Transcript
Sponsor Announcer (0:02)
You're listening to the Cyberwire Network, powered by N2K. This episode is brought to you by Indeed. Stop waiting around for the perfect candidate. Instead, use Indeed Sponsored Jobs to find the right people with the right skills fast. It's a simple way to make sure your listing is the first candidate. C According to Indeed data, Sponsored Jobs have four times more applicants than non sponsored jobs. So go build your dream team today with Indeed. Get a $75 sponsor job credit@ Indeed.com podcast. Terms and conditions apply.
Dave Bittner (0:46)
Dark Sword targets iPhones for indiscriminate exploitation cybercrime in the Iran war. The FBI confirms purchasing commercially available location data. The DHS secretary nominee gets grilled on CISA funding. A Zimbra collaboration suite, Vulner, is being used in targeted espionage. A new Android malware targets sensitive data stored in user notes. AWS warns of ongoing interlock ransomware activity tracking pixels grab more than they should Harry Carpenter and Mason Amadeus from the Fake Files podcast speak with Haynie Farid about the real world harms of synthetic media and do boomers balance breaches better. Foreign. March 19, 2026 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. A newly discovered iPhone hacking technique called Dark Sword marks a shift from rare targeted attacks to large scale, indiscriminate exploitation. Researchers at Google, Iverify and Lookout found the tool embedded in compromised websites, allowing attackers to silently hack iPhones that simply visit those pages. It primarily affects devices running older versions of iOS 18, which still account for roughly a quarter of iPhones. Dark Sword can extract sensitive data, including passwords, messages, photos, and even cryptocurrency wallet credentials. It uses fileless methods, hijacking legitimate system processes to avoid detection, and operates in a quick smash and grab fashion before disappearing after a reboot. The tool has been linked to Russian espionage campaigns and earlier attacks in multiple countries, but its code was left exposed online, making it easy for other hackers to reuse. Researchers warn this reflects a growing market where advanced iPhone exploits are being widely shared, increasing risks for everyday users, not just high value targets. Has cybercrime activity surged since the start of the Iran war? Well, that depends on who you ask. Akamai reports a 245% increase in attacks, particularly targeting banking and fintech sectors. Most activity involves reconnaissance and infrastructure scanning, including spikes in botnet traffic, credential harvesting, and distributed denial of service preparation. While some attacks originated from Iran, many were routed through Russia and China, often via proxy services used by hacktivists. Researchers also observed increased activity from pro Russian groups and Iran linked actors like Handela, which claimed a destructive attack on a U.S. medical firm. Despite this, CISA reports no significant rise in nation state threats, noting a steady overall landscape. The findings highlight how geopolitical conflict is expanding the cyberattack surface, with both state linked and criminal groups exploiting the situation. The FBI has confirmed it's purchasing commercially available location data to track individuals, according to Director Kash Patel's Senate testimony yesterday. This marks a shift from 2023 to when the agency said it was not actively buying such data. Officials say the practice complies with existing laws and has produced useful intelligence. The disclosure raises concerns among lawmakers who argue it bypasses warrant requirements established by the Supreme Court. Proposed legislation would require warrants for such purchases, while others defend the practice as a necessary tool for law enforcement. Senator Mark Wayne Mullen, nominee for DHS secretary, faced questions over whether he would restore staffing and funding cuts at the Cybersecurity and Infrastructure Security Agency. Lawmakers highlighted that the agency's workforce was reduced by about one third and its budget significantly cut under current leadership. Mullin did not commit to reversing those changes, instead emphasizing the need to recruit the right people and ensure mission readiness without specifying staffing levels. Senators warned that rising geopolitical tensions, including conflict with Iran, could increase cyber threats, underscoring the need for a fully resourced cyber defense agency. Critics argued that recent cuts have weakened national cybersecurity, citing program reductions and disruptions at cisa, Mullen is expected to advance to a full Senate confirmation vote. Speaking of cisa, they've added a critical Zimbra collaboration suite vulnerability to the known Exploited Vulnerabilities catalog, citing active exploitation. The flaw is a stored cross site scripting issue in Zimbra's classic UI that allows attackers to embed malicious code in emails. When opened, the code executes within the user's session, enabling data theft, session hijacking and broader system compromise. Researchers report the flaw has been used in targeted espionage, including a campaign attributed to Russian linked group APT28 against a Ukrainian government agency. The attack required no links or attachments relying entirely on malicious HTML email content. CISA has ordered federal agencies to patch by April 1, urging immediate updates or discontinuation of the platform if unpatched. Perseus is a new Android malware that targets sensitive data stored in user notes, including passwords, recovery phrases and financial details disguised as IPTV apps in unofficial app stores. It exploits side loading habits to infect devices and gain full control using Android accessibility services. Researchers at ThreatFabric report that Perseus can capture screenshots, perform overlay attacks and remotely control devices with a focus on financial and crypto apps, particularly in Turkey and Italy. Notably, it systematically scans note taking apps, a rare capability. The malware reflects a broader trend of attackers exploiting pirated streaming apps to distribute banking Trojans and steal personal data. The Interlock Ransomware group has been exploiting a critical zero day flaw in Cisco's Secure Firewall Management center since January, according to aws. The vulnerability allows unauthenticated attackers to execute code as root, giving full system control. AWS observed attackers using the flaw for initial access, then deploying scripts, custom remote access tools and a memory resident web shell to maintain stealthy persistence. They also installed backup access via remote management software. The campaign highlights the risks of zero day exploits where attacks occur before patches are available, reinforcing the need for layered defenses and continuous monitoring alongside rapid patching. A new analysis from Jscrambler finds that TikTok and meta tracking pixels collect far more data than typical. Ad attribution requires raising privacy and security concerns beyond tracking user behavior. These pixels gather personal information such as emails, phone numbers and addresses, then convert them into persistent identifiers that can be re linked to individuals, the research shows. The pixels also capture detailed commerce data including product selections, pricing and checkout activity, often without businesses fully realizing the scope. In some cases, sensitive data is collected before or despite user consent and and may even be transmitted insecurely. This creates potential violations of privacy laws like GDPR and CCPA while also exposing businesses to competitive risks as the collected data can enhance ad targeting for larger rivals. Coming up after the break, Perry Carpenter and Mason Amadeus speak with Haney Farid about the real world harms of synthetic media and de boomers balance breaches Better stick around. No, it's not your imagination. Risk and regulation really are ramping up and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk and customer trust together on one AI powered platform. So whether you're getting ready for a SoC2 or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and RYTR spend 82% less time on audits. With Vanta, that means less time chasing paperwork and more time focused on growth. For me, it comes down to over 10,000 companies, from startups to large enterprises. Trust Vanta to help prove their security. Get started@vanta.com cyber.
