Transcript
Hadas Kasorla (0:00)
From the CISO series, it's Cybersecurity Headlines these are the Cybersecurity headlines for July 16, 2025. I'm Hadas Kasorla. In today's cybersecurity news, Pentagon welcomes Chinese engineers into its environment in an unfortunate case of the fox guarding the henhouse, US Military systems are receiving backend support from engineers based in China. That may sound like a security risk, and that's because it is. ProPublica reports that while these foreign engineers work through digital escorts in the US the escorts often lack the technical skills to detect malicious code or misuse. The arrangement was approved by the Pentagon despite serious internal warnings from Microsoft staff about national security risks. Hazy Beacon it's not a beer, but it leaves a bitter aftertaste A new state backed cyber campaign likely linked to China is hiding in plain sight. Called Hazy Beacon, the malware targets Southeast Asian governments using stealthy tactics. It installs via DLL sideloading, tricking trusted programs into running malicious code for command and control. It uses AWS Lambda URLs disguising traffic as normal cloud activity. Once inside, it exfiltrates trade and policy documents through services like Google Drive, then wipes its tracks to avoid detection. Analysts at Unit 42 uncovered it through cloud traffic anomalies and forensic traces left behind after a failed cleanup. What the world needs now is another framework. On July 14, 2025, MITRE launched adversarial Actions in Digital Asset Payment Technologies. This new cybersecurity framework was designed specifically for blockchain and digital payment systems. Built on the familiar ATTCK architecture, ADAPT diverges by focusing on financially driven threats such as double spend exploits, flash loans, smart contract hacks and and fraud. It offers hands on guidance to crypto exchanges, defi developers and under resourced financial organizations. All that glitters isn't gold confetti. Android malware is scattering itself across the Google Play store again. It evades detection by manipulating the internal zip structure of APK files to hide malicious payloads during app review. Once installed, it quietly harvests user data and floods ad networks with fake traffic using Carmel Ads, a legitimate ad platform exploited here for invisible ad fraud. Earlier confetti variants racked up more than 10 billion fake ad requests per day, getting all over the place just like its namesake. And now, thanks to Today's episode sponsor ThreatLocker, ThreatLocker is a global leader in zero trust endpoint security, offering cybersecurity controls to protect businesses from zero day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit threatlocker.com CISO I do not think that means what you think it means. Wetransfer, a popular cloud service used to send large files, wreaked havoc when it updated its terms in July with language like you grant us a license to use, reproduce, modify, create derivative works of, and publicly display your content. These phrases, often tied to AI training, received criticism from artists, writers, and voice actors who used the service. Another clause said they could use content to promote the service. Creators pushed back, wanting to know if that gave Wetransfer the ability to use their work in ads, while denying that that's what they meant at all. Wetransfer did revise the language, removing the AI adjacent terms and limiting usage to what's strictly necessary to run the platform. Hey, whose keys are these? Marcoella's A government staffer working under the Department of Government Efficiency. Doge accidentally posted an ActiveXAI API key to GitHub, exposing access to more than 50 Grok language models. The key stayed live even after it was removed, raising red flags about how tightly AI credentials tied to government work are being handled. It's sloppy, but for now the real world impact is likely limited to actually access sensitive data or systems, an attacker would also need login credentials or access to private government deployments. And the hits just keep on coming. Cloudflare says it's already blocked more DDoS attacks in 2025 than it did in all of last year. Over 27 million so far, and we're only halfway through the year. In just the last quarter, they stopped more than 6,500 major attacks, including one that hit 7.3 terabits per second. Telecom, gaming, even agriculture got hit hard, with most attacks coming out of Asia and targeting countries like China, Brazil and Germany. These attacks are smarter, faster and hitting industries no one expected how to become a North Korean hacker in 5 easy to learn steps North Korean contagious interviews just got more viral. Here's what's new in their latest supply chain campaign targeting developers. Step one they pose as recruiters on LinkedIn and offer fake jobs, usually in crypto or Tech. Step 2 During the interview, they send a coding challenge and ask the target to install an NPM package to complete it. What's new? That package now includes a stealthy malware loader called XORindex, found in 67 packages downloaded over 17,000 times. Step 3 XOR index runs silently and connects to Command Server. Step 4 It pulls down tools like Beavertail and Invisible Ferret to steal browser data, crypto and open a persistent backdoor. And step five if that developer later joins your company and brings the same machine credentials or git access, you've now got a nation state backdoor inside your environment. Have you ever seen a cybersecurity vendor cross the line in the name of competition? We all know it's a crowded vendor landscape, so it's not surprising to see some of them occasionally behaving badly. We're digging into the best and worst vendor habits on this week's Super Cyber Friday discussion. Join us this Friday at 1pm Eastern Time for Hacking Vendor Competition. Head on over to our events page@cisoseries.com to register to join us. If you have some thoughts on the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we'd love to hear from you. I'm Hadas Kasorla, reporting for the CISO series. Stay Alert, Stay Patched, Stay Hydrated. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
