written for use in Windows XP and several other systems.

Microsoft declined a request for an interview, but a statement on the company’s blog said: “Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful. We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.”

“A lot of people in the security community were impressed with Microsoft’s speed, but it highlights an ongoing challenge we have,” said Stephen Cobb, a senior security researcher with ESET, a global security software company. “If a malicious code outbreak breaks out tomorrow, and targets unsupported operating systems, Microsoft may have to go there again.”

‘Perfect Storm’ of Conditions Helped Cyberattack Succeed

The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Not to mention the fact that those responsible were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

Other criminals may be tempted to mimic the success of Friday’s “ransomware” attack, which locks up computers and hold people’s files for ransom. Experts say it will be difficult for them to replicate the conditions that allowed the so-called WannaCry ransomware to proliferate across the globe.

But we’re still likely to be living with less virulent variants of WannaCry for some time. And that’s for a simple reason: Individuals and organizations alike are fundamentally terrible about keeping their computers up-to-date with security fixes.

The worm

One of the first “attacks” on the internet came in 1988, when a graduate student named Robert Morris Jr. released a self-replicating and self-propagating program known as a “worm” onto the then-nascent internet. That program spread much more quickly than expected, soon choking and crashing machines across the internet.

The Morris worm wasn’t malicious, but other nastier variants followed — at first for annoyance, later for criminal purposes, such as stealing passwords. But these worm attacks became harder to pull off as computer owners and software makers shored up their defenses.

So criminals turned to targeted attacks instead to stay below the radar. With ransomware, criminals typically trick individuals into opening an email attachment containing malicious software. Once installed, the malware just locks up that computer without spreading to other machines.

The hackers behind WannaCry took things a step further by creating a ransomware worm, allowing them to demand ransom payments not just from individual but from entire organizations — maybe even thousands of organizations.

Perfect storm

Once inside an organization, WannaCry uses a Windows vulnerability purportedly identified by the NSA and later leaked to the internet. Although Microsoft released fixes in March, the attackers counted on many organizations not getting around to applying those fixes. Sure enough, WannaCry found plenty of targets.

Since security professionals typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network. WannaCry exploited common techniques employees use to share files via a central server.

“Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful,” said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

Persistent infections

“When any technique is shown to be effective, there are almost always copycats,” said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, California. But that’s complicated, because hackers need to find security flaws that are unknown, widespread and relatively easy to exploit.

In this case, he said, the NSA apparently handed the WannaCry makers a blueprint — pre-written code for exploiting the flaw, allowing the attackers to essentially cut and paste that code into their own malware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, said ransomware attacks like WannaCry are “not going to be the norm.” But they could still linger as low-grade infections that flare up from time to time.

For instance, the Conficker virus, which first appeared in 2008 and can disable system security features, also spreads through vulnerabilities in internal file sharing. As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.

Conficker was more of a pest and didn’t do major damage. WannaCry, on the other hand, threatens to permanently lock away user files if the computer owner doesn’t pay a ransom, which starts at $300 but goes up after two hours.

The damage might have been temporarily contained. An unidentified young cybersecurity researcher claimed to help halt WannaCry’s spread by activating a so-called “kill switch.” Other experts found his claim credible. But attackers can, and probably will, simply develop a variant to bypass this countermeasure.

Fighting back

The attack is likely to prompt more organizations to apply the security fixes that would prevent the malware from spreading automatically. “Talk about a wake-up call,” Hypponen said.

Companies are often slow to apply these fixes, called patches, because of worries that any software change could break some other program, possibly shutting down critical operations.

“Whenever there is a new patch, there is a risk in applying the patch and a risk in not applying the patch,” Grobman said. “Part of what an organization needs to understand and assess is what those two risks are.”

Friday’s attack might prompt companies to reassess the balance. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizations patch it.

Microsoft took the unusual step late Friday of making free patches available for older Windows systems, such as Windows XP from 2001. Before, Microsoft had made such fixes available only to mostly larger organizations that pay extra for extended support, yet millions of individuals and smaller businesses still had such systems.

