Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:12)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire.
B (1:38)
Chinese Threat Actors Deploy Brickstorm malware the critical react to shell vulnerability is under active exploitation. Cloudflare's emergency patch triggered a brief global outage. Phishing kits pivot to fake e commerce sites. The European Commission Fines Ex Twitter 120 million euros for violating the Digital Services Act. Creditor spyware has a new bag of trick A Russian physicist gets 21 years in prison for cybercrimes. Twin brothers are arrested for allegedly stealing and destroying government data. Our guest is Blair Canavan, Director of Alliances for PKI and PQC Portfolio from Thales, discussing post quantum cryptography and smart toilet encryption Claims don't hold water.
B (2:34)
It's Friday, December 5th, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing.
B (2:54)
Thanks for joining us here today. Happy Friday. It is great to have you with us. Chinese state sponsored threat actors are deploying Brickstorm malware to maintain persistent access, steal files and eavesdrop on government and IT networks worldwide, according to a joint report from cisa, the NSA and the Canadian Centre for Cybersecurity. The agencies analyzed eight samples taken from victim environments. The report says the People's Republic of China is targeting government and information technology organizations, though it does not identify specific victims. CrowdStrike separately observed activity against a government entity in the Asia Pacific region. One investigated intrusion showed PRC actors gaining long term access to an organization's VMware and Windows systems, compromising domain controllers and an Active Directory Federation Services server to export cryptographic keys. Officials warn the operation reflects China's intent to embed deeply for espionage, disruption or future sabotage. Though China denies the allegations, multiple China linked threat actors began exploiting the critical React to shell vulnerability within hours of its public disclosure. The flaw is an insecure deserialization issue in the React Server Components flight protocol that enables unauthenticated remote code execution in React and Next JS applications. Although initially assigned a separate identifier, the Next JS tracking number was rejected as a duplicate. The bug affects several recent REACT versions, placing thousands of projects at risk. Wiz estimates 39% of observed cloud environments are vulnerable. AWS reports that China Nexus Group Earth, Lamia and Jackpot Panda immediately incorporated incorporated the flaw into active campaigns. Alongside additional activity from unattributed China based infrastructure, attackers are manually testing payloads, running reconnaissance commands and adjusting exploits in real time. Valid proof of concept exploits have been published, increasing risk despite available patches. Researchers have released scanners to help organizations determine exposure.
