Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Cyber threats are evolving every second, and staying ahead is more than just a challenge, it's a necessity. That's why we're thrilled to partner with ThreatLocker, the cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant. The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of US Citizens. Microsoft issues emergency updates to fix an active directory bug. Hackers are installing stealth backdoors on Fortigate devices. Researchers warn of a rise in dangling DNS attacks. A pair of class action lawsuits allege a major ad tech firm secretly tracks users online without consent. Google is fixing a 20 year old Chrome privacy flaw. The Tycoon 2 FA phishing as a service platform continues to evolve. My guest is Tim Starks from cyberscoop, discussing the latest from CISA and Chris Krebs and slop squatting AI totally harshes the supply chain vibe.
Tim Starks (1:55)
Foreign.
Dave Bittner (2:01)
2025 I'm Dave Bittner and this is your CyberWire Intel Briefing. Happy Monday and thanks for being with us here today. It's great to have you here. The U.S. department of the Interior has removed top cybersecurity and tech officials, including CIO Darren Ash and CISO Stan Low, following a dispute with the Department of Government Efficiency doge. The conflict centers on Doge's push, backed by President Trump and Elon Musk, to use AI to cut federal spending, which critics say bypasses key security protocols. Doge's unvetted access attempts triggered legal backlash and judicial restraining orders. The personnel shakeup, first reported by nextgov, also includes Associate Solicitor Tony Irish, who disputes claims of being fired and is pursuing administrative recourse. The Interior Department has not commented. This follows a broader trend of cybersecurity leadership removals across federal agencies, including the recent dismissal of NSA and U.S. cyber Command head General Timothy Hogg. The U.S. department of justice has launched a data security program aimed at blocking foreign adversaries from acquiring sensitive personal data of US citizens. This follows a February 2024 executive order and targets countries like China, Russia and Iran that allegedly use commercial means or national laws to access such data. The program prohibits unauthorized data transfers covering health, biometric, financial and other personal information via brokerage vendor employment or investment agreements. The DOJ warns that adversaries exploit bulk data using AI for espionage, manipulation and strategic advantage. Violators face civil and criminal penalties, including up to 20 years in prison. The program took effect April 8 with a 90 day grace period for those making good faith. Compliance efforts Microsoft has issued emergency updates to fix a bug affecting audit login policies in Active Directory Group Policy. The issue causes local policies to incorrectly show no auditing for logon and log off events even if auditing is active. This can confuse admins but doesn't affect actual event logging. The out of band updates apply to various Windows versions and are intended for enterprise environments only. Microsoft also warned of related issues, including potential Windows Server 2025 restarts and Office 2016 crashes tied to recent updates. Hackers are exploiting known Fortinet vulnerabilities to install stealth backdoors on Fortigate devices, allowing them to maintain access even after patches are applied. The attackers use symbolic links to quietly read configuration files through the SSL VPN interface, avoiding detection. Devices without SSL VPN enabled are not affected. Fortinet has responded with updates across multiple Fortaos versions, along with tools to detect and remove the backdoor and changes to the SSL VPN interface to prevent future abuse. CEO of Watchtower, Benjamin Harris warned this reflects a broader trend. Attackers now design backdoors to survive patches and resets. Fortinet urges all users to update immediately to block these persistent threats and protect their systems from ongoing exploitation. Cybersecurity researchers are warning of a rise in dangling DNS attacks where attackers exploit outdated or misconfigured DNS records to hijack organizational subdomains. These vulnerabilities often occur when companies discontinue cloud services or SaaS tools but leave behind DNS entries like CNAME records pointing to decommissioned resources. Attackers can then register the abandoned destination and serve malicious content through the legitimate domain, creating a serious supply chain risk. SentinelOne found over 1250 vulnerable subdomains in the past year, with one case showing 150 deleted AWS S3 buckets receiving over 8 million requests. These requests included software updates and VPN configurations which could have been weaponized by attackers. The real danger lies in the trust users and systems place in subdomains unknowingly connecting to attacker controlled infrastructure. To mitigate the threat, experts recommend regular DNS audits, immediate removal of stale records, and runtime security monitoring for anomalous activity. Two class action lawsuits filed in California allege that adtech firm the Trade Desk secretly tracks users online without consent violating privacy laws. The suits target the Company's Unified ID 2.0 and and AdServe tracking tools, accusing them of collecting personal data like email addresses, IPs and even health info for profiling and real time ad bidding. Plaintiffs argue the firm acts like a data broker, monetizing user data without disclosure. One case claims UID 2 circumvents privacy protections and may breach California's wiretapping laws. Legal experts say UID 2's unique methods could draw closer court scrutiny. While proving harm in such privacy cases is tough, the suits are seen as strategic and timely amid growing privacy advocacy. The Trade Desk, a $25 billion firm, has not responded to the allegations. Google is fixing a 20 year old chrome privacy flaw that allowed websites to detect users browsing history by checking if links had been previously visit. The issue stems from the visited CSS selector, which changes a link's color if a user has clicked it before. Malicious sites could exploit this to infer which sites users visited. Enabling tracking and Profiling Chrome version 136 will introduce triple key partitioning for visited links using the link URL, top level site and frame origin. This change ensures a link appears as visited only in the same site and context where it was first clicked, preventing cross site history leaks. Google chose not to eliminate the visited functionality entirely to preserve user experience and rejected a permissions based model as too vulnerable to abuse. The feature is experimental in Chrome 132135 and will be enabled by default in version 136. Other browsers offer partial protections but lack full partitioning. The tycoon 2fa phishing as a service platform has received major updates, enhancing its ability to bypass multi factor authentication and evade detection. Originally discovered in October 2023, the phishing kit now hides malicious JavaScript using invisible Unicode characters, evading manual and static analysis. It has also replaced Cloudflare Turnstile with a self hosted CAPTCHA using randomized HTML5 canvas elements to avoid reputation checks and enable better customization. Additionally, new anti debugging scripts detect and block browser automation tools like Phantom JS and Burp Suite, redirecting suspicious users to legitimate sites. Trustwave also reports a surge in phishing attacks using malicious SVG files, a tactic favored by Tycoon2FA and similar platforms. These SVGs, disguised as voicemails or logos, contain obfuscated JavaScript that redirects victims to fake Microsoft 365 login pages. Phishing resistant MFA and blocking SVG attachments at the email gateway level are our recommended defenses. SVG based fishing jumped 800% from April 2024 to March 2025. Coming up after the break, my conversation with Tim Starks from cyberscoop with the latest from CISA and Chris Krabs. And slop squatting AI totally harshes the supply chain vibe. Stay with us. Bad actors don't break in. They log in. Attackers use stolen credentials in nearly nine out of 10 data breaches. Once inside, they're after one thing, your data. Varonis AI powered data security platform secures your data at scale across las SaaS and hybrid cloud environments. Join thousands of organizations who trust Varonis to keep their data safe. Get a free data risk assessment@varonis.com it is always my pleasure to welcome back to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, welcome back. Great to be back, Tim. Your beat is Washington, D.C. and the policy issues that are going on in this great city of ours. Yes. Is that a fair description?
