Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire Researchers uncover serious vulnerabilities in the signal fork reportedly used by top government officials. CISA adds a second commvault flaw to its known exploited vulnerabilities catalog. Xai exposed a private API key on GitHub for nearly two months. Border Guard uncovers the cyber espionage campaign targeting critical national infrastructure in the Middle East. Threat brokers advertise a new SS7.0 day exploit on cybercrime forums. The Steel C Info Stealer and Malware Loader gets an update. Passkeys blaze the trail to a passwordless future on our afternoon Cyber Tea segment with Ann Johnson and speaks with Christina Murillo, head of Information Security at the New York Giants and Cubism meets computing. The Z80 goes full Picasso.
Ann Johnson (2:02)
Foreign it's.
Dave Bittner (2:09)
Monday, May 5, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Hello everyone and welcome back. It is really good to be home back in the Baltimore area after an exciting, energizing trip to San Francisco for this year's RSAC 2025 conference. The conference was a hit. Great sessions, lively conversations and plenty of time spent with friends, both familiar faces and some fantastic new ones. And yes, I spotted my new favorite T shirt. My agentic AI has purchase authority because nothing says cutting edge like giving your AI a company credit card. Let's get into it. So researchers have uncovered a serious vulnerability in TM Signal, an obscure non public messaging app reportedly used by former National Security Advisor Mike Waltz, known for accidentally adding a journalist to a classified chat. TM Signal turns out to be a lightly tweaked version of Signal modified to archive messages, which may explain its appeal to officials needing to comply with record keeping laws. But here's the the app uses hard coded credentials, a rookie level security blunder according to hackers. The company behind the app, Telemessage, was also breached, exposing messages, user data and even backend credentials. The breach reportedly took 15 to 20 minutes, and it raises uncomfortable questions about why officials are turning to fringe apps instead of secure government systems. Whatever the rationale, it's clear that security hygiene took a back seat. What happened here appears to be a textbook case of bypassing the rules that exist for a reason. Instead of going through proper US Government channels to vet and approve software, officials reportedly sidestepped protocol and deployed a messaging app through what amounts to shadow it. It's the kind of move that makes the whole cutting red tape mantra look reckless rather than efficient. Bureaucracy may be frustrating, but it's built on hard learned lessons about risk and control. Ignoring it in favor of quick fixes isn't innovation, it's dangerous. CISA has added a second Commvault flaw to its known exploited vulnerabilities catalog in less than a week, highlighting rising threat activity. The critical vulnerability, with a CVSS score of 10, affects multiple commvault command center versions and allows unauthenticated remote code execution via malicious zip files. Though not yet confirmed exploited in the wild, proof of concept code is public. Federal agencies Must patch by May 23. CISA also added a related YI framework flaw used in craft CMS attacks. A security misstep at Elon Musk's AI company Xai exposed a private API key on GitHub. For nearly two months. The key granted unauthorized access to internal, finely tuned LLMs used by SpaceX to Tesla and X Twitter, including unreleased GROK models discovered by security expert Philippe Catoregli and later investigated by GitGuardian. The leak stemmed from a mistakenly committed environment file. Despite early alerts, the key remained active until April 30. The exposed credentials had access to at least 60 sensitive data sets, underscoring lapses in XAI's credential management and internal monitoring. GetGuardian flagged that this kind of mistake committing secrets to public repos is unfortunately common. XAI has not commented publicly. The incident highlights how even top tier tech firms can fall short on basic operational security when secret management protocols are weak or overlooked. Fortiguard's Incident Response Team has uncovered a prolonged cyber espionage campaign targeting critical national infrastructure in the Middle east attributed to an Iranian state sponsored group. The intrusion spanned from May 2023 to early 2025, with activity possibly dating back to 2021. Attackers used stolen VPN credentials to access the network, deploying custom malware like Hanifnet, HX Library and Neo Express Rat, and evaded segmentation using proxy tools. They also attempted to regain access post containment via Web app vulnerabilities and phishing attacks. The campaign showed a high level of sophistication, with an emphasis on persistence and stealth. No operational disruptions were confirmed, but the attackers demonstrated strong interest in OT systems. The report urges better credential hygiene, stronger segmentation and proactive monitoring to defend against such advanced threats. A newly advertised SS7 zero day exploit on cybercrime forums is raising alarms about global mobile network security. Priced at $5,000, the kit allows attackers to intercept SMS messages, track phones in real time and potentially eavesdrop on calls or bypass two factor authentication. The exploit targets vulnerabilities in the mobile application part of the SS7 protocol, spoofing legitimate network nodes to manipulate routing and location data. Despite SS7's outdated design, it still underpins many 2G and 3G telecom systems worldwide used by about 30% of mobile connections. While newer networks offer stronger security, legacy systems remain vulnerable. Experts urge telecom providers to adopt SS7 firewalls and stricter controls and recommend users move away from SMS based authentication. This incident highlights the ongoing risks from legacy telecom infrastructure, Even decades after SSS's known flaws were first exposed. A popular infostealer and malware loader called Steelsea has released its second major version, now at 2.2.4. First spotted in March of this year by Zscaler, the update includes improved payload delivery, Chrome cookie theft bypasses, RC4 encryption and real time alerts via Telegram. It also adds a new admin panel and support for 64 bit systems. Notably, anti VM checks were removed, possibly due to a major code overhaul. Steel C remains actively used in attacks often delivered via malware loaders like Amaday. Microsoft is advancing its commitment to a passwordless future by making passkeys the default sign in method for all new Microsoft accounts. This shift aligns with the industry's move toward more secure and user friendly authentication methods. Passkeys utilize device based biometric or PIN authentication, eliminating the need for traditional passwords and reducing the risk of phishing attacks. Microsoft reports a 98% success rate for passkey sign ins, significantly higher than the 32% for password based logins. Security expert Troy Hunt emphasizes the vulnerabilities associated with traditional two factor authentication methods such as one time passwords, which can be susceptible to phishing. In a post titled Passkeys for Normal People, he advocates for the adoption of passkeys, highlighting their resistance to such attacks. Hunt's insights underscore the importance of transitioning to more secure authentication methods as major tech companies like Microsoft, Apple and Google adopt passkeys users are encouraged to embrace this change for enhanced security and a more streamlined login experience. Coming up after the break on our afternoon Cyber Tea segment with Ann Johnson. Ann speaks with Christina Murillo, head of Information security at the New York Giants and Cubism meets computing. The Z80 goes full Picasso.
