Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network powered by N2K. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. An unsecured Chrome database exposes personal information of Canva creators A researcher brute forces Google phone numbers 50 day vulnerabilities in Salesforce industry cloud are uncovered. Librarian ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches, including a critical fix for a Netweaver bug. Sensada Technologies confirms the theft of sensitive personal data during an April ransomware attack. Sentinel 1 warns of targeted cyber espionage attempts by China linked threat actors. Skitne gains traction amongst ransomware gangs. The UK's NHS issues an urgent appeal for blood donors on today's Threat Vector host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. And the FBI's Cyber Division welcomes a new leader. Hi, it's Tuesday, June 10th, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. A data breach exposed personal information from 571canva creators after a Russian AI firm My Jedi, left a Chrome database unsecured. The database used to train AI chatbots included survey responses detailing creators, professional and financial data posing phishing and competitive risks discovered by upguard. The breach highlights vulnerabilities in the fast growing AI supply chain where tools like Chroma are deployed rapidly without mature security practices. My Jedi secured the data within 24 hours of notification. This marks the first known Chroma related leak and underscores how the rush to adopt AI has sometimes outpaced safeguards, increasing the risk of misconfigurations and data exposure. A white hat hacker known as brutecat uncovered a flaw in Google's authentication process that exposed users phone numbers to brute force attacks. The exploit required only an email address and used Google's account recovery hints to deduce phone numbers enabling potential SIM swapping attacks. Brutecat bypassed protections using cloud services and Google Looker Studio, exploiting a non JavaScript recovery form and leveraging IPv6 to sidestep IP based rate limits by automating the process. Phone numbers could be cracked in seconds to minutes depending on the region. Despite the severity, Google awarded a modest $5,000 bounty, though they quickly patched the issue. The incident highlights the need for stronger safeguards in account recovery workflows and how overlooked legacy systems can create significant security risks. Security researchers at Appomni uncovered five zero day vulnerabilities and 15 serious misconfigurations in Salesforce Industry Cloud, potentially impacting tens of thousands of organizations. Salesforce Industry Cloud offers low code tools tailored for sectors like healthcare, finance and government, but its ease of use can lead to risky default settings. Three of the five flaws were fixed by Salesforce directly, while two require customer action. The remaining issues stem from common misconfiguration traps often caused by non technical users unknowingly applying insecure access settings. These missteps could lead to major data breaches including exposure of sensitive health or financial data, App Omni's scans show. These risks are widespread among industry cloud users, raising serious concerns about security in low code enterprise platforms designed for speed and simplicity. The Librarian Ghouls Apt group, also known as Rare Werewolf or Rezit, has been actively targeting Russian and CIS organizations through a stealthy and persistent malware campaign extending into May of this year. This group leverages legitimate third party software, PowerShell scripts and phishing emails to avoid detection. Victims receive password protected archives containing fake business documents, initiating a multi stage attack that installs legitimate looking tools like 4T Tray Minimizer to conceal activity once infected. Systems are exploited for credential theft, data exfiltration and cryptocurrency mining. Targets include industrial and educational institutions suggesting an intent to steal intellectual property. The campaign uses scheduled tasks Anydesk for remote access and disables security tools to ensure persistence. Hundreds have been affected by highlighting the group's sophisticated social engineering and technical execution. SAP released 14 security patches in its June 2025 Security Patch Day, including a critical fix for a Netweaver bug rated 9.6 on the CBSS scale. The flaw allows privilege escalation through a missing authorization check in the RFC framework. Onapsis warns it could severely impact application integrity and availability. SAP also addressed five high severity and multiple medium and low severity flaws affecting various components. No active exploitation has been reported, but immediate patching is strongly recommended. Sensata Technologies confirmed that hackers accessed and stole sensitive personal data during a ransomware attack that disrupted operations in April. The attackers had access from March 28 through April 6 and exfiltrated files containing names, Social Security numbers, financial and health data likely belonging to employees. At least 362Maine residents are affected. The Massachusetts based firm, which supplies electrical components globally, hasn't appeared on any known ransomware leak sites and it remains unclear if a ransom was paid. Sentinel 1 is calling for greater industry transparency after revealing targeted cyber espionage attempts by China linked threat actors APT15 and APT41. The first campaign, Purple Haze, involved reconnaissance on Sentinel One servers and attacks using Avanti Zero Day Flaws and the Gore Shell backdoor. A second operation tied to APT41 aimed to infiltrate a SentinelOne supplier via Shadowpad malware in a suspected supply chain attack. These incidents highlight a growing Cybersecurity vendors are becoming direct targets. SentinelOne warns the industry to stay vigilant, citing a pattern of stealthy long term intrusions focused on high value infrastructure. Skitnet, also known as Boss Net, has rapidly become a favored tool among ransomware groups this year, notably Black Basta and Cactus. Marketed as a user friendly post exploitation toolkit, it gained traction following a takedown of major botnets like Quackbot, filling a gap in the cybercrime ecosystem. Distributed via underground forums like Ramp, Sketnet's Malware as a service model enables even low skilled actors to launch advanced attacks. Technically sophisticated, it uses a rust loader and Chacha 20 encrypted NIM payload to establish stealthy DNS based reverse shells. Its persistence techniques include DLL hijacking, startup shortcuts and use of tools like AnyDesk and PowerShell. The malware also features anti forensic measures, log wiping and living off the land tactics making detection and attribution difficult. Skitnet's rise underscores the growing industrialization of cybercrime and the need for proactive defense strategies. The UK's NHS has issued an urgent appeal for 1 million blood donors as national blood supplies remain critically low, especially for O negative blood, following a 2023 ransomware attack on pathology provider Synovus. The attack disrupted services, forcing hospitals to rely heavily on O type blood, leading to a fragile supply. The NHS is particularly seeking O negative donors and those of black heritage, crucial for treating conditions like sickle cell disease. Meanwhile, over 900,000 patients were impacted by the Synovus breach, which exposed sensitive medical data, including cancer and STI records. Despite legal obligations to notify affected individuals, many remain uninformed. The NHS warns that without immediate donor support, the system risks entering a red alert state where demand exceeds supply, threatening patient care and public safety. Coming Coming up after the break on today's Threat Vector, David Moulton speaks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. And the FBI's Cyber Division welcomes a new leader. Stay with us.
