Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network. Powered by N2, Krogle is AI built for the enterprise SOC, fully private schema, free and capable of running in sensitive air gapped environments. Krogle autonomously investigates thousands of alerts weekly, correlating insights across your tools without data leaving your perimeter. Designed for high availability across geographies, it delivers context aware, auditable decisions aligned to your workflows. Krogle empowers analysts to act faster and focus on critical threats, replacing repetitive triage with intelligent automation to help your SOC operate at scale with precision and control. Learn more@krogle.com that's C R O gl.com Google and Microsoft issue critical updates CISA warns of active exploitation of a critical flaw in wing FTP server cloudflare restores their DNS resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they've disrupted Chinese cyber campaigns targeting US Critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former US army soldier pleads guilty to charges of hacking and extortion. Ben Yellen joins us with insights on the Senate Armed Services Committee's response to rising threats to critical infrastructure and the large print giveth and the small print taketh away. Foreign July 16, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Google has issued a critical chrome update fixing six vulnerabilities, including one actively exploited flaw rated high severity 8.8. This bug allows attackers to escape Chrome's sandbox via a specially crafted HTML page. It targets Angle, a graphics layer that processes untrusted GPU commands from websites discovered by Google's Threat Analysis Group. The flaw affects multiple Chrome versions, while technical details remain restricted. The risk is serious, as sandbox escapes can allow malware to spread beyond the browser. Users are urged to update Chrome immediately. The patch also addresses five additional flaws, though none were exploited. This marks the fifth exploited Chrome vulnerability fixed in 2025. Meanwhile, Microsoft has issued an emergency update to fix a bug that blocked some Azure virtual machines from starting. The issue affected Windows Server 2025 and Windows 1124H2 systems using VBS with trusted launch disabled, particularly on older VM SKUs. It stemmed from a secure kernel initialization problem introduced in the July patch Tuesday update. Microsoft advises impacted users to install the new patch and recommends enabling Trusted launch to prevent similar issues. Updated VM images now include the fix A critical flaw in Wing FTP server is being actively exploited, prompting a CISA alert. The vulnerability, rated 10 out of 10 in severity, allows total server compromise and affects Windows, Linux and macOS versions. CISA added it to the known exploited vulnerabilities catalog, ordering federal agencies to patch by August 4th. Wing FTP is used by major organizations like the US Air Force and Sony. Exploits were observed as early as July 1, with attackers attempting file downloads, reconnaissance and remote monitoring installs. Huntress and Arctic Wolf researchers confirmed the threat and shared detection guidance. Despite attackers clumsy execution, the bug is actively targeted. Shadow server found 2,000 exposed instances. Census reported over 8,000 organizations are urged to upgrade immediately to mitigate risk. Yesterday, Cloudflare's 1.1.1.1 DNS resolver service went offline globally for over an hour due to a misconfiguration introduced in June during internal preparations for a new data localization service. A configuration error mistakenly included 1.1.1.1 in a test topology and when activated, this change caused the withdrawal of the resolver's IP routes from Cloudflare's network. DNS traffic dropped immediately, effectively cutting off many users Internet access. Cloudflare reverted the change and fully restored service. While a brief BGP hijack occurred during the outage, it wasn't the cause. Cloudflare pledged to accelerate deprecation of legacy systems and adopt staged deployments to prevent future outages. DNS over HTTPs remained mostly unaffected throughout the incident. A critical vulnerability in Larespee, a PHP documentation tool, allows attackers to execute code on affected servers via server side template injection. With a CVSS score of 10.0. The flaw stems from insecure handling of user input in templates. Exploitation requires minimal skill, using standard SSTI payloads to read files, execute commands, or access environment variables. Users should upgrade immediately and audit systems for signs of compromise. US Cybersecurity officials from the NSA and FBI say they've disrupted Chinese cyber campaigns, particularly Volt Typhoon, which targeted US critical infrastructure. Speaking at the International Conference on Cybersecurity at Fordham University in New York City yesterday, NSA's Christina Walter confirmed China's attempts to quietly infiltrate networks were unsuccessful