Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K laundry bear airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a GitHub MCP vulnerability. Tenable patches, critical flaws in network monitor on Windows MathWorks confirms ransomwares behind a Matlab outage. The Feds audit NVD over vulnerability backlogs. The FBI warns law firms of evolving silent ransom group tactics. Chinese hackers exploit a Cityworks flaw to breach U.S. municipal networks Everest ransomware group leaks Coca Cola employee data Nova Scotia power's been hit by ransomware on today's threat vector. David Moulton speaks with his Palo Alto Networks colleagues Tanya Shastri and Navneet Singh about a strategy for secure AI by design and the CIA's secret spy site was a Star wars fan page. It's Tuesday, May 27, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Thanks for joining us. It is great to have you with us and we hope everybody had a great long holiday weekend here in the U.S. anyway, Dutch intelligence just introduced the world to Laundry Bear, a fresh Russian threat actor with a knack for speed, stealth and stealing inboxes. The group, also tracked by Microsoft as Void Blizzard, has been linked to cyber espionage across NATO with a suspicious focus on defense contractors, aviation and Ukraine laundrie. Bear first popped up after a hack on the Dutch police in 2024 using session hijacking and credentials from the cybercriminal flea market. The Bear broke in, swiped contacts and likely hit other targets too. Despite overlapping tactics with Fancy Bear and the usual GRU suspects laundry, Bear is being treated as a distinct creature in the growing Russian menagerie. Think of it as the laundry doing cousin of Sandworm, Cozy and the rest. The Bear's tools are simple, automated and stealthy, just enough to make defenders lose sleep without ever deploying custom malware. Researchers at Invariant Labs uncovered a Critical vulnerability in GitHub's Model Context Protocol server and exposing AI coding agents to prompt injection attacks. The flaw lets attackers plant hidden commands in public GitHub issues. When users direct their AI agents to review these issues, the agents can be tricked into leaking sensitive data from private repositories. This exploit doesn't compromise the MCP tool itself, but manipulates the AI's trust in external content. One proof of concept prompted an agent to pull sensitive data like salaries and private repo info and publish it publicly, all under the guise of user feedback. The vulnerability is model agnostic and impacts the broader AI devtool ecosystem. As AI agents become central to software development, this incident shows traditional security may not be enough. Tenable has patched two high severity flaws in its network monitor tool for Windows. Discovered by researcher Will Dorman, the bugs affect versions before 6.5.1 and allow local privilege escalation and arbitrary code execution. The first flaw arises from insecure directory permissions in non default installations, enabling attackers with local access to elevate privileges. The second flaw is more severe, allowing low privileged users to plant malicious files and execute them with system rights. No admin clicks required. Tenable's latest update also upgrades several key libraries addressing broader vulnerabilities. Organizations using Tenable Network Monitor on Windows are urged to update immediately and review directory permissions. These flaws, while requiring local access provided, pose a serious threat in shared or multi user environments where the platform's privileged network monitoring role makes it a high value target. MathWorks has confirmed a ransomware attack is responsible for the week long outage that crippled Matlab, affecting millions of users. The incident began on May 18 and disrupted both internal systems and key online services, including licensing and Matlab Online, widely used in academia. Users, including frustrated students and engineers, were left in limbo with vague status updates and no clear cause until MathWorks broke its silence. Some users even resorted to pirating the software just to meet deadlines. The attack especially impacted students during exam season, with licensing servers down and access to Matlab greater stalled. Although many services are now restored, full recovery is ongoing. Commercial customers with local license servers largely avoided disruption, while educational Users who rely on cloud based access bore the brunt. MathWorks has involved federal law enforcement and is working with cybersecurity experts to finish cleanup and restore remaining services. The U.S. department of Commerce has launched an audit of the national vulnerability database to address a growing backlog of unprocessed security flaws. The backlog emerged after a key contract was terminated in early 2024, leaving vulnerabilities unexamined. The audit, led by the Office of Inspector General, aims to evaluate NIST's oversight and improve future processing. NVD leaders