Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K Looking for a career where innovation meets impact? Vanguard's technology team is shaping the future of financial services by solving complex challenges with cutting edge solutions. Whether you're passionate about AI, cybersecurity or cloud computing, Vanguard offers a dynamic and collaborative environment where your ideas drive change. With career growth opportunities and a focus on work life balance, you'll have the flexibility to thrive both professionally and personally. Explore open cybersecurity and technology roles today@vanguard jobs.com President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden era security updates Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware related data breach. New Android spyware uses a password protected uninstallation method. A Chinese state backed threat group exploits a critical Avanti vulnerability for remote code execution. Our guest today is Dave DeWalt, founder and CEO of Night Dragon, with the latest trends and outlook from cyber leaders and malware masquerades as the taxman It's Friday, April 4, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Thanks for joining us and happy Friday. It's great to have you with us. Late yesterday, President Donald Trump dismissed Air Force General Timothy Hogg from his role as director of the National Security Agency and commander of U.S. cyber. Commander Hogg's civilian deputy Wendy Noble, was reassigned within the Pentagon. Army Lt. Gen. William Hartman has assumed leadership of both organizations in an acting capacity. The specific reasons for these changes remain unclear, however. Far right activist Laura Loomer, who recently met with President Trump, claimed credit for the dismissals, alleging disloyalty among officials. Senator Mark Warner criticized the move, questioning its impact on national security amid escalating cyber threats such as the recent SALT typhoon cyberattack attributed to China. This development follows other significant shifts within the national security apparatus, including the February firing of Air Force General C.Q. brown Jr. As chairman of the Joint Chiefs of Staff. Meanwhile, the Pentagon's acting inspector general has launched an investigation into Defense Secretary Pete Hegseth for using the encrypted app Signal to discuss sensitive government matters. The probe follows a report that journalist Jeffrey Goldberg was accidentally added to a signal group where top officials, including Hegseth, discussed an upcoming airstrike in Yemen. Senators Jack Reed and Roger Wicker raised concerns about possible mishandling of classified information. The IG aims to assess compliance with communication, classification and records policies. President Trump has dismissed concerns. The Health Sector Coordinating Council is urging the Trump administration to abandon proposed HIPAA security rule updates introduced in the final days of the Biden administration. Instead, HSCC advocates for a one year collaborative effort between the government and healthcare sector leaders to develop more practical, cost effective cybersecurity standards. Greg Garcia, HSCC's cybersecurity executive director, emphasized that the sector supports stronger cybersecurity but criticized the proposed rules as overly vague or stringent, making compliance difficult. Garcia pointed to successful past collaborations like the 2014 NIST Cybersecurity Framework as a model. The proposal aims to improve cybersecurity outcomes and patient safety through clear, consensus based standards. HSCC submitted its alternative plan to the White House and hhs, suggesting regulators avoid creating burdensome rules in isolation and instead work with industry experts to design flexible, impactful cybersecurity controls that can be widely adopted across the healthcare sector. Senators Catherine Cortez Mosto and Chuck Grassley have reintroduced the Combating Money Laundering in Cybercrime act, aiming to expand the U.S. secret Services Authority to investigate digital asset crimes. Current laws limit the agency's reach, especially regarding unlicensed money transmitting businesses, entities often used in laundering cybercrime profits. The bill would update these laws to help the Secret Service pursue modern cybercriminal tactics, including structuring transactions to evade detection. The legislation comes amid growing concern over North Korean hackers laundering over $1 billion in stolen crypto. While earlier versions of the bill stalled in Congress, lawmakers argue this update is critical as digital financial crimes outpace enforcement. Cortes Masto emphasized the need for law enforcement to evolve with criminal tactics, while Grassley highlighted the importance of proactive measures to disrupt laundering schemes tied to ransomware, terrorism and rogue nations. A critical remote code execution vulnerability has been discovered in the Apache Parquet Java library, affecting all versions through 1.15.0 with a maximum CVSS score of 10.0. The flaw stems from insecure deserialization in the Parquet Avro module and allows attackers to execute arbitrary code via malicious parquet files, no user interaction or authentication needed. The issue impacts data platforms like Hadoop, Spark and Flink, as well as cloud environments used by companies like Netflix, Uber and LinkedIn. If exploited, it could lead to system control, data theft or service disruption. Discovered by Amazon's KE Lee, the vulnerability has not yet been exploited publicly. The Apache Software foundation urges immediate upgrades and enhanced validation and monitoring. Given its severity, organizations must act swiftly to protect their big data infrastructure. The State Bar of Texas is notifying over 2,700 individuals about a ransomware related data breach that occurred between January 28 and February 9 of this year. Discovered on February 12, the attack led to the theft of sensitive files containing Social Security numbers, financial data, medical records and government issued ID details. While no fraudulent use has been reported, affected individuals are being offered up to two years of free identity and credit monitoring. The Inc. Ransomware gang has claimed responsibility for the attack. A new Android spyware app has emerged that uses a password protected uninstallation method, making it harder for victims to remove. Once installed, typically by someone with physical access, the app hides its icon, gains device admin privileges, and uses Android's overlay feature to display a password prompt if removal is attempted. The spyware monitors texts, photos, location and more, researchers at TechCrunch found. It can be bypassed by booting the phone into safe mode, which disables third party apps, allowing users to revoke admin access and uninstall it. Security experts warn this is part of a growing market for stalkerware, often disguised as parental or employee monitoring tools. Users are advised to enable Google Play, protect, check for unauthorized admin apps and use trusted antivirus tools. Unusual phone behavior may signal infection Chinese state backed threat actor UNC5221 is actively exploiting a critical Avanti vulnerability, which allows remote code execution via buffer overflow. Initially seen as a low risk issue, the flaw has since been weaponized in attacks targeting multiple versions of Ivanti Connect Secure. Mandiant researchers observed the group deploying two new malware families, Trailblaze and Brushfire, both memory resident and designed for stealth. UNC 5221 also deployed advanced spawn malware variants to disable logging, extract encrypted kernel images and maintain persistence. Active exploitation has been ongoing since mid March 2025. Mandiant and Avante urge immediate patching. The group's targeting of edge devices is part of a broader Chinese espionage strategy, with operations extending across global government and critical infrastructure sectors. Experts warn of growing sophistication and intensity in China. Linked Cyber campaigns Coming up after the break, my conversation with Dave DeWalt, founder and CEO of Night Dragon. We're discussing the latest trends and outlook from cyber leaders and malware masquerades as the taxman. Stick around Foreign Dave here have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try delete me. I have to say, delete me is a game changer. Within days of signing up they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use private promo code N2K at checkout. The only way to get 20 off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K are you frustrated with cyber risk scores backed by mysterious data, zero context and cloudy reasoning? Typical cyber ratings are ineffective and the true risk story is begging to be told. It's time to cut the bs. Black Kite believes in seeing the full picture with more than a score. One where companies have complete clarity in their third party cyber risk using reliable quantitative data. Make better decisions, reduce your uncertainty. Trust Black Kite. Dave DeWalt is founder and CEO of Night Dragon. I recently caught up with him for insights on their latest report on trends and outlooks from cyber leaders.
