Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Quick question. Do your end users always, and I mean always without exception, work on company owned devices and IT approved apps? I didn't think so. So my next question is how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices? 1Password has an answer to this Extended Access Management 1Password Extended Access Management helps you secure every sign in for every app on every device because it solves the problems traditional IAM and MDM can't touch. And it's now available to companies with Okta and Microsoft Entra and in beta for Google Workspace customers. Check it out@1Password.com cyberwire that's 1Password.com cyberwire Researchers uncover a large scale hacking operation tied to the infamous Shiny Hunters A Dell Power manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a US ban. Radiant Capital attributed a $50 million cryptocurrency heist to North Korea. Japanese firms report ransomware attacks affecting their US subsidiaries. WhatsApp's view once feature faces continued scrutiny. Spy loan malware targets Android users through deceptive loan apps. A major Romanian electricity distributor is investigating an ongoing ransomware attack. Contenders for top cyber roles in the next Trump administration, visit Mar A Lago in our Industry Voices segment, Jason Lamar Cobalt, Senior vice President of Product, joins us to share insights on offensive security and Google's new Quantum chip promises scaling without failing. Coming to you live from the Cybersecurity Marketing Society's Cyber Marketing Con in Philadelphia. I'm Dave Buettner and this is your Cyberwire Intel Brief Briefing. Thanks for joining us here today. It is great as always to have you with us. Cybersecurity researchers Noam Rotem and Ran Lokar have uncovered a large scale hacking operation tied to the infamous Shiny Hunters and Nemesis groups. Exploiting vulnerabilities and misconfigurations, hackers accessed sensitive data including AWS keys, source code and cryptocurrency wallets. Using tools like ff, httpx and Shodan, they automated exploits targeting millions of websites and endpoints globally. The operation traced to French speaking individuals involved selling stolen data on Telegram for hundreds of Euros. Notably, an open AWS S3 bucket used by the attackers revealed harvested data and even linked back to Sezyu Kaizen, a convicted member of Shiny Hunters. This error exposed their tools, techniques and some identities. Researchers collaborating with AWS mitigated the impact and notified affected parties. Shiny Hunters, known for breaches at major firms like AT&T and Ticketmaster and Nemesis, tied to a black market forum demonstrate the sophistication of these syndicates. A critical vulnerability in Dell Power Manager, used to manage power settings on Dell systems, allowed attackers with local access and low privileges to execute malicious code and escalate privileges. The flaw stems from improper access control, enabling unauthorized access to sensitive system functions and potential full system compromise. Rated with a CVSS score of 7.8, the vulnerability requires local access but is low in complexity and does not need user interaction. Dell has released version 3.17 to address the issue, urging users to update immediately. No workarounds exist, emphasizing the need for timely patching and robust endpoint security to mitigate risks. TikTok has requested a federal court injunction to delay a U.S. ban set for January 19th as it appeals to the U.S. supreme Court. The D.C. circuit Court upheld a law requiring TikTok to sever ties with Chinese parent ByteDance. TikTok argues the ban poses no immediate national security risk and seeks a decision by December 16th. The injunction would allow the incoming administration to reassess the case, potentially avoiding harm and Supreme Court involvement. Defi platform Radiant Capital has attributed the $50 million cryptocurrency heist from its platform on October 16 to North Korean state affiliated hackers known as Citrine Sleet, also known as UNC4736 or apple juice. The sophisticated attack bypassed advanced security measures including hardware wallets and multi signature verification, exploiting malware delivered via a spoof telegram message. Hackers use the malicious payload inlet drift to compromise developer devices, enabling authorized transactions on the Arbitrum and Binance smart chain networks. Mandiant assisted in the investigation, linking the attack to North Korea's broader strategy of targeting cryptocurrency platforms to fund state operations. Radiant, a DEFI platform enabling cross blockchain asset management, emphasized the attacker's ability to evade standard verification processes. It's now working with US Law enforcement and recovery firms to reclaim stolen funds while calling for improved device level security to mitigate future threats. Japanese firms Kurita Water Industries and Ito N recently reported ransomware attacks affecting their U.S. subsidiaries. Querita, a global leader in water treatment chemicals, revealed that its Minnesota based Qurita America was targeted on November 29th. Attackers encrypted servers and potentially leaked data belonging to customers, employees and partners. However, core systems have been restored and operations remain unaffected. Similarly, Ito N North America, part of Japan's largest green tea producer, faced a ransomware attack on December 2, impacting servers in Texas. Backup data is being used to restore operations, and investigations are ongoing. These incidents highlight the surge in ransomware targeting Japanese companies in 2024, with major firms like Fujitsu, Game Freak and nidec also affected. Meta's WhatsApp faced criticism after a vulnerability in its view once featured allowed attackers to bypass privacy protections using modified WhatsApp web clients. The feature, designed to limit media to a single view, was undermined by browser extensions that ignored its restrictions, enabling