thanks to coordination between the nsa, FBI and private sector. Volt Typhoon aimed to set the stage for future sabotage, especially around naval infrastructure. In places like Guam, public disclosures forced Chinese hackers to adapt burning older tactics. FBI Cyber Director Brett Leatherman also detailed a real time cyber battle with China's Flax Typhoon, where the FBI temporarily hijacked botnet infrastructure before Chinese actors retaliated with a DDoS attack, only to shut down their own systems upon learning the FBI was involved. Both officials emphasized the Chinese cyber ecosystem blends government and private entities. U.S. efforts to expose these operations aim to disrupt their tactics and force resource draining resets, building friction into their campaigns. Sometimes a cyber breach isn't just about stolen data it can put lives at risk. A leaked database from 2022 exposed personal details of nearly 19,000 Afghans who supported British forces and applied to relocate to the uk. And after the Taliban takeover. The breach, caused by a UK defense official, remained secret until this week, when a super injunction was lifted. Defense Secretary John Healy admitted he couldn't confirm whether the leak led to any deaths, but called it a grave failure. About 600 Afghan soldiers and their families remain in Afghanistan, potentially exposed. The UK's response includes a 850 million pound resettlement scheme. And yet critics question the secrecy and delays. Officials stressed that while the Taliban likely already had much of the data, the breach heightened fear and panic among those affected. The incident reignites debate over accountability, transparency and the deadly consequences of cyber negligence during wartime evacuations. Hackers are hiding malware inside DNS records, an area often overlooked by security tools. Domain tools researchers found a strain of nuisance malware called Joke Screenmate embedded in the text records of subdomains on whitetreecollective.com the malware was encoded in hexadecimal, split into chunks, and hidden in DNS records. Attackers can reassemble the chunks using normal looking DNS queries, bypassing standard defenses. With growing use of encrypted DNS protocols like DoH and DoT, detecting such activity becomes even harder. This stealthy tactic isn't new. PowerShell scripts have been hidden in DNS for years, but it's evolving. Researchers also found DNS records used to host prompt injection attacks targeting AI chatbots. These included bizarre or dangerous commands designed to manipulate the AI. As Ian Campbell of Domain Tools puts it, DNS remains a strange and enchanting place where attackers can quietly operate beyond the reach of conventional CyberSecurity tools. Former US army soldier Cameron John Wagenius has pleaded guilty to wire fraud, extortion and identity theft after hacking US telecom companies and attempting to ransom or sell stolen customer data while on active duty. He and accomplices breached systems using stolen credentials, stealing call and text metadata from hundreds of thousands of users, including high profile targets. Prosecutors say Wigenius demanded up to $500,000 in cryptocurrency and even offered stolen data to a foreign intelligence agency. Documents revealed he tried to defect, violated military orders and continued hacking even after federal searches. He posted stolen data on cybercrime forums like Breach Forums and Telegram with some of the compromise files containing government officials phone records. Authorities seized over 17,000 identity documents from his devices. Wigenius faces up to 27 years in prison and will be sentenced on October 6th. He's considered a significant flight risk and national security threat. Coming up after the break, Ben Yellen joins us with insights on the Senate Armed Services Committee's response to rising threats to critical infrastructure and the large print giveth and the small print taketh away. Stick around. Foreign hey everybody. Dave here. I've talked about Delete Me before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Delete Me keeps finding and removing my personal information from data broker sites and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it piece of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees, personal information and and reduce exposure to social engineering and phishing threats. And right now our listeners get a special deal, 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K Foreign did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Semperis created Purple Night, the free security assessment tool that scans your active directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using Purple Knight to stay ahead of threats. Download it now@sempris.com purple night that's sempris.com purple night. And it is always my pleasure to welcome back to the show My caveat co host Ben Yellen. He is from the University of Maryland center for Cyber Health and Hazard Strategies. Ben, welcome back.
