Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Your business needs AI solutions that are not only ambitious, but also practical and adaptable. That's where Domo's AI and data products platform comes in. With Domo, you can channel AI and data into innovative uses that deliver measurable impact. Secure AI agents connect Prepare and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more@AI.domo.com that's AI.domo.com CISA and the FBI warn that Ghost ransomware has breached organizations in over 70 countries President Trump announces his pick to lead the DOJ's National Security Division. A new ransomware strain targets European healthcare organizations. Researchers uncover four critical vulnerabilities in Avanti Endpoint Manager. Microsoft has patched a critical Improper Access Control, Vulnerability and Power pages. The NSA updates its Ghidra reverse engineering tool. A former U.S. army soldier admits to leaking private call records. Our guest is Stephen Hilt, senior threat researcher at Trend Micro, Sharing the current state of the English cyber underground market and the pen testers Breach was simulated. Their arrest was not.
Stephen Hilt (1:57)
Foreign.
Dave Bittner (2:01)
February 20, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. Our Cyberwire team is at the Threat Locker Zero Trust World 25 Conference in Orlando, Florida. CISA and the FBI warn that Ghost ransomware has breached organizations in over 70 countries targeting critical infrastructure healthcare, government, education, technology and manufacturing. Active since 2021, Ghost exploits outdated software vulnerabilities, including Fortinet, ColdFusion, and Exchange flaws. Ghost ransomware operators frequently change their malware, ransom notes and email contacts, making attribution difficult. The group, also known as Kring, Cryptor, Phantom and others, uses publicly available exploits to infiltrate systems. Defensive measures include regular backups, prompt patching, network segmentation and phishing Resistant MFA Ghost attackers have previously used Mimikatz, Cobalt, Strike and Certutil to evade detection. The advisory provides indicators of compromise and tactics to help defenders mitigate threats. Fortinet users were repeatedly warned to patch vulnerabilities, but Ghost continues to exploit them. Former Trump White House legal adviser John Eisenberg is set to be nominated to lead the DOJ's National Security Division, which oversees terrorism, cyber espionage and FISA surveillance. Eisenberg was a key figure in Trump's first impeachment, handling the Ukraine phone call that sparked the inquiry. He reportedly ordered the call's recording into a classified system, though he denied it. Eisenberg's nomination is highly relevant to cybersecurity, as he would oversee cybercrime investigations and foreign cyber threats. The division plays a crucial role in combating nation state hackers, ransomware groups and espionage operations. He's also expected to face scrutiny over FISA's Section 702, a critical foreign surveillance tool under debate for renewal. With recent leadership shakeups in the division, Eisenberg's appointment signals Trump's intent to install loyalists in key national security roles ahead of potential cyber policy shifts. Meanwhile, Kate Arrington, a Trump ally and former DoD cybersecurity official, has been appointed as the Department of Defense chief information security officer. Her return to the Pentagon is unexpected given her 2021 suspension over allegations of disclosing classified information claims she disputes, arguing that Biden appointees forced her out due to her Trump ties. Arrington, previously a champion of the Cybersecurity Maturity Model certification program, now faces major budget cuts that could hinder cyber defense initiatives. With an 8% defense, budget, reduction concerns grow that cybersecurity programs may be deprioritized. Experts warn that staff cuts could threaten the implementation of cmmc, crucial for securing defense contractors. Her role is critical in advancing Zero Trust security and ensuring stronger cyber hygiene practices, but funding and personnel shortages could limit progress. A new ransomware strain, Nalao Locker, has been used in attacks against European healthcare organizations Between June and October of last year, the attackers exploited a Checkpoint security gateway vulnerability to gain access and deploy malware linked to Chinese state sponsored groups. Though relatively unsophisticated, Nail Locker Encrypts files with AES256CTRL and drops a ransom note without mentioning data theft. Analysts suggest this could be a false flag, a mix of espionage and extortion, or state backed hackers moonlighting for profit. A shift in Chinese cyber tactics. Horizon 3 AI has disclosed four critical vulnerabilities in Ivanti Endpoint Manager. These path traversal flaws, patched in January can be exploited by unauthenticated attackers to coerce machine account credentials, enