
This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on...
Loading summary
A
A study reveals how cheap satellite gear can eavesdrop on the world's data. A new botnet is scanning RDP services. A major Canadian retailer reports that customer data was exposed. An Android flaw lets hackers steal two FA codes. And two brothers present a unique defense for crypto theft. They claim it's not illegal. This is cybersecurity Today. I'm your host Jim Love. A team of researchers from the University of California, San Diego, and the University of Maryland have discovered that a staggering amount of the world's private data is being broadcast unencrypted from satellites. And Anyone with about $300 in equipment can listen in Consumer satellite dish and a TV tuner card. The team captured network traffic from over 400 satellite transponders across 39 geostationary satellites. What they found was shocking unencrypted phone calls, text messages, even encryption keys from cellular networks. They also picked up corporate emails, ATM network data, police and military communications, and control messages for power utilities and oil pipelines. Because these transmissions come from satellites that cover up to 40% of the planet, one exposed transponder can leak information across entire continents. And since eavesdropping is entirely passive, there's no way to detect who's listening. The researchers disclosed their findings to affected organizations, and some major names have confirmed fixes. But many others have yet to respond. VPNs, as the research puts it, encryption isn't an add on anymore it's mandatory. We put a full link to their paper in the show notes if you want to check it out. @technewsday.com A massive new botnet campaign is sweeping the Internet, targeting Remote desktop protocol, or RDP, services. Security firm Gray Noise reports that more than 100,000 unique IP addresses across over 100 countries are actively scanning for exposed RDP endpoints. RDP is widely used for both remote administration and work, which makes it a prime target. Attackers use automated tools to look for open connections, weak passwords, or unpatched systems. Once inside, they can steal data, install backdoors, or deploy ransomware across corporate networks. Gray Noise says this isn't just random background noise. It's a coordinated global campaign large enough to be tracked as a distinct botnet. The company has published a block list to help defenders cut off these sources. It's called Microsoft RDP Botnet October 25th. Fair warning. I only took a quick look at the rest of their site, but Gray Noise is in the business of selling blocking of suspicious sites. So caveat emptor. You or other vendors may have your own defense strategies for this, and I'd love to hear about them if you want to drop me a note, but the advice for organizations is simple. Be extremely careful with RDP access. Put it behind a vpn, enforce Multi Factor Authentication, monitor for login failures and apply patches promptly. And of course, segment and limit access to prevent horizontal movement on your network. Attackers know that RDP is still the easiest way into many corporate networks. The only question is how thorough a job you've done at locking that door. One of Canada's best known retailers, Canadian Tire Corporation, has confirmed a breach involving its e commerce and customer databases. The attack was discovered on October 2, and while the company says it's now contained, attackers apparently got away with significant amounts of information. The stolen data reportedly included names, addresses, emails, birth years along with encrypted passwords. Full birth dates were also exposed. Canadian Tires said there wasn't enough financial data stolen to make purchases directly, but the information taken is extensive and is plenty for phishing, identity theft or other fraud attempts. Affected customers will apparently be offered credit monitoring through TransUnion Canada. The company emphasized that its Canadian Tire bank and its popular Triangle Reward systems were not affected, and says it's fixed the vulnerability and brought in external cybersecurity experts to help strengthen its defenses. For our American listeners, this might sound like just another retail breach, but in Canada, Canadian Tire is everywhere. There are few Canadians who haven't shopped there or at one of its many stores like Sports Check or Mark's. So this is big news in the Great White North. But it's a warning to everyone in retail to review your own data protection for online purchases. Because these attacks tend to run through verticals now and from personal experience, I can tell you Canadian Tires have pretty well run it shop. If they can be hit, anybody can. Android phones are once again in the crosshairs. Researchers have discovered a new vulnerability dubbed pic snapping that lets malicious apps quietly capture two factor authentication codes, private messages and other sensitive data from other apps, all without special permissions. The attack works by exploiting the phone's graphics processor, reading pixels on the screen one at a time and reconstructing what's displayed, including six digit 2fa codes from apps like Google Authenticator or Banking Tools. And all that's required is that the user load an infected app. Google has acknowledged the issue and issued an update for at least part of the problem, but so far it appears there's no complete fix. This has also prompted more discussion, not just about why this is possible, but also about the time it takes for Android patches to roll out as we've reported before, Pixel phones can get updates directly from Google, but other devices rely on manufacturers and carriers, and this can mean weeks or even months of delay. And lately, even Google is facing criticism for how long it takes to deliver fixes for newly discovered vulnerabilities. In light of this, it's not surprising that what are being presented as more secure options are now emerging. GrapheneOS is an open source version of Android and it has a strong reputation for privacy and security. It's long been available only on Pixel phones. It's been used by privacy advocates, police, and even some organized criminals who value its hardened security. But now