Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI Our researcher uncovers vulnerab across Intel's internal websites that exposed sensitive employee and supplier data. The Kim Suki Group targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 rapid reset fix. Drug development firm Innovative reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the Pipe Magic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android bank Trojan is leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency on this week's Threat vector, David Moulton speaks with Liz Pinder and Patrick Bale for a no holds barred look at context switching in the sock and a UK police force fails to call for backup. It's Tuesday, August 19, 2025. I'm Dave Buettner, and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Security researcher Eaton Zvere uncovered four major vulnerabilities across Intel's internal websites that exp sensitive employee and supplier data. First, Intel's business card ordering site allowed login bypass, enabling access to a global employee database of over 270,000 records. Second, the hierarchy management site stored weakly encrypted hard coded credentials, allowing attackers to decrypt passwords, impersonate admins, and access employee and product data. Third, the product onboarding portal leaked multiple hard coded credentials, including GitHub tokens, which could have allowed rogue product uploads. Finally, Intel's SIM supplier site had broken authentication checks, letting attackers enumerate employees and access confidential supplier agreements. While intel patched the flaws after disclosure, its bug bounty program excluded website vulnerabilities, leaving the researcher unrewarded despite reporting critical issues elsewhere, Researchers at Trellix have exposed a North Korea linked espionage campaign by the Kim Suki Group, also known as APT43, targeting South Korean diplomatic missions. Between March and July, at least 19 spear phishing emails impersonated trusted contacts using password protected zip files hosted on Dropbox and DOM. The lures mimicked real events such as EU meetings and US Independence Day celebrations. Once opened, malicious LNK files launched obfuscated PowerShell scripts that pulled base 64 encoded payloads from GitHub, where attackers maintained private repositories for command and control. Victims ultimately received Xenorat, a remote access Trojan enabling full system control. Data theft and surveillance infrastructure analysis linked operations to the DPRK but noted Chinese holiday pauses, suggesting activity from China. The campaign maps to MITRE attack techniques remains ongoing and underscores the need for stronger diplomatic network defenses, researchers from Tel Aviv University have uncovered. MadeYou Reset, a new DDoS vulnerability in the HTTP 2 protocol that bypasses the 2023 Rapid Reset fix. Like Rapid Reset, it abuses HTTP 2's concurrent stream design to overwhelm servers. But instead of clients canceling requests, attackers send invalid control frames that force the server to cancel streams on their behalf. This allows attackers to repeatedly trigger backend work, mimicking rapid reset's devastating effect. The flaw could impact up to one third of websites worldwide. Severity varies across implementations While many vendors had already hardened systems after rapid reset, others only patched recently. Mitigation is complex, requiring stricter stream cancellation handling or backend limits, but inconsistent vendor responsibility leaves risks unresolved. Indiana based drug development firm Innotiv reported a ransomware attack to the SEC after discovering the incident on August 8. Threat actors encrypted key systems, forcing shutdowns that disrupted internal data storage, business applications and overall operations. The company is relying on offline alternatives while working to restore systems with no timeline yet for recovery. Law enforcement was notified, though no group has claimed responsibility. InnoTiv, which earned $375 million in the first three quarters of 2025, said financial impacts remain uncertain. The UK has reportedly dropped a demand requiring Apple to provide access to encrypted iCloud accounts, according to US Director of National Intelligence Tulsi Gabbard. The order, known as a technical capability notice, was criticized as a backdoor into user data, though the British government disputes that characterization. Apple had disabled advanced Data protection for UK users in 2023 to comply, since the feature made certain iCloud data accessible only from user devices. Apple is challenging the order at the Investigatory Powers Tribunal. With support from civil society groups, the UK government emphasized safeguards under existing US UK data sharing agreements, stressing that neither nation can target the other's citizens while reaffirming its commitment to balancing security with privacy protections. Microsoft has warned that hackers are disguising the Pipe Magic backdoor as a fake ChatGPT desktop app to prepare ransomware attacks attributed to threat group Storm2460. The malware exploits a Windows zero day in the common log file system driver to gain persistence and escalate privileges before deploying ransomware. Pipe Magic has been observed targeting it financial and real estate sectors worldwide. First seen in 2022, the malware resurfaced in 2024. Victims see only a blank screen while attackers gain remote access and data theft capabilities. Researchers from Huntio have discovered that the source code for Ermac version 3.0, a powerful Android banking Trojan, was leaked online in March 2024 via an exposed archive. The leak contained the trojan's back end, front end panel, Exfiltration Server builder and obfuscator. EIRMAC 3.0 expanded targeting from 467 apps in version 2 to over 700 financial, shopping and crypto apps, while adding stronger encryption, upgraded form injection techniques, fake push notifications, device control and remote uninstallation. Huntio also uncovered live infrastructure tied to the operation, including command and control servers with weak security for such as hard coded tokens and default credentials. While the leak undermines ermac's malware as a service credibility, it may enable defenders to improve detection but also risks new, harder to Detect variants emerging Nebraska man Charles O. Parks III, also known as CP3O, was sentenced to one year in prison for defrauding cloud providers for of nearly $3.5 million to mine nearly $1 million in cryptocurrency between January and August 2021. He used aliases and shell companies to access massive computing power from providers believed to be Microsoft and Amazon without paying. Parks laundered proceeds through crypto exchanges, banks and even an NFT marketplace funding luxury purchases. Prosecutors said he falsely branded himself a crypto influencer and innovator. Coming up after the break on this week's Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bale about context switching in the soc, and a UK police force fails to call for backup. Stay with us. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use indeed when it comes to hiring, indeed is all you need. Stop struggling to get your job post noticed. Indeed's sponsored Jobs helps you stand out and hire fast Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with sponsored jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need.
