Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Delete Me also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now our listeners get a special 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K foreign suffers a global service outage a major DDoS attack hits a Russian Internet provider US banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new browser in the middle attack targeting Safari users. A Florida health System pays over $800,000 to settle INS breach concerns CISA issues five urgent ICS advisories Our guest is Matt Covington, VP of Product at Black Cloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. And the Feds are putting all our Digital data in one basket. It's Friday, May 30, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Happy Friday and thanks for joining us here today. Cybersecurity firm Sentinel 1 experienced a global service outage on Thursday that disrupted its ext, a detection and response platform affecting security monitoring and updates for nearly 13,000 customers. The issue lasted about six hours, with administrators reporting problems accessing the cloud based console. Although customer endpoints remained protected, managed detection and response services were offline and threat data reporting was delayed. SentinelOne attributed the outage to an internal automation error, not a cyber attack. Most of the company's services, including Endpoint and Cloud Security, were listed as unavailable. Some admins speculated AWS or DNS issues, but evidence didn't support this. The outage interrupted Star rule based custom detections and impacted clients dependent on real time updates Sentinel One classified the incidents as SeV0, the highest severity level, and later restored service. Experts viewed the response as effective despite temporary loss of visibility and MDR functions. A major DDoS attack hit Russian Internet provider ASVT this week, knocking tens of thousands offline in Moscow and nearby areas for several days. The disruption began Tuesday and lasted Into Friday, affecting ASVT's website, mobile app and customer services. Many residents couldn't work remotely, use card payments or access buildings due to downed intercoms. ASVT blamed the Ukrainian IT army, though the group hasn't claimed responsibility. The incident follows a similar March attack on Lovett, another provider accused of monopolistic practices and now under investigation. Russia's federal anti monopoly service is also probing asvt. The broader trend reflects rising cyberattacks on Russian telecoms, often politically motivated. In 2023, over 30% of DDoS attacks in Russia targeted telecoms. Previous attacks have included data theft and infrastructure damage by groups like the Ukrainian Cyber alliance and Silent Crow. It's unclear if ASVT's enterprise or government clients were affected. US banking groups are urging the securities and Exchange Commission to scrap its cybersecurity incident disclosure rules, arguing they clash with confidential protocols meant to protect critical infrastructure. Led by the American Bankers association, five major industry groups say the SEC's Cybersecurity Risk Management rule, requiring rapid disclosure of breaches hinders law enforcement, creates confusion and disrupts incident response. They argue the rule, in effect since July 2023, has been flawed and difficult to implement. A recent breach at Coinbase underscores the danger, with attackers impersonating support staff to steal user assets. This incident amplifies fears across the financial sector about centralized data risks as crypto adoption expands. Banking and crypto sectors alike now stress the need for better cybersecurity guardrails without compromising critical operations. Australia has become the first country to mandate reporting of ransomware payments. Starting Friday. Organizations earning over $3 million Australian annually or in critical infrastructure must report any payments made to cybercriminals within 72 hours to the Australian Signals Directorate. Non compliance could lead to civil penalties. The law aims to improve visibility into ransomware attacks, which are largely underreported, with only one in five victims currently coming forward. Initially, enforcement will focus on severe violations, but stricter oversight is planned for 2025. This move follows a wave of major cyber attacks in Australia and echoes similar proposals in the uk. Critics argue that while the law may help profile attackers, it won't stop ransomware. Researchers from squarex have uncovered a new browser in the middle attack targeting Safari users by exploiting flaws in the browser's full screen API. This technique, revealed through the Year of Browser Bugs project, enables stealthy phishing by tricking users into entering full screen mode without warning. Unlike Chrome or Firefox, Safari lacks clear visual indicators when full screen mode is triggered, making it easier for attackers to disguise malicious sites as legitimate login pages. Using novnc, attackers can embed a remote session inside the victim's browser to stealing credentials undetected. Traditional endpoint detection and response tools can't see browser activity, making this attack hard to detect. Apple has acknowledged the issue but considers Safari's behavior intentional, not a bug. Experts urge enterprises to use browser native security tools as network based defenses can be bypassed. BayCare Health System in Florida has agreed to pay $800,000 and implement a corrective plan to settle a federal HIPAA investigation over a 2018 insider breach. The incident, reported by a patient at St. Joseph's Hospital in Tampa, involved unauthorized access to her printed and electronic medical records. The patient said she was later contacted by someone with photos and video of her records. Federal investigators traced the access to credentials belonging to a former non clinical staffer at a medical practice connected to BayCare. The U.S. department of Health and Human Services found multiple HIPAA violations, including inadequate access controls and failure to monitor system activity. Although BayCare admitted no wrongdoing, the case highlights the risk of insider threats and the need for continuous monitoring and auditing of access to patient data. Experts emphasize that software alone isn't enough Effective compliance requires ongoing oversight. A new malware campaign, UTG Q015, is targeting government Web servers across multiple regions, posing a threat to national infrastructure. First detected earlier this month, it uses brute force, credential stuffing and SQL injection to breach defense and municipal systems. The malware employs polymorphic code to evade detection and embeds itself via process hollowing, replacing legitimate software with malicious code. It maintains persistence through registry tweaks and scheduled tasks, enabling long term access and data theft. Agencies report backdoors and service disruptions. CISA issued five urgent advisories addressing severe vulnerabilities in critical industrial control systems used across sectors like health care, construction, maritime safety and infrastructure. Affected systems include Siemens CIPAASS access control platforms, Consilium CS5000 fire panels, Instantel micromate environmental monitors, and Santasoft medical imaging software. The flaws, ranging from firmware tampering and hard coded passwords to missing authentication and memory corruption, pose high risks of remote exploitation and system compromise. CVSS scores for these vulnerabilities range from 8.2 to 9.3, highlighting their severity. While Siemens and Santasoft have issued patches, Consilium urges hardware upgrades. CISA advises organizations to immediately apply vendor mitigations, implement network segmentation, use VPNs for remote access, and maintain up to date asset inventories. Coming up after the break, my conversation with Matt Covington from Black Cloak. We're discussing the emergence of advanced impersonation techniques like deep fakes, and the Feds are putting all our digital data in one basket. Stay with us. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic Identity Threat Protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing. To neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire compliance regulations, third party risk, and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you've ever found yourself drowning in spreadsheets, chasing down screenshots or wrangling manual processes just to keep your GRC program on track, you're not alone. But let's be clear. There is a better way. Vanta's trust management platform takes the headache out of governance, risk and compliance. It automates the essentials from internal and third party risk to consumer trust, making your security posture stronger. Yes, even helping to drive revenue. And this isn't just nice to have. According to a recent analysis from IDC, teams using Vanta saw a 129% boost in productivity. That's not a typo, that's real impact. So if you're ready to trade in chaos for clarity, check out Vanta and bring some serious efficiency to your GRC game. Vanta GRC how much easier trust can be? Get started at vanta.com cyber Matt Covington is VP of Product at Blackcloak. I recently caught up with him at the RSAC conference. In today's sponsored Industry Voices segment, we discuss the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. So Matt, here we are at RSAC 2025. Before we dig into some of the specific topics, what's your take on this year's show and any sense for the general buzz around the show floor.
