Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Hey everybody, Dave here. Join me and my guests Outpost 24's Laura Enriquez and Michaelo Steppa on Tuesday, May 13th at noon Eastern time for a live discussion on the biggest threats hitting web applications today and what you can do about them. We're going to talk about why attackers still love Web apps in 2025, the latest threat trends shaping the security landscape how to spot and prioritize critical vulnerabilities fast, along with scalable practical steps to strengthen your defenses. Again, the webinar is Tuesday, May 13th for our live conversation on the state of modern Web application security. You can register now by visiting events.thecyberwire.com that's events.thecyberwire.Com we'll see you there. Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Delete Me keeps finding and removing my personal information from data broker sites and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K a major student student engagement platform falls victim to the Click Fix social engineering attack Google settles privacy allegations with Texas for over $1.3 billion stores across the UK face empty shelves due to an ongoing cyber attack. Ascension Health reports that over 437,000 patients were affected by a third party data breach. A critical zero day vulnerability in SAP Netweaver is being actively exploited. Researchers uncover two major cybersecurity threats targeting IT, admins and cloud systems. US prosecutors charged three Russians and one Kazakhstani in connection with the takedown of two major botnets. A new tool disables Microsoft Defender by tricking Windows into thinking a legitimate antivirus is installed. Tim Starks, senior reporter from cyberscoop, discusses congressional reactions to White House budget cut, proposals for CISA and fair use faces limits in generative AI foreign May 12, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Happy Monday and thanks for joining us here today. It is great to have you with us. IClicker is a student engagement platform used by about 5,000 instructors and 7 million students at US colleges, including major universities like Michigan and Florida. Between April 12th and the 16th of this year, its website was compromised in a click fix social engineering attack. A fake captcha tricked visitors into running a malicious PowerShell script by copying it from the clipboard into the Windows Run dialog. Once executed, the script connected to a remote server to fetch more malware. Depending on the visitor, the attack either gave hackers full access or downloaded harmless software to avoid detection. The likely payload was an information stealer, targeting credentials, browser data and cryptocurrency wallets. IClicker confirmed the breach on May 6, stating its apps and data were unaffected and the vulnerability had been fixed. The number of affected users is still unknown. Google will pay $1.375 billion to Texas to settle claims it secretly tracked users locations, private browsing activity and biometric data without consent. The lawsuit, led by Attorney General Ken Paxton, allege that Google continued tracking users even with location services off and used the data for advertising profits. It also claimed Google collected biometric data like facial geometry without proper consent. Google denies wrongdoing but has since updated its policies. The settlement is one of the largest US Privacy related fines. Co Op stores across the UK are facing empty shelves due to an ongoing cyber attack that began two weeks ago. Fearing hackers may still have access, the company has kept key logistics systems offline, severely disrupting deliveries. Staff report depot shipments are below 20% of normal, with meat, dairy and eggs prioritized due to perishability laws. Other items like produce, canned goods and cigarettes remain scarce. CEO Shirin Khoury Hawk confirmed customers and member data was compromised, though the nature of the hack is still unclear. Despite all stores remaining open, recovery is expected to take weeks. On the Scottish island of Islay, where Co Op is the only major grocer, special delivery processes are in place. Co Op, a member owned cooperative, operates over 3,000 locations and does not have to report financial losses to public markets. Ascension Health reported that over 437,000 patients were affected by a data breach tied to a third party vendor's software vulnerability, not its own systems. Hackers exploited this flaw to steal sensitive data including names, contact details, Social Security numbers and health information. The breach likely stemmed from the Clop ransomware group's December 2023 attack on Clio's file transfer platform. Impacted patients are being offered two years of free credit monitoring. This breach is smaller than Ascension's May 2024 ransomware incident affecting 5.6 million. A critical zero day vulnerability in SAP Netweaver is being actively exploited by Chinese state sponsored hackers. The flaw, found in the Internet Communication Manager component of allows unauthenticated remote code execution via crafted HTTP requests. Despite