Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try DeleteMe. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know.
Chris Hare (0:45)
Exactly what's been done.
Dave Bittner (0:47)
Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K the Doge team faces growing backlash. The Five Eyes release guidance on protecting edge devices. A critical macOS kernel vulnerability allows privilege escalation, memory corruption, and kernel code execution. Google and Mozilla released security updates for Chrome and Firefox. Multiple Veeam backup products are vulnerable to man in the middle attacks. Zyzo suggests you replace those outdated routers. A former Google engineer faces multiple charges for alleged corporate espionage. CISA issues nine new advisories for ICS vulnerabilities. A House Republican introduces a cybersecurity Workforce scholarship bill on our CERT byte segment, a look at ISC2's CISSP exam and Google updates its stance on AI weapons.
Steven Burnley (2:25)
Foreign.
Dave Bittner (2:31)
It's Wednesday, February 5th, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It is great as always to have you with us. Elon Musk and his advisory team, the Department of Government Efficiency Doge are facing growing backlash over their efforts to dismantle federal agencies. Cybersecurity experts, government officials and Democrats warn that their actions could compromise national security, expose federal employees data, and violate federal laws. Key concerns center around Doge's reported access to critical federal systems, including the Treasury's payment system, which processes Social Security payments and federal salaries. Additionally, at the Office of Personnel Management, which stores sensitive employee records, Musk allegedly installed an unvetted private server, raising fears of a Repeat of the 2015 OPM hack by Chinese hackers. The White House insists Doge's access is read only, but reports suggest a former Musk employee was given administrative privileges. Senator Elizabeth Warren has demanded answers from Treasury Secretary Scott Bessant, emphasizing that these Systems handle over $6 trillion in annual transactions. Security experts argue that Musk's actions violate federal cybersecurity laws, including FISMA, and create risks for foreign adversaries to exploit. The lack of oversight and independent logging makes it impossible to verify what information has been accessed or altered. House Democrats warn that the new email system at OPM could enable phishing attacks targeting federal workers. Legal experts stress that granting unauthorized access to federal systems is a felony, and federal employees resisting these changes are reportedly being fired or placed on leave. Critics liken the situation to a precarious Jenga tower, where reckless interference could trigger a catastrophic failure of government operations. The UK's National Cybersecurity Centre and its Five Eyes partners have released new guidance to improve the security of edge devices. These include routers, network attached storage, IoT devices and perimeter security solutions, all frequent targets of cyber attacks. The document sets baseline security standards for manufacturers and provides best practices for customers selecting network hardware. It emphasizes logging and forensic capabilities, ensuring devices can detect and investigate threats effectively. Edge devices face growing threats from both financially motivated hackers and and state sponsored actors. A 2024 report found vulnerabilities in these devices increased 22% with higher severity ratings. Recent zero day exploits such as those targeting Avanti and Fortigate products highlight the risks. A critical macOS kernel vulnerability allows privilege escalation, memory corruption and kernel code execution. Discovered by MIT CSAIL researcher Joseph Rajakandran. The flaw affects macOS, Sonoma, Sequoia and iPad OS. The issue stems from a race condition in Apple's XNU kernel involving safe memory reclamation, read only page mapping and unsafe use of memcpy. Improper synchronization enables unauthorized credential modification. Ravakandran released a proof of concept exploit demonstrating the flaw. Apple has not yet patched it, so users should avoid untrusted code. The researcher recommends using Atomic writes to fix the issue. Google and Mozilla have released security updates for Chrome and Firefox addressing multiple high severity memory safety vulnerabilities. Chrome 133 includes 12 security fixes with three reported by external researchers. Two critical use after free flaws affect the Skia graphics library and version 8 JavaScript engine, potentially enabling code execution or sandbox escapes. Google awarded $7,000 for one bug and $2,000 for another. Firefox 135 patches multiple vulnerabilities, including two high severity use after free bugs affecting the Custom Highlight API and xslt. Additional fixes addressed code execution risks in Firefox, ESR and Thunderbird. No active exploitation has been reported, but