Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire Network powered by N2K.
David Moulton (0:14)
We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need.
Maria Varmazes (2:01)
CISA says it'll continue monitoring Russians cyber threats broadcom patches zero days that can lead to VM escape Google patches 43 bugs including two sneaky zero days CISA flags vulnerabilities exploited in the wild Palau's Health Ministry recovers from a ransomware attack Lost and found or lost and leaked on this week's Threat Vector segment, David Moulton previews an episode with Holly Hennessy on IoT Cybersecurity Risk Mitigation and next week's special International Women's Day episode featuring the trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights and Is that really you? Today is Tuesday, March 4, 2025. Maria I'm Maria Varmazes, host of T Minus Space Daily, in for Dave Bittner, and this is your Cyberwire Intel Briefing. Thanks for joining us on this lovely Tuesday. Let's get into our daily intel briefing. The U.S. department of Homeland Security says the Cybersecurity and Infrastructure Security Agency, also known as cisa, will continue monitoring cyber threats from Russia, asserting that media reports to the contrary are false. The Guardian reported over the weekend that CISA staff received a memo directing them to prioritize threats from China with no mention of Russia. Tricia McLaughlin, assistant secretary for public affairs at DHS, told CyberScoop that such a memo was never sent, adding, cisa remains committed to addressing all cyber threats to US Critical infrastructure, including from Russia. There has been no change in our posture or priority on this front. The Guardian's story is separate from reports that Defense Secretary Pete Hegsgeth ordered Cyber Command to halt offensive operations against Russia during negotiations over the war in Ukraine. The Pentagon hasn't officially commented on these reports, but Bloomberg cites an anonymous senior Defense official as saying that Hegsgath has neither canceled nor delayed any cyber operations directed against malicious Russian targets, and there has been no stand down order whatsoever from that priority. Kim Zetter at Zero Day has written up a useful summary that clarifies reporting on these two stories, and we have a link to that piece in our show. Notes for you Broadcom has issued patches for three actively exploited zero days affecting VMware, ESX and any products that contain ESX, including vSphere, Cloud foundation and Telco Cloud Platform, according to a report from Security Week. Broadcom warns that the vulnerabilities can lead to a virtual machine escaping, stating that this is a situation where an attacker who has already compromised a virtual machine's guest OS and gained privileged access administrator or root could move into the Hypervisor itself. In March 2025, Google released security updates addressing 43 vulnerabilities in Android, notably to zero days actively exploited in targeted attacks. One of them, identified as CVE 2000, 24, 503.02, is a high severity information disclosure flaw in the Linux kernel's human interface device driver. This vulnerability was reportedly leveraged by Serbian authorities using an exploit chain developed by Israeli firm Cellebrite to unlock confiscated devices. The exploit chain also included a USB video class zero day and an ALSA USB sound driver. Zero day, both discovered by Amnesty International Security Lab in mid 2024. Google had previously provided fixes for these vulnerabilities to OEM partners. In January, the Cybersecurity and Infrastructure Security Agency has updated its known Exploited Vulnerabilities catalog to include several critical security flaws, underscoring the importance of timely remediation to protect organizational networks, and the newly added vulnerabilities are a critical path traversal vulnerability in progress WhatsApp Gold, which could allow unauthenticated remote code execution A medium severity command injection vulnerability in Cisco Small Business RV series routers enabling arbitrary command execution or authentication bypass. Notably, Cisco has stated it will not release a fix for this issue. A pair of vulnerabilities both affecting Hitachi Ventera Pentaho BA Server, which could involve special element injection and authorization bypass, and an improper resource shutdown or release flaw in Microsoft Windows win 32k which could be exploited to execute arbitrary code. Federal agencies are mandated to address these vulnerabilities by March 24, 2025. CISA strongly recommends that all organizations, regardless of sector, prioritize the remediation of these vulnerabilities to mitigate potential exploitation risks. And we do have the CVEs for all these vulnerabilities in our selected reading for you should you need them. The island nation of Palau's Ministry of Health and Human Services, or mhhs, is recovering from a ransomware attack that it sustained on February 17. According to a report from the Record, the Ministry attributed the attack to the Chilin ransomware gang, adding that the crooks were able to exfiltrate data during the incident. The MHHS stated that based on the kind of information that's been stolen, MHHS and its cyber advisors do not perceive any significant impact to the security of individual Palauans. However, MHHS recommends that all Palawans remain vigilant against potential fraud and or phishing emails that may attempt to use this incident as a means of getting you to release personal information. The Ministry added that the attack was a heinous crime by greedy cybercriminals that has put our ability to provide critical medical care and life saving emergency services at risk. A Defend Forward team from US Cyber Command is on site assisting with the investigation. A recent security labs exposed 14 unprotected databases containing approximately 820,750 but who's counting? Sensitive records totaling 122 gigs from lost and Found software, which is utilized by airports across the United States, Canada and Europe. Discovered by cybersecurity researcher Jeremiah Fowler, the breach included detailed information on lost items such as medical devices, electronics, wallets and bags, and personally identifiable information of their owners. Notably, high resolution images of passports, driver's licenses and other identification documents were accessible, heightening risks of identity theft and fraud. Additionally, screenshots of payment confirmations, shipping labels and original receipts were exposed. Upon notification, the company promptly secured the databases and this incident underscores the critical need for robust data protection measures in handling sensitive customer information. US Newspaper publisher Lee Enterprises is still grappling with a ransomware attack that occurred on February 3rd. According to a report from TechCrunch, freelancers and contractors who work for the company told TechCrunch that they haven't been paid for their work since the attack took place. One contractor is owed thousands of dollars and has no timeline for when Li's payment system will be up and running again. LI Enterprises itself has avoided using the term ransomware, but it mentioned in an SEC filing that the attackers encrypted critical applications and exfiltrated certain files. The Qilin ransomware gang last week claimed responsibility for the attack, and the filing also noted that the incident disrupted distribution of products, billing collections and vendor payments. In response to Australia's recent legislation that bans social media access for children under 16, TikTok has criticized the government's decision to exempt YouTube from this ban, labeling it a sweetheart deal that is illogical, anti competitive and short sighted. This sentiment is echoed by other tech giants, including Meta Platforms and Snapchat, who argue that YouTube offers similar features to those that led to the band, such as algorithmic content, recommendations and exposure to potentially harmful material. Mental health experts have also raised concerns about YouTube's potential to expose children to addictive and dangerous content, questioning the consistency and fairness of the exemption. Coming up after our break, we've got our Threat Vector segment with host David Moulton from Palo Alto Networks. And even your zoom calls might be catfishing you.
