Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI Chinese hackers infiltrate a US law firm the EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say lojacks is the latest malware from Russia's fancy bear Salesforce refuses ransom demands London police arrest two teens over an alleged ransomware attack on a preschool Microsoft tightens Windows 11 setup restrictions signed and Data Tribe Spotlight 2025 cybersecurity innovators on our Industry Voices segment, we're joined by Sean Duby Sempras principal technologists discussing identity system security and the growth of the HIP conference and employees overshare with ChatGPT. It's Wednesday, October 8th, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Thanks for joining us here today. It's great to have you with us. Williams and Connolly, one of the United States top law firms, disclosed that Chinese hackers infiltrated parts of its computer systems in a broader campaign targeting US law and tech firms. The FBI's Washington Field Office is investigating what sources say may involve more than a dozen victims. The New York Times reports the attackers reportedly access several attorney email accounts through a zero day vulnerability, though the firm says there's no evidence client files or databases were compromised. Williams and Connolly has engaged cybersecurity firm Crowdstrike and outside counsel Norton Rose Fulbright to assist in the response. According to Mandiant, the campaign aligns with a Chinese espionage effort seeking intelligence on US national security and trade issues. The firm says the intrusion has been contained. European Commission President Ursula von der Leyen warned that Russia is waging a hybrid war against Europe, citing coordinated cyberattacks, sabotage and provocations across EU member states. Speaking before the European Parliament, she pointed to airspace violations by Russian MiG fighters and drone incursions over critical infrastructure in several EU countries, describing them as part of a deliberate campaign to unsettle our citizens, test our resolve and weaken our support for Ukraine. Von Der Leyen said a new Pan European Security Strategy developed with NATO aims to strengthen rapid cyber response and protect essential infrastructure. She urged EU members to leave their comfort zone and confront the threat with unity and deterrence. She declared, every square centimeter of our territory must be protected. Researchers at ESET have uncovered lojax, the first known malware found actively infecting a computer's UEFI firmware, a critical component that controls how a system boots. Believed to be created by the rushing hacking group Sednit, also known as Fancy Bear or APT28, Lojax embeds itself in a computer's firmware, allowing it to survive even after a hard drive replacement or operating system reinstall. This gives attackers deep, persistent control over compromised machines and potential access to network systems and data. ESET named the malware after LoJack, the legitimate anti theft tool it abuses. Experts recommend enabling secure boot and updating firmware to block infection if compromised. Users may need to reflash or replace the motherboard entirely. Salesforce has confirmed it will not pay ransom demands from the hacking group scattered Lapsus Hunters, which claims to have stolen nearly 1 billion records from Salesforce customers. The attackers launched a data leak site on the Breach Forum's domain, threatening to publish stolen data from 39 major companies, companies including FedEx, Disney, Google and Marriott. Salesforce told customers it will not negotiate or pay extortion demands despite credible intelligence that the hackers plan to leak the data. London's Metropolitan Police arrested two 17 year olds on suspicion of computer misuse and blackmail linked to a ransomware attack on preschool operator Keto International. The attackers, calling themselves the Radiant Group, leaked photos, names and home addresses of children and parents to extort payment, later deleting the data after backlash from other criminals. The arrests follow a September 25 report to the UK's Action Fraud Center. Police said the case is being treated extremely seriously and investigations are ongoing. Microsoft is tightening restrictions on creating local accounts during Windows 11 setup, removing known methods that let users bypass Microsoft account requirements. The change, introduced in a recent Insider preview build, means users will soon need both an Internet connection and a Microsoft account to complete the out of box experience. Microsoft says bypassing the setup previously caused incomplete configurations and reduced security. Earlier this year, the company removed the bypass NRO script for similar reasons, though a Registry workaround still exists for now, Microsoft may eliminate that option in future updates to ensure devices are fully configured and meet modern security standards. SciNet has announced the 2025 SciNet 16 Innovator Award winners, recognizing standout startups driving the next wave of cybersecurity innovation. Selected from 193 applicants across 19 countries, the winners include Bedrock Security, ConductorOne, Oligo Security, Prompt Security and Seamplicity. Each company was chosen for developing technologies that address modern threats across cloud, AI and enterprise Systems in parallel. DataTribe named five finalists for its 2025 Cybersecurity Startup Challenge, including Acuity, Citadel, Tensor Machines, Starseer and Evercoast, ahead of Cyber innovation day on November 4th in Washington, D.C. together, these programs spotlight the innovators defining cybersecurity's AI driven future. It's likely unsurprising to anyone that employees are getting a little too chatty with ChatGPT. A new report from LayerX warns that employees are inadvertently exposing sensitive corporate data through ChatGPT and other generative AI tools. The Enterprise AI and SaaS Data Security Report for 2025 found that 45% of enterprise employees use AI tools and 77% of them paste data into chatbot prompts, 22% of which contain personally identifiable or payment card information. Most of these pastes come from unmanaged personal accounts, leaving companies blind to data leakage and compliance risks. LayerX says ChatGPT dominates enterprise AI use accessed by over 90% of users, while Microsoft Copilot adoption remains below 3%. The report urges CISOs to enforce single sign on to maintain visibility and control over AI data flows. LayerX warns such leaks could create regulatory and geopolitical risks. Coming up after the break, my conversation with Sean Duby, principal technologist at C Sempras. We're discussing identity system security and the growth of the hip conference and employees overshare with ChatGPT. Stick around at Talas. They know cyber security can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Thales T H A L E S. Learn more@talasgroup.com Cyber what's your 2am Security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep. Get started@vanta.com cyber that's v a n t a dot com cyber Shawn Dubey is principal technologist at Sempris. On today's sponsored Industry Voices segment, we discuss identity system security and the growth of the HIP Conference. Sean, I understand you are in Charleston this week at the HIP Conference. For folks who aren't familiar with that conference, what is it and what's your involvement there?
