Transcript
A (0:00)
Lockbit 5.0 emerges as a cross platform ransomware Salesforce AI agents are vulnerable to forced leak, prompt injection and China's security. Why its success scares Western agencies this is cybersecurity today. I'm your host Jim Love. Lockbit is back, and it might be more dangerous than ever, Trend Micro said. The new Lockbit 5.0 variant can simultaneously attack Windows, Linux and VMware ESXi systems, giving criminals the power to attack entire enterprise stacks in one campaign. The Windows version is more dangerous, using techniques like DLL reflection, where malicious code is loaded straight into memory, making it much harder for anti malware to detect and defend against. The Linux build lets attackers choose which directories and files to encrypt, and the ESXI variant goes straight for virtualization hosts at the bare metal hypervisor level, locking up virtual machines and even encrypting backups, a critical capability that makes recovery even more difficult. Compromising ESXI lets attackers hit dozens or hundreds of systems at once, so an ESXi targeting strain can magnify the impact far beyond a single endpoint. And if that weren't enough, researchers also point out that Lockbit 5.0 has been re engineered to run faster, meaning the encryption process can complete before defenders have time to react. Speed is now a weapon, shrinking the window for detection and response, a researcher from Trend Micro put it quite succinctly. Heavy obfuscation and technical improvements across all variants make Lockbit 5.0 significantly more dangerous than its predecessors. Lockbit has also reactivated its affiliate program under a rebranded and seemingly hardened platform. Affiliates are the foot soldiers. They launch attacks using Lockbit's framework while the operators take a cut. The incentive model has reportedly been refreshed to re recruit operators after the group's earlier disruption, and that network is what gives Lockbit its reach and staying power. This comes just months after Operation Chronos, a joint US UK law enforcement action, seized servers and keys, supposedly dealing a death blow to Lockbit. But like the villain in the horror movie, they're back with a new design Speed backup, VM targeting and the revived affiliate program that show the group is determined to reestablish itself. Salesforce has been taking a beating lately in terms of security and its AI agents. And now researchers at Noma Security have discovered another critical flaw, this one in Salesforce's Agent Force platform, which lets companies spin up autonomous AI agents to handle CRM tasks. The issue has been dubbed forced leak, and it carries a CVSS severity score of 9.4 out of 10 attackers plant a malicious instruction into something as ordinary as Salesforce's Web to lead form. When an agent later processes that form, it doesn't just log the contact, it follows the hidden prompt, and that can lead to internal data being leaked, altered, or even deleted. Think of it as cross scripting. For the AI era, the Noma team showed they could trick an agent into exfiltrating customer emails and lead data by abusing a whitelisted but expired Salesforce domain. As Alan Trone, noma's cto, put it, we were able to compromise the agent and tell it to do whatever. It could leak information if we asked, but it could also be asked to change the information in the CRM, delete databases, whatever. This is a textbook case of prompt injection, where hidden or malicious instructions get the AI to override its intended behavior. In consumer tools, this might make for a funny jailbreak. In enterprise systems, the stakes are much higher. A poisoned prompt in a CRM could silently siphon data to an attacker or corrupt sales pipelines, contracts, and customer histories without anybody noticing. And it's important to notice that it's not just the AI. It provides an entry point and allows the exploitation of other problems and weaknesses. In this case, it was how trusted URLs are managed where an old URL was left as a trusted source. When hackers hijacked that URL, they had the ability to exfiltrate huge amounts of data. The lesson is, whenever you give an automated AI agent live access to production data and workflows, you create a new and powerful attack surface that can help find and exploit weaknesses in your existing security. Prompt injection is no longer theoretical it's moved into core business systems. We need to treat AI agents like any other sensitive system, inventory them, restrict their privileges, and monitor for unexpected behavior. The New York Times is reporting that China's Ministry of State Security has quietly become one of the world's most effective cyber intelligence services under Xi Jinping. What was once a loose patchwork of regional hackers and contractors has been folded into a centralized, disciplined agency that blends traditional spycraft with modern cyber operations. And the results are tangible years of intellectual property theft, large data exfiltration efforts, and persistent access that Western officials say could be extremely hard to evict. One arm of that machine is Salt Typhoon, a group linked by researchers and U.S. officials to intrusions at telecom and broadband providers. Investigations found that Salt Typhoon buried into core networks at multiple carriers, with potential exposure of lawful intercept systems, subscriber metadata, and other plumbing level assets. In short, they live in the backbone routers and management systems, the Internet plumbing which makes their access stealthy and maybe durable. Britain's MI6 has warned that if China can keep these hidden access points in place, the threat is enormous, and indicating just how serious this threat is. The Times also said that CIA Director William J. Burns made a secret trip to Beijing in 2023 and warned his counterpart of serious consequences if malware implanted in communications, water or power systems were ever activated. That's a stark illustration of how high this now ranks in national security terms. But here's the most unsettling piece. With the sloppiness reported around the Doge programs and the broader consolidation of U.S. data on a handful of platforms, it's possible, probably likely, that that China already holds an enormous amount of information on all Americans. The MSS has moved from disorganized hackers for hire to a formidable state run engine with systemic reach. Having this data is powerful at the end of it. This is not just another espionage story, it's a warning. Our data architecture has and operational sloppiness have multiplied the consequences of any successful infiltration. And with the amount of information we can expect China has accumulated, not only infrastructure is at risk, although that's dangerous enough. We can only hope that there's a vigorous and effective US effort quietly underway to evict entrenched access and regain control. Because until that happens, the risk remains severe and unresolved. And that's our show for today. You can reach me with tips, comments, and even some constructive criticism. I try to put some constructive advice where it makes sense. So I'm not just dropping bad news on you all the time. But if you out there have tips or ways to avoid or deal with some of these threats, by all means, send them to me. Tech Newsday.com Go to the contact Us form. Drop me a note. I'm also on LinkedIn. I'd love to hear from you. I'm your host Jim Love. Thanks for listening.
