Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
John Focker (0:12)
Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your Delete Me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K Apple releases emergency security updates to patch a zero day vulnerability CISA places election security workers on leave. Elon Musk leads a group of investors making an unsolicited bid to require open AI. The man accused of hacking the SEC's ex Twitter account pleads guilty. Law enforcement seizes the leak site of the eight base ransomware gang. Researchers track a massive increase in brute force attacks targeting edge devices. Experts question the UK government's demand for an encryption backdoor on Apple's devices. Today's guest is John Focker, head of Threat Intelligence at Trellix, joining us to discuss their work. Blurring the how nation states and organized cybercriminals are becoming alike and it's International Day for Women and girls in SC. It's Tuesday, February 11, 2025. I'm Dave Bittner and this is your Cyberwire Intel Brief. Thanks for joining us here today. It's great to have you with us. Apple has released emergency security updates to patch a zero day vulnerability that was exploited in highly sophisticated targeted attacks. The flaw reported by Citizen Lab's Bill Markzak affects USB Restricted Mode, a security feature designed to block unauthorized data extraction from locked iPhones and iPads. Attackers could bypass this protection through a physical exploit, potentially using forensic tools like Gray Key or cellebrite. Apple addressed the issue with improved state management. The vulnerability affects various iPhone and iPad models, including iPhone Xs and later, though the attack was limited to specific targets. Users are urged to Update immediately. The U.S. cybersecurity and Infrastructure Security Agency has placed 17 staffers on administrative leave, raising concerns about election security support. These employees, including 10 regional election security specialists, provided cybersecurity and physical security training to state and local election officials. The internal review reportedly examines efforts to counter foreign interference and misinformation. Both Republican and Democratic election officials have defended CISA's work, highlighting its crucial role in securing elections. The move comes amid political pressure, with Trump administration figures criticizing CISA's past efforts to counter misinformation. The agency remains without a permanent director, and its leadership was absent from recent election security meetings. Despite the suspensions, CISA has assured states that cybersecurity and physical security services will continue to be available. Elon Musk and a group of investors have made a $97.4 billion unsolicited bid to acquire OpenAI, escalating Musk's ongoing feud with CEO Sam Altman. Altman dismissed the offer on X Twitter, jokingly offering to buy Twitter for $9.74 billion, to which Musk responded. Swindler Musk's consortium, which includes Baron Capital and Valor Management, seeks to restore OpenAI's original open source mission. Musk argues that OpenAI has strayed from its founding principles, while his own XAI follows the values he was promised. The bid complicates Altman's efforts to take OpenAI private, as the for profit arm must fairly value the nonprofit's assets. Musk also urged California's Attorney General to open competitive bidding. Musk Co founded OpenAI in 2015 but left in 2018. His ongoing legal battles against OpenAI focus on its shift toward profit driven AI. In other OpenAI news, a hacker named Emmerking claimed on breach forums to be selling 20 million OpenAI credentials, but experts believe the data originates from InfoStealer malware, not an OpenAI breach. OpenAI says they investigated and found no evidence of a compromise. Threat intelligence firm Keela analyzed the data and confirmed it matches infostealer logs likely collected from malware like Redline, Rise Pro and Vidar. The hacker's post was later deleted, reinforcing suspicions that the claim was exaggerated. Breach Forums is known for hosting misleading data breach claims. Eric Council Jr. Age 25, pleaded guilty to conspiracy to commit identity theft and fraud after hacking the US securities and Exchange Commission's ex Twitter account in January of last year. His actions caused wild swings in Bitcoin's price by falsely announcing SEC approval of crypto based ETFs. He faces a maximum sentence of five years, with sentencing set for May 16th. Mr. Counsel used SIM swapping techniques to take over the SEC account, posing as an FBI employee to obtain a victim's phone number. He then used it to reset security codes and hijack the SEC Gov account. Prosecutors say he was paid in Bitcoin for the hack, which aimed to manipulate the crypto market. Law enforcement agencies seized the Leak site of the 8base ransomware gang, replacing it with a takedown notice. The action coincided with the arrest of four suspects in Thailand accused of stealing $16 million from over 1,000 victims worldwide. Authorities from Switzerland and the US had issued warrants for the suspects, two men and two women who now face wire fraud and conspiracy charges. Europol, the FBI, and other agencies supported the operation, named Phobos. Ator8base emerged in 2023, targeting manufacturing firms and entities like the United Nations Development Program. It has ties to Ransom House and Phobos Ransomware. The takedown follows similar law enforcement crackdowns on ransomware groups like Lockbit and Blackcat, contributing to a 35% drop in ransom payments in 2024. Security researchers have observed a massive increase in brute force attacks targeting edge devices, often launched from malware infected routers and firewalls. The Shadow Server foundation reports that 2.8 million unique IP addresses daily have been used in these attacks, with the highest concentrations coming from Brazil, Turkey, Russia and Argentina. The attacks primarily target devices from Palo Alto Networks, Ivanti, and sonicwall, with over 100,000 Microtik devices implicated. The cause of these infections remains unclear, though some speculate malware may be bundled with popular software. In Brazil, hackers, including state sponsored groups like China's Salt Typhoon, often exploit unpatched vulnerabilities in edge devices. The surge highlights ongoing cybersecurity risks for firewalls, VPN gateways, and email security appliances, which remain prime targets for cyberattacks. A Wall Street Journal editorial from Johns Hopkins cryptographer Matthew Green and Sentinel 1 CISO Alex Stamos warns that the UK government's demand for an encryption backdoor in Apple's devices poses a grave risk to global security. The order would allow British authorities to access any iPhone user's private data worldwide, setting a dangerous precedent that could weaken security for billions. The editorial argues that Congress must act immediately to prohibit US tech companies from complying with such demands, creating a legal conflict that Apple could fight in UK courts. The authors highlight the growing cyber threats from Russia and China, pointing to recent hacks targeting US Telecoms, the Treasury, and political figures. Even the FBI now supports encryption to protect Americans from cyber threats. If Britain succeeds, China and other nations will surely follow, undermining security for all. The editorial urges lawmakers to ensure strong encryption remains unbreakable by any foreign government, safeguarding American privacy and national security. Coming up after the break, my conversation with John Focker from Trellix. We're discussing their work blurring the lines how nation states and organized cyber criminals are becoming alike and celebrating International Day for Women and Girls in Science. Stay with us. Foreign cyber threats are evolving every second, and staying ahead is more than just a challenge, it's a necessity. That's why we're thrilled to partner with Threat Locker, the cybersecurity solution trusted by businesses worldwide. Threat Locker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. More than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. John Focker is head of threat intelligence at Trellix. I recently sat down with him to discuss their work Blurring the lines how nation states and organized cyber criminals are becoming alike.