recently pledged to use automation and AI tools to catch up and and prevent future delays in vulnerability analysis. The FBI has issued a warning that law firms are being targeted by the Silent Ransom Group, also known as Chatty Spider, luna moth and UNC3753. Active since 2022, Silent Ransom Group previously used phishing emails posing as fake subscription alerts to lure victims into phone based scams. As of March of this year, they've pivoted to calling employees directly while posing as internal IT staff. Victims are tricked into joining remote access sessions, enabling attackers to install tools like WINSCP or RCLONE to exfiltrate sensitive data. Silent Ransom Group then demands ransom, threatening to leak data and even calling employees to pressure payment. Their use of legitimate tools makes detection difficult. While law firms are prime targets, medical and insurance organizations have also been hit. The FBI urges strong phishing awareness training, data backups and reporting of any SRG related incidents. Cisco Talos reports that a Chinese speaking threat group, UAT6382, has been exploiting a critical vulnerability in Cityworks to breach US local government networks since January of this year. Cityworks is an enterprise asset management and public asset management platform designed primarily for local governments and public works agencies. The flaw, rated CVSS 8.6, allows remote code execution. After gaining access, the attackers deploy web shells, custom malware and tools like Cobalt Strike and vshell to establish long term control. The group showed a specific interest in utility management systems. Evidence such as Chinese language code and tools like tetraloader built using the Chinese malware builder Maloader support Cisco's assessment of the group's origin and motives. The FBI urges affected organizations to update cityworks immediately and review Cisco's technical indicators to detect possible compromise. The campaign underscores the risk of software vulnerabilities in municipal infrastructure and the growing trend of financially motivated state linked cyber operations. The Everest Ransomware Group has leaked 502 megabytes of data containing sensitive information on 959 Coca Cola employees across the Middle east, including the UAE, Oman and Bahrain, posted on both their Dark Web Leak site and the XSS cybercrime forum. The files include personal data like names, addresses, passports, visas, banking details and salary records. Also leaked are internal documents mapping Coca Cola's system, admin accounts, HR roles and organizational hierarchies, critical intel for spear phishing, social engineering and further intrusions. While no passwords were exposed, the data significantly raises Coca Cola's cyber risk. Everest is known for leaking data when ransom demands are ignored. Coca Cola hasn't commented on whether negotiations occurred. Nova Scotia Power confirmed it suffered a ransomware attack traced back to March 19th of this year, although it was only detected on April 25th. The breach disrupted key IT systems like billing payments and customer portals, but not electricity supply. About 280,000 customers had sensitive data stolen and leaked online after the utility refused to pay ransom, citing sanctions, compliance and law enforcement advice. Stolen data includes names, contact info, addresses, social insurance and driver's license numbers, and bank details for autopay users. The company is offering free credit monitoring and has brought in cybersecurity experts to restore systems and strengthen defenses. Coming up after the break on today's Threat Vector, David Moulton speaks with his Palo Alto Networks colleagues Tanya Shastry and Navneet Singh about a strategy for secure AI by design and the CIA's secret spy site was a Star wars fan page. Stay with us. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic Identity Threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire compliance regulations, third party risk and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you've ever found yourself drowning in spreadsheets, chasing down screenshots or wrangling manual processes just to keep your GRC program on track. You're not alone, but let's be clear, there is a better way. Vanta's trust management platform takes the headache out of governance, risk and compliance. It automates the essentials from internal and third party risk to consumer trust, making your security posture stronger yes, even helping to drive revenue. And this isn't just nice to have. According to a recent analysis from IDC, teams using Vanta saw a 129% boost in productivity. That's not a typo, that's real impact. So if you're ready to trade in chaos for clarity, check out Vanta and bring some serious efficiency to your GRC game. Vanta GRC how much easier trust can be? Get started@vanta.com cyber on today's threat Vector segment, David Moulton speaks with his Palo Alto Networks colleagues Tanya Shastry and Navneet Singh about a strategy for secure AI by design.
