Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Unknown Sponsor Voice (0:14)
The IT world used to be simpler. You only had to secure and manage environments that you controlled. Then came new technologies and new ways to work. Now employees, apps and networks are everywhere. This means poor visibility, security gaps and added risk. That's why Cloudflare created the first ever connectivity cloud. Visit cloudflare.com to protect your business everywhere you do business.
Dave Bittner (0:54)
The US sanctions Russian and Iranian groups over election misinformation Apple settles a class action lawsuit over Siri privacy allegations Double clickjacking exploits a timing vulnerability in browser behavior Fire scam targets sensitive info on Android devices. ASUS issues a critical security advisory for several router models A former crypto boss faces extradition amidst allegations of defrauding investors out of more than $40 billion. HHS unveils proposed updates to HIPAA. Millions of email servers have yet to enable encryption. Our guest is Joe Saunders, co founder and CEO of Run Safe Security, discussing the complexities of SAF critical infrastructure and using DOOM to prove you're human. It's Friday, January 3rd, 2025. I'm Dave Bittner and this is your Cyberwire Intel Brief. Thanks for joining us here today and happy Friday. It is great to have you with us. The United States has sanctioned two groups tied to Iranian and Russian disinformation campaigns targeting American voters. The treasury accused these organizations of spreading fake videos, news and social media posts to deepen divisions and undermine trust in US Elections. The Moscow based Center for Geopolitical Expertise used AI to create deepfake videos and fake news websites. Its director allegedly collaborated with Russian military intelligence to support cyberattacks. Iran's Cognitive Design Production center, linked to the Revolutionary guard, has incited U.S. political tensions since 2023 and targeted officials with cyber attacks. U.S. intelligence also blames Iran for promoting protests related to Israel's conflict with Hamas. Both nations denied the allegations. U.S. officials say Russia aimed to bolster Trump while Iran opposed him due to policies like reimposing sanctions and the killing of Iranian general Qassem Soleimani. The broader effort included actions by China to undermine US democracy. Apple has agreed to a $95 million settlement in a class action lawsuit claiming Siri violated user privacy. The lawsuit alleged Siri unintentionally activated recorded and shared private communications without user consent. Eligible US residents who owned Siri enabled devices between September 17, 2014 and December 31, 2024, can file claims for pro rata payments capped at $20 per device. Devices include iPhones, iPads, Apple watches, Macs and HomePods plaintiffs accused Apple of violating privacy and consumer protection laws. Apple denied wrongdoing but settled after five years of litigation. The settlement covers 10 to 15% of estimated damages, with attorney fees up to 30% of the fund. The preliminary settlement was filed in federal court in Oakland, California. Notifications will go to affected Siri device owners, as the class size is expected to be substantial. It's worth noting that no definitive proof has emerged from reputable cybersecurity researchers or investigations that Apple intentionally uses Siri to listen to conversations and then sells that data to advertisers. Apple's privacy policies explicitly state that it does not sell user data, including Siri recordings, to third parties. Meanwhile, security researchers have discovered sysbumps, a novel attack targeting macOS systems on Apple silicon processors. The attack exploits speculative execution vulnerabilities in system calls to bypass kernel address space layout randomization, a key security feature. The research, led by a team from Korea University, demonstrates how sysbumps leverages speculative execution and translation lookaside buffer side channel analysis to infer kernel memory layouts. Using a prime probe technique, attackers identify valid kernel addresses with 96% accuracy, exposing systems to further exploitation. The attack highlights challenges in securing modern processors, particularly Apple's ARM based M series chips. While no immediate fixes exist, the researchers proposed mitigation strategies and responsibly disclosed their findings to Apple. Users are advised to update their systems as patches become available. Hackers are exploiting a timing vulnerability in browser behavior with a technique called double clickjacking, a sophisticated evolution of clickjacking attacks. Security researcher Paulos Yebelo identified this method, which manipulates the delay between two mouse clicks to trick users into authorizing sensitive actions such as granting OAuth permissions, enabling account takeovers, or confirming transactions. Double clickjacking bypasses modern browser protections like same site cookies and X frame options by exploiting the moused down and click event sequence. The attack starts with a deceptive browser window such as a captcha prompt, which closes after the first click, revealing a sensitive action like an authorization