Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K. What's the best time of day to get a deal? All day with Jack in the Box's all day Big deal meal. You get to choose from four entrees.
Tim Starks (0:19)
Like the supreme croissant and five tasty.
Dave Bittner (0:21)
Sides plus a drink starting at $5. So hurry in or take your time.
Tim Starks (0:27)
You've got all day at Jack.
Dave Bittner (0:29)
Every bite's a big deal. Ransomware supply chain attacks and zero day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of the Threat Locker Zero Trust Endpoint Protection Platform Robust cybersecurity is a non negotiable to safeguard organizations from cyberattacks, ThreatLocker implements a proactive, deny by default approach to cybersecurity, blocking every action process end user unless specifically authorized by your team. This least privilege methodology mitigates the exploitation of trusted applications and ensures protection for your organization. 247365 IT professionals are empowered by ThreatLocker application allowance listing, Ring Fencing, Network Control, and EDR solutions, enhancing their cybersecurity posture and streamlining internal IT and security operations. To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit threatlocker.com A new report sheds light on both Volt and Salt Typhoons penable updates faulty NESSUS agents and resumes plugin updates. A new info stealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. Eset warns Windows 10 users of a potential security fiasco. A vulnerability in NUCLEI allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware cover up. Tim Starks, senior reporter from cyberscoop, joins us today to discuss a new United Nations Cybercrime treaty along with his outlook for 2025 and a fond farewell to a vision.
Tim Starks (2:57)
Foreign.
Dave Bittner (3:03)
It's Monday, January 6, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Happy Monday and thank you for joining us here today. It is great to have you with us. Two major reports published this past weekend shed light on China's escalating hacking campaigns. A Bloomberg article focused on Volt Typhoon, the Chinese group behind the 2022 cyberattack on Guam's power authority the GPA. This hack, tied to over 100 intrusions, raised concerns about China's capability to disrupt US military operations in Guam, a strategic hub in the Indo Pacific. Experts see this as part of a potential strategy to disable US Responses in a Taiwan conflict. The GPA incident is particularly alarming since it serves the US Navy. Highlighting the national security stakes, the US has made countering Volt Typhoon a priority, but China has denied any involvement. Liu Pengyu, a Chinese embassy spokesperson, dismissed the allegations as baseless smear campaigns. A Wall Street Journal piece examined Salt Typhoon, the Chinese hacking group that has infiltrated at least nine major U.S. telecom companies, including AT&T, Verizon and T Mobile. Newly identified victims include Charter Communications, Consolidated Communications, and Windstream. The article also revisited China's 2021 Port Houston attack, where a disguised attacker accessed a password reset server. Notably, a cybersecurity vendor flagged the breach, but a misjudgment by the port's cybersecurity chief led to the attack being dismissed as a false alarm right before he went to lunch at Whataburger. These incidents illustrate China's sophisticated and targeted cyber campaigns with serious implications for US national security. The revelations spotlight the vulnerabilities in critical infrastructure and the growing urgency to bolster defenses against state sponsored cyber attacks. Tenable temporarily disabled Nessus agent versions after discovering they went offline during plugin updates. The issue affecting Tenable Vulnerability Management and Security center led to halted updates while the company investigated. On January 2, Tenable released an updated version, which resolves the problem, and resumed plugin updates. Organizations are advised to either update to the latest version or downgrade to a previous version to ensure plugin resets were needed. The root cause remains undisclosed, with potential customer impacts unclear. Gaming enthusiasts are being warned about a new infostealer campaign targeting Discord users. Scammers send unsolicited messages claiming to be game developers seeking beta testers. Victims receive a download link and password for an installer, but instead of a game, they unknowingly install information, stealing malware like NovaStealer, AgiosStealer or HexonStealer. These malware strains steal credentials, Discord tokens, browser data, cryptocurrency wallet information, and more. The scam often uses compromised accounts and credible hosting platforms, including Dropbox and Discord's own content delivery network, to appear legitimate. Criminals leverage stolen Discord credentials to manipulate users into further scams, expanding their reach. To stay safe, users should maintain up to date anti malware software, verify suspicious messages through alternate channels, and avoid downloading files from unsolicited messages. The ultimate goal of these scams is financial theft and account compromise. A fake version of the popular Edit this Cookie browser extension