emergency patches, many SAP systems remain exposed. Attackers are targeting high value sectors like finance and manufacturing to steal sensitive data and establish persistent access. Researchers found that custom malware dubbed safire uses encrypted communication over SAP protocols, making detection difficult. The attack chain begins with a malicious SOAP request that exploits memory corruption and delivers a reverse shell. From there, attackers modify SAP configurations to maintain access. The sophisticated campaign raises concerns about supply chain risks and has already caused operational disruptions across critical sectors, including healthcare, government and infrastructure. Varonis has uncovered two major CyberSecurity threats targeting IT admins and cloud systems. First, attackers are using SEO poisoning to trick admins into downloading malware disguised as legitimate tools. These fake downloads can install backdoors like smoked ham or monitoring software, enabling credential theft and data exfiltration. In one case, nearly a terabyte of data was stolen from followed by a ransomware attack. Separately, Varonis found a critical root access flaw in Azure's AZNFS Mount utility. Used in HPC and AI workloads, the bug lets unprivileged users escalate to root by exploiting environment variables. Though Microsoft rated it low severity, the risk of full cloud compromise is significant. Varonis urges immediate patching and recommends a defense in depth strategy to reduce exposure. US Prosecutors have charged three Russians and one Kazakhstani in connection with a takedown of two major botnets, Any proxy and five Socks. The suspects allegedly ran a malware campaign that hijacked outdated wireless routers, converting them into proxy servers for rent on the seized websites. The botnets offered over 7,000 proxies, generating $46 million over 20 years. The operation, named Moonlander, involved international cooperation and technical analysis from Lumen Technologies. Many infected routers were found in Oklahoma, with global reach across over 80 countries. The FBI warns that outdated routers, especially older Linksys, Cisco and TP link models, are prime targets for exploitation by threat actors, including Chinese hackers. Two defendants also face charges of using false identities to register domains. Authorities urge replacing unsupported routers to avoid similar compromises. A new tool called defendnaut disables Microsoft Defender by exploiting the Windows Security center API, tricking Windows into thinking a legitimate antivirus is installed. Created by a GitHub developer, Defendnaut registers a fake antivirus product using reverse engineered interactions with the undocumented WSC API, bypassing Microsoft's integrity checks by injecting its code into trusted processes like Task Manager. Once registered, Windows automatically disables Defender to avoid conflicts. While the tool requires admin privileges and persistent installation to survive reboots, it poses a risk if abused by malware developers. Security experts warn that although Defend not showcases impressive technical skill, it highlights a significant security gap in how Windows handles AV product registration. The tool builds on the developer's earlier project nodefender and underscores the need for better safeguards in WSC's architecture. Coming up after the break, my conversation with Tim Starks from cyberscoop discussing congressional reactions to White House budget cut, proposals for CISA and fair use faces limits in generative AI stick around and now a word from our sponsor, ThreatLocker keeping your system secure shouldn't mean constantly reacting to threats. ThreatLocker helps you take a different approach by giving you full control over what software can run in your environment. If it's not approved, it doesn't run. Simple as that. It's a way to stop ransomware and other attacks before they start without adding extra complexity to your day. See how ThreatLocker can help you lock down your environment at www.threatlocker.com. foreign let's be real. Navigating security compliance can feel like assembling IKEA furniture without the instructions. You know you need it, but it takes forever, and you're never quite sure if you've done it right. That's where Vanta comes in. Vanta is a trust management platform that automates up to 90% of the work for frameworks like SoC2, ISO 27001 and HIPAA, getting you audit ready in weeks, not months. Whether you're a founder, an engineer, or managing IT and security for the first time, Vanta helps you prove your security posture without taking over your Life. More than 10,000 companies, including names like Atlassian and Quora, trust Vanta to monitor compliance, streamline risk, and speed up security reviews by up to five times and the roi, A recent IDC report found Vanta saves businesses over half a million dollars a year and pays for itself in just three months. For a limited time, you can get $1,000 off vanta@vanta.com cyber that's v a n-t a.com it is always my pleasure to welcome back to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, welcome back.
