Transcript
A (0:02)
You're listening to the Cyberwire Network powered.
B (0:04)
By N2K.AI Adoption is exploding and security teams are under pressure to keep up. That's why the industry is coming together at the Data SEC AI Conference, the premier event for cybersecurity, data and AI leaders. Hosted by data security leader Ciera. Built for the industry by the industry, this two day conference conference is where real world insights and bold solutions take center stage. Datasec AI25 is happening November 12th and 13th in Dallas. There's no cost to attend, just bring your perspective and join the conversation. Register now@datasecai2025.com CyberWire a major ransomware attack disrupts airport operations across Europe Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every entra ID tenant. Automaker Stellantis confirms the data breach. Fortra patches a critical flaw in its Go Anywhere MFT software. Europol leads a major operation against online child sexual exploitation. Three of the cybersecurity industry's biggest players opt out of MITRE's 202025 attack evaluations. A compromise steam game drains a cancer patient's donations. We've got our business breakdown. Andres Olchawa and Malenko Starchyk from Vision Space join Maria Vermazes, host of T Minus Space Daily on hacking satellites and how one kid got tangled in scattered spider's we Monday, September 22, 2025 I'm Dave Buettner and this is your CyberWire Intel Briefing. Thanks for joining us here today. Happy Monday. It's great to have you with us. A major ransomware attack has disrupted airport operations across Europe, targeting check in and boarding software supplied by Collins Aerospace. The European Union agency for cybersecurity confirmed that the malware scrambled automated systems, forcing manual workarounds at airports including Heathrow, Berlin and Brussels. Heathrow warned staff that more than 1,000 computers may be corrupted, with recovery requiring in person fixes. Although about half of Heathrow's airlines, including British Airways, restored partial service. Brussels airport canceled nearly 140 flights on Monday. Collins, whose Muse software was attacked, has issued patches but acknowledged hackers remain inside systems even after a rebuild. Law enforcement is investigating. The incident highlights the growing ransomware threat, with aviation cyber attacks up 600% in the last year, according to Talas, and criminal gangs reaping hundreds of millions annually. Congress is on the verge of letting the 2015 Cybersecurity Information Sharing act expire at the end of this month, and the stakes are high. The law gives companies liability protections when sharing cyber threat intelligence with each other and the government essential to timely detection and response. While industry, the Trump administration and many lawmakers favor a clean, multi year reauthorization, repeated attempts at both short and long term extensions have collapsed. Senator Rand Paul has objected to straightforward renewals, pushing instead for changes that industry and colleagues argue would gut protections and chill sharing. With no clear legislative path and the clock ticking, a lapse could have immediate consequences. Hesitation to share critical threat data heightened exposure to attacks and amplified political fallout if a major breach occurs during the gap. A critical design flaw in legacy Microsoft components nearly allowed total compromise of every entra ID tenant. Researcher Dirkjean Molema found undocumented unsigned actor tokens issued by the old access control service and used for internal service to service calls that can impersonate any user for 24 hours and aren't logged or revocable. Coupled with a defect in the deprecated Azure Ad Graph API, an attacker could craft an actor token, target a tenant, impersonate a global admin, and change users, reset passwords or alter configurations with almost no trace in the victim tenant. Microsoft was notified July 14. The company fixed the issue within nine days and issued a public patch on September 4. The takeaway here is legacy auth paths and deprecated APIs are high risk inventory remove and monitor them urgently Automaker Stellantis has confirmed a data breach stemming from a third party vendor supporting its North American customer service operations. The intrusion exposed customer names and email addresses, but no financial or sensitive information. The automaker launched an investigation, alerted law enforcement and began notifying affected customers, warning them to watch for phishing attempts. Stellantis has not disclosed the vendor or number of victims. Fortra has patched a critical flaw in its Go Anywhere MFT software that could enable remote code execution through command injection. The issue stems from deserialization of untrusted data in the licensed servlet, exploitable with a forged license signature. Recent versions include fixes and Fortra urges customers to block public access to the admin console, monitor audit logs and check for suspicious errors while no active exploitation is reported. Past clop ransomware abuses make this vulnerability a serious risk. An international task force coordinated by Europol has identified 51 children and launched proceedings against 60 suspects