Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K Nakasone addresses AI at the Munich Cybersecurity Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation German officials investigate Apple's app tracking hackers exploited security flaws in Beyond Trust CISA issues 20 new ICS advisories the new Astorock fishing kit bypasses two FA hackers waste no time exploiting a sonic wall Proof of concept vulnerability Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, discussing why preemptive defense is essential in the AI arms race and have I been pwned? Ponders whether resellers are worth The Trouble Foreign February 14, 2024 I'm Dave Bittner and this is your Cyberwire intel briefing. Well, happy Valentine's and thank you all for joining us here today at the Munich CyberSecurity conference. Former NSA Director Paul Nakasone emphasized the need for AI integration while preserving human expertise. He highlighted that future national security professionals must blend coding skills with policy knowledge. AI can enhance efficiency, but human intuition remains essential, especially in intelligence work where operators detect subtle adversarial changes that AI cannot. Nakasone stressed that the side integrating AI fastest will gain the advantage, but ethical and moral decision making will still require human judgment. Peter Kant, CEO of Enabled Intelligence, reinforced this, advocating for neurodiverse teams to refine AI. He noted that neurodiverse individuals excel at spotting AI hallucinations, biases and inconsistencies, making AI outputs more reliable. AI, Kent argued, should automate routine tasks, allowing humans to focus on critical thinking and innovation. Neurodiversity enhances AI development, improving defense applications like satellite image analysis. Ultimately, AI is a tool, but human intelligence, ethics and adaptability remain irreplaceable. New court documents reveal that Marco Elez, a 25 year old employee of the Department of Government Efficiency DOGE had write privileges to a Treasury payment system, contradicting earlier reports that he had read only access. However, his privileges were mistakenly granted for just one day before treasury officials revoked them, and there's no evidence he made unauthorized changes. The treasury implemented strict security measures, including monitoring ELEZ's activities and restricting his access to certain systems. Despite media claims that he had administrative level access, officials assert he was only able to edit data in a limited capacity. A lawsuit has been filed to block Doge employees from accessing treasury systems over security concerns. Elez resigned on February 6 following media scrutiny. While some reports suggest he altered treasury code, court documents indicate his work mainly involved helping automate payment review processes rather than making unauthorized or disruptive changes. Meanwhile, the doge.gov website has serious security flaws allowing anyone to edit its database. Two security individuals demonstrated the vulnerability by adding public messages mocking the site's lack of protection. Doge.gov was hastily launched after Musk touted Doge's transparency, but experts say it appears to be hosted on cloudflare pages rather than secure government servers. The site pulls data from an open database that's been modified by third parties. One researcher found they could alter government employment stats by accessing exposed API endpoints. The site's codebase appears to be deployed from GitHub without proper security measures. Similar issues were found with waste.gov, another DOGE affiliated site. Needless to say, the lack of cybersecurity raises major concerns. Dutch police dismantled the Z server's X host bulletproof hosting operation, taking 127 illegal servers offline. The US, UK and Australia recently sanctioned the same service for aiding cybercriminals, particularly Lockbit ransomware operators run by Russian nationals Alexander Mishin and Alexander Bolshakov. Z servers facilitated botnets, malware distribution and money laundering. The service openly advertised its tolerance for criminal activity, making it a safe haven for cybercrime. Authorities found servers hosting hacking tools from Lockbit and Conti Ransomware, two of the most damaging ransomware operations. The Amsterdam based servers allowed anonymous purchases via cryptocurrency while no arrests were made. Dutch cybercrime specialists are investigating seized equipment for further evidence. Mission and Boshakov face asset freezes and travel bans, but criminal charges have not been filed yet. Dutch police emphasize that shutting down bulletproof hosting is key to disrupting global cybercrime. Germany's competition watchdog is investigating Apple's app tracking transparency framework, alleging that the company exempts itself from the strict privacy rules it enforces on third party apps. Since 2021, iOS developers must ask for user consent before tracking activity across apps, a move that hit Facebook hard, costing it an estimated $10 billion in ad revenue. However, regulators claim Apple still tracks users within its own ecosystem, using data from the App Store, Apple ID and connected devices for personalized ads. Apple's consent prompts also appear to favor its own services by reducing user friction compared to third party apps. The German Federal Cartel Office argues this could be anti competitive self preferencing. Apple, which has appealed its regulatory designation in Germany, has yet to respond. A final court decision on its competitive status is expected on March 18. Hackers exploited security flaws in Beyond Trust, a company that helps businesses manage secure access to their systems. They used two unknown software bugs and a stolen security key to break in to Beyond Trust's network in December. A month later, the US Treasury Department was also hacked. Investigators linked this attack to Chinese state sponsored hackers known as Silk Typhoon, who stole sensitive government documents related to economic sanctions and foreign investments. Experts later discovered that the hackers also took advantage of a hidden weakness in PostgreSQL, a database tool used in many systems. This flaw allowed them to take control of Beyond Trust software remotely. Although Beyond Trust fixed one of the security issues, it didn't fully repair the database flaw. Still, their update blocked hackers from using it. CISA has since ordered agencies to secure their systems against these types of attacks. Speaking of CISA, they've issued 20 new security advisories for industrial control systems, warning about critical vulnerabilities in products from Siemens, O Ring, My, scada, Mitsubishi Electric and others. These flaws could allow hackers to disrupt operations, steal sensitive data, or gain unauthorized access. Issues range from remote code execution, authentication, bypass weak encryption, and command injection. CISA urges organizations to apply security patches, strengthen authentication and isolate vulnerable systems. A new phishing kit called Astaroth has emerged as a major cybersecurity threat, capable of bypassing two factor authentication using advanced session hijacking and real time credential interception. First seen in January of this year, it targets platforms like gmail, Yahoo, and Office365. Astaroth acts as a person in the middle, mirroring real login pages with SSL certificates to avoid detection when victims enter credentials and two FA tokens, attackers intercept session cookies allowing them to bypass authentication entirely. Sold for $2,000 on cybercrime forums, it includes real time credential capture, SSL certified phishing domains, and takedown resistant hosting. Experts warn that traditional security measures are ineffective against Astaroth's real time attacks. Enhanced cybersecurity user awareness and proactive threat detection are crucial to defending against these evolving phishing threats. Hackers are actively exploiting a high severity authentication bypass in Sonicwall firewalls after a proof of concept exploit was published. This vulnerability allows attackers to bypass multi factor authentication, access private data and disrupt VPN sessions. Sonicwall released patches in January, but as of February 7th around 4,500 devices remain unpatched. Arctic Wolf warns that cybercriminals often exploit firewall and VPN vulnerabilities for ransomware attacks, citing past incidents involving Akira. Ransomware organizations should immediately update Sonicwall firewalls or follow mitigation steps to prevent attacks. Disabling SSL VPN is recommended if patching is not possible, as the public proof of concept increases the risk of exploitation. Coming up after the break, Lawrence Pingree from Dispersive joins us to discuss why preemptive defense is essential in the AI arms race. And have I been poned ponders whether resellers are worth the trouble? Stay with us. Foreign cyber threats are evolving every second, and staying ahead is more than just a challenge, it's a necessity. That's why we're thrilled to partner with Threat Locker, the cybersecurity solution trusted by businesses worldwide. Threat Locker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. Lawrence Pingree is VP of Technical Marketing at Dispersive. I recently sat down with him to discuss why preemptive defense is essential in the AI arms race.