form. The second click, intended for the initial prompt, unwittingly triggers malicious actions. Yabello demonstrated the technique on major platforms like Salesforce, Slack, and Shopify. He proposed defenses including client side JavaScript, disabling critical buttons until intentional interaction is detected and introducing a double click protection. HTTP header platforms like Dropbox and GitHub have already adopted these mitigations. A new threat has emerged in the Android ecosystem, a stealthy malware known as Firescam, capable of harvesting sensitive information and monitoring user activities, according to research from Ciferma. Disguised as Telegram Premium, Fyrescam spreads through a phishing website imitating the Roostore app Store hosted on a GitHub IE domain. Once downloaded, FhirsCam's installer gains control over the device by requesting extensive permissions. It lists installed apps, modifies storage, and prevents updates from other sources, ensuring its persistence. The malware tricks users into granting unrestricted background operation, further solidifying its grip on the system. Fhir Scam doesn't stop at merely existing it actively observes it fingerprints devices, monitors applications, and registers a backdoor using Firebase cloud messaging, enabling remote commands. It tracks interactions, intercepts USSD communications, and exfiltrates data to a fire based database. By exploiting legitimate services and phishing tactics, Fire Scam showcases a chilling capacity to compromise privacy and security, highlighting the need for vigilance against evolving cyber threats. ASUS has issued a critical security advisory for several router models, highlighting vulnerabilities in multiple firmware versions. These flaws could allow authenticated attackers to execute arbitrary commands via the AI cloud feature, potentially compromising network security. ASUS has released firmware updates and urges users to update immediately. To enhance security, the company advises using strong unique passwords and disabling Internet accessible services on older routers. Do Hyung Kwon, the co founder and former CEO of a cryptocurrency firm, has been extradited to the US From Montenegro to face fraud charges. Appearing in a Manhattan court, Kwon, 33, is accused of defrauding investors in TerraForm cryptocurrencies between 2018 and 2022, leading to losses exceeding $40 billion, according to the Department of Justice. Kwon allegedly misrepresented Terraform's stability and success, inflating the value of its cryptocurrencies. He claimed the Terra protocol maintained a stablecoin's dollar peg, exaggerating the independence of the Luna foundation guard and fabricated partnerships, including with payment processor Kai. Despite early efforts to mask issues, a collapse in 2022 exposed systemic vulnerabilities, causing massive losses. Kwon faces charges of commodities and securities fraud, wire fraud and money laundering, with a potential 130 year prison sentence if convicted. The US Department of Health and Human Services today unveiled a proposed overhaul of the HIPAA security rule, the first major Update in over 20 years. The revisions aim to shift from a flexible, process oriented approach to to more prescriptive requirements, including mandatory encryption, multi factor authentication and vulnerability scanning every six months. Key proposals include annual technology, asset inventories, network mapping and a requirement to restore critical systems within 72 hours. Additionally, business associates must verify compliance with technical safeguards annually. Critics argue the 72 hour restoration mandate is unrealistic and could increase risks if systems are restored prematurely. The update responds to surging healthcare data breaches, with incidents increasing 102% between 2018 and 2023. Compliance costs are estimated at $9 billion in the first year and $6 billion annually thereafter, raising concerns about the financial strain on small and rural healthcare providers. Public comments on the rule are open until March. Millions of email servers worldwide are sitting exposed, vulnerable to network sniffing attacks. According to Shadow server, over 3.3 million IMAP and POP3 email servers lack TLS encryption, leaving sensitive email data, including usernames and passwords transmitted in plain text. IMAP, often used for accessing email across multiple devices, and POP3, which downloads emails to a single device, rely on TLS to protect data during transmission. Without it, these servers become easy targets for attackers. Shadow Server has alerted mail server operators, urging them to enable TLS encryption or reassess the necessity of exposed services. Despite modern TLS 1.3 being introduced in 2018 and outdated versions retired by major tech companies in 2020, many servers remain unsecured. The NSA has also warned that outdated configurations allow attackers to intercept and manipulate traffic. The message is clear. Without secure protocols, sensitive data is at significant risk. Coming up after the break, my conversation with Joe Saunders from Run Safe Security. We're discussing the complexities of safeguarding critical infrastructure and using DOOM to prove you're human. Stay with us.
