Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com n2k and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K Security concerns grow over Doge's use of AI the British government demands access to encrypted iCloud accounts. Researchers identify critical vulnerabilities in the Deep Seq iOS app Microsoft Edge uses AI to block scareware. A phishing campaign targets Facebook users with fake copyright infringement notices. Researchers discover malicious, ambitious machine learning models on hugging face A major data broker faces yet another data breach lawsuit. CISA warns of a critical Microsoft Outlook vulnerability under active exploitation. Our guest is John Anthony Smith, founder and chief security officer at Phoenix 24, sharing his insights into why backups could be your most important security control and the UK's Cyber Weather Report says expect light fishing with a chance of ransomware.
John Anthony Smith (2:25)
Foreign.
Dave Bittner (2:32)
February 7, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Happy Friday and thanks for joining us here today. It is great to have you with us. Elon Musk's Department of Government Efficiency Doge has been using AI software to analyze financial data at the US Education Department, including personally identifiable information related to grants and internal financial records. The team, which includes former Musk employees, is leveraging Microsoft's Azure cloud services to scrutinize every dollar spent by the government, with the goal of significantly cutting costs and potentially eliminating the department altogether. The Washington Post reports Doge's actions align with the Trump administration's broader agenda to shrink federal agencies. The group plans to extend its AI driven auditing across multiple government departments, including the Department of Health and Human Services, the Treasury, and the Centers for Disease Control and Prevention, seeking to optimize government spending. Their access to Medicare and Medicaid payment systems has raised concerns about potential privacy violations and data breaches. Critics warn that Doge's approach lacks oversight and could lead to security risks, particularly as AI systems are prone to errors and may expose sensitive data. The rapid implementation of Doge's strategies has has already led to significant workforce reductions, including placing 100 Education Department employees on administrative leave based on their participation in diversity training. In response to growing concerns, a federal judge temporarily restricted Doge's access to treasury payment systems after advocacy groups filed a lawsuit. While Musk's team claims they're rooting out inefficiencies and fraud, privacy experts worry about the unchecked power DOGE has gained, the potential for misuse of personal data, and the broader implications of AI driven government restructuring. The British government has reportedly issued a secret legal demand to Apple requiring access to encrypted iCloud accounts under the Investigatory Powers Act Technical Capability Notice, according to the Washington Post. While reporting on the existence of a TCN is legal, disclosing its details is prohibited. The demand could create a backdoor for authorities to access global iCloud data, though officials claim it only ensures compliance with legal warrants. Apple introduced optional end to end encryption for iCloud in 2022, despite law enforcement concerns about crime prevention. Similar encryption debates continue, with UK officials criticizing Meta's end to end encrypted messaging. Tech companies argue alternative security measures suffice, while law enforcement insists metadata alone is insufficient for serious investigations. Neither Apple nor the UK government has commented on the report. Research from security firm NowSecure has identified critical vulnerabilities in the DeepSeek iOS app, urging enterprises and governments to ban its use due to severe privacy and security risks. Since its rise to the top of the App store on January 25, DeepSeek has been downloaded on millions of devices, including those used by government employees, prompting swift bans from multiple agencies and the US Military. Key risks include unencrypted data transmission, weak encryption, insecure data storage, extensive data collection, and data transmission to China. Under PRC laws, these issues pose significant threats, including surveillance data breaches and compliance violations. Now Secure recommends organizations immediately remove Deep Seek, seek secure AI alternatives and continuously monitor mobile applications for emerging risks. The latest version of Microsoft Edge is rolling out globally with key improvements, including an AI powered Scareware blocker and a revamped downloads ui. The Scareware blocker now available in Edge's settings, detects tech support scams in real time using computer vision without sending data to the cloud. Unlike Defender SmartScreen, it analyzes webpage content to block scams more effectively. A phishing campaign is targeting Facebook users with fake copyright infringement notices, aiming to steal login credentials. The scam, sent to over 12,000 email addresses, primarily affects enterprises in the EU, US and Australia. Attackers use Salesforce's email service to make phishing emails appear legitimate. The emails claiming violations under the dmca, reference major companies like Universal Music Group and create urgency by threatening account restrictions. Victims clicking the appeal link are directed to a fake Facebook support page designed to capture their credentials. Attackers can then hijack accounts, alter content, and manipulate messaging, posing risks for businesses relying on Facebook. Researchers at Reversing Labs have discovered malicious machine learning models on Hugging Face exploiting vulnerabilities in Python's Pickle serialization format. These models contain embedded payloads capable of executing arbitrary code, posing serious security risks. Pickle is widely used in ML but allows attackers to embed harmful commands with seemingly legitimate models. The researchers identified two Pytorch based malicious models, dubbed Nullif AI, that bypassed Hugging Face's security tools by executing payloads early in the Pickle stream. The incident highlights the risks of collaborative AI platforms where productivity often outweighs security. Hugging Face is enhancing its protections, but developers should remain cautious, avoid unverified models and consider safer serialization alternatives. Security experts recommend monitoring for suspicious activity linked to Pickle vulnerabilities to prevent potential cyber threats. Gravy analytics is facing yet another lawsuit over a massive data breach that allegedly exposed 17 terabytes of personal data, including the precise locations of millions of smartphones. This is the fourth lawsuit since January, following claims that hackers stole sensitive data from the company's AWS S3 storage buckets and posted evidence on a cybercrime forum. The stolen data reportedly includes geo coordinates collected from popular apps like Tinder, Grindr, Candy Crush, MyFitnessPal and VPN services affecting users in the U.S. europe and Russia. Gravy, now part of Unicast, has already been banned by the FTC from selling sensitive location data. The lawsuit alleges negligence, breach of contract and unfair competition. While Gravy denies direct collection of location data, critics argue the company failed to secure its license datasets, leading to serious privacy risks. CISA has issued an urgent warning about active exploitation of a critical Microsoft Outlook vulnerability dubbed Moniker Link. This remote code execution flaw allows attackers to bypass Office Protected View, making malicious Office files open in editing mode instead of read only. The vulnerability affects multiple Microsoft Office products and can be exploited via zero click attacks leading to NTLM credential theft, remote code execution, and full system compromise. CISA has added this flaw to its known Exploited Vulnerabilities catalog, requiring federal agencies to Patch by February 27th. Coming up after the break, John Anthony Smith from Phoenix24 shares insights into why backups could be your most important security control. And the UK's cyber weather report says expect light fishing with a chance of ransomware. Stay with us.
