Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, DeleteMe is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know.
Tim Starks (0:45)
Exactly what's been done.
Dave Bittner (0:47)
Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K federal agencies become battlegrounds in an unprecedented power struggle. XE Group evolves from credit card skimming to exploiting zero days. WhatsApp uncovers a zero click spyware attack linked to an Israeli firm. Texas expands its ban on Chinese backed AI and social media apps. Data breaches expose the personal and medical information of over a million people. Nvidia patches multiple critical vulnerabilities. ARM discloses critical vulnerabilities affecting its MALI GPU kernel drivers and firmware. The UK government aims to set the global standard for securing AI. Tim Starks from cyberscoop has the latest from Senate confirmation hearings and the National Cryptologic Museum rights a wrong.
Tim Starks (2:25)
Foreign.
Dave Bittner (2:29)
February 3, 2025 I'm Dave Bittner and this is your Cyberwire intel briefing. Thank you all for joining us here today. Great to have you with us as always. This past weekend, chaos erupted within federal agencies as Elon Musk's task force moved swiftly to seize control of critical government operations. The U.S. agency for International Development is facing deep uncertainty as President Trump continues his push to slash foreign aid and restructure federal agencies. The agency's independence is at risk and sweeping layoffs are expected. Two top security officials, John voorhees and Brian McGill, were placed on administrative leave after denying access to representatives from Elon Musk's team who sought entry into classified systems. USAID's chief of staff, Matt Hopson, has also resigned. Musk, appointed to lead a controversial government restructuring initiative, has publicly criticized usaid, calling it a criminal organization and pushing for its shutdown. His influence extends to the Office of Personnel Management, where his appointees have locked out career civil servants from critical personnel databases containing sensitive government employee data. Federal workers have raised cybersecurity concerns, noting that Musk's team now controls systems without oversight. The situation has sparked protests outside opm, where government employees accuse Musk's team of orchestrating a hostile takeover. Meanwhile, an unsecured email system at OPM led to a massive spam attack targeting federal employees, highlighting the vulnerabilities of the rushed transition. Amid the turmoil, Musk's self named Department of Government Efficiency Doge is overseeing a dramatic downsizing of the federal workforce, offering employees buyouts to resign. Agencies like CISA have been excluded from these offers, raising further concerns about the restructuring's national security implications. The events reflect a broader shift in Trump's second term governance, with Musk playing a central role in reshaping federal institutions. Xegroup, a cybercriminal organization active for over a decade, has evolved from credit card skimming to exploiting zero day vulnerabilities, posing significant threats to global supply chains. Originally known for targeting e commerce platforms, the group has shifted to infiltrating manufacturing and distribution sectors. By 2024, XeGroup exploited two vulnerabilities in Veracor, a supply chain management software, using an upload validation flaw and an SQL injection vulnerability to exfiltrate data and maintain persistent access. The group demonstrated patience reactivating a web shell planted in 2020. Using customized web shells and PowerShell based payloads, XeGroup has automated its attacks, focusing on long term infiltration. Researchers believe the group operates from Vietnam but is likely not state sponsored due to minimal operational security measures. WhatsApp has uncovered a zero click spyware attack linked to Israeli firm paragon, targeting nearly 100 journalists, activists and civil society members worldwide. The spyware required no user interaction, making it especially dangerous. WhatsApp disrupted the attack, alerted affected users and collaborated with Citizen Lab, which helped analyze the breach. Victims including Italian journalist Francesco Cancellato, are investigating the extent of data exposure. The spyware could access messages, activate microphones and steal passwords, raising major privacy concerns. Paragon, which markets itself as an ethical alternative to NSO Group, had been seeking entry into the US Market. However, recent scrutiny and national security concerns have paused key contracts. This incident underscores the urgent need for stronger regulations on commercial spyware and government surveillance tools. Texas governor Greg Abbott has expanded the state's ban on Chinese backed AI and social media apps, prohibiting six additional platforms, including Deep Seek, Lemon 8 and RedNote, on government issued devices. The order aims to prevent data harvesting and potential espionage by the Chinese Communist Party. This follows Abbott's 2022 ban on TikTok and a 2023 law granting him authority to block apps posing security risks. The move comes amid heightened concerns over Chinese technology influence, especially as platforms like Rednote gain popularity among U.S. users. Three separate data breaches have exposed the personal and medical information of over a million people. Asheville Eye Associates in North Carolina confirmed a CyberAttack affecting over 193,000 patients. Stolen data includes medical treatment details and insurance information, but not Social Security or financial data. The Dragon Force Ransomware Group claimed responsibility last December. Delta County Memorial hospital reported a May 2024 breach affecting over 148,000 individuals. Hackers accessed Social Security numbers, medical data and financial records. Victims will receive free identity theft protection. Globe Life Insurance is notifying 850,000 individuals of a data theft incident linked to an extortion attempt. The compromised data includes insurance policy details and personal identifiers, though the company states no business operations were disrupted. GlobeLife is working with regulators and offering credit monitoring services to affected customers. Nvidia has released critical security updates to patch multiple vulnerabilities in its GPU display driver and virtual GPU software. These flaws, affecting both Windows and Linux platforms, could lead to information disclosure, denial of service, data tampering or code execution. Key issues include a buffer overflow and a memory corruption flaw in VGPU. Affected products include GeForce, Nvidia, RTX, Quadro NVS and Tesla GPUs. Nvidia urges users to update immediately via the Driver Downloads page to mitigate security risks. ARM has disclosed critical security vulnerabilities affecting its MALI GPU kernel drivers and firmware impacting Bifrost, Valhall and 5th gen GPU architectures. One flaw has been actively exploited, allowing local attackers to access freed memory, potentially leading to further system compromise. Nine Additional vulnerabilities could cause system crashes, privilege escalation or data leaks. Affected users, especially those on smartphones and tablets, are urged to immediately update drivers and firmware to mitigate risks. The UK government has introduced a new AI code of practice aiming to set a global standard for securing AI through the European Telecommunications Standards Institute. Developed with the National Cybersecurity center and industry stakeholders, the voluntary code outlines 13 principles covering secure AI design, deployment and maintenance. The code applies to AI vendors and organizations using AI, but excludes vendors selling AI models without deploying them. These will be governed by separate cybersecurity regulations. Key principles include threat modeling, secure infrastructure, software, supply chain security, and regular updates. NCSC CTO Ali Whitehouse emphasized its role in fortifying UK AI security while promoting innovation. The UK aims to lead globally in AI safety. Following recent efforts to criminalize deepfake creation, the government hopes this framework will enhance AI resilience and protect digital ecosystems from security threats. Coming up after the break, Tim Starks from cyberscoop has the latest from the Senate confirmation hearings and the National Cryptologic Museum Rights are wrong Stay with us.