But there will be other vulnerabilities to come, and not all of them will have fixes for older systems. And those fixes will do nothing for newer systems if they aren’t installed.

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm?

Malicious software called “ransomware” has forced British hospitals to turn away patients and affected Spanish companies such as Telefonica as part of a global outbreak that has affected tens of thousands of computers.

How does it work?

WannaCry — also known as WanaCrypt0r 2.0, WannaCry and WCry — is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that you cannot access them anymore.

How does it spread?

Ransomware is a program that gets into your computer, either by clicking on the wrong thing or downloading the wrong thing, and then it holds something you need to ransom.

In the case of WannaCry, the program encrypts your files and demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

There are different variants of what happens: Other forms of ransomware execute programs that can lock your computer entirely, only showing a message to make payment in order to log in again. There are some that create pop-ups that are difficult or impossible to close, rendering the machine difficult or impossible to use.

Where has it spread?

British-based cyber researcher Chris Doman of AlienVault said the ransomware “looks to be targeting a wide range of countries,” with initial evidence of infections in at least two dozen nations, according to experts from three security firms.

The broad-based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina, and appears to be sweeping around the globe, researchers said.

What is so special about WannaCry?

WannaCry is not just a ransomware program, it is also a worm.

This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible.

Ransomware has a habit of mutating, so it changes over time in order to find different ways to access computers or to get around patches (operating system updates that often include security updates). Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped.

Several cybersecurity firms said WannaCry exploits a vulnerability in Microsoft and that Microsoft patched this in March. People don’t always install updates and patches on their computers, and so this means vulnerabilities can remain open a lot longer and make things easier for hackers to get in.

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the internet. Shadow Brokers said that they obtained it from a secret NSA server.

The identity of Shadow Brokers is unknown, though many security experts believe the group that surfaced in 2016 is linked to the Russian government.

The NSA and Microsoft did not immediately respond to requests for comment.

Is Human Behavior Impeding Self-Driving Cars?

Most technology experts agree that self-driving cars will soon finish the testing phase and enter the commercial market, probably as taxis and delivery vehicles. But some of them wonder if the cars’ artificial brains will be able to cope with the human propensity to bend the traffic rules. VOA’s George Putic reports.

What You Need to Know About Ransomware

An aggressive wave of cyberattacks hit companies and public institutions around the globe Friday, causing international havoc and bringing many services to a standstill. Computers were locked up and users’ files held for ransom when dozens of countries were hit in a cyberextortion attack that targeted hospitals, companies and government agencies.

What is ransomware?

Ransomware is a type of malware that attempts to extort a computer user for money. In some cases, the ransomware encrypts certain files and holds them hostage. In other cases, as happened Friday, it locks a user out of their entire computer system until a ransom is paid. Some ransomware that encrypts files increases the stakes after a few days, demanding more money and threatening to delete files altogether.

Steps of ransomware infection

A ransomware infection usually takes these five steps.

1. The user downloads malware from an infected website or email.

2. The initial malware hijacks the user’s browser and redirects it to a malicious site.

3. Part of the malware, called an exploit kit, looks for vulnerabilities in the user’s system.

4. Once a vulnerability is found, a malicious payload is downloaded onto the victim’s computer.

5. Then the malware calls home with sensitive data from the user’s computer. In the case of ransomware, the malware attempts to extort the user for money.

The ransomware program that spread Friday is not just malware, it is also a worm. This means that the malware gets into a computer and looks for other computers to try and spread itself as far as possible.

Do ransomware attacks generate money for the hackers?

Yes, they can. A hospital system in Los Angeles paid about $17,000 earlier this year following an attack that blocked hospital employees from using email and other forms of electronic communication by using encryption to lock them out of the system. The hackers even set up a help line to answer questions about paying the ransom.

Security industry experts say such attacks are becoming more prevalent, but are rarely made public.

