Transcript
A (0:00)
From the CISO series. It's Cybersecurity Headlines.
B (0:07)
These are the cybersecurity headlines for Tuesday, May 27, 2025. I'm Steve Prentiss. Malicious npm and VS code packages stealing data as many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest host names, IP addresses, data, DNS servers and user directories to a discord controlled endpoint. This is according to a report from a researcher at Socket Security. The code is designed to fingerprint every machine that installs the package while also aborting the execution if it detects it is running in a virtualized environment associated with Amazon, Google and others. The stolen information includes host details, system DNS servers, network interface, card information and internal and external external IP addresses, all transmitted to a discord webhook Nova Scotia Power confirms ransomware attack following up on a story we covered at the end of April, the utility Nova Scotia Power, along with its parent company Emera, announced the breach on April 28 and then on May 1 added that data had been stolen. On May 14, they disclosed that PII and financial information was compromised, but there had been no disruption to electricity generation, transmission and distribution facilities. An update from May 23 says the incident was a sophisticated ransomware attack, end quote, but that no ransom has been paid. It is not clear which group is responsible for this attack. Researchers claim ChatGPT03 bypassed shutdown in controlled test in the news to keep you awake at night category A report from Palisade Research describes an experiment which claims that the ChatGPTO03 model successfully rewrote a shutdown script to stop itself from being turned off, even after being clearly instructed to allow yourself to be shut down. The experiment involved instructions to solve some mathematics tests followed by a shutdown command. It should be noted that the tests were performed using APIs, which, according to Bleeping Computer, do not have as many restrictions and safety features as the ChatGPT consumer app. Huge thanks to our sponsor ThreatLocker, ThreatLocker is a global leader in zero trust endpoint security, offering cybersecurity controls to protect businesses from zero day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and to start your free trial, visit threatlocker.com CISO I.e. tHR E A T China linked APT started exploiting Ivanti EPMM flaws shortly after their disclosure, according to researchers at Eclectic IQ. The group named APT UNC 5221 chained two Ivanti EPMM floors together to achieve remote code execution without authentication. The exploitation started on May 15th of this year, the same day that Ivanti disclosed the two critical vulnerabilities. The attacks were on Internet exposed systems at organizations in healthcare, telecommunications, aviation, municipal government, finance and defence across Europe, North America and the Asia Pacific region. Dana Bot Malware operation seized A coordinated international effort by law enforcement and cybersecurity teams has disrupted Danabot, a major malware as a service operation. This according to the US Department of Justice. Authorities seized Danabot's command and control servers and unsealed charges against 16 individuals allegedly involved in its development and deployment. Originating as a banking Trojan in 2018, Danabot evolved into a powerful tool for stealing information and delivering follow on malware. Operated by a Russia based cybercrime group, Danabot infected over 300,000 computers worldwide, causing at least $50 million in damages through fraud and ransomware. This takedown follows the recent dismantling of the Lumastealer operation, another global infosteeler network that infected around 10 million systems. Suspected infostealer data breach exposed 184 million logins and passwords Researcher Jeremiah Fowler has posted a perplexing yet cautionary tale over at Website Planet. He apparently discovered a massive database containing 184 million login and password credentials. These files, which were not encrypted or protected in any way, included logins for Microsoft products, Facebook, Instagram, Snapchat, Roblox and many others, along with bank and financial accounts, health platforms and government portals from numerous countries. The domains connected to the database revealed nothing about who owned it, and the WHOIS registration is private. It's not known whether this is an infostealer database or if it had been gathered for legitimate research purposes and subsequently exposed due to oversight. An interesting comment that Fowler makes about the Trove goes as many people unknowingly treat their email accounts like free cloud storage and keep years worth of sensitive documents such as tax forms, medical records, contracts and passwords without considering how sensitive they are. This could create serious security and privacy risks if criminals were to gain access to thousands or even millions of email accounts. Most organizations have a basic understanding of their own crown jewels. Dig a level deeper and it becomes a different story. Where are they? What's their value? Where are they traveling? Who has access to them? Who shouldn't have access to them? How will the cybersecurity team partner with the business to protect those assets? Those are the questions that we'll be answering on this week's episode of the CISO Series podcast. Look for the episode I can't choose. I love all my assets equally. Wherever you get your podcasts and if you have some thoughts on the news from today or about the Cybersecurity Headlines show in general, please be sure to reach out to us@feedbackisoseries.com we would love to hear from you. I'm Steve Prentiss reporting for the CISO series.
