Transcript
A (0:00)
From the CISO series. It's Cybersecurity Headlines.
B (0:06)
These are the cybersecurity headlines for Wednesday, February 26, 2025. I'm Rich Straffolino. U.S. employee screening firm confirms breach Disa Global Solutions provides employment screenings and background checks to a third of the Fortune 500. This week, it submitted a filing with Maine's Attorney General confirming it detected a cyber incident on April 22, 2024. After investigation, it was found the illicit network access began back on February 9th. In a filing with the Massachusetts attorney general, it was confirmed that attackers obtained Social Security numbers, credit cards and other financial information, as well as scanned ID documents from some screened individuals. The filing also states that Disa could not definitively conclude the specific data procured, so it can't name specific victims. No word on who orchestrated the attack or why it waited almost a year to disclose it. Swedish law enforcement seeking messaging app backdoors Swedish news outlet SVT Neheter reported that law enforcement and security agencies in the country are pushing legislation requiring encrypted messaging apps to create technical backdoors in their infrastructure. The agencies would need to get the proposed bill before relevant committees before it could be taken up by Sweden's Parliament next year. Minister of Justice Gunnar Stromer came out in favor of the backdoors for these apps, but the Swedish armed forces opposes the bill as they regularly use things like Signal. Signal Foundation President Meredith Whitaker said Signal would leave the market if such a bill passed. Dems warned of exposed entry points on government systems Democrats on the House Oversight Committee sent a letter to President Trump warning that the Department of Government Efficiency, or doge, has left multiple government agencies vulnerable to cyber attacks by foreign agents and malicious actors. With no transparency on which department officials have access. The letter points to publicly exposed systems with the Treasury's Secure Payment System, the Office of the Comptroller of the Currency, and several national laboratories, including ones that manage US Nuclear stockpiles. The letter asks where new technology was deployed, what data has been exported by Doge staff to third party servers and and information on cyber incidents under the new administration. Linux backdoor used in the wild Researchers at Palo Alto Networks Unit 42 discovered an undocumented Linux backdoor called Autocolor, used by threat actors against government and university targets in North America and Asia from November to December 2024. Researchers don't know the initial attack vector. If it runs with root privileges, it installs a malicious library implant, copies itself to the system directory and modifies files to ensure that it executes before any other system libraries. Even without root access, the malware can still provide remote access to threat actors, but lacks persistence once running, it uses a custom encryption algorithm to talk to C2 servers. And now, thanks to today's episode sponsor Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? You know, chasing down SMEs for answers, updating systems, coordinating across teams, all the grunt work nobody wants to do, plus having to finish the dang questionnaire itself. While that teammate exists, Conveyor just launched sue, the first AI agent for customer trust. Sue really is the dream teammate. She never misses a deadline, answers every customer request from sales, completes every questionnaire, and knocks out all the coordination in between. Sue Conveyor's AI agent handles it all so you don't have to learn more@conveyor.com that's C O N V E-Y-O-R.com LightSpy learns new tricks LiteSpy is a modular spyware suite first seen in use in Hong Kong back in 2020. Researchers have previously seen active development on LightSpy. ThreatFabric documented that it expanded plugin support last year and and added new destructive capabilities on mobile. Now, Researchers at Hunt IO have found signs of increasing sophistication with how LightSpy interacts with C2 servers, now offering over 100 commands. These new commands expand beyond direct data transfers and allow for version tracking and transmission management. The new commands also add the ability to target Facebook and Instagram apps on Android for database extraction. Large scale legacy driver Exploitation campaign discovered A new report from Check Point Research documented this campaign using over 2,500 variants of the vulnerable TrueSight sys driver, part of a product suite from the cybersecurity firm Adlais. Attackers use the driver to exploit an exception with the Windows driver signing policy and get it to load. Attackers generally use phishing lures to get them on machines where they install EDR killing modules and Prepare for a second stage payload. Using a variant of Ghost RAT, 75% of victims in the campaign were located in China, with Chinese public clouds used for the C2 infrastructure. After reporting the issue, Microsoft updated its vulnerable driver block list to remove the exception. Lockbit variant makes Siberian dairy plant go sour A regional office for Russia's FSB security service announced that a version of Lockbit ransomware was used in an attack on a Semyonishna dairy plant in southern Siberia. The plant manager said the attack caused all printers in the facility to print out leaflets condemning the Russian military. The attackers reportedly used AnyDesk remote desk software to access the plant's network. The attack did not disrupt dairy production, but did prevent any food labeling. This is the second cyberattack on the plant in the last year. A July attack took down cheese production for a month. Orange confirms breach after leaks the French telco Orange group confirmed a bleeping computer it suffered a data breach on a non critical application. This came after a member of the Hellcat ransomware group known as Ray published thousands of internal documents from the company, including source code, invoices and employee information from its Romanian operations. Ray maintains this wasn't a Hellcat operation in and of itself and that they maintained access to Orange systems for over a month. Ray said that they dropped a ransom note, but Orange did not negotiate. It's unclear how much data was obtained. A review by bleeping computer found some leaked documents at least five years old. Remember to subscribe to the ciso series on YouTube. You can join us there for our Week in Review show every Friday at 3:30pm Eastern and also see original clips, demos and industry interviews. Just search for ciso series on YouTube and give us a follow. Reporting for the CISO series, I'm Rich Stroffolino, reminding you to have a super sparkly day.