How is the NSA involved?

The hackers appear to have used a technique that was discovered by the National Security Agency and was leaked online in April by a group calling itself the Shadow Brokers.

The malware is exploiting a flaw in Microsoft software. Microsoft created a patch to fix the flaw earlier this year, but not all businesses have updated their operating systems.

Who carried out the attack?

Investigators are pursuing information, but have not said if they have any strong leads. Officials say they believe the attack is the work of criminals and not a foreign government. The original hacking tool was apparently stolen from the NSA and leaked online by the Shadow Brokers, but officials do not know who that group is or whether they carried out this attack.

How to keep your computer safe

Microsoft released a patch in March that fixes the specific vulnerability exploited in this attack. The U.S. Department of Homeland Security is urging people to take three steps.

1. Update your systems to include the latest patches.

2. Do not click on or download unfamiliar links or files in emails.

3. Back up your data to prevent possible loss.

Companies Affected by Global Cyber Attack

A global cyber attack on Friday affected British hospitals, government agencies and companies in 99 countries, with Russia, Ukraine and Taiwan the top targets, security software maker Avast said.

Hacking tools widely believed by researchers to have been developed by the U.S. National Security Agency that were leaked online last month appear to have been leveraged to launch the attacks.

Around 1,000 computers at the Russian Interior Ministry were affected by the cyber attack, a spokeswoman for the ministry told Interfax.

Some of the companies affected:

FedEx Corp

Telefonica SA

Portugal Telecom

Telefonica Argentina

Syrian Refugees Earn Money, Cultivate Understanding, Teaching Arabic Online

A handful of New Yorkers have gathered at New York University to practice conversing in Arabic. Their two conversation partners have joined via Skype, video images projected side-by-side on a TV monitor.

The scene would be nothing out of the ordinary, save for the fact that the conversation partners, Ghayath and Rasha, are recently displaced Syrian refugees.

They are among some 50 refugees working with NaTakallam, a New York startup that pairs Arabic language learners, most based in the U.S., with displaced Syrians for paid, one-on-one conversation practice sessions over Skype.

NaTakallam sessions have garnered more than $110,000 for refugee instructors since launching in August 2015, according to the startup. Instructors keep $10 of the $15 paid by students for a one hour session. For the many Syrian refugees who must often start over and adjust to life in entirely new countries, the earnings supplement work that is already difficult to secure.

The idea for NaTakallam (Arabic for “we speak”) grew out of Aline Sara’s desire to improve her own Arabic speaking skills as a Lebanese-American. “The opportunities to practice Arabic were . . . kind of limited in New York, or extremely expensive for what I could afford at the time,” said the startup founder and CEO.

Typical Arabic classes also tend to teach Modern Standard Arabic, which Sara describes as “a Shakespearean version” of Arabic. “You don’t speak that way in your day-to-day activities,” she said. Conversational sessions provide the opportunity to practice regional dialects of the language. Most Syrians speak Levantine Arabic, one of the most widely understood dialects among Arabic speakers.

Instructors

For instructors like Ghayath, a Syrian refugee who has resettled in Italy, the language sessions are also an opportunity for cultural exchange. “We choose to speak together about daily life, about their interests, about my life, their life … the news.”

“I always say NaTakallam is my window to the world, because I travel every day through this small screen,” he added.

Students sign on for a variety of reasons, whether they’re studying related subjects such as political science, history or journalism or are part of the Arab diaspora and hoping to improve their native language skills. Other students may be tourists preparing for a trip abroad. Ghayath assesses each student’s particular language needs and tailors lessons accordingly.

Beyond the financial independence NaTakallam offers, Sara stresses the importance of bringing awareness and understanding to refugee communities.

“We’re always talking about refugees en masse. We don’t take the time to individualize them, to humanize them. This is a direct way,” said Sara, “You’re connecting in a one-on-one setting, people get to know each other. I think it’s very powerful.”

