Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:11)
AI adoption is exploding and security teams are under pressure to keep up. That's why the industry is coming together at the Data SEC AI Conference, the premier event for cybersecurity, data and AI leaders. Hosted by data security leader ciara. Built for the industry, by the industry, this two day conference conference is where real world insights and bold solutions take center stage. Datasec AI25 is happening November 12th and 13th in Dallas. There's no cost to attend, just bring your perspective and join the conversation. Register now@datasecai2025.com CyberWire British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high severity vulnerabilities in Super Micro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple large scale automated email phishing campaigns. Librezva issues an emergency patch for its email security gateway. Our guest next is Jason Clark, Chief Strategy Officer at Ciera. Tackling the security threat of agentic AI and robocars get misdirected by mirrors it's Wednesday, September 24, 2025. I'm Dave Buettner and this is your CYBERW Intel Briefing. Thanks for joining us. It is great to have you with us. British authorities arrested a man in connection with a ransomware attack on Collins Aerospace, a subsidiary of RTX that disrupted airport check in systems and caused widespread travel delays across Europe. The national crime agency said the suspect was detained under the Computer Misuse act and released on conditional bail, adding the investigation remains in its early stages. No group has yet claimed responsibility and monitoring sites have not detected related leaks on the dark web. Meanwhile, the UK government says a new artificial intelligence tool has helped recover nearly 500 million pounds in fraud over the past year, the largest amount ever reclaimed by anti fraud teams. About 186 million pounds of that total was linked to COVID 19 schemes, including fraudulent bounce back loans. The fraud risk assessment accelerator developed by the Cabinet Office cross references departmental data and scans policies for weaknesses before they can be exploited. Officials plan to license the tool internationally with interest from the us, Canada, Australia and New Zealand. Ministers say the recovered funds will support frontline services, but critics warn of risks around bias and civil liberties. Campaign groups have previously accused government fraud detection AI of unfairly targeting vulnerable groups groups CISA disclosed that attackers breached a US Federal civilian executive branch agency last year by exploiting an unpatched geoserver flaw. The remote code execution bug patched in June 2024 was later added to CISA's known exploited vulnerabilities catalog after proof of concept exploits emerged. Online Shadow Server observed active attacks beginning July 9th with threat actors compromising two agenc servers. Within weeks. They deployed web shells like China Chopper, used brute force to steal passwords, and escalated privileges through compromised service accounts. The intruders went undetected for three weeks until an endpoint detection tool flagged suspicious activity. CISA urged agencies to prioritize patching closely, monitor alerts and strengthen incident response. Researchers have uncovered two high severity vulnerabilities in Super Micro Server motherboards that let attackers install malicious firmware which runs before the operating system, making infections extremely persistent and hard to remove, security firm Binarly says One flaw stems from an incomplete January patch for an earlier issue, and a second critical bug was also found. The weaknesses target Baseboard management controllers, or BMCs, which can reflash UEFI firmware stored in a soldered SPI chip. Exploits let attackers replace signed firmware images without tripping verification, and they could be deployed after gaining BMC admin access or via compromised update servers. This matters because implanted firmware survives OS reinstalls and hard drive replacement. That persistence can enable long term espionage, data destruction or control of servers, including those in AI data centers. Defenders should prioritize verified BMC firmware updates, audit update servers and assume firmware integrity may be at risk. Boyd Gaming Corporation confirmed hackers accessed its internal systems, stealing employee data and information tied to some individuals. The Las Vegas based operator stressed that hotel and casino operations were not disrupted. In a filing with the U.S. securities and Exchange Commission, Boyd said it had notified affected parties, regulators and law enforcement. The company engaged external cybersecurity experts, activated insurance coverage and stated it does not expect a material financial impact. Boyd operates 11 casinos in Las Vegas and additional sites nationwide. Analysts at Barracuda tracked multiple large scale automated email phishing campaigns abusing OAuth flows, cloud platforms and popular online tools. Kits such as Tycoon and Evil proxy exploit Microsoft OAuth to steal tokens, bypass Multi Factor authentication and register malicious apps that request broad scopes. Attackers also host phishing pages on serverless platforms, website builders and productivity tools, notably Logokit and weaponize trusted services like Google Translate to mask malicious domains. Other Campaigns target Twilio's SendGrid accounts to send authenticated phishing and abuse Google Classroom and Meet to funnel victims to WhatsApp scams. Barracuda urges organizations to restrict trusted redirect URLs limit OAuth scopes, validate short lived tokens, enforce explicit account selection, monitor logs for anomalies, and train users and developers to spot these evolving phishing as a service threats elsewhere For Scouts, Videre Labs reports a surge in phishing that pairs Telegram bots with front end hosting platforms, enabling rapid, low cost reputation shielded campaigns. Researchers analyzed 9,100 domains between April 2020 and August of this year. Generic TLDS dominated with.com, app and.dev Prominent hosting was clustered on servers from Cloudflarenet Fastly and Amazon. Attackers automate site, spin up, embed bot tokens and reuse them across domains, enabling easy clustering campaigns, spoof banks, webmail and enterprise tools and often target meta admins and cryptocurrency users. FHP abuse rose steadily since 2021 with recent shifts toward surge. It's significant because trusted provider domains help phishing bypass filters at scale. Defenders should control Telegram bot API traffic, monitor FHP access, apply DNS policies, enforce mfa, detect risky sign ins, and accelerate takedowns using exposed tokens. A large phishing campaign abused GitHub's notification system to target developers with cryptocurrency draining malware disguised as y Combinator Winter 2026 invitations. Attackers created hundreds of fake issues in repositories tagging usernames, so GitHub's automated emails delivered the lure directly to inboxes. Victims were urged to apply for $15 million in YC funding via a fake site using a misspelled domain. The site ran obfuscated JavaScript that tricked users into verifying wallets, which instead authorized malicious withdrawals. Reports to GitHub, IC3 and Google safe browsing prompted takedowns, though it remains unclear if assets were stolen. Experts advise any developers who connected wallets to migrate funds immediately. The real YC application portal is hosted by Y Combinator and closes November 10th. Librezva issued an emergency patch for its email security gateway after detecting active exploitation of a command injection flawless. The medium severity bug triggered by malicious compressed attachments allowed arbitrary command execution from non privileged accounts. At least one attack attributed to a suspected state actor has been confirmed. The vulnerability affects ESG versions 4.5 and later, with fixes deployed automatically across cloud and on premise systems. Librezva released the update within 17 hours, adding improved sanitation, compromise, scanning and self assessment. Investment checks Coming up after the break, my conversation with Jason Clark from Sierra we're tackling the security threat of agentic AI and robocars get misdirected by mirrors. Stay with us Foreign.