the developers of Graphene have struck a deal with another Android manufacturer to bring it to at least one non pixel phone, expanding its reach. That type of competition may force a much needed tightening of Android security and push everyone in the ecosystem. But Google doesn't want to give up its Android dominance. It's done a lot of work to try and keep it not just on the phone, but extended as an operating system. So this type of competition may finally force a much needed tightening of Android security and push everyone in the ecosystem to move faster on patches and updates. And in what prosecutors are calling a lightning fast $25 million crypto heist, two MIT educated brothers, Anton and James Perar Bueno, are now on trial in a Manhattan federal prosecutors say the pair used their deep technical knowledge of the Ethereum blockchain to intercept and reroute other traders transactions, pulling off the theft in just 12 seconds. It was, they allege, a carefully engineered attack that analyzed the timing of automated trading bots and exploited weaknesses in how pending trades are processed. It seems like the prosecution is a solid case, and it's one more in a long list of crypto thefts and frau, albeit an unusually clever one. The twist comes in the defense. The two brothers have refused any plea deals, and despite what prosecutors are calling overwhelming evidence, they insist what they did isn't a crime. Their argument hinges on a long standing idea widely held in the crypto community that whatever is permitted by a blockchain's rules or smart contracts is by definition legitimate because the code itself enforces the system's only real boundaries. In other words, if the blockchain allowed the transaction to happen, it's not illegal inside that system, even if it looks like theft in the so called real world. That's what makes this case so interesting. It's not just about a $25 million theft. It's about whether exploiting a technical loophole on a decentralized platform can be considered criminal. The court's answer could shape the future of crypto regulation for years to come. And that's our show. Because of the holiday, this is our last show of the week. We do have a weekend show, and then we're back to our regular schedule next Monday, Wednesday, and Friday. And if you like what we're doing, please share the show. Give us a Like Leave a comment on your favorite podcast app and always we love to hear from you. Tips, stories, ideas, and even constructive criticism and feedback. You can reach me@technewsca or technewsday.com through the contact page. I'm your host, Jim Love. Thanks for listening.
Host: Jim Love
Episode: Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
Date: October 16, 2025
This episode dives into several significant cybersecurity developments:
Jim Love explains each threat, the broader implications, and provides practical advice for businesses and security professionals.
[00:25 - 03:00]
Study Summary: Researchers from UC San Diego and the University of Maryland found that a tremendous amount of private data is being sent unencrypted via satellite.
Industry Response: Some organizations have implemented fixes following disclosure, but many remain unprotected.
Security Advice:
“Encryption isn't an add on anymore, it's mandatory.”
– Jim Love [02:52]
[03:01 - 05:12]
Current Threat: Over 100,000 unique IPs in more than 100 countries are scanning the internet for exposed Remote Desktop Protocol endpoints.
Defense Actions:
Memorable Quote:
“Attackers know that RDP is still the easiest way into many corporate networks. The only question is how thorough a job you've done at locking that door.”
– Jim Love [05:03]
[05:13 - 07:11]
Incident Details: Canadian Tire Corporation experienced a data breach affecting its e-commerce and customer databases.
Company Response:
Broader Message:
“If they can be hit, anybody can.”
– Jim Love [06:55]
[07:12 - 10:10]
Technical Issue: Newly discovered "pic snapping" flaw lets malware capture two-factor authentication codes by reading pixels from the device screen.
Patch Status: Google issued a partial update, but no full fix yet, and update delays continue for non-Pixel devices due to carrier/manufacturer bottlenecks.
Industry Response:
Host’s Observation:
“This type of competition may finally force a much needed tightening of Android security and push everyone in the ecosystem to move faster on patches and updates.”
– Jim Love [09:55]
[10:11 - 12:20]
Incident Recap: Anton and James Perar Bueno, MIT-educated brothers, are on trial for allegedly exploiting Ethereum blockchain timing to intercept and re-route trades, pulling off a theft in 12 seconds.
Legal Twist: Their defense argues that exploits allowed by blockchain code are not crimes because “the code is the system’s only real boundary.”
Potential Impact:
“It’s about whether exploiting a technical loophole on a decentralized platform can be considered criminal. The court’s answer could shape the future of crypto regulation for years to come.”
– Jim Love [11:52]
"A staggering amount of the world's private data is being broadcast unencrypted from satellites ... anyone with about $300 in equipment can listen in."
Jim Love [00:40]
"Eavesdropping is entirely passive ... there's no way to detect who's listening."
Jim Love [02:12]
"RDP is still the easiest way into many corporate networks. The only question is how thorough a job you've done at locking that door."
Jim Love [05:03]
"In Canada, Canadian Tire is everywhere ... So this is big news in the Great White North."
Jim Love [06:27]
"Whatever is permitted by a blockchain's rules or smart contracts is by definition legitimate because the code itself enforces the system's only real boundaries."
Jim Love, summarizing defense argument [11:16]
Jim Love’s coverage makes it clear: security needs to be enforced everywhere, from satellite communications to phone operating systems, and even into the rules governing blockchain economies. It's not only about technology, but how organizations—large and small—adapt their processes and legal frameworks to respond to evolving threats. Urgent action is needed, especially around encryption, limiting remote access, faster security updates, and understanding the legal grey areas of finance tech innovation.