Transcript
Steve Prentiss (0:00)
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Friday, July 4, 2025. I'm Steve Prentiss. Microsoft asks users to ignore Windows firewall config errors this issue seems to appear for some users on Windows 1124H2 systems after rebooting their systems following the installation of the 2025 Windows non security Preview. Update Warnings appear in the event viewer as event 2042 for Windows Firewall with Advanced security with a config read failed warning and a more data is available message. Microsoft says this is a quote known issue end quote caused by a quote new feature that is still under development and hasn't yet been fully integrated with the operating system, end quote. The alert can be safely ignored, they said, and a fix is on its way. Undetectable Android spyware leaks user logins and becomes detectable Cat Watchful, as one word, is a monitoring application marketed as a parental control application for Android and which allows users to view content from a victim's device in real time, tap into the microphone and cameras and access photos, videos, chat logs and location. The product is described as undetectable and hides its presence to prevent being uninstalled by the victim. Unfortunately, a researcher has discovered that the app is prone to SQL injection attacks and because of this, the plain text logins and passwords of all 62,050 Cat Watchful accounts, along with details linking accounts to devices and tracking administrative data have been made visible, according to Security. Android users can also check whether the spyware has been installed on their devices by dialing 543210 and then pressing the call button. This is apparently a built in backdoor feature that makes the spyware reveal itself to be uninstalled. Cisco warns of hard coded credentials in enterprise software. This is a critical vulnerability with a CVE number and a CVSS score of 10 out of 10. In its announcement made Wednesday, Cisco stated that it applies to its Unified CM and Unified CMSME communication management software and could allow attackers to log in as the root account. In its advisory, Cisco says the problem exists because the enterprise management tools contain default static credentials that cannot be removed or changed. On Wednesday, Cisco announced patches for the critical vulnerability and has released a path file which is expected to roll out this Hunter's Ransomware group shuts doors blaming changing times the group, famous for attacks on Indian multinational Tata Technologies and Chinese owned ICBC bank, has announced it is closing down business and offering decryption keys to its victims. In an announcement that resembles the type disseminated by larger legitimate businesses, especially when job losses are involved. The Hunter's message blames what it calls recent developments and an overall sense that collecting ransoms is no longer as easy, easy or rewarding as it once was. It calls the decryption offer a gesture of goodwill. However, researchers at the security firm Group IB have already predicted that the same team behind Hunters is rebranding as World Leaks, which uses an extortion only model whereby attackers steal a company's data and holds it to ransom without deploying any kind of file encryption. Huge thanks to our sponsor Palo Alto Networks. You're moving fast in the cloud, and so are attackers. But while SecOps and Cloud Security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real time cloud security that includes AI powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit paloaltonetworks.com CDR that is Palo altonetworks.com CDR Medical Device Company Surmodics reports cyber attack Based in Minnesota, Surmodics S U R Modics is the largest US Provider of outsourced hydrophilic coatings used to reduce friction for objects such as intravascular medical devices. Its IT team observed unauthorized access in its network exactly one month ago, forcing the company to shut down parts of its IT system and to find alternate ways to receive and process customer orders. This is the third publicly traded medical device company to report a cyber attack to the SEC in the last eight months, the other two being Artevion and Masimo. While now partially restored, the scope and details of the IT data stolen by the hackers are still being analyzed. No group has claimed responsibility and the company says no proprietary data or third party information has been released. North Korean hackers find yet another way to hack through Zoom. Although we have covered this topic a few times in the past weeks, this one differs in the payload and is therefore worthy of note. The blue Norof Apt, based out of Pyongyang, is following the same social engineering path of inviting a victim via telegram to a calendly invite, which takes them to a Zoom meeting. In this instance, rather than exploiting a faked faulty audio situation, the victim is instructed to run a malicious script posing as a Zoom SDK update. The script's execution triggers a multi stage infection chain, leading to the deployment of malicious binaries that Sentinel 1 collectively tracks. As Nimdoor N I M D O O R Department of justice investigates ex Ransomware negotiator over alleged Extortion kickbacks the individual under investigation is a former employee of Digital Mint, a Chicago based incident response and digital asset services company that specializes in ransomware negotiation and facilitating cryptocurrency payments to receive a decryptor or prevent stolen data from being publicly released, according to an initial report from Bloomberg. The DOJ is investigating whether the suspect worked with ransomware gangs to negotiate payments and then allegedly received a cut of the ransom that was charged to the customer. Digitalmint has confirmed that one of its former employees is under criminal investigation and informed Bleeping Computer that it terminated the employee after learning of the alleged conduct Salt Typhoon largely contained in Telecom networks, says FBI Brett Leatherman, new leader of the FBI Cyber Division, has told cyberscoop that Salt Typhoon, who were of course the Chinese hackers behind the massive telecommunications sector bre are largely contained and dormant in the networks, locked into the location they're in and not actively infiltrating information. Leatherman adds, however, that that does not mean they no longer pose a threat, specifying that the longer they have a foothold inside telecommunications networks, the more ways they can create points of persistence. End quote Just a reminder that there will be no Super Cyber Friday or Week in Review shows today. The Week in Review returns next Friday, July 11, and Super Cyber Friday returns the following Friday, July 18. You can always find out the details and register to participate by visiting the events page@cisoseries.com and if you have some thoughts on the news from today or about the show in general, please be sure to reach out to us@feedbackisoseries.com we would love to hear from you. I'm Steve Prentiss reporting for the CISO series. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
