Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Chris Pearson (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security Enterprises.
Zscaler Representative (0:17)
Have spent billions of dollars on firewalls.
Chris Pearson (0:20)
And VPNs, yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than.
Zscaler Representative (0:39)
Ever with AI tools. It's time to rethink your security Zscaler.
Chris Pearson (0:44)
Zero Trust plus AI stops attackers by.
Zscaler Representative (0:47)
Hiding your attack surface, making apps and.
Chris Pearson (0:50)
IPs invisible eliminating lateral movement connecting users.
Zscaler Representative (0:54)
Only to specific apps, not the entire network continuously verifying every request based on.
Chris Pearson (1:00)
Identity and context simplifying security management with AI powered automation and detecting threats using.
Zscaler Representative (1:08)
AI to analyze over 500 billion daily transactions.
Chris Pearson (1:12)
Hackers can't attack what they can't see.
Zscaler Representative (1:14)
Protect your organization with Zscaler Zero Trust and AI. Learn more at Zscaler.com Security.
Chris Pearson (1:36)
A draft Cybersecurity Executive Order from the Biden Administration seeks to bolster defenses. Researchers identify a mass exploitation campaign targeting Fortinet firewalls. A Chinese language illicit online marketplace is growing at an alarming CISA urges patching of a second beyond trust vulnerability. The UK proposes banning ransomware payments by public sector and critical infrastructure organizations. A critical flaw in Google's authentication flow exposes millions to unauthorized access. Owasp releases its first non human identities top 10aMicrosoft lawsuit targets individuals accused of bypassing safety controls in its Azure OpenAI tools. Our guest is Chris Pearson, founder and CEO of Blackcloak, discussing Digital Executive Protection and the Feds remind the health care sector that AI must first do no harm. It's Tuesday, January 14, 2024. I'm Dave Bittner and this is your Cyberwire Intel Brief. Thanks for joining us. It is great to have you with us here today. A draft Cybersecurity Executive Order from the Biden Administration seeks to bolster defenses across federal agencies, contractors and even outer space cyberscoop reports. Aimed at countering threats like those from China and cybercriminals, the order assigns agencies 53 tasks over timelines spanning 30 days to three years. Measures include encrypting federal mail, strengthening contractor security oversight and enhancing the cybersecurity and infrastructure security agencies ability to detect threats across federal systems. The order also addresses broader issues like cybercrime, artificial intelligence, and quantum computing. It calls for using AI to protect critical infrastructure and directs agencies to advance post quantum cryptography and directs agencies to advance post quantum cryptography. Space systems deemed vital to national security would undergo continuous cybersecurity assessments. Recognizing the burden of minimum cybersecurity standards on private industry, the Commerce Department is tasked with developing guidance on common practices. While ambitious in scope, the order underscores the urgency of addressing evolving cyber threats. Security researchers have identified a mass exploitation campaign targeting Fortinet firewalls, likely using an unpatched zero day vulnerability. The attacks, which began in November of 2024 and peaked in December, involved gaining access to fortigate firewalls with exposed management interfaces. Arctic Wolf labs observed tens of intrusions with attackers altering configurations, creating admin accounts and exploiting SSL VPN access to steal credentials and enable lateral movement. The attacks used automated login Attempts via spoofed IPs on web based CLI ports with changes to firewall settings starting in late November. Significant configuration changes occurred between December 4 and 7 while attackers were removed before completing their objectives. Researchers suggest ransomware may have been a motive. Fortinet has acknowledged the issue is under investigation, but has not confirmed the vulnerability or issued a patch. Affected firmware includes versions released between February and October of 2024. Security teams are advised to monitor systems and implement mitigations immediately. The scam ecosystem is thriving, with Huon Guarantee emerging as a dominant player in enabling online fraud, a story in Wired says. This Chinese language marketplace, described as the largest illicit online marketplace, has reportedly facilitated $24 billion in transactions, doubling its activity in under a year, offering services like escrow, money laundering, victim data sales and deepfake tools. Huon has become a one stop shop for scammers, its activities mostly on Telegram, utilize the Tether stablecoin