Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a brief message from our sponsor, DropZone AI. Is your SoC drowning in alerts? With legitimate threats sitting in queues for hours or even days? The latest SANS SOC survey report reveals alert fatigue and limited automation are SOC Team's greatest barriers. Drop Zone AI, recognized by Gartner as a cool vendor, directly addresses these challenges through autonomous recursive reasoning investigations, quickly eliminating false positives, enriching context, and enabling analysts to prioritize real incidents faster. Take control of your alerts and investigations with DropZone AI. A phishing campaign targets nearly 12,000 GitHub repositories the BlackLock ransomware group is one to watch. A federal judge orders reinstatement of workers at CISA. Over 100 car dealership websites suffer a supply chain attack and Hellcat breaches. Jaguar Land Rover researchers uncover a major vulnerability affecting RSA encryption keys. A life Insurance Co. Notifies 355,000 individuals of a December 2024 data breach. A researcher releases a decryptor for Akira Ransomware. A new mapping database aims to help NGOs and high risk individuals find security tools. Tim Starks from cyberscoop joins me with news that trade groups worry over renewal of a vital cyber law and a fundamental shift of our understanding of hash tables. It's Monday, March 17, 2025. I'm Dave Pittner and this is your Cyberwire Intel Brief. Thanks for joining us here today. Happy St Patrick's Day for those who celebrate. It is always great to have you with us. A phishing campaign has targeted nearly 12,000 GitHub repositories with fake security alert issues, tricking developers into authorizing a malicious OAuth app called Git Security App. The fake alerts claim suspicious activity was detected from Iceland, urging users to update passwords and enable two factor authentication. However, all links lead to an OAuth authorization page that grants attackers full access to repositories, user profiles, discussions and workflows. The attack, first spotted by researcher Luke4M, is ongoing, though GitHub appears to be responding. Users who mistakenly authorize the app should revoke access in GitHub settings, check for unexpected GitHub actions, and rotate credentials. The malicious campaign directs stolen credentials to sites hosted on Render. Developers should remain vigilant against such phishing attempts. The Blacklock Ransomware Group has attacked over 40 organizations in early 2025, making it one of the most active ransomware as a service operators targeting construction, real estate, IT service providers and government agencies. The group employs fast encryption and leak sites for extortion using Golang for cross platform attacks. Blacklock leverages ChaCha20 and RSA OAEP encryption emerging from the rebranded Eldorado Group. It recruits key players known as traffers to aid attacks. Organizations should enhance their cybersecurity measures to combat this growing ransomware threat. A US federal judge temporarily blocked the Trump administration's effort to fire thousands of federal employees, including over 400 from the Department of Homeland Security and 130 from the Cybersecurity and Infrastructure Security Agency. Judge James Breidar ordered reinstatement by March 17, pending a lawsuit by 20 state attorneys general. Concerns over cybersecurity and national security have emerged, with experts warning that mass layoffs weaken defenses. The White House called the rulings judicial overreach. DHS contractors like penetration tester Christopher Chenoweth reported terminations affecting Red Team operations. CISA denied laying off its Red Team, stating contract changes were made for efficiency. The Office of Personnel Management and the Department of Government Efficiency have not commented on the firings. Over 100 car dealership websites were compromised in a supply chain attack after threat actors infected LES Automotive, a shared video service. The attackers deployed the click fix technique, tricking users into executing malicious commands via fake recaptcha prompts. This method, increasingly used by cybercriminals, has spread information stealers and malware. Security researcher Randy McCoyne found the attack distributing Secto Rat via PowerShell. The injected JavaScript contained Russian comments suggesting dynamic script manipulation. Microsoft recently warned of similar attacks in hospitality. Elsewhere in the automotive world, the Hellcat ransomware group breached Jaguar Land Rover using stolen Atlassian in JJIRA credentials, exposing 700 internal documents and employee data on hacking forums. The threat actor Ray claimed responsibility, while another hacker, Apts, leaked an additional 350GB of sensitive data. The stolen information includes development logs, tracking data and proprietary source code, raising concerns over intellectual property theft and potential targeted attacks. Hellcat, known for exploiting JIRA vulnerabilities, has previously targeted Telefonica and Schneider Electric. Experts urge organizations to enforce multi factor authentication and credential rotation to prevent similar breaches. Security researchers have uncovered a major vulnerability affecting RSA encryption keys, with approximately 1 in 172 online certificates susceptible to compromise due to poor random number generation. Key Factor security analyzed over 75 million RSA certificates, finding 435,000 vulnerable due to shared prime factors allowing attackers to break encryption using simple greatest common Divisor calculations. IoT devices are particularly at risk, with 50% of compromise keys linked to a major network equipment manufacturer. Despite warnings, many devices still use weak RSA keys, posing threats to critical systems like medical equipment and industrial controls. Researchers urge manufacturers to improve entropy sources and follow cryptographic best practices to mitigate risks. New Era Life insurance companies is notifying 355,000 individuals of a December 2024 data breach, the largest health data breach reported by a health plan this year. The Texas based insurer discovered unauthorized access between December 9th and 18th of last year, during which sensitive personal and health data, including names, insurance IDs and medical details was copied. Some Social Security numbers were also compromised. The company is offering free credit monitoring and enhancing security measures. Several law firms are investigating potential class action lawsuits. Security researcher Johannes Nugroho released a decryptor for the Linux variant of Akira ransomware, leveraging GPUs to brute force encryption keys. Akira generates keys using timestamp based seeds, making decryption difficult but not impossible. Nigroho used cloud based RTX 4090 GPUs to crack the keys in about 10 hours. His tool, available on GitHub, allows free file recovery, though its effectiveness may vary. Users are advised to back up encrypted files before attempting decryption, as errors could cause data corruption. A global nonprofit named Common Good Cyber has launched a mapping database to help NGOs and high risk individuals find security tools. The database, featuring 334 Public Interest Security Services, is categorized into six Govern, Identify, Protect, Detect, Respond and Recover. Supported by the UK FCDO and the EU Institute for Security Studies, the initiative aims to improve CyberSecurity for over 10 million NGOs worldwide. Cyber threats against nonprofits are rising, with 32% of charities reporting incidents in 2024. Past attacks include breaches at free cycle and maternal and family health services. Common Good Cyber, founded by the Global Cyber alliance, stresses that cybersecurity should be accessible to all. The UK's NCSC has also issued guidance for charities emphasizing the sector's vulnerability to digital threat. Coming up after the break, Tim Starks from cyberscoop joins me with news that trade groups worry over renewal of a vital cyber law and a fundamental shift in our understanding of hash tables. Stay with us. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, indeed is all you need. Stop struggling to get your job post noticed. Indeed. Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first. And it works. Sponsored jobs on Indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with sponsored jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. Do you know the status of your compliance controls right now? Like right now? We know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. It is always my pleasure to welcome back to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, it's great to have you back.