 

Dutch Inventor Years Ahead in Plan to Clean Up Massive Plastic Patch in Pacific

A Dutch entrepreneur has come up with an invention he says will allow him to start cleaning up a massive floating garbage patch in the Pacific two years ahead of schedule.

“To catch the plastic, act like plastic,” Boyan Slat said Thursday in Utrecht.

Slat’s Ocean Cleanup foundation plans to scoop up most of the Great Pacific Garbage Patch — a gargantuan floating island of plastic between the U.S. states of Hawaii and California.

When he discovered that his original plan of attaching large barriers to the sea floor to trap the plastic would not work, Stal devised a different plan.

The barriers will instead be weighed down by floating anchors and travel in the same sea currents as the garbage, trapping it.

Slat says the new plan will allow him to start collecting the trash within a year — two years ahead of schedule.

The young entrepreneur’s system is making waves among America’s super-rich philanthropists. Last month, his foundation announced it had raised $21.7 million in donations since November, clearing the way for large-scale trials at sea. Among donors were Salesforce.com CEO Marc Benioff and PayPal co-founder Peter Thiel.

 

Nancy Wallace, director of the Marine Debris Program at the U.S. National Oceanic and Atmospheric Administration, said much of the garbage in the world’s oceans is found throughout the water column — at different depths. That would likely put some of it out of reach of Slat’s barriers.

 

However she applauded The Ocean Cleanup for bringing the issue to a broad public.

 

“The more people are aware of it, the more they will be concerned about it,” Wallace said. “My hope is that the next step is to say `what can I do to stop it?’ and that’s where prevention comes in.”

The Great Pacific Garbage Patch is not just an ugly reminder of a throwaway human society — it is also a danger to sea life and humans. Tiny bits of plastic can find their way into the food chain.

Ocean Cleanup says 8 million tons of plastic wind up in the seas every year. One piece of plastic can take decades to break down.

Slat on Thursday brought out an intact plastic crate fished from the Pacific last year. The date 1977 was stamped on it.

Some information for this report from AP.

What’s Holding Back Self-driving Cars? Human Drivers

In just a few years, well-mannered self-driving robotaxis will share the roads with reckless, law-breaking human drivers. The prospect is causing migraines for the people developing the robotaxis.

A self-driving car would be programmed to drive at the speed limit. Humans routinely exceed it by 10 to 15 mph (16 to 24 kph) — just try entering the New Jersey Turnpike at normal speed. Self-driving cars wouldn’t dare cross a double yellow line; humans do it all the time. And then there are those odd local traffic customs to which humans quickly adapt.

 

In Los Angeles and other places, for instance, there’s the “California Stop,” where drivers roll through stop signs if no traffic is crossing. In Southwestern Pennsylvania, courteous drivers practice the “Pittsburgh Left,” where it’s customary to let one oncoming car turn left in front of them when a traffic light turns green. The same thing happens in Boston. During rush hours near Ann Arbor, Michigan, drivers regularly cross a double-yellow line to queue up for a left-turn onto a freeway.

 

“There’s an endless list of these cases where we as humans know the context, we know when to bend the rules and when to break the rules,” said Raj Rajkumar, a computer engineering professor at Carnegie Mellon University who leads the school’s autonomous car research.

 

Although autonomous cars are likely to carry passengers or cargo in limited areas during the next three to five years, experts say it will take many years before robotaxis can coexist with human-piloted vehicles on most side streets, boulevards and freeways. That’s because programmers have to figure out human behavior and local traffic idiosyncrasies. And teaching a car to use that knowledge will require massive amounts of data and big computing power that is prohibitively expensive at the moment.

 

“Driverless cars are very rule-based, and they don’t understand social graces,” said Missy Cummings, director of Duke University’s Humans and Autonomy Lab.

 

Driving customs and road conditions are dramatically different across the globe, with narrow, congested lanes in European cities, and anarchy in Beijing’s giant traffic jams. In India’s capital, New Delhi, luxury cars share poorly marked and congested lanes with bicycles, scooters, trucks, and even an occasional cow or elephant.