users should update their browsers immediately. A critical vulnerability in multiple Veeam backup products allows attackers to execute remote code via man in the middle attacks with a CVSS score of 9.0. This flaw in the Veeam updater component can lead to full system compromise, including data theft and ransomware attacks. Affected products include Veeam backup for Salesforce, aws, Azure, Google Cloud and others. Veeam has released urgent patches and users should update immediately to mitigate risks. Attackers can intercept and manipulate update requests injecting malicious code. Zyzole has announced it will not release patches for two actively exploited vulnerabilities affecting its end of life routers, despite warnings from security researchers. Threat intelligence firm Graynoise reported that attackers are using these flaws to execute arbitrary commands, leading to full system compromise. The vulnerabilities were discovered by Volnchek in mid 2023 but remained unpatched. Zyzyl claims it was unaware until January 29 after Granoise reported active exploitation. The company advises customers to replace affected routers instead of expecting fixes. Security researchers argue that many impacted devices remain in use and even available for purchase online. Census reports nearly 1,500 vulnerable routers exposed to the Internet, and Gray Noise warns botnets like Mirai are exploiting the flaws in large scale attacks. Former Google engineer Lin Wei Ding faces multiple charges for allegedly stealing AI trade secrets for a Chinese company. Prosecutors say ding copied over 1,000 confidential files related to Google's AI supercomputing infrastructure between 2022 and 2023. He allegedly transferred this data using Apple notes to bypass security measures. Ding was later offered a CTO position at Beijing Rongshiu Langzhi Technology. While still employed at Google after leaving Rongshu, he founded a Chinese AI startup which sought government funding to develop AI infrastructure. Google detected the theft in December of 2023, revoked Ding's access and notified authorities. He was arrested in March of 2024. If convicted, he faces up to 15 years per economic espionage charge and 10 years per trade secret theft count plus millions in fines. CISA has issued nine new advisories highlighting critical vulnerabilities in industrial control systems. These flaws impact major vendors like Rockwell Automation, Schneider Electric and AutomationDirect, posing risks to energy, manufacturing and transportation sectors. Key vulnerabilities include remote code execution, denial of Service attacks and unauthorized access, with CVSS scores reaching 9.3. Affected devices range from routers and PLCs to industrial software. Some vendors have issued patches, while others recommend network segmentation or device replacement. Gray Noise reports Botnet's actively exploiting certain vulnerabilities. Emphasizing the urgency of mitigation, CISA urges organizations to apply updates immediately to protect critical infrastructure from cyber threats. Additionally, former DHS and Energy Department cyber Executive Karen Evans has joined CISA as a senior advisor for cybersecurity. While her role is currently advisory, sources suggest she may be named Executive Assistant Director for Cybersecurity Authority or move into a top DHS position. Evans previously served as DHS CIO and led cybersecurity efforts at the Department of Energy. Since leaving government in 2020, she worked in the private sector and co led a national study on CISA's cybersecurity workforce role. Her return comes as agencies combat Chinese backed cyber threats like volt typhoon. Meanwhile, CISA's future under the Trump administration remains uncertain, with Homeland Security Secretary Kristi Noem advocating for a smaller, more nimble agency and criticizing its involvement in countering misinformation during elections. Key cybersecurity leadership roles in the administration remain unfilled. House Homeland Security Committee Chairman Mark Green, a Republican from Tennessee, is reintroducing the Pivot Act, a bill aimed at addressing the US Cyber workforce shortage by creating an ROTC like scholarship for two year cybersecurity degrees. The legislation, which previously had unanimous committee support, stalled last session but remains a priority due to growing cyber threats, particularly from Chinese backed hacking groups like Volt Typhoon. Under the bill, students at community colleges and technical schools would receive scholarships in exchange for two years of government cyberservice at any level. The program, managed by CISA, also seeks to expedite security clearances and place 10,000 new cyber professionals in the workforce. Despite internal Republican debates over CISA's role, Green argues the agency is critical to national cybersecurity and workforce development efforts. Coming up after the break on our CERT Byte segment, a look at ISE2's CISSP exam and Google updates its stance on AI weapons. Stay with us.
