Transcript
Alice Carruth (0:02)
You're listening to the Cyberwire network. Powered by N2K.
Dave Bittner (0:14)
The DMV has established itself as a top tier player in the global cyber industry. DMV Rising is the premier event for cyber leaders and innovators to engage in meaningful discussions and celebrate the innovation happening in and around the Washington D.C. area. Join us on Thursday, September 18th to connect with the leading minds shaping our field and experience firsthand why the Washington D.C. region is the beating heart of cyber innovation. Visit DMVRising.com to secure your spot. Think your certificate security is covered by March 2026 TLS, certificate lifespans will be cut in half, meaning double today' renewals. And in 2029, certificates will expire every 47 days, demanding between 8 and 12 times the renewal volume. That's exponential complexity, operational workload and risk. Unless you modernize your strategy, Cyberark proven in identity security is your partner in certificate security. Cyberark simplifies lifecycle management with visibility, automation and control at scale. Master the 47 day shift with CyberArk Scan for vulnerabilities, streamline operations, scale security visit cyberark.com 47day that's cyberark.com the numbers 47day hackers disrupt a cyber campaign by Russia's Midnight Blizzard the sales loft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the Tamperchef Infosteeler. A hacker finds crash data Tesla claimed not to have Spain cancels a 10 million euro contract with Huawei. A fraudster bilks Baltimore for over $1.5 million. We got a breakdown of the latest business news in our Threat Vector segment. Michael Sikorsky and guest Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. And we preview our spicy new episode of Only Malware in the building. It's Tuesday, September 2, 2020. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Researchers at Amazon have disrupted a cyber campaign by Midnight Blizzard and a Russian state backed group tied to the svr. The hackers compromised legitimate websites in a watering hole attack, redirecting about 10% of visitors to fake Cloudflare verification pages. From there, victims were funneled into a malicious Microsoft device code authentication flow, tricking them into authorizing attacker controlled devices. Amazon's Threat Intelligence team uncovered the scheme, noting the attackers used randomization cookies and basic obfuscated JavaScript to avoid detection. Working with Microsoft and Cloudflare. Amazon cut off the group's domains and infrastructure. APT29 quickly tried to rebuild on new cloud services, highlighting its persistence. The campaign reflects a shift away from MFA bypass tactics towards stealthier credential theft. Users are urged to enforce MFA monitor logins and review device authorization policies. Hackers have stolen authentication tokens from SalesLoft's Drift chatbot, exposing not just Salesforce data but hundreds of other connected services, including Slack, Google Workspace, AWS, Azure and OpenAI. Google's Threat Intelligence Group warned the campaign, active from August 8th through the 18th, allowed attackers to siphon corporate Salesforce data, search for cloud credentials and even access some Google Workspace email accounts. The attackers tracked as UNC 6395 may overlap with extortion groups like Shiny Hunters or Scattered Spider, though attribution remains unclear. Google advised companies to treat all Salesloft linked integrations as compromised and invalidate tokens immediately. In response, Salesforce blocked Drift integrations. Salesloft has enlisted Mandiant to investigate the breach, which highlights the growing risk of authorization sprawl attackers abusing legitimate tokens instead of malware. The Salesloft Drift breach continues to ripple outward following Google's warning about stolen OAuth tokens being used to access Salesforce and other cloud services. Zscaler confirmed that attackers obtained limited access to its Salesforce data. The exposed details include employee contact information, product licensing data and some plain text support case content, but no sensitive files or infrastructure were affected. Zscaler revoked Drift access, rotated tokens and tightened customer authentication. The company urges vigilance against phishing attempts exploiting leaked contact details. WhatsApp has patched a critical flaw in its iOS and Mac apps, which was exploited in a zero click spyware campaign used with a separate Apple vulnerability. The attack allowed hackers to compromise devices and steal data, including private messages, without user interaction. Amnesty International reports fewer than 200 WhatsApp users were targeted since late May. Meta confirmed the bugs were fixed weeks ago but offered no attribution, leaving the responsible spyware vendor or group unidentified. Researchers have uncovered a large scale malware campaign distributing a fake PDF editing tool called App Suite PDF Editor through Google Ads. The app, signed with fraudulent certificates from at least four companies, initially appeared legitimate but received a malicious update on August 21, activating the Tampered Chef infostealer. The malware