 

Then there is the problem of aggressive humans who make dangerous moves such as cutting cars off on freeways or turning left in front of oncoming traffic. In India, for example, even when lanes are marked, drivers swing from lane to lane without hesitation.

 

Already there have been isolated cases of human drivers pulling into the path of cars such as Teslas, knowing they will stop because they’re equipped with automatic emergency braking.

 

“It’s hard to program in human stupidity or someone who really tries to game the technology,” says John Hanson, spokesman for Toyota’s autonomous car unit.

 

Kathy Winter, vice president of automated driving solutions for Intel, is optimistic that the cars will be able to see and think like humans before 2030.

 

Cars with sensors for driver-assist systems already are gathering data about road signs, lane lines and human driver behavior. Winter hopes auto and tech companies developing autonomous systems and cars will contribute this information to a giant database.

 

Artificial intelligence developed by Intel and other companies eventually could access the data and make quick decisions similar to humans, Winter says.

 

Programmers are optimistic that someday the cars will be able to handle even Beijing’s traffic. But the cost could be high, and it might be a decade or more before Chinese regulators deem self-driving cars reliable enough for widespread public use, said John Zeng of LMC Automotive Consulting.

 

Intel’s Winter expects fully autonomous cars to collect, process and analyze four terabytes of data in 1 { hours of driving, which is the average amount a person spends in a car each day. That’s equal to storing over 1.2 million photos or 2,000 hours of movies. Such computing power now costs over $100,000 per vehicle, Zeng said. But that cost could fall as more cars are built.

 

Someday autonomous cars will have common sense programmed in so they will cross a double-yellow line when warranted or to speed up and find a gap to enter a freeway. Carnegie Mellon has taught its cars to handle the “Pittsburgh Left” by waiting a full second or longer for an intersection to clear before proceeding at a green light. Sensors also track crossing traffic and can figure out if a driver is going to stop for a sign or red light. Eventually there will be vehicle-to-vehicle communication to avoid crashes.

 

Still, some skeptics say computerized cars will never be able to think exactly like humans.

 

“You’ll never be able to make up a person’s ability to perceive what’s the right move at the time, I don’t think,” said New Jersey State Police Sgt. Ed Long, who works in the traffic and public safety office.

China Simulates Extended Moon Stays Amid Space Drive

China is testing the ability for future astronauts to stay on the moon for extended periods, as Beijing accelerates its space program and looks to put people on the surface of the moon within the next two decades.

The official Xinhua news agency said volunteers would live in a “simulated space cabin” for between 60-200 days over the next year helping scientists understand what will be needed for humans to “remain on the moon in the medium and long terms”.

Chinese President Xi Jinping has called for China to become a global power in space exploration, with plans to send a probe to the dark side of the moon by 2018, the first ever such trip, and to put astronauts on the moon by 2036.

“While it remains unclear exactly how long China’s first lunar explorers will spend on the surface, the country is already planning for longer stays,” Xinhua said.

Two groups of four volunteers will live in the simulated cabin “Yuegong-1” to test how a life-support system works in a moon-like environment. A similar 105-day trial was carried out successfully in 2014.

The system, called the Bioregenerative Life Support System (BLSS), allows water and food to be recycled and is key to any Chinese probes to the moon or beyond.

“The latest test is vital to the future of China’s moon and Mars missions and must be relied upon to guarantee the safety and health of our astronauts,” Liu Zhiheng of the Chinese Academy of Sciences told the news agency.

The Yuegong-1 cabin has a central living space the size of a “very small urban apartment” and two “greenhouses” for plants.

In March, China announced plans to launch a space probe to bring back samples from the moon this year, while the country’s first cargo space craft docked with an orbiting space lab in April, a major step as Beijing looks to establish a permanently manned space station by 2022.

Despite the advances in China’s space program for military, commercial and scientific purposes, China still lags behind the United States and Russia.