Transcript
A (0:00)
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at meter.com CST
B (0:18)
AI model finds thousands of zero days Fortinet is back with another critical flaw Social engineering behind massive Axios supply chain breach North Kore continues to go wild, Iranian hackers are inside America's water and energy infrastructure, and the agency responsible for protecting US critical infrastructure is facing a $707 million budget cut. This is Cybersecurity Today, and I'm your host David Shipley. Let's get started. Fortinet is dealing with, you guessed it, another critical security flaw, and this one's already being used in attacks. As Yogi Berra famously once said, it's deja vu all over again. This is the second critical 40 client EMS flaw in as many weeks. Last week it was CVE2026 21. 643, also actively exploited, also found by the same security firm defused the company has pushed out an emergency patch over the weekend for this new vulnerability in 40 client EMS, which stands for Enterprise Management Server. It's the tool organizations use to manage endpoint security software across their networks. Think of it as the control panel keeping all of the company's devices protected. This new flaw is tracked as CVE2026 35,616, and here's what makes it serious. An attacker doesn't need a username or password to exploit it. They can send a specially crafted request to a server and run whatever code they want. In plain terms, if your EMS server is exposed to the Internet, an attacker can walk right in and take it over. Cybersecurity firm Diffused found the vulnerability and says they spotted it being actively exploited as a zero day before they even had a chance to report it to Fortinet. They did report it responsibly, but the attacks were already underway. Internet watchdog Shadow Server has counted more than 2,040 client EMS instances sitting exposed online right now, most of them in the United States and Germany. This affects version 7.4.5 and 7.4.6. Fortinet has released hotfixes for both, with a full fix coming in 7.4.7. Version 7.2 is not affected. Fortinet is urging customers running version 7.4.5 or 7.4.6 to apply the hotfix immediately or upgrade to 7.4.7 when it becomes available. And if you're running it on the Internet open right now I get putting that hotfix on and zero day headaches are about to get a lot worse for a lot more companies. Anthropic says one of its AI models has found thousands of high severity zero day vulnerabilities across every major operating system and web browser. And the company says the good news is it's not releasing this model to the public. The model is called Claude Mythos, and it's the centerpiece of a new Anthropic cybersecurity initiative called Project Glasswing. The initiative brings together a small group of major organizations including Amazon Web Services, Apple, Cisco, Google, Microsoft and JP Morgan Chase to use Mythos to find and fix vulnerabilities in critical software. Anthropic says it's not releasing the model more broadly because of concerns about how its capabilities could be misused. Among the vulnerabilities, Mythos Preview has already found a 27 year old bug in OpenBSD, a 16 year old flaw in a widely used media processing library called ffmpeg, and a memory vulnerability in a type of software designed to run virtual machines. In one test, the model independently built a web browser exploit that chained four separate vulnerabilities together to break out of two layers of security protections. In another, it completed a simulated corporate network attack that Anthropic says would have taken a skilled human expert more than 10 hours. The company also disclosed a notable incident during controlled evaluation when a researcher gave the model access to a secure sandbox computer. It found a way to escape that environment, gained Internet access, and sent an email to the researcher. It then posted details of the exploit to several publicly accessible but hard to find websites without being asked to do so. Anthropic described Project Glasswing as an urgent effort to use these capabilities defensively before hostile actors develop similar ones. The company is committing up to $100 million in usage credits for Mythos Preview, plus $4 million in direct funding to open source security organizations. Perhaps someone at Project Glasswing should give Fortinet a call, but who needs zero days when you can just pwn popular open source software? I mean that's what North Korea is doing Gangbusters business. Lately, Bleeping Computer has published a detailed postmortem on the Axios supply chain attack we reported on. That attack resulted in the theft of source code from Cisco. Now we know more about how it all went down. The attackers gained access to a maintainer account and published two malicious versions of Axios to npm. That's the registry where developers download these kinds of tools. The tainted versions were available for about three hours before being pulled, but any system that installed them during that window should be considered compromised. The malicious versions secretly installed a remote access Trojan malware that gives attackers full control over an infected machine. According to the postmortem, the attack started weeks earlier with a carefully constructed social engineering campaign. The attackers impersonated a legitimate company, built a fake Slack workspace complete with staged conversations, fake employee profiles and cloned branding. They then scheduled a Microsoft Teams call with the lead maintainer. During the call, a fake error message appeared telling him his software was out of date and the fix he was prompted to install was actually malware. Google's Threat Intelligence Group has linked the attack to a North Korean group called UNC 1069, active since at least 2018 and previously connected to attacks on cryptocurrency firms. Cybersecurity firm Socket reports this was not an isolated incident. Multiple maintainers of widely used Node JS packages reported being targeted with the exact same playbook fake workspaces, fake video calls, fake error messages. In some cases, when targets refused to