has been discovered stealing login credentials and conducting phishing attacks. The legitimate Edit this cookie, used by millions to manage browser cookies, was recently removed from the Chrome Web Store, likely due to incompatibility with Google's new manifest version 3 framework. Cybercriminals exploited this gap, launching a fraudulent version. Edit this cookie with a registered trademark sign, now downloaded over 50,000 times. Malware analyst Eric Parker revealed the extension's malicious features, including phishing mechanisms, Facebook credential theft, and advertising scripts for revenue. Although current versions lack cookie exfiltration, future updates could escalate risks through Chrome's automatic updates. Users should audit their extensions, avoid suspicious add ons, and enable Chrome's enhanced safe browsing. This incident underscores ongoing challenges in Google's Chrome Web Store security and the controversial rollout of Manifest version 3. ESET is urging Windows 10 users to upgrade to Windows 11 or Linux before the operating system support ends on October 14, 2025. Without free updates, Windows 10 users will face significant security risks from newly discovered vulnerabilities. ESET's Thorsten Urbansky warns that delaying the upgrade could lead to a security fiasco. Windows 10 remains the most widely used OS globally, but with 63% of Windows users compared to 34% on Windows 11. Many users hesitate to upgrade due to missing features, performance issues, or hardware incompatibilities such as the Trusted Platform module requirement. Businesses and consumers relying on older devices face limited Upgrade to Windows 11, switch to another OS, or pay costly extended security updates. These updates, priced at up to $427 over three years, highlight the urgency to transition a vulnerability in nuclei. The open source Vulnerability Scanner allows attackers to bypass template signature verification and inject malicious code. NUCLEI uses YAML templates to scan websites for vulnerabilities and executes commands locally to extend functionality. Templates are protected by a digest hash for verification. The flaw exploited differences between go's regex based signature verification and YAML parser behavior with line breaks. Attackers could inject malicious content by manipulating how R is processed, bypassing verification but executing when parsed. Additionally, nuclei's limited digest line verification in a template allowed attackers to add additional malicious payloads in subsequent lines. WIZ researchers disclosed the issue to project discovery on August 14th of last year. It was fixed by nuclei on September 4th. Users should update immediately and isolate NUCLEI to prevent risks. Indiana based West End Dental has agreed to pay $350,000 and enhance data security measures following allegations of a ransomware cover up from 2020. The incident, which encrypted patient records via Medusa Locker malware, only came to light during a 2022 investigation triggered by a patient complaint about missing X rays. West End allegedly failed to conduct a forensic investigation or notify affected individuals, violating HIPAA and state breach laws, despite knowing its systems were hacked. The practice falsely claimed the data loss resulted from a server formatting error. Regulators allege West End attempted to hide the breach and delayed reporting it for two years. Under a consent order, West End must improve HIPAA compliance, notify all patients as of November 2023 and address allegations of improperly sharing patients protected health information online. The case highlights the growing enforcement of data privacy regulations in health care. Coming up after the break, Tim Starks from CybersGroup joins us to discuss a new United nations cybercrime treaty and a fond farewell to a visionary leader. Stay with us. And now a word from our sponsor, KnowBe4. It's all connected and we're not talking conspiracy theories when it comes to infosec tools, effective integrations can make or break your security stack. The same should be true for security awareness training. KnowBeFor, provider of the world's largest library of security awareness training, provides a way to integrate your existing Security stack tools to help you strengthen your organization's security culture. KnowBeFor's security coach uses standard APIs to quickly and easily integrate with your existing security products from vendors like Microsoft CrowdStrike and Cisco. 35. Vendor integrations and Counting Security Coach analyzes your security stack alerts to identify events related to any risky security behavior from your users. Use this information to set up real time coaching campaigns targeting risky users based on those events from your network, endpoint identity or web security vendors. Then coach your users at the moment the risky behavior occurs, with contextual security tips delivered via Microsoft Teams, Slack or email. Learn more@knowbe4.com SecurityCoach that's knowbe4.com SecurityCoach and we thank knowbe4 for sponsoring our show. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001 they also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. It is always my pleasure to welcome to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, thanks for joining us.
