Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network.
David Weissman (0:04)
Powered by N2K.
Dave Bittner (0:11)
Cyber threats are more sophisticated than ever. Passwords. They're outdated and can be cracked in a minute. Cybercriminals are intercepting SMS codes and bypassing authentication apps. While businesses invest in network security, they often overlook the front door. The login Yubico believes the future is passwordless. Yubikeys offer unparalleled protection against phishing for individuals, SMBs, and enterprises. They deliver a fast, frictionless experience that users love. Yubico is offering N2K followers a limited buy one, get one offer. Visit yubico.com N2K to unlock this deal. That's Yubico. Say no to modern cyber threats. Upgrade your security Today Veeam patches a critical vulnerability in its backup and replication software A spyware data breach highlights ongoing risks Clearview AI attempted to purchase sensitive data such as Social Security numbers and mugshots. The Netherlands Parliament looks to reduce reliance on US Software firms. The Pennsylvania Union notif over half a million individuals of a data breach. Researchers discover a ransom Hub affiliate deploying a new custom backdoor called Betruger. A new info stealer spreads through game cheats and cracks. Our guest is David Weissman, vice president of secure communications at BlackBerry, joining us to explore how organizations can effectively implement CISA's encrypted communications guidelines and what to do when AI casually accuses you of murder. It's Thursday, March 20, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It is great to have you with us. Veeam has released patches for a critical vulnerability with a CVSS score of 9.9 in its backup and replication software that allows remote code execution by authenticated users. The flaw is rooted in improper deserialization handling. The company urges users to update to the latest version. Cybersecurity firm Watchtower, which reported the issue, notes that Veeam's reliance on a blocklist for deserialization has led to recurring security gaps. The flaw is linked to prior RCE vulnerabilities, which have been exploited in ransomware attacks. While authentication is required for exploitation, Watchtower warns, it is weak. The firm also identified additional vulnerabilities, highlighting ongoing risks. Users should patch immediately to mitigate potential threats. Ron Deibert, founder of the Citizen Lab, has led investigations into global spyware abuses. His new book, Chasing Shadows, details the rise of commercial surveillance and efforts to detect it. In an interview with Recorded Futures, the Record, Deibert explains how his team uncovers spyware by scanning network infrastructure and analyzing infected devices. He warns that spyware firms evolve to evade detection and that many threats remain undiscovered. Deibert discusses Citizen Lab's findings on Pegasus software, including its use against Saudi journalist Jamal Khashoggi's associates. He criticizes Western inaction on spyware regulation and private equity's investment in surveillance firms. Deibert also warns that authoritarian and democratic governments alike misuse spyware while detection methods improve, adversaries adapt. He stresses the need for regulation to curb abuses as self policing by spyware companies is insufficient. Speaking of which, consumer spyware operation Spy X suffered a data breach in June of last year, exposing nearly 2 million accounts, including thousands of Apple users. The breach, unreported until now, highlights the persistent risks of consumer grade spyware. Spy X and its clones M Safely and Spyphone operate on Android and iOS, often using iCloud credentials to monitor victims. Security expert Troy Hunt confirmed 17,000 plain text Apple account credentials in the leaked data, validating their authenticity. Google removed a related Chrome extension citing spyware violations. Spy X's operators did not respond to inquiries. TechCrunch advises users enable Google Play Protect, use two factor authentication and check Apple account security settings. Spyware removal guides are available, but disabling these apps may alert perpetrators requiring careful handling. Apple was notified but has not commented. Court records reveal that Clearview AI, while building its facial recognition database, also attempted to purchase sensitive data such as Social Security numbers and email addresses, according to 404 Media. The company, which scrapes images from social media, has stated its goal of making almost everyone identifiable. It has contracts with law enforcement but faces legal scrutiny and regulatory fines. Privacy experts warn that Clearview's use of booking photos and facial recognition could worsen racial bias, as the technology is less accurate for black and brown individuals. Critics fear police may disproportionately target those with mugshots in search results. Regulators and Congress are investigating the purchase of personal data. Clearview faces ongoing lawsuits, regulatory penalties and financial setbacks, although it anticipates growth under a second Trump administration. The Netherlands Parliament approved motions urging reduced reliance on US Software firms, including creating a Dutch controlled cloud platform. Lawmakers cite changing U.S. relations under President Trump as a key concern. The motions also call for re evaluating Amazon Web Services for Dutch Internet hosting and prioritizing European firms in public contracts. Amazon insists its cloud services allow full data control. This move follows European tech firms pushing for EU investment in local cloud infrastructure. Experts say this is an initial step toward digital sovereignty. The Pennsylvania State Education association is notifying over 517,000 individuals of a data breach from July of last year where attackers stole personal, financial and health data, including Social Security numbers and payment information. The Raisida ransomware gang claimed responsibility demanding a 20 bitcoin ransom. PSEA has not disclosed if it paid. Raisita has previously attacked major institutions including the British Library and Lurie Children's Hospital. Affected individuals are offered free credit, monitoring and urge to monitor their accounts. Researchers at Symantec have discovered a Ransom Hub affiliate deploying a new custom backdoor called Betruger. This sophisticated malware streamlines ransomware attacks by consolidating multiple capabilities, reducing the attacker's digital footprint and making detection harder. Betruger enables credential theft, keystroke logging, privilege escalation and data exfiltration. Symantec has deployed adaptive and behavior based protections. The malware highlights the evolving nature of ransomware as a service, reinforcing the need for strong security measures, regular system updates and cybersecurity awareness training. A new information stealing malware called Arcane is targeting users by stealing VPN credentials, gaming accounts, messaging data and browser information. Discovered by Kaspersky, Arcane is unrelated to Arcane Stealer 5 and emerged in November of 2024. It primarily infects users in Russia, Belarus and Kazakhstan. Unusual for Russian based cybercriminals who typically avoid domestic targets, arcane spreads through YouTube videos promoting game cheats and cracks, tricking users into downloading malicious files. It disables Windows Defender protections and has evolved its distribution methods, including a fake downloader called Arcana loader, promoted via YouTube and Discord. The malware steals credentials from VPNs, email clients, gaming platforms, cryptocurrency wallets and browsers. It also takes screenshots and retrieves WI fi passwords. Users are urged to avoid downloading pirated software and cheats. Of course you already know do that. Coming up after the break, my conversation with David Weissman from BlackBerry. We're discussing how organizations can effectively implement CISA's encrypted communications guidelines and what to do when AI casually accuses you of murder. Stay with us. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed. Indeed's Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with sponsored jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need.