steals credentials, browser cookies and system data while checking for security tools. Over 50 domains hosted these deceptive apps, suggesting a coordinated effort. Some variants also attempted to enroll devices into residential proxy networks. Further monetizing victims. Trusec and Expel found the campaign began in mid-2024 and includes related apps like OneStart and Manual Finder, which download each other and execute hidden commands. Though some certificates were revoked, users with active installations remain at risk. A Miami jury has ordered Tesla to pay $243 million in damages over a 2019 crash in Florida after critical autopilot data initially missing was uncovered by a hacker known as Green the only the hacker extracted a collision snapshot from the car's autopilot unit, revealing what Tesla's system detected in the moments before the fatal crash. Tesla later admitted it had the data on its servers but failed to produce it. Jurors found Tesla 33% liable, concluding its technology and handling of crash data contributed to the tragedy. The verdict marks a major setback for Tesla's Autopilot defense strategy, raising questions about transparency in crash investigations, and has already fueled shareholder and wrongful death lawsuits nationwide. Tesla says it will appeal. Spain has canceled a 10 million euro contract that would have deployed Huawei equipment in its Red Iris academic and research network, which links universities, research centers and parts of the Defense Ministry. The government cited digital strategy and strategic autonomy in reversing the deal awarded to Telefonica just a week earlier. The move follows growing concerns from NATO allies about Chinese technology and critical infrastructure. While Huawei faces restrictions across Europe, Spain has maintained a case by case approach, creating friction with allies over security risks. The city of Baltimore lost more than $1.5 million after a fraudster spoofed a vendor and tricked employees into changing bank account details, the city's inspector general reported. Using a fake supplier contact form in December 2024, the scammer gained access to the vendor's workday account and submitted multiple account change requests, which were approved without verification. Payments of $800,000 and $721,000 followed. Only the latter was recovered. This marks Baltimore's third vendor scam since 2019, highlighting persistent weaknesses in financial controls despite prior promised reforms. We've got a new segment here for you today. Each week we're going to surface the biggest stories from across the cybersecurity business landscape in our weekly Business Briefing newsletter. We bring you the highlights here on the Cyberwire Daily. In our business breakdown last week, we saw just over $500 million raised across three investments and three acquisitions. First, a look at investments and exits. California headquartered SASE provider Netscope has filed for an IPO and will go public on the Nasdaq as ntsk. Netscope hasn't disclosed the price of its stock, but Reuters reports that the IPO is expected to raise more than $500 million, which could value the company at over? 5 billion. While still not profitable, the company has increased its ARR by 33% year over year to just over $700 million. InnerWorks, a UK fraud prevention firm, raised $4 million in seed funding, which it plans to use to improve its defenses against AI cybercrime and expand its platform. Turning to acquisitions, one of the standouts was Canadian quantum secure infrastructure firm Scope Technologies, acquiring Indian SSO provider Cloud Codes from Pluraloc for $1.7 million Canadian. With this acquisition, Scope Technologies aims to deploy the world's first commercial quantum resistant SSO platform. Also making headlines, Cryptic Vector, a US Government contractor, is acquiring the offensive cyber R and D firm Caesar Creek Software. The acquisition aims to improve Cryptic Vector's position as one of the largest offensive cyber solution providers and better support the dod. And that wraps up this week's business breakdown. For deeper analysis on major business moves shaping the cybersecurity landscape, subscribe to N2K Pro and check out TheCyberWire.com every Wednesday for the latest business updates. Coming up after the break in our Threat Vector segment, Michael Sikorsky and Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. And we preview our spicy new episode of Only Malware in the Building. Stick around at Talas. They know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Talas. T H A L E S. Learn more@thalesgroup.com cyber and now a word from our sponsor, ThreatLocker, the powerful Zero Trust Enterprise solution that stops ransomware in its tracks. Allowlisting is a deny by default software that makes application control simple and fast. Ring Fencing is an application containment strategy ensuring apps can only access the files, registry keys, network resources and other applications they truly need to function. Shut out cybercriminals with world class endpoint protection from Threat Locker. On today's Threat Vector segment, Michael Sikorsky and guest Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense.
