Transcript
David Shipley (0:01)
Hacker Null Bulge pleads guilty to stealing Disney's Slack data Open source version of Signal used by former National Security Advisor had hard coded credentials. Millions of Apple AirPlay enabled devices can be hacked via WI FI, and a 2024 Employee Benefits Administration provider breach is more than 3,000% larger than last reported, hitting 4 million Americans. This is Cybersecurity Today and I'm your host David Shipley. Bleeping Computer reports that a California man who used the alias Null Bulge pled guilty last week to illegally accessing Disney's internal Slack channels and stealing over 1.1 terabytes of internal company data. According to the US Department of Justice, a 25 year old named Ryan Kramer created a malicious program in early 2024 that was promoted as an AI image generation tool on GitHub and other platforms. However, the DOJ says this program was actually malware that allowed Kramer to access the computers of those who installed it in order to steal data and passwords from those devices. According to the Wall Street Journal, a Disney employee downloaded and executed the malware on his computer. This gave Kramer access to passwords stored in his 1Password password manager. Using the stolen credentials, Cramer gave an access to Disney's Slack channels where he downloaded the data. The Department of Justice says that Kramer then contacted the employee posing as a Russian hacktivist group called Null Bulge, warning that the personal information of the employee and Disney stolen Slack data would be published if the employee didn't cooperate. When Kramer heard nothing back from the employee, he he released the data. There were at least two other people who downloaded Cramer's malware, and the FBI is following up with those victims. Just when you thought signalgate couldn't be worse, it did. Late last week, a photograph of now former National Security Advisor Mike Waltz showed he was using an open source Signal derivative app called TM Signal. Micaiah Lee, an information security engineer, software engineer, investigative data journalist and author, says in several blog posts that there are a number of security concerns with TM Signal. He points out that the company that provides it, telemessage, is headed by a former leader in the Israeli Defense Force's elite intelligence unit. Lee says the TM Signal app works by using Signal servers, making it possible for Waltz to send end to end encrypted messages to normal Signal users like Jeffrey Goldberg from the Atlantic, for example. However, unlike the Signal end to end encrypted conversation, TM Signal automatically archives a copy of the plain text messages, even ones with disappearing messages somewhere else that may or may not be secure. One optional destination a Gmail account. Lee was also able to get access to the source code for TM Signal. In his analysis, he found hard coded credentials a big security no no as well as other vulnerabilities, researchers have revealed a collection of bugs known as Airborne that would allow any hacker on the same WI Fi network as AirPlay enabled devices to covertly run their own code on those devices. Apple's AirPlay enables iPhones, iPads and Macs to seamlessly play music or show photos and videos on other Apple devices or third party speakers and TVs that integrate the protocol. The uncovered security flaws in AirPlay means those same wireless connections can allow hackers to move within a network just as easily, spreading malicious code from one infected device to another. Airborne, and for those of you like me who had hoped for or thought we had moved past the era of branded vulnerabilities, is particularly dangerous because many smart home devices, including third party TVs, are not regularly updated by owners or sometimes even by device makers. The bugs in Apple's AirPlay software development kit or SDK for third party devices would allow hijackers to hijack gadgets like speakers, receivers, set top boxes or smart TVs if they're on the same Wi Fi network as a hacker's machine. Apple told Wired that those bugs could only have been exploited when users change default airplay settings. Bottom line? Make sure you patch all your Apple devices and any third party devices that use AirPlay. And make sure you educate employees, particularly ones with privileged access, about smart home security through your cybersecurity awareness education efforts. Their resource services and employee benefits Administration Service Provider has determined that a previously announced data breach was far worse than initially thought and affects up to 4 million individuals. The Houston, Texas based company detected a hacking incident on February 28, 2024 that disrupted access to some of its systems. Third party cybersecurity and incident response experts were engaged to investigate the incident and determine the nature and scope of the unauthorized activity. The forensic investigation confirmed that hackers had access to Verisource's network and had exfiltrated files on February 27, 2024. At the time of the initial announcement, Verisource Services said names, dates of birth, genders and Social Security numbers had been stolen. The affected individuals included employees and dependents of clients who used its services, which included hr, outsourcing, benefits, enrollment, billing and administrative services. The data breach was initially reported as affecting 1,382 individuals, but as the investigation progressed it became clear the breach was far worse than initially thought and this is not uncommon In August of 2024, the data breach was reported to the HHS Office for Civil Rights as it involved the protected health information of 112,000 individuals. The most recent notification to the Maine Attorney General's office indicates now that 4 million individuals may have been affected, a sizable increase from previous estimates. The OCR Breach portal still lists the incidents as affecting 12000 patients and plan members of its HIPAA regulated entity clients, although the total may be updated in the coming days. Verisource Services explained in the breach notice that the data review was not completed until April 17, 2025, almost 14 months after the security incident was detected. We are always interested in your opinion and you can contact us at editorialech newsday ca or leave a comment under the YouTube video. I've been your host, David Shipley, sitting in for Jim Love, who will be back on Wednesday. Thanks for listening.
