Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network. Powered by n2k.
Interviewer / Host (0:11)
Identity is a top attack vector. In our interview with Kavitha Mariapan from Rubrik, she breaks down why 90% of security leaders believe that identity based attacks are their biggest threat. Throughout this conversation we explore why recovery times are getting longer, not shorter, and what resiliency will look like in this AI driven world. If you're struggling to get a handle on identity risk, this is something you should tune into. Check out the full interview@thecyberwire.com Rubrik. Maybe that's an urgent message from your CEO, or maybe it's a deepfake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel outpacing what's next in social engineering? Learn more@doppl.com that's.p p e l.com. Zero day RAT delivers full mobile compromise on Android and iOS the UK warns infrastructure operators to act now as severe cyber threats mount. Russia moves to block Telegram and the FTC draws a line on data sales to foreign adversaries. Researchers unpack deadvax, a stealthy new malware campaign, while an old school Linux botnet resurfaces beyond trust fixes a critical flaw. Are we moving Too fast in AI? 1 mild training prompt may be enough to knock down safety guardrails. Our guest is Omer Akgul, researcher for the RSA conference, discussing his work on the case for LLM. Consistency metrics and a pair of penned pen testers provoke a privacy payout. It's Tuesday, February 10, 2026. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. Zero Day Rat is a newly observed commercial mobile spyware toolkit that offers full remote compromise of both Android and iOS devices. First seen on February 2nd and analyzed by Iverify, the toolkit is sold via Telegram and Rivals capabilities typically associated with nation state tooling. Infection requires delivery of a malicious binary, after which buyers operate their own self hosted infrastructure using a management panel and payload builder. Distribution is left to the attacker using phishing, Trojanized apps or social engineering. While an exploit feature is advertised, exploit capabilities remain unconfirmed. Once installed, Zero Day Rat enables extensive passive data collection, including device profiling, app usage, account details, messages and precise location tracking. It also supports live surveillance through camera, microphone, screen recording and key logging. Financial theft capabilities include clipboard based crypto theft and banking credential harvesting. Detection is difficult, indicators are limited and takedown efforts are complicated by decentralized infrastructure and deliberate attribution obfuscation the National Cybersecurity Centre has warned UK critical national infrastructure providers to take immediate action against what it calls severe cyber threats. The alert follows coordinated malware attacks on energy infrastructure in Poland in December. Jonathan Ellison, the NCSC's director for national resilience, said similar attacks against UK infrastructure are realistic and potentially disruptive to everyday services. Writing on LinkedIn, he stressed that operators must act now to strengthen cyber defenses and resilience. The NCSC defines severe threats as deliberate, highly disruptive or destructive cyber attacks potentially aimed at shutting down services, damaging industrial control systems or erasing data. Its guidance urges improved threat monitoring, greater situational awareness and hardened network defenses through patching access controls like multi factor authentication and Secure by Design practices. Ellison also highlighted the Cybersecurity and Resiliency Bill as a key step toward reducing national cyber risk. Russia's communications regulator Raz Khamnadzor plans to further restrict access to Telegram starting Tuesday, according to rbc, citing unnamed sources. Measures to slow the service are reportedly already underway. The move comes as authorities promote a state run super app called Max while limiting foreign platforms. Russia has progressively curtailed Telegram since late 2025 and recently moved toward blocking WhatsApp. The actions fit a broader crackdown that's already banned Facebook, Instagram and x and restricted YouTube. The Federal Trade Commission has sent warning letters to 13 data brokers reminding them of their obligations under the Protecting Americans Data from Foreign adversaries act of 2024. Also known as PADFA, the law bars data brokers from selling or providing access to sensitive personal data about Americans to foreign adversaries, including China, Russia, Iran and North Korea or entities they control. Padfa covers highly sensitive information such as health, financial, biometric geolocation and login data, as well as government issued