Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network powered by N2K.
Sean Dube (0:18)
Hackers leak back end data from the North Korean state sponsored hacking group Kim Suki. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world's largest staffing firms suffers a data breach. St. Paul, Minnesota confirms the interlock ransomware gang was behind a July cyber attack. Researchers jailbreak chatgpt5 A cyber incident takes the Pennsylvania Attorney General's office entirely offline. A new report quantifies global financial exposure from operational technology cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we're joined by Sean Duby Sampras, principal technolog technologist with insights on the global state of ransomware and hackers take smart buses for a virtual JoyRide. It's Tuesday, August 12th, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Thanks for joining us. It's great to have you with us. Two hackers with the handles, Saber and Cyborg leaked 8.9 gigabytes of backend data from North Korean state sponsored hacking group Kim Suki, citing ethical objections to the group's financial greed. The leak, shared via distributed denial of secrets, exposes Kim Suki's infrastructure, phishing tools, malware, source code and operational logs. It includes phishing kits targeting South Korean government sites, Cobalt strike loaders, reverse shells, SSH logs, private certificates and links to GitHub accounts and VPN purchases. Kimsuki, known for espionage against South Korea and global entities, now faces potential disruption as parts of its infrastructure are compromised. While the exposure may hinder ongoing operations, experts note long term impact is uncertain. The breach offers valuable intelligence for cybersecurity analysts to strengthen defenses and develop targeted countermeasures. A ransomware attack on Dutch lab clinical diagnostics NMDL exposed personal and medical data of about 485,000 women in the national Cervical Cancer Screening Program. Stolen data includes names, addresses, medical test results and historical records, some of which are already for sale on the Dark Web. The Lab waited nearly five weeks to report the breach, far exceeding the EU's 72 hour rule. The delay prompted Population Screening Netherlands to cut ties and move testing to other labs to maintain program operations. Manpower. One of the world's largest staffing firms is notifying over 144,000 people of a data breach that occurred between December 29, 2024 and January 12 of this year. The breach was discovered during an IT outage investigation in Lansing, Michigan and attackers reportedly stole 500 gigabytes of data. The Ransom Hub ransomware group claimed responsibility, alleging theft of sensitive personal, corporate and financial record, including passport scans, Social Security numbers, contracts and HR data. Some data has since been removed from Ransom Hub's leak site, suggesting a ransom payment. Manpower says they've strengthened IT security, that they're working with the FBI and that they're offering free credit monitoring through Equifax. Ransom Hub, a rebranded Ransomware as a service operation, has targeted numerous high profile victims and breached over 200 U.S. critical infrastructure entities in recent years. St. Paul, Minnesota confirmed the interlock ransomware gang was behind a July cyber attack that disrupted city systems, prompting the governor to deploy the National Guard's cyber unit. While emergency services were unaffected. Online payments and some services remain delayed. The city refused to pay ransom, but Interlock claims to have stolen 66,000 files and has leaked some online. Active since 2024, Interlock targets global organizations, especially healthcare, and was recently linked to major breaches at DaVita and Kettering Health. Just 24 hours after OpenAI launched GPT5 on August 7, Tenable Research says it bypassed the model's new Safe Completions safety system and obtained detailed instructions for making a Molotov cocktail. OpenAI had touted GPT5 as its most advanced model yet, with expert level skills, improved accuracy and stronger safeguards against harmful use. Using a four step crescendo approach, Tenable posed as a history student, gradually steering the model toward providing dangerous instructions. The incident raises concerns about GPT5 security, as other researchers have also reported jailbreaks and hallucinations. OpenAI says fixes are in progress, but Tenable warns that organizations may already be exposed to risks if employees use the model without safeguards. A cyber incident has taken the Pennsylvania Attorney General's office entirely offline, disabling its website, email and phone systems. Attorney General Dave Sunday confirmed the outage, which is preventing citizens from submitting tips or accessing resources. Staff are continuing work and coordinating with supervisors to limit disruptions. The nature of the attack and any potential data exposure remain undisclosed. The office is working with law enforcement to investigate the incident and restore full system functionality. Dragos, in collaboration with Marsh McLennan's Cyber Risk Intelligence center, has released the 2025 OT Security Financial Risk Report, what they say is the first large scale analysis quantifying global financial exposure from operational technology cyber incidents. The report highlights that indirect losses such as business interruption, can account for up to 70% of the total impact in extreme but plausible one. In 250 year scenarios, global OT cyber risk exposure could reach $329.5 billion, with 172.4 billion tied specifically to business interruptions. Drawing on over a decade of breach and insurance claim data, the study identifies the top three OT cybersecurity controls linked to the greatest risk reductions, incident response planning, defensible architecture and ICS network visibility and monitoring. It offers executives and insurers a data informed framework to prioritize risk mitigation and justify investment in OT security. Finnish prosecutors have charged the captain and two senior officers of the Russian linked tanker Eagle S with aggravated criminal mischief and interference with communications for allegedly damaging five critical subsea cables in the Baltic Sea. Authorities say the ship, part of Russia's shadow fleet, dragged its anchor for 90 kilometers, causing at least 60 million euros in repair costs and risking Finland's energy and telecom infrastructure. The suspects deny the charges, citing jurisdiction issues. NATO has warned of increased sabotage threats in the Baltic region. Coming up after the break, my conversation with Sean Dube from Sempras. We're discussing the global state of ransomware and hackers take smart buses for a virtual joyride. Stay with us.
