Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:11)
Think your certificate security is covered. By March 2026, TLS, certificate lifespans will be cut in half, meaning double today's renewals. And in 2029, certificates will expire every 47 days, demanding between 8 and 12 times the renewal volume. That's exponential complexity, operational workload and risk. Unless you modernize your strategy, Cyberark proven in Identity security is your partner in certificate security. Cyberark simplifies lifecycle management with visibility, automation and control at scale. Master the 47 day shift with CyberArk Scan for vulnerabilities, streamline operations, scale security visit cyberark.com 47day that's cyberark.com the numbers 47day SonicWall confirms a breach in its cloud backup platform Google patches a high severity zero day in Chrome updates on the shy Hulu worm Chinese phishing emails impersonate the chair of the House China Committee. The UK's NCA takes the reins of the Five Eyes law enforcement group. Revenge Hotels uses AI to deliver Venom RAT to Windows Systems. A major VC shares details of a recent ransomware attack. A lawsuit targets automated license plate readers. Our guest is Brock Lupton, product strategist at Maltego, discussing the human side of intelligence work and from mic check to Malware, a crypto phishing story. It's Thursday, September 18th, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief.
A (2:32)
Foreign.
B (2:38)
Thanks for joining us here today. It's great to have you with us. Sonicwall has confirmed a breach in its MySonicWall cloud backup platform. Attackers launched brute force attacks against its API service, gaining access to firewall configuration files. Those files may include network maps, VPN credentials, API keys, encrypted passwords and firewall rules. While Sonicwall says fewer than 5% of firewalls are affected, it hasn't shared exact numbers. If you use SonicWall with cloud backup, check your MySonicWall account. If your devices are flagged, you need to reset all passwords, keys and shared secrets not just on your firewall, but also with ISPs, dynamic DNS providers, VPN peers and LDAP or RADIUS servers. Sonicwall has shut down the attack vector and is working with law enforcement. Google has issued emergency patches for a high severity zero day in Chrome's V8 JavaScript engine. It's the sixth exploited zero day fixed in Chrome this year. Google confirmed the flaw has a public exploit, a strong sign of active abuse, often linked to state backed spyware campaigns targeting high risk individuals. The issue was reported by Google's Threat Analysis Group and patched within a day. Users are urged to update Chrome immediately. Yesterday we shared news of a new self replicating worm dubbed Shy Hulud that has compromised over 180 packages, including the popular ONTROL tiny color library. The malware spreads automatically by stealing developer credentials, publishing malicious code to NPM and creating GitHub repos that expose stolen secrets. Harvested data includes API keys, cloud credentials, GitHub tokens and SSH keys, potentially enabling ransomware crypto mining and cloud data theft. Analysis from Palo Alto Networks Unit 42 indicates a large language model likely helped generate the malicious bash script based on unusual comments and emojis in the code. The worm currently targets Linux and macOS systems. Developers are urged to rotate all credentials, audit dependencies, review GitHub accounts and enforce MFA immediately. This incident highlights the escalating risk of AI assisted malware and the growing speed of CI CD driven supply chain compromises across open source ecosystems. Proofpoint has uncovered a new Chinese state aligned cyber campaign targeting US Government agencies, think tanks, law firms and academics focused on trade policy. The activity is attributed to TA415, also known as APT41, Wicked Panda and Brass Typhoon. Attackers used phishing emails themed around US China economic relationships, sometimes impersonating Representative John Moulinar, Chair of the House China Committee. The emails invited recipients to closed door briefings with malicious attachments, delivering a Python loader called Whirlcoil. Instead of noisy malware, the group leaned on Visual Studio code, remote tunnels and legitimate cloud services like Google Sheets and Zoho Work Drive for persistence and command and control. The campaigns ran during summer trade negotiations, suggesting a clear intelligence gathering motive. The findings echo a recent congressional advisory about ongoing Chinese fishing operations. Together they highlight Beijing's continued push for insights into U S China economic strategy and its willingness to use stealthy, creative methods. The UK's National Crime Agency will chair the Five Eyes law enforcement group for the first time since 2015, pledging to use the alliance to disrupt cybercrime, money laundering and online child sexual abuse. The Five Eyes Law Enforcement Group, or felig, unites major policing bodies including the FBI, dea, afp, RCMP and New Zealand Police. A key target is the com, the loosely connected network of online groups spreading violent extremist and child abuse material often run by young men on gaming platforms and messaging apps. These groups are also tied to major cybercrime outfits like Scattered Spider, Shiny Hunters and Lapsus, linked to high profile data thefts and extortion campaigns against global retailers and fashion brands NCA Director Graham Bigar stressed that international cooperation is vital as criminals exploit new technologies, highlighting successes such as the Lockbit ransomware takedown as proof of what joint action can achieve. Revenge Hotels, also known as TA558, is using AI generated loader scripts plus JavaScript and PowerShell downloaders to deliver Venom Rat to Windows systems. Targets include hotel reservation and HR inboxes lured with overdue invoice or job application links that redirect to fake document portals visiting the site, auto downloads an AI crafted Wscript JS that drops a PowerShell loader, leading to Venom Rat execution. The rat hardens itself, kills debuggers and forensic tools, drops a VBS for persistence, elevates its privileges, spreads via removable media, and erases Windows event logs. Insight Partners, a major venture capital firm, disclosed more details of a 2024 ransomware attack affecting over 12,000 individuals. The breach began in October 2024 but was only detected in January of this year when attackers exfiltrated data and encrypted servers after a social engineering attack. Stolen information may include banking, tax, employee and limited partner data. Victims face risks of identity theft and are offered free protection services. Experts warn VC firms are prime targets due to their sensitive financial and portfolio data. A lawsuit in Norfolk, Virginia has revealed the extent of surveillance by Flock Safety's license plate readers. Between February and July of this year, 176 cameras tracked retired veteran Lee Schmidt 526 times. That's about four times per day and co plaintiff Crystal Arrington 849 times, averaging six logs a day. Norfolk struck a $2.2 million deal with Flock, whose ALPR network spans 5,000 police agencies, 1,000 businesses and homeowners associations nationwide. The plaintiffs, backed by the Institute for Justice, argue warrantless tracking violates the Fourth Amendment and are seeking to disable Norfolk's system. Flock, however, cites case law supporting ALPR use as public point in time photography. Civil liberties advocates warn the technology amounts to mass surveillance, with potential risks if data is shared across jurisdictions or accessed by federal agencies such as ice. Coming up after the break, my conversation with Brock Lupton, product strategist at Maltego. We're discussing the human side of intelligence work and from mic check to malware A crypto phishing story. Stick around. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at cs jhu.edu, mSSI We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed. When it comes to hiring Indeed is all you need. Stop struggling to get your job Post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus, with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. Brock Lupton is product strategist at Maltego, and in today's Sponsored Industry Voices segment, we discuss the human side of intelligence work.