recipients to save or share content. Meta initially deployed a partial fix in September, but attackers adapted quickly. A robust server side fix in November resolved the issue by blocking Once View media access on Web clients. While effective, this fix raised concerns about metadata exposure and left vulnerabilities in modified mobile clients. Experts suggest device integrity checks, or DRM for enhanced protection. Spy loan malware is a growing threat targeting Android users through deceptive loan apps masquerading as legitimate financial tools. These apps exploit social engineering to gain access permissions and steal sensitive data, including financial information, contacts and location details. Downloaded over 8 million times, spyloan apps bypass Google Play Store's filters and target users globally, with cases reported in India, Southeast Asia, Africa and Latin America. Victims face financial exploitation, blackmail and harassment. Authorities are combating the threat, but Spyloan's global prevalence demands stronger security measures and user vigilance. Electrica Group, a major Romanian electricity distributor, is investigating an ongoing ransomware attack that has not impacted its critical SCADA systems. The company, serving over 3.8 million customers, emphasize that temporary disruptions are precautionary measures to protect infrastructure and data. Romania's Energy Ministry confirmed the attack, stating that network equipment remains unaffected. The incident follows a declassified report revealing over 85,000 cyberattacks targeting Romania's election infrastructure, highlighting the country's increasing cybersecurity challenges. Electrica is collaborating with authorities to resolve the issue. A critical flaw in open WRTs attended sys upgrade feature could have enabled attackers to distribute malicious firmware via custom builds. OpenWRT is a popular Linux based OS for routers and IoT devices, and it's had vulnerabilities involving command injection and hash truncation. Researcher Ryotac demonstrated how these flaws allowed modification of firmware artifacts. OpenWRT developers promptly addressed the issue, fixing it within hours. Although no exploitation has been detected, users are urged to update their firmware to eliminate potential risks. Brian Harrell, a seasoned veteran of the Department of Homeland Security under the Trump administration, is reportedly a leading contender for high ranking cybersecurity roles in the next administration, the Record reports. Sources familiar with the situation reveal that Harrell has been invited to Mar A Lago in the coming weeks to interview for roles such as director of the Cybersecurity and Infrastructure Security Agency and DHS Undersecretary for Strategy, Policy and plans. Harrell, who previously served as DHS Assistant Secretary for Infrastructure protection, is well regarded for his expertise in safeguarding critical infrastructure. Recorded Future News first reported his candidacy for these prominent positions. He's not the only one under consideration. Matt Hayden, former DHS Assistant Secretary for Cyber Infrastructure Risk and Resilience, and Sean Plankey, a former National Security Council Cyber Team member and acting assistant secretary at the Department of Energy's Cybersecurity office, are also being considered for potential leadership at cisa. Two sources confirmed Plankey's name in the mix for the top CISA role. The forthcoming Mar? A Lago interviews are part of broader plans to fill key positions within DHS not only in cybersecurity but also in areas such as immigration enforcement and leadership roles at the Transportation Security Administration. This diverse hiring strategy reflects the transition team's focus on securing leadership across various critical sectors. Coming up after the break, Jason Lamar, Cobalt's senior Vice President of product, joins us to share insights on offensive security and Google's new quantum chip promises scaling without failing and now a word from our sponsor, KnowBefore. It's all connected and we're not talking conspiracy theories when it comes to infosec tools, effective integrations can make or break your security stack. The same should be true for security awareness training. KnowBefore, provider of the world's largest library of security awareness training, provides a way to integrate your existing security stack tools to help you strengthen your organization's security culture. KnowBefore's security coach uses standard APIs to quickly and easily integrate with your existing security products from vendors like Microsoft, CrowdStrike and Cisco 35. Vendor integrations and Counting Security Coach analyzes your security stack alerts to identify events related to any risky security behavior from your users. Use this information to set up real time coaching campaigns targeting risky users based on those events from your network, endpoint, identity or web security vendors. Then coach your users at the moment the risky behavior occurs with contextual security tips delivered via Microsoft Teams, Slack or email. Learn more@knowbefore.com SecurityCoach that's knowbefore.com SecurityCoach and we thank KnowBe4 for sponsoring our show Identity Architects and engineers modernize your identity systems with Strata, integrate legacy apps with any idp, ensure seamless identity failover, and apply MFA with without touching app code. Strada offers robust, efficient identity management, reducing tech debt and enhancing security. Gain peace of mind and operational efficiency with Strata's comprehensive solutions. Visit Strada IO CyberWire. Share your biggest identity challenge and enjoy free AirPods Pro. Optimize your identity solutions today. Visit Strata IO CyberWire and our thanks to Strata for being a longtime friend and supporter of this podcast. In our Industry Voices segment, Jason Lamar, Cobalt's senior vice president of product, joins us to share insights on offensive security, Staying ahead of Cyber threats and It.