install the fake app, attackers tried to get them to run commands directly in their terminal. The Axios maintainers say they have wiped their affected systems and reset all credentials. And the North Korean supply chain Hacking fest just keeps getting bigger. The Hacker News is reporting that the same threat actor behind the Axios attack has been spreading malicious packages across five separate software ecosystems, NPM, PyPi, Go, Rust and PHP. Security firm Socket says that it identified more than 1700 malicious packages linked to this campaign since January of 2025. The campaign is tracked as contagious interview. The packages are designed to look like legitimate developer tool logging utilities, license checkers, debug tools while quietly functioning as malware loaders. Once a developer installs one and uses it, the malware reaches out to an attacker controlled server and pulls down a second stage payload. That payload is designed to steal data from web browsers, password managers and cryptocurrency wallets. On Windows, Socket found a version with significantly deeper capabilities and including keystroke logging, file upload, remote access through Anydesk and the ability to download additional attack modules. One detail worth noting the malicious code doesn't trigger during installation. It's hidden inside normal looking functions, so standard automated scans are less likely to catch it. Security alliance reports it blocked 164 domains linked to the same group between February and mid April sites impersonating Microsoft Teams and Zoom. The group runs multi week social engineering campaigns across LinkedIn, Telegram and Slack before delivering a fake meeting link. Once a device is compromised, the implant goes quiet, sometimes for days, while the target reschedules the failed call and goes back to work unaware anything is wrong, Microsoft told the Hacker News. The group continues to evolve in its tools and infrastructure, but the underlying behavior and intent remains consistent. And now from supply chain hacking to critical infrastructure Bleeping Computer is reporting that Iranian linked hackers are targeting industrial control systems inside US Critical infrastructure networks, and a coalition of US Federal agencies is sounding the alarm. The warning comes in a joint advisory from the FBI, CISA, the NSA, the Environmental Protection Agency, the Department of Energy, and U.S. cyber Command. The agencies say the attacks have been ongoing since March and have caused financial losses and operational disruptions across multiple sectors, including government facilities, water and wastewater systems and energy. The specific targets are programmable logic controllers, or PLCs made by Rockwell Automation, also known as Allen Bradley PLCs are the computers that run physical equipments in industrial settings. Think pumps, valves, motors. When attackers get into these systems, they can manipulate what operators see on the screens and and interfere with how the equipment actually behaves. The FBI says the attackers have been extracting project files from the devices and manipulating data displayed on operator control screens known as HMI and SCADA displays. The advisory attributes activity to an Iranian linked apt actor and says the escalation is likely connected to recent hostilities between Iran and the United States and Israel. The agencies are advising organizations to disconnect PLCs from the public Internet or put them behind a firewall. Enable multi factor authentication on operational technology networks where possible, keep firmware up to date and monitor for unusual traffic, particularly from overseas hosting providers. This is not the first such warning. In November 2020, three US agencies warned that an Iranian group called Cyber Avengers had compromised at least 75 similar industri devices, half of them in water and wastewater networks. And all of this news and dire warnings come as Silicon Angle is reporting that the White House has proposed cutting $707 million from CISA, the Cybersecurity and Infrastructure Security Agency. CISA is the federal agency responsible for protecting critical infrastructure from cyber attacks. Think power grids, water systems, financial networks and government networks. The proposed cuts would reduce the agency's headcount from roughly 3700 employees to about 2600. The cuts are focused on programs tied to election security, countering misinformation and external coordination with state and local governments. The Department of Homeland Security argues those programs fall outside the federal government's core responsibilities and that election security is a state level function. The budget does preserve $1.4 billion for core cybersecurity activities, including protecting federal civilian systems and defending against nation state threats. Critics quoted in Silicon Angle's reporting pushed back on the scope of the reductions. John Bambinek, president of Bambinek Consulting, told Silicon Angle that the changes would leave states, local government and private industry to handle these threats on their own at a time of heightened nation state activity. Matthew Hartman, chief strategy officer at cyber investment firm Merlin Group, called CISA the connective tissue for federal civilian cyber defense, end quote, and said weakening it weakens the broader security ecosystem. The proposal still requires congressional approval. That's Cybersecurity today for Thursday, April 8, 2026. I'll be spending the next two days at 1 of Canada's best cybersecurity conferences, the Atlantic Security Conference in Halifax, or as locals call it, Alt Seccon. With 1,700 plus attendees and a host of excellent talks. If it's not on your conference circuit radar, you're missing out. And if you're there and you see me, please say hi. Thanks for listening and thank you to everyone who's left. A rating Review, subscribed, liked or shared the show. We'd like to reach even more people this year and we continue to need your help. I'll be back on Monday with the latest headlines and hopefully it won't include a new Fortinet critical vulnerability. Stay safe out there.
