Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network. Powered by n2k.
Dutch Bros Sponsor (0:09)
This episode is brought to you by Dutch Bros. Big smiles, rocking tunes and epic drinks, Dutch Bros. Is all about you. Choose from a variety of customizable handcrafted beverages like our Rebel Energy drinks, coffees, teas and more. Download the Dutch Bros app for a free medium drink plus find your nearest shop, order ahead and start earning rewards Offer valid for new app users only. Free medium Drink Reward upon registration. 14 day expiration terms apply. See Dutchbros.com.
Dave Buettner (0:42)
Identity architects and engineers Simplify your identity management with Strata. Securely integrate non standard apps with any idp, apply modern MFA and ensure seamless failover during outages. Strata helps you avoid app refactoring and reduces legacy tech debt, making your identity systems more robust and efficient. Strata does it better and at a better price. Experience stress free identity management and join industry leaders in transforming their identity architecture with Strata. Visit Strata IO Cyberwire, share your identity challenge and get a free set of AirPods Pro. Revolutionize your identity infrastructure. Now visit Strata IO CyberWire and our thanks to Strata for being a longtime friend and supporter of this podcast. A federal judge finds NSO group liable for hacking WhatsApp China accuses the US government of cyber attacks the UK's Operation Destabilize uncovers a vast criminal network. An alleged lock bit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their user management component. Italy's data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest WI FI security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's senior vice president of data science and chief scientist, talking about balancing AI and human intervention and hackers supersize their McDonald's delivery orders. It's Monday, December 23rd, 2024. I'm Dave Buettner and this is your Cyberwire Intel Brief. Foreign thanks for joining us here today. Great to have you with us as always. A federal judge in California has ruled that NSO Group, the developer of Pegasus spyware, is liable for hacking 1400 WhatsApp users, including activists, journalists and diplomats. This marks the first time the company has been held accountable for its role in spyware abuses. Meta owned WhatsApp filed the lawsuit in 2019, alleging NSO exploited a bug in its platform to install spyware on users devices. NSO repeatedly bypassed WhatsApp's security defenses over two years, targeting victims globally. The court found NSO violated the Federal Computer Fraud and Abuse Act, California's Comprehensive Computer Data Access and Fraud act, and WhatsApp's terms of service. Judge Phyllis Hamilton criticized NSO for failing to produce complete Pegasus source code, a factor in her decision to impose sanctions. NSO executives admitted in depositions that the company controlled data extraction from hacked devices and designed Pegasus to circumvent WhatsApp's security measures. Court evidence showed NSO developed new malware even after WhatsApp sued them. This ruling is seen as a victory for spyware victims, signaling increased accountability for spyware companies. Natalia Krapieva of Access now hailed the decision, emphasizing its importance for digital security and human rights. Damages will be determined in March. NSO did not comment on the ruling, but WhatsApp and advocates for victims expressed hope that this decision would deter similar abuses by spyware developers in the future. China's National Cyber Incident Response center has accused the US government of cyberattacks targeting two Chinese tech firms to steal trade secrets. In a public notice, CN CERT claimed a U.S. intelligence agency was responsible, citing incidents in May 2022 and August 2023. One attack targeted a high tech company in China's smart energy sector, exploiting Microsoft Exchange vulnerabilities to implant backdoors and gain control over company systems. The second attack infiltrated an advanced material research unit by exploiting a document management system vulnerability, infecting over 270 hosts with Trojans. The allegations come amid heightened tensions with the US accusing China of cyber espionage and breaches of telecom networks. Cncert, which is tied to China's Ministry of Industry and Information Technology, has escalated claims of US cyberattacks in recent years. The UK's National Crime Agency recently unveiled Operation Destabilize, a four year investigation uncovering an unprecedented financial chain connecting street level drug dealing to global money laundering networks. This effort exposed links between ransomware groups like Ryuk and Conti, Russian businesses and entities funding espionage and sanctions evasion. The Investigation began in 2021 with blockchain analysis of ransomware payments. It soon expanded to reveal billions laundered through Russian entities Smart and TGR Group, led by high profile figures Ekaterina Zanova and George Rossi. A key breakthrough came in November 2021 with the arrest of cash courier Fawad Saidi, who had laundered over 15.6 