Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K.
Brandon Karp (0:11)
Your business needs AI solutions that are not only ambitious, but also practical and adaptable. That's where Domo's AI and data products platform comes in. With Domo, you can channel AI and data into innovative uses that deliver measurable impact. Secure AI agents connect. Prepare and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more@AI.domo.com that's AI.domo.com International law enforcement takes down a pair of notorious hacking forums Wiz discovers an open Deepseek database Time bandit jailbreaks chatgpt ransomware hits one of the largest US Blood centers. A cyber attack takes the South African weather service offline. Researchers describe a new browser sync jacking attack. TeamViewer patches a high severity privilege escalation flaw. Over three dozen industry groups urge Congress to pass a national data privacy law. CISA faces an uncertain future. N2K's Brandon Karf speaks with Ellen Chang, vice president of ventures at BMNT and head of H4X Labs and OpenAI cries foul after getting a taste of its own medicine. It's Thursday, January 30th, 2020. I'm Dave Buettner and this is your Cyberwire Intel Briefing. Happy Thursday and thank you for joining us here today. It is great as always to have you with us. Authorities have dismantled two of the largest hacking forums, Cracked and Nulled in operation talent, seizing 17 servers and arresting two suspects. With over 10 million users, these forums served as hubs for cybercriminal activity, offering stolen credentials, hacking tools, and cybercrime as a service. Europol described them as entry points into cybercrime, providing configs for credential stuffing tools like OpenBullet and hosting AI based hacking tools. In a coordinated effort across multiple countries, authorities seized 12 domains, including cracked, Nulled, Stark, RDP and celix, the latter two being integral to the forum's operations. Law enforcement searched seven properties, confiscating over 50 electronic devices and $312,000 in cash and cryptocurrency. The FBI took over the domains, replacing their name servers with FBI controlled addresses. The seized data, including email and IP addresses, will aid future investigations. While forum staff acknowledged the takedown, law enforcement emphasized its impact on disrupting cybercriminal infrastructure. It started with a routine scan. The Wiz research team was mapping deepseaq's external attack surface. Nothing unusual for cybersecurity researchers. Deepseek, after all, was making waves with its DeepSeek R1 reasoning model, a rival to OpenAI's best. But quickly the team stumbled upon something alarming an open Clickhouse database, completely exposed, no passwords, no authentication, just sitting there waiting to be accessed with a simple query. The researchers found themselves staring at over 1 million logs filled with chat history, API keys, backend operations, and other sensitive data. Worse, the database allowed full administrative control, meaning an attacker could not just read but potentially alter or escalate privileges within deepsea's systems. Realizing the gravity of the situation, the Wiz team immediately reported the issue. Deepseek responded swiftly, locking down the exposure. But the incident highlighted a growing AI startups are scaling fast, often without proper security measures. While the world worries about AI's long term risks, the real dangers are often much accidental data leaks like this one. AI companies must prioritize security, just as cloud providers do, or risk exposing their users, their data, and their reputation. AI researcher David Kuzmar made a chilling Time Bandit, a jailbreak that lets users bypass ChatGPT's safety filters to access dangerous instructions on weapons, malware, and even nuclear topics. The flaw exploits ChatGPT's temporal confusion, tricking it into thinking it's in the past while using modern knowledge. Realizing the severity, Kuzmar frantically tried to alert OpenAI, but struggled to find a direct contact. Even after reaching out to cisa, the FBI and government agencies, he was met with silence. He says his anxiety grew as the weeks passed. Eventually through CERT Coordination Center, OpenAI was contacted, confirming the exploit. While OpenAI has implemented partial fixes, the jailbreak still works in some cases. The New York Blood center nybc, one of the largest US Blood centers, has suffered a ransomware attack, causing service disruptions detected on January 26, the breach forced NYBC to take systems offline, affecting blood donation processing and hospital supply chains. The attack comes amid a blood emergency with supplies at dangerously low levels. NYBC is working to restore systems but has no clear timeline. It's unknown who's behind the attack or if patient data was compromised. A cyberattack has taken the South African Weather Service offline, disrupting critical weather services for airlines, farmers and regional allies like Mozambique and Zambia. The attack, which began Sunday evening, took down the weather service's website, email systems and aviation and marine services, forcing the agency to share updates via social media. This marks the second attempted attack in two days with no ransomware group claiming responsibility. South Africa has faced numerous cyber attacks on public institutions, including its Defense Department pension system and National Lab Services. The Weather Service is working with ICT service providers to restore systems, but has no timeline for full recovery. Imagine installing what seems like an innocent browser extension only to unknowingly hand over full control of your browser data and even your device to an attacker. That's exactly what researchers at squarex have uncovered in a new technique they're calling browser sync jacking. It's a three stage attack that turns a simple extension into a full scale cyber weapon. First, a user, maybe an employee, installs a malicious extension. That extension silently authenticates them into an attacker controlled Google workspace profile, allowing hackers to disable security settings and make changes to the browser. Next, they take over the entire browser. The extension waits for a normal download, then swaps it out for a malicious file. That file registers the victim's Chrome browser as managed by the attacker, giving them full control and finally, device hijacking. The attacker can now use the compromised browser to record screens, capture audio, turn on cameras, and even install malware without the user even knowing. The researchers say there's no easy way to track or stop it. Traditional security tools like EDR and secure Web Gateways simply don't catch these kinds of browser based attacks. SquareX is calling this a massive blind spot in enterprise security, and unless organizations start monitoring what extensions their employees install, this kind of attack could become a huge problem. TeamViewer has patched a high severity privilege escalation flaw that could allow local attackers to gain elevated privileges on Windows systems. The vulnerability affects multiple versions and has been fixed in the latest updates, although there's no evidence of exploitation in the wild. TeamViewer urges users to update immediately as threat actors have previously abused TeamViewer for malware deployment. The flaw was reported via Trend Micro's Zero Day Initiative. Security experts warn that remote Access tools like TeamViewer can increase the attack surface, especially in industrial and operational technology environments, making regular updates crucial. Over three dozen industry groups are urging Congress to pass a national data privacy law that would override state regulations. In a letter to House and Senate Commerce Committee leaders, they argue that a unified standard would help businesses operate more efficiently and lower consumer costs. Despite bipartisan interest. Past privacy bills have failed due to disagreements over preempting state laws and allowing individuals to sue over violations. If enacted, federal law could replace strong state protections such as California's privacy law and Illinois's biometric data rules. The letter, backed by big tech and automotive groups, does not mention data brokers. It proposes transparency requirements, consumer opt out rights and limits on data collection, but exempts small businesses. Critics warn the proposal mirrors weaker state laws and could reduce consumer protections rather than strengthen them. The cybersecurity and infrastructure security agency has played a major role in protecting election systems across the US but now its future is uncertain. Since its creation in 2018, CISA has worked with state officials to strengthen voting security. But President Donald Trump and his allies have criticized the agency, accusing it of censoring conservatives and interfering in the 2020 election. CISA denies these claims. Now, with Trump back in office, there's no clear leader for the agency. His Homeland Security secretary, Kristi Noem, has suggested reining in CISA's authority, and a Republican policy plan, Project 2025, proposes moving CISA to the Transportation Department and limiting its role in elections. Many state officials say CISA has been critical in improving election security. But as political battles continue, the question will CISA's mission change before the next? Coming up after the break, N2K's Brandon Karp speaks with Ellen Chang, vice president of ventures at VMNT and head of H4X Labs. And OpenAI cries foul after getting a taste of its own medicine. Stay with us.
