Transcript
A (0:00)
From the CISO series, it's Cybersecurity Headlines.
B (0:07)
These are the cybersecurity headlines for Wednesday, February 12, 2025. I'm Rich Stroffelino Lockbit host sanctioned Australia, the UK and the US announced joint financial sanctions against the Russia based hosting provider zserver over allegations that it provided essential infrastructure to the lock bit ransomware operation. The country has also sanctioned two Russian nationals working as Z server administrators for their role in directing Lockbit transactions and supporting their attacks, According to the U.S. office of Foreign Asset Control, these sanctions stem from a raid on a Lockbit affiliate back in 2022, where Canadian authorities discovered a laptop running a VM operating a lockbit control panel off of a Z server subleased IP address. A Peek at Deepseek's Weak Security According to researchers at Appsoc, DeepSeek's R1 large language model failed various security tests for business applications, largely due to a lack of comprehensive guardrails. They found that the R1 could not prevent users from creating malware 93% of the time. That was the failure rate. They also could jailbreak away from system safeguards 91% of the time. The model showed stronger scores when it came to leaking training data failure failing in 1.4% of attempts. But overall, the researchers found it extremely easy to cause the model to hallucinate and generate toxic or harmful content. Sandworm targeting Ukraine with Trojanized KMS researchers at Eclectic IQ found signs that since late 2023, the Russian cyber espionage group Sandworm began using fake Windows Updates and Trojanized versions of Microsoft Key Management Service activators to target victims. In Ukraine, there is evidence of seven malware campaigns using these similar lures. The attack starts by attracting victims to a typo squadded domain to get the DC RAT Trojan on their machine. From there, it prevents a fake Windows activation interface, disables Windows Defender, and delivers a further payload. This approach appears effective due to the prominent use of pirated software in Ukraine, even in the government sector. SonicWall Flaw Allows for VPN Hijacks On January 7, SonicWall warned about a firewall vulnerability that is susceptible to actual exploitation for customers with SSL VPN or SSH management enabled and urging admins to apply mitigations immediately. Researcher Bishop Fox announced that he developed a proof of concept for the flaw on January 22 and has now released full technical details. The flaw allowed for sending a crafted session cookie to an SSL VPN authentication endpoint. This appears associated with an active VPN session and triggers improper validation while logging the victim out of the session. This was only released after Sonicwall made patches available and now, thanks to today's episode sponsor Vanta. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get started at vanta.com headlines that's V A N T A dot com headlines ransomware gangs find Quantity has a quality all its own According to Huntress 2025 Cyber Threat Report, ransomware attacks last year showed a trend in moving away from higher profile targets, instead focusing on speed of attacks at a higher volume. The average time to ransom across all groups was just under 17 hours, but sophisticated groups like Ransom Hub and Akira showed much faster times of around six hours. Ironically, the group rapid had the slowest time to ransom at 43 hours. Overall, ransom Hub, Lynx and Akira ransomware groups accounted for 54% of observed attacks. Additionally, 71% of ransomware incidents saw attackers exfiltrate data prior to deploying ransomware. Intel patched 374 vulnerabilities in 2024. According to Intel's product security report, 72% of these vulnerabilities were found in software things like Drivers, utilities and SDKs. Firmware fixes accounted for 21%, including 30 UEFI patches, with the remaining patches in hardware across processors, SGX and side channel issues. The company attributed 96% of the discovered vulnerabilities to its proactive product security assurances. Intel issued bug bounties on 53% of these vulnerabilities, with UEFI flaws drawing the most money. Although intel does not share specific amounts, Google Tag Manager used to deploy card Skimmers Just when you thought it was safe to go shopping, a handful of sites were discovered to be using what looked to be a typical Google Tag Manager and Google Analytics script for store analytics, but it also included a containerized backdoor that allowed for persistent access. According to researchers at Sucuri, this was used to collect payment information during the checkout process. It's unclear what vector is being used to get the script onto the sites. Apple making a deal to bring AI to China. Virtually any Western company looking to launch a software service in China has to make a deal with local partners to assuage regulators. Apple is no exception, the information sources say. Apple partnered with Alibaba to submit its Apple Intelligence features to the Cyberspace Administration of China, the country's Internet and cybersecurity regulator. Apple already announced plans to launch Apple Intelligence in China as part of iOS 18.4 in April, but it wasn't clear how they had cleared regulatory hurdles. The company also reportedly looked into doing deals with Baidu and Deepseek. Remember, if you want more video content from the CISO series, subscribe to the CISO Series YouTube channel. We're always posting original content, interviews, demos and of course our Week in Review show. Every Friday at 3:30pm Eastern. You can join me and our vibrant chat room with one of our CISO guests and get their perspective on the news of the week. Reporting for the CISO Series, I'm Rich Strofalino, reminding you to have a super sparkly day.
