Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Sponsor Voice (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible eliminating lateral movement Connecting users only to specific apps, not the entire network Continuously verifying every request based on identity and context simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@zscaler.com Security.
Mike Hamilton (1:36)
The FBI deletes plug X malware from thousands of US computers Researchers uncover vulnerabilities in Windows 11, allowing attackers to bypass protections and execute code at the kernel level. A look at a busy patch Tuesday researchers uncovered six critical vulnerabilities in a popular Linux file transfer tool. Texas sues Allstate for allegedly collecting, using and selling driving data without proper consent. An executive order enables AI developers to build data centers on federal lands. On our Industry Voices segment, we're joined by Mike Hamilton, chief information officer at cloudflare, discussing how tech sprawl emulates the old Snake game and meta profits while users suffer. It's Wednesday, January 15th, 2025. I'm Dave Buettner and this is your Cyberwire Intel Briefing. Thank you once again for joining us here today. It is great as always to have you with us. The US Department of Justice announced that the FBI has deleted PlugX malware linked to the Chinese espionage group Mustang panda from over 4,200 U.S. computers. PlugX, active since 2008, is a powerful cyber espionage tool capable of data theft, keystroke logging and command execution. This variant spread via USB drives, infecting devices across governments, dissident groups and companies worldwide. The operation was part of a global effort led by French law enforcement and cybersecurity firm Sequoia, which started dismantling the botnet in 2024. U.S. authorities obtained court orders to delete Plugx from infected computers without collecting user data. Notifications were sent to affected users. Sequoia identified the botnet's command server, which connected to 2.5 million devices globally with 100,000 daily pings. PlugX's source code, potentially leaked in 2015, complicates attribution as various threat actors continue to exploit it. This takedown marks a significant win in combating cyber threats. Researchers from HN Security uncovered vulnerabilities in Windows 11's virtualization based security and hypervisor protected code integrity, allowing attackers to bypass protections and execute code at the kernel level. VBS isolates memory for OS security, while HVCI prevents unauthorized drivers from loading. An exploit transforms an arbitrary pointer dereference vulnerability into a read write primitive, enabling attackers to manipulate kernel memory and execute data only attacks without triggering security mechanisms. The techniques allow privilege escalation, disabling of endpoint detection and response, and manipulation of protected process light features. These vulnerabilities affect Windows 11 and Windows Server 2016 through 2022. While Microsoft has addressed some kernel vulnerabilities, others remain exploitable. Researchers emphasize the importance of layered security beyond built in OS features, as sophisticated attackers can still bypass advanced protections. Microsoft's January 2025 Patch Tuesday addressed eight zero day vulnerabilities, three of which were actively exploited. These included elevation of privilege flaws in Windows Hyper V with a CVSS score of 7.8. Despite the moderate score, experts warned these vulnerabilities allow attackers to escalate privileges, disable security tools, and pivot within enterprise networks. Additionally, five publicly disclosed zero days, including EOP and spoofing vulnerabilities were patched. Other critical updates addressed issues in Windows NTLM, multicast drivers and OLE, with CVSS scores as high as 9.8. Experts emphasize the importance of automated patch management due to the 150 vulnerabilities fixed. This month, Google released Chrome 132, fixing 16 security flaws, including high severity issues in its V8 engine and Skia graphics library. Researchers earned $37,000 in bug bounties. Meanwhile, Nvidia Zoom and Zyzzle released patches for high severity vulnerabilities, urging users to update to mitigate risks. Ivanti resolved critical path traversal flaws in Endpoint Manager, while Apple patched a macOS vulnerability, allowing attackers to bypass system integrity protection. This exploit posed significant risks by enabling rootkits and privileged malware installations. Turning to industrial control systems, Schneider Electric, Siemens Phoenix Contact, and CISA issued ICS security advisories for January 2025. Schneider addressed nine vulnerabilities, including high severity flaws in PowerLogic, SCADA Pack, TMX 70 and Modicon products with risks like privilege escalation, remote code execution, and information disclosure. Siemens published five advisories covering vulnerabilities in Mendix, Ciprotech 5, and Simatic S7 1200, some lacking patches. Phoenix Contact disclosed a cryptographic issue in CM Dongle and a privilege escalation flaw in some of their controllers. CISA released four ICS advisories, including critical vulnerabilities in Hitachi Energy, Foxman un, and a denial of service flaw in Linfone Desktop. The updates underscore the need for proactive security practices, timely updates, and layered defenses to counter evolving threats. Organizations should prioritize patching critical vulnerabilities to prevent potential exploitation. Researchers uncovered six critical vulnerabilities in Rsync, a popular Linux file transfer tool, with the most severe flaw allowing remote code execution on rsync servers with anonymous read access. Other issues include information leakage, path traversal, and privilege escalation vulnerabilities. The flaws affect all rsync versions prior to 3.4.0, released on January 14th of this year. Given RSync's widespread use in backups and software distribution, experts urge immediate updates or mitigation by disabling checksum options in server configurations. Texas Attorney General Ken Paxton has sued Allstate and its subsidiary Arity for allegedly collecting, using and selling driving data from over 45 million Americans without proper consent. The companies reportedly embedded tracking software in popular apps like Life360 and GasBuddy to collect location and movement data every 15 seconds. This data was used to profile driving habits, adjust insurance premiums, and sold to other insurers. The lawsuit claims violations of the Texas Data Privacy and Security act, the Data Broker Law, and the Texas Insurance Code. It alleges deceptive practices, including purchasing location data from automakers like Toyota and Mazda to refine pricing. The suit seeks civil penalties, consumer restitution, data destruction, and an injunction to halt these practices. Allstate denies the allegations. Asserting compliance with laws, President Biden signed an executive order enabling AI developers to build gigawatt scale data centers powered by clean energy on federal lands. The Departments of Defense, Energy, and Interior will identify suitable locations with minimal community impact and accessible transmission infrastructure. Developers must fully fund and match data center electricity demand with clean energy to avoid burdening consumers with higher energy costs. This initiative addresses skyrocketing energy needs for AI, highlighted by a 2024 DOE report noting grid strain from hyperscale facilities. Agencies will evaluate AI infrastructure's impact on energy prices and explore ways to integrate new clean energy sources. The order also includes safeguards for computing hardware on federal sites, aiming to maintain US Leadership in AI and clean energy. As competition with China intensifies, implementation challenges may arise with the upcoming Washington transition. Coming up. After the break, Mike Hamilton from cloudflare joins us to discuss how tech sports sprawl emulates the Snake game and meta profits while users suffer. Stay with us.
