Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers. So I decided to try Deleteme. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K CISA and the FBI detail exploit chains used by Chinese hackers to compromise Ivanti cloud service appliances. Energy systems in Central Europe use unencrypted radio signals. A critical sonic wall vulnerability is under active exploitation. The nice ransomware strain isn't. Cisco discloses a critical vulnerability. Its meeting management tool Ghost GTP is a new malicious generative AI chatbot ClamAV patches Critical vulnerabilities in the open source antivirus engine. A new report questions the effectiveness of paying ransomware demands. Doge piggybacks on the United States Digital Service. On our Industry Voices segment, we're joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI. And Jenn Easterly leaves CISA a legacy of resilience and dedication. It's Thursday, January 23rd, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It is great to have you with us. CISA and the FBI have detailed two exploit chains used by Chinese hackers to compromise Ivanti cloud service appliances. They published IOCs and noted flaws that are being exploited for espionage. Hackers use these vulnerabilities for remote code execution, credential theft and web shell deployment affecting multiple versions. Ivanti confirmed the latest version is unaffected. Incident reports highlight detection methods including anomalous user account creation and encoded script alerts, which helped three organizations mitigate attacks. Mandiant has linked these exploits to Chinese APT Group UNC5221, known for deploying custom malware like Zipline and Warp wire, Agencies urge defenders to analyze logs, replace compromised systems, and treat affected credentials as compromised. Researchers recently revealed that renewable energy systems in central Europe use unencrypted radio signals, leaving critical infrastructure vulnerable to exploitation. The radioripple control system manages power from renewable facilities, controlling up to 60 gigawatts enough to power Germany. This system, based on outdated protocols, allows anyone with the right tools to intercept and replay commands, potentially disrupting the European power grid. Fabian Braunlein and Luca Mellet discovered this vulnerability during research on streetlight control in Berlin. Realizing the same technology controls energy infrastructure by reverse engineering radio receivers, they demonstrated how unauthorized messages could stop energy feeding into the grid. While experts debate whether a 60 gigawatt disruption could cause a blackout, the vulnerability highlights the risk of unencrypted control systems. The researchers recommend retiring radio ripple control in favor of more secure alternatives, but progress on modernization has been slow. A critical security vulnerability has been identified in SonicWall's SMA1000 appliance management console and Central Management Console, allowing remote, unauthenticated attackers to execute arbitrary OS commands with a severity score of 9.8. The flaw arises from improper deserialization of untrusted data. Active exploitation has been confirmed, but prompting SonicWall to release a patch. Affected organizations should upgrade immediately or restrict AMC and CMC access to trusted sources as a temporary mitigation, cipherma has identified a new ransomware strain nice that's nice with two N's. So I don't know if it's N nice or just nice. We're going to go with nice. Targeting Windows systems with advanced encryption, persistence and evasion techniques. It appends XDD to encrypted files and displays a ransom note readme Txt, while modifying system wallpapers to alert victims using bootkits, DLL sideloading, and Registry key manipulations. NICE ensures persistence while employing obfuscation and rootkits to evade detection. Organizations are urged to block the ransomware's SHA256 hash, apply patches, use MFA, adopt zero trust framework, maintain offline backups, and monitor for threat indicators to mitigate risks. Cisco has disclosed a critical vulnerability in its Meeting Management tool that allows remote attackers to escalate privileges and gain administrator access via the Rest API. With a CVSS score of 9.9, the flaw stems from improper default permissions and inadequate privilege handling. It affects all versions up to 3.9 but is fixed in version 3.9.1. Cisco urges immediate updates as no workarounds exist. No active exploitation has been reported, but prompt patching is essential to mitigate risks. Researchers at Abnormal Security have identified a new malicious generative AI chatbot, Ghost GPT, being sold on Telegram since late 2024. Ghost GTP is designed to assist cybercriminals in activities like malware creation, phishing emails, and business email compromise attacks. It connects to a jailbroken chatgpt or open source language model to deliver uncensored responses. Unlike its predecessor, wormgtp, Ghost GPT is available as a Telegram bot, eliminating the need for technical setups. Buyers can quickly access the tool for a fee, enabling low skilled threat actors to execute sophisticated campaigns. The Chatbot facilitates tasks such as exploiting development, phishing, template creation, and malware coding. Tested by researchers, it easily generated a convincing DocuSign phishing email. GhostGPT's growing popularity among cybercriminals highlights increasing interest in AI tools for illicit purposes. With thousands of views on online forums, the ClamaV team has released security updates addressing a critical vulnerability in the ole2 file parser that could cause a buffer overflow and denial of service. ClamAV, a widely used open source antivirus engine, detects malware viruses and trojans, serving as a trusted security tool for individuals and enterprises. These updates also fix an infinite loop issue in clamav's directory monitoring tool. Users are strongly encouraged to Upgrade via the ClamaV downloads page, GitHub, or Docker Hub. A survey by Hiscox reveals that less than 20% of companies who pay ransomware demands recover all their data, with 10% finding their data leaked despite payment. The 2024 Cyber Readiness Report highlights that businesses often pay ransoms to protect reputations or recover data without backups. But paying up rarely pays off. Nearly 70% of U.S. companies report increased cyberattacks, averaging 60 incidents annually. Reputational damage is significant, with 47% of businesses struggling to attract clients after an attack. HISCOX advises businesses to bolster defenses through employee training, retiring outdated technology, and maintaining consistent backups. Phishing accounts for 60% of attacks, underscoring the need for security awareness. The report warns that inadequate cybersecurity damages trust, deters partners, and attracts regulatory scrutiny, posing greater risks than bankruptcy for many firms. In an article for Wired, Steven Levy examines Donald Trump's new executive Order, which establishes the president's Department of Government Efficiency. DOGE the EO embeds DOGE into the United States Digital Services, a small, innovative tech agency that has improved government it since its Obama era inception. DOGE aims to streamline government IT systems promising significant cost savings. However, it shifts USDS collaborative approach to a more top down, musk inspired model, focusing on centralizing data and enforcing the DOGE agenda. While doge's goals, like addressing inefficiencies and hidden budgetary waste, could be transformational, its adversarial approach and political overtones raise concerns. New four person agency teams, including HR and legal personnel alongside engineers suggest a shift from building solutions to enforcing policy, potentially undermining USDS ethos of innovation. Usds, which survived previous administrations through deft navigation and bipartisan support, now faces uncertainty. Critics fear doge's disruptive structure could sunset USDS by its scheduled end in 2026, jeopardizing its legacy of impactful public Coming up after the break on our Industry Voices segment, we're joined by Joe Gillespie, senior Vice President at Booz Allen, discussing Cyber AI and Jen Easterly leaves CISA a legacy of resilience and dedication. Stay with us.