in a major operation against online child sexual exploitation. Bringing Together officers from 18 countries, investigators met in the Hague to analyze over 5,000 pieces of material using both traditional police work and AI driven forensic tools. The effort produced 276 intelligence packages leading to arrests across multiple jurisdictions. The cross border nature of the crimes, servers, platforms and victims spread across countries underscored the need for real time intelligence sharing. Europol says this collaborative model combining advanced forensics with multinational coordination will guide future efforts. Authorities stress that while police pursue offenders, parents must also take proactive steps, educating children about online risks, setting clear boundaries and encouraging safe reporting of suspicions. Suspicious contact Three of the cybersecurity industry's biggest players Microsoft, SentinelOne and Palo Alto Networks have opted out of MITRE's 2025 Attack Evaluations Enterprise test, raising questions about the program's future relevance. All three cited resource prioritization and innovation as reasons, though experts suggest concerns about the evaluations becoming more promotional than practical also played a MITRE admitted the test may have grown too complex, with tougher scenarios, including cloud environments and alert volume tracking. Despite the withdrawals, a dozen vendors remain in the 2025 round, and Mitre plans to reboot its vendor forum for 2026 to restore industry engagement and refine testing objectives. A latvian streamer fighting stage four cancer lost $32,000 in life saving treat after downloading what appeared to be a verified Steam game during a live fundraiser. Blockblasters, a retro style platformer with very positive reviews, silently drained his cryptocurrency wallet. Initially benign, the game was updated with a crypto drainer on August 30, targeting high value crypto users. Security researchers later tied it to broader thefts of up to $150,000 across hundreds of accounts using a Dropper script, backdoor and Steal C payload. The loss struck during a GoFundMe campaign, but crypto influencer Alex Becker quickly replaced the stolen funds with a $32,500 donation. The case highlights how trusted platforms like Steam can be weaponized, underscoring the need for caution with lesser known or lightly reviewed titles. It's Monday, so that means it's time for our Monday business breakdown. We tracked roughly $390 million flowing into 15 investments plus six acquisitions, so a lively week on the funding side. Vega popped out of stealth with a hefty $65 million across seed and Series A, aiming to beef up R and D and build out its US footprint right alongside them. Irregular focused on securing frontier AI models debuted with an even bigger $80 million raise led by Sequoia targeting model resilience and misuse Prevention. M and A stayed busy, too. CrowdStrike snapped up Pangea to deepen Falcon's AI detection and response story. Think broader coverage across the AI Lifecycle, and Accenture picked up Canada's IAM concepts to sharpen its identity chops across critical industries north of the border. That's this week's business breakdown. If you want the deeper dive on who's buying whom and why it matters for your roadmap, subscribe to N2K Pro and swing by TheCyberWire.com every Wednesday for the latest. Coming up after the break, Maria Varmazes, host of the T Minus Space Daily, speaks with Andres Olchawa and Malenko Starchyk from visionspace. They're talking about hacking satellites and how one kid got tangled in scattered spider's web. Stay with at Talas. They know cybersecurity can be tough and you can't protect everything, but with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world are rely on Thales to protect what matters most applications, data and identity. That's Thales T H A L E S learn more@thalesgroup.com cyber compliance regulations, third party risk and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you're thinking there has to be something more efficient than spreadsheets, screenshots and all those manual processes, you're right. GRC can be so much easier and it can strengthen your security posture while actually driving revenue for your business. You know, one of the things I really like about Vanta is how it takes the heavy lifting out of your GRC program. Their trust management platform automates those key areas compliance, internal and third party risk, and even customer trust so you're not buried under spreadsheets and endless manual tasks. Vanta really streamlines the way you gather and manage information across your entire business. And this isn't just theoretical. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. That's a pretty impressive number. So what does it mean for you? It means you get back more time and energy to focus on what actually matters, like strengthening your security posture and scaling your business. Vanta GRC Just imagine how much easier trust can be. Visit vanta.com cyber to sign up today for a free demo that's V A N T a dot com CYBER Maria Vermazes is host of the T Minus Space Daily podcast. She recently sat down with Andres Ochawa and Malenko Starchyk from visionspace to discuss hacking satellites.
