Transcript
A (0:02)
You're listening to the Cyberwire network. Powered by N2K, the DMV has established itself as a top tier player in the global cyber industry. DMV Rising is the premier event for cyber leaders and innovators to engage in meaningful discussions and celebrate the innovation happening in and around the Washington D.C. area. Join us on Thursday, September 18th to connect with the leading minds shaping our field and experience firsthand why the Washington D.C. region is the beating heart of cyber innovation. Visit DMVRising.com to secure your spot. Think your Certificate security is covered by March 2026 TLS, certificate lifespans will be cut in half, meaning double today' renewals. And in 2029, certificates will expire every 47 days, demanding between 8 and 12 times the renewal volume. That's exponential complexity, operational workload and risk. Unless you modernize your strategy, Cyberark Proven in Identity Security is your partner in certificate security. Cyberark simplifies lifecycle management with visibility, automation and control at scale. Master the 47 day shift with CyberArk Scan for vulnerabilities, streamline operations scale security visit cyberark.com 47day that's cyberark.com the numbers 47day A new self replicating malware infects the NPM repository Microsoft and cloudflare disrupt the phishing as a service platform. Researchers uncover a new Fancy Bear backdoor campaign. The Void proxy platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November. A new Rowhammer attack variant targets DDR5 memory. Democrats warn proposed budget cuts could slash the FBI's cyber division staff by half. At a heated Senate Judiciary Committee hearing on our Industry Voices segment, we're joined by Abhishek Agrawal from Material Security discussing challenges of securing the Google workspace and Pompompuram heads to prison. It's Wednesday, September 17, 2020. I'm Dave Buettner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. A new self replicating malware called Shai Hulud has infected at least 187 packages in the JavaScript repository npm. Named after the sandworms in Dune, the worm steals developer credentials and publishes them in public GitHub repositories. Security firm Aikido reports the malware spreads by hijacking NPM tokens, injecting itself into the 20 most popular packages linked to a victim's account and releasing altered versions. The attack briefly compromised CrowdStrike managed packages, but they were quickly removed. Unlike past NPM breaches, Shai Hulud self propagates using tools like Truffle Hog to harvest secrets and spread further, researchers warn the worm mimics a living virus capable of lying dormant before flaring up again. Experts say stronger two factor authentication for publishing packages is needed to prevent future outbreaks. Microsoft and Cloudflare have disrupted raccoon O365, a phishing as a service plant platform that sold subscription kits to steal Microsoft 365 credentials. With a court order, Microsoft seized 338 websites tied to the operation, cutting off attackers infrastructure. Raccoon O365, also known as Storm 2246, enabled low skilled criminals to impersonate brands like DocuSign and SharePoint, creating fake Microsoft login pages. The kit used adversary in the middle tactics to capture passwords and session cookies, bypassing MFA protections. Investigators tracked cryptocurrency payments after discovering the group's leaked wallet, identifying Nigerian programmer Joshua Ogudipe as the ringleader. He marketed the service on Telegram and along with associates, sold tiered subscription plans ranging from $355. The group made at least $100,000. Microsoft has filed suit and referred Ogundipe to international law enforcement. Researchers at Sequoia IO have discovered a new APT28 Fancy Bear campaign dubbed Operation Phantom. Net Voxel that uses malicious Microsoft Office documents to deliver advance backdoors. The attack, aimed at Ukrainian military officials via signal spear Phishing, tricks victims into enabling macros. These drop a DLL and a PNG image that hides shellcode, which then loads an HTTP grunt stager from the open source Covenant framework. This establishes command and control through the cloud service Kufer, where attackers use folders named tansfering and Keeping to manage tasks and exfiltrated data. A second backdoor, Beardshell, uses IceDrive for C2 and executes PowerShell commands. Researchers also linked APT28 to slim agent spyware, enabling key logging and screenshots. At least 42 hosts may be compromised since late 2024, highlighting Fancy Bear's growing reliance on blended open source and legitimate cloud services for stealth and persistence, researchers at Okta have uncovered Void Proxy, a phishing as a service platform targeting Microsoft 365 and Google accounts. The operation uses adversary in the middle techniques to intercept logins, capturing credentials, MFA codes and session tokens for use in business email compromise, fraud and data theft, experts warn Void Proxy is part of a growing wave of attacker in the middle driven phishing as a service tools. Following kits like Evil Jinx Security leaders stress an identity first approach, reducing excessive privileges and monitoring identity interactions. Since identity based attacks are harder to detect and exploit user trust directly. British Telecom Colt Technology Services says recovery from its August ransomware attack may not finish until late November, marking over three months of disruption. The Warlock group claimed responsibility, allegedly exfiltrating Colt's data. While core network infrastructure remains operational. Customer portals hosting APIs, billing and some voice services are still affected. Colt has engaged external experts, filed reports with authorities in 27 countries and continues phased system restoration. Investigators suggest the attack may have exploited SharePoint vulnerabilities, followed by data theft and extortion attempts. Researchers from Google and ETH Zurich have discovered a new Rowhammer attack variant dubbed Phoenix that targets DDR5 memory. Rowhammer exploits memory's tendency to leak electrical charges, allowing attackers to corrupt adjacent cells, degrade performance or escalate privileges by repeatedly access specific rows. While DDR5 was thought resistant, researchers found SK Hynix DDR5 vulnerable when tested on an AMD Zen 4 system. The attack is complex and resource intensive but effective. Phoenix, with a 7.1 CVSS score, highlights gaps in DDR5 protections, particularly the absence of JDEX per row activation counting defense. ETH Zurich responsibly disclosed the flaw to memory and CPU vendors in June. AMD has since released a BIOS update and cloud providers were notified to mitigate risks. Yesterday, at a heated Senate Judiciary Committee hearing, Democrats warned that proposed Trump era cuts could slash the FBI's cyber division staff by half, undermining defenses against foreign threats and ransomware. Sen. Dick Durbin cited a proposed $500 million FBI budget cut, while Senator Alex Padilla argued shifting resources to immigration and politically motivated probes hurt core cyber missions. FBI Director Kash Patel countered that arrests rose 42%, with 409 arrests and 169 convictions in the past year, and insisted no resources were diverted from election security or counterterrorism. Patel highlighted ongoing efforts against Chinese hacking groups like Salt Typhoon and Volt Typhoon, as well as ransomware. Senator Amy Klobuchar raised concerns about AI driven election interference, which Patel attributed to loosely organized overseas actors. Meanwhile, House lawmakers introduced a short term funding bill to extend two key cyber programs, the 2015 Cybersecurity Information Sharing act and the State and local cybersecurity grant program until Nov. 21. Both were set to expire Sept. 30. The extension gives Congress more time to negotiate long term renewals, with the house proposing a 10 year extension and the Senate, led by Senator Rand Paul expected to push for a shorter timeline with fewer safeguards for private entities sharing threat data. Uncertainty remains over bipartisan support. Coming up after the break, my conversation with Abhishek Agrawal from Material Security. We're discussing challenges of securing the Google Workspace and Pompompuram heads to prison. Stay with us. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed. When it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed. Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been talking to you. 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed. On this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. Abhishek Agrawal is CEO and co founder of Material Security and in today's Sponsored Industry Voices segment, we discuss the challenges of securing the Google Workspace.