million pounds in a cash for crypto scheme tied to Zanova. The operation uncovered vast networks, laundering money for drug cartels, organized crime and Russian elites utilizing cryptocurrency to evade detection. Despite challenges. The NCA tackled both street level crime and high level conspiracies, marking a significant step in combating global financial crime. Israeli authorities arrested alleged Lockbit ransomware developer Rostolov Panev, a dual Russian Israeli national, in August 2023 at the request of the United States. Panev faces 41 charges, including computer related extortion and conspiracy. US officials argue Panev developed malware for Lockbit, including tools to bypass antivirus protections and Deploy ransomware, receiving $10,000 monthly payments from Lockbit leader Dimitri Khoroshev. Lockbit, active since 2020, extorted over $500 million and infected 2,500 victims globally before its disruption in 2024. Hanev's arrest follows international efforts to dismantle the gang. Hanev admitted to coding for Lockbit from 2019, initially claiming ignorance of its criminal use but later acknowledging he continued for the money. Investigators found Lockbit source code and credentials on his computer linking him to the operation. Penev awaits extradition to the US to face charges. Apache has released a security update addressing a remote code execution vulnerability in the Tomcat web server. The issue a time of check, time of use race condition affects multiple Tomcat versions on case insensitive file systems with default Servlet write enabled. Users should upgrade and Apache says future updates will enforce safer defaults. Siemens has issued a security advisory for a critical heap based buffer overflow vulnerability in its user management component affecting industrial control systems used in manufacturing and energy sectors. Exploitation could allow attackers to execute arbitrary code, disrupt operations, exfiltrate data or manipulate critical systems. Affected products include OpsCenter, Execution Foundation, Simatic PCs, Neo and Synec NMS. Siemens has released patches for some products and advises restricting access to ports 4002 and 4004. Italy's Data Protection Authority fined OpenAI $15.6 million for unlawfully processing personal data to train ChatGPT and lacking transparency with users. The investigation also found inadequate age verification, exposing minors to inappropriate content. OpenAI called the fine disproportionate and plans to appeal, noting it exceeds their revenue in Italy during the period. The company agreed to run a public awareness campaign and remains committed to privacy compliance. The case highlights growing global regulatory scrutiny of AI systems like ChatGPT. Researchers from the University of the West Indies demonstrated a method to bypass WPA3, the latest Wi FI security protocol, to obtain network passwords. WPA3 was designed to improve on WPA2 by introducing features like simultaneous authentication of equals to prevent offline attacks. However, the researchers exploited weaknesses in WPA3's transition mode, which allows compatibility with WPA2 devices. Using a downgrade attack, they captured the WPA3 handshake and deauthenticated users and created a rogue Evil twin access point with a captive portal to steal passwords. The attack, requiring specific conditions and user interactions, highlights vulnerabilities in networks without protected management frames enabled. The findings stress the need for user education, proper configuration, and further investigation to strengthen WPA3 against technical exploits and social engineering. Picture THIS you receive a notification from Apple on your iPhone warning that spyware hackers are targeting you. The alert sounds serious, even alarming, but instead of offering help, Apple points you to a non profit organization for support. That's how Apple's spyware notification system works, and it's been quietly operating since 2021. Designed to warn individuals of highly targeted attacks, the system has notified users in over 150 countries. These attacks, often linked to mercenary spyware like Pegasus, target specific individuals based on who they are or what they do. While the notifications highlight the risk, Apple doesn't provide direct technical assistance, leaving victims to seek help from organizations like Apple Access now or Amnesty Tech for forensic analysis. For those who suspect spyware tools like the misecure app can scan devices for threats, offering capabilities comparable to those used by governments. Still, critics wonder why Apple, a tech giant with vast resources, redirects users to nonprofits rather than deploying its own expertise. Apple assures users that these attacks are rare and advises keeping devices updated and rebooting regularly to disrupt potential spyware. Still, the company's hands off approach raises questions about responsibility. Why point users elsewhere when the stakes are so high? For now, Apple remains tight lipped. Coming up after the break, Sven Krasser from CrowdStrike discusses balancing AI and human intervention, and hackers supersize their McDonald's delivery orders. Stay with us.