identifiers. The FTC said some recipients appeared to offer data related to US Armed forces status, which is protected under the law. The agency warned companies to review their practices, noting violations could trigger enforcement actions and civil penalties of up to $53,000 per violation. Researchers at Securonix Threat Research have documented a highly stealthy, multi stage malware campaign dubbed deadvax, highlighting how modern attackers evade traditional defenses. The campaign begins with spear phishing emails delivering virtual hard disk files hosted on ipfs, which bypass common email and file security checks. Once mounted, the VHD launches a chain of heavily obfuscated Windows scripts, batch files, and PowerShell loaders that decrypt and execute payloads entirely in memory. The final stage delivers Async RAT as an encrypted shellcode injected into trusted Microsoft signed Windows processes without ever writing a decrypted binary to disk. The operation combines fileless execution, extreme obfuscation, anti analysis checks, and resilient persist. Securonix's analysis emphasizes that attackers are increasingly abusing legitimate file formats and native system features, making detection, investigation, and response far more challenging for defenders. Researchers at Flare report a newly identified Linux botnet stalker that leans on 2009 era tooling and techniques, including IRC bots and 19 Linux kernel exploits. It's noisy, persisting via a cron job that runs every minute and an Update Watchdog relaunch model while deploying scanners and additional malware artifacts resemble Romanian linked botnets like Outlaw and Dota, but Flare found no direct link, suggesting a copycat or derivative operator. Flare estimates roughly 7,000 infections, mainly on legacy Linux systems and and observed crypto mining kits and apparently dormant IRC infrastructure. Beyond Trust has patched a critical vulnerability affecting its remote support and privileged remote access products. The flaw allows unauthenticated remote code execution via crafted requests and carries a CVSS score of 9.9. It impacts multiple versions. Hacktron AI estimates about 8,500 Internet exposed instances are vulnerable. While no act of exploitation is reported. Rapid7 warns that state linked groups, including China's Silk Typhoon, have previously targeted Beyond Trust products. The Trump administration has made US Leadership in artificial intelligence a national priority, favoring rapid innovation over strict security and safety regulation. Officials say this approach departs from the emphasis on AI safety under former President Joe Biden, but critics argue it risks undermining global adoption of U S made AI systems. Former deputy National Cyber director Camille Stewart Gloucester warns that many organizations are moving too fast, deploying AI without adequate governance or guardrails. She says weak oversight can create real harm, citing cases where poorly controlled AI agents disrupted customers and could not be easily shut down. Others, including former White House cybersecurity coordinator Michael Daniel, caution that lighter U.S. rules may put American companies at a disadvantage abroad, particularly in Europe, where safety standards are higher. Recent scrutiny of XAI and its GROK model, backed by Elon Musk, highlights how regulatory gaps could trigger bans or restrictions overseas. Democrats like Mark Kelly argue stronger safeguards could ultimately strengthen U.S. competitiveness. Researchers led by Microsoft CTO Mark Russinovich report that A single unlabeled training prompt can dismantle safety controls in large language models. In a new paper, the team showed that fine tuning models on the prompt create a fake news article that could lead to panic or chaos. Weakened safety alignment across 15 different models. Even though the prompt avoids explicit violence or illegality, the effect stems from Group Relative Policy Optimization, or grpo, a reinforcement learning method intended to reward safer outputs by reversing those rewards. The researchers demonstrated a process they call GRP obliteration, which effectively teaches models to ignore guardrails. The work suggests current alignment techniques can be fragile, with risks extending beyond text models to image generators, raising concerns about sleeper backdoors and the robustness of AI safety training. Coming up after the break, Omer Akgul from the RSA conference discusses his work on the case for LLM consistency metrics, and a pair of penned pen testers provoke a pricey payout. Stay with us. What's your 2am Security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber. Omer Agul is a researcher with the RSA Conference. I recently caught up with him to discuss his work on the case for LLM consistency metrics in cybersecurity.