for transactions and include gambling like platforms suspected of laundering money. Despite efforts to expand with proprietary tools like a stablecoin crypto exchange and messaging service, Huon still relies heavily on centralized platforms like Telegram and Tether potential vulnerabilities for law enforcement. Elliptic researchers stress the platform's critical role in industrializing online scams and its growing influence, warning of the challenges posed if Huon becomes fully independent. Suppressing its operations now could significantly disrupt global scam networks. CISA is urging federal agencies to patch a second vulnerability in Beyond Trust, privileged remote access and remote support solutions after evidence of active exploitation. The medium severity flaw allowing remote command execution was identified during an investigation into a Chinese state sponsored attack on the US treasury attributed to the Silk Typhoon Group. Agencies must patch by February 3rd per federal mandates, while organizations are advised to prioritize addressing this and related vulnerabilities. The UK government has proposed banning ransomware payments by public sector and critical infrastructure organizations to deter attacks on essential services like hospitals, schools and transportation. Part of a 12 week Home Office consultation, the measures include mandatory reporting of ransomware incidents to boost intelligence sharing and assist international law enforcement efforts such as Operation Chronos against the Lockbit Gang. The plan also suggests a ransomware payment prevention regime to guide victims and block payments to criminal groups. While the proposals aim to disrupt ransomware actors, financial incentives experts warn of unintended consequences such as increased targeting of private businesses and prolonged disruptions to critical services. Ransomware remains the UK's most immediate cyber threat, with attacks on public services causing significant disruptions, data breaches and economic losses in recent years. A critical flaw in Google's sign in with Google authentication flow exposes millions of accounts to unauthorized access, particularly for users of failed startups. The vulnerability stems from Google's OAuth implementation, which ties access claims to email domains. Attackers can exploit this by purchasing domains of defunct companies, recreating email accounts, and accessing sensitive SaaS platform data like HR systems and private chats. The issue is exacerbated by inconsistent unique user identifiers in Google's system, leaving many platforms reliant on domain names for authentication. Sensitive data such as Social Security numbers and pay stubs are at risk, with over 100,000 vulnerable domains identified. Initially dismissed by Google, the case was reopened after a security researcher demonstrated its impact. Google has promised a fix but provided no timeline. Meanwhile, users are urged to enable SSO with two FA for critical services. OWASP has released its first Non Human Identities Top 10 Addressing cybersecurity risks tied to automated systems like APIs, bots and cloud services. With NHIS outnumbering human credentials 10 to 50 times in organizations, they represent a massive attack surface for cybercriminals. Vulnerabilities such as secret leakage over privileged accounts and insecure cloud deployments are key risks. Recent breaches, including Microsoft's midnight blizzard attack and Okta's support system compromise, highlight the need for stronger NHI management. OWASP's guidance emphasizes mitigation strategies like ephemeral credentials, least privilege policies, and advanced tooling for managing nhis at scale. As automation expands, securing nhis becomes critical for resilience against cyber threats. The report provides a roadmap for prioritizing actions and strengthening identity management in today's highly interconnected digital landscape. Microsoft has filed a lawsuit against 10 unnamed individuals accused of using a hacking as a service scheme to bypass safety controls in its Azure OpenAI tools, including Dall E. The defendants allegedly exploited stolen API keys and custom tools to generate harmful content, violating Azure's AI safeguards. Microsoft claims the individuals used software to mimic legitimate API requests, subverting checks designed to prevent abuse, such as generating violent or inappropriate images. The company first detected the exploitation in July 2024 and has since revoked access and implemented countermeasures. The lawsuit, filed in a Virginia court, seeks to seize related infrastructure, including a domain hosting the illicit service. Microsoft aims to disrupt the operation, gather EV and improve its AI security protocols. Coming up after the break, Chris Pierson from Black Cloak discusses digital executive protection and the Feds remind the health care sector that AI must first do no harm. Stay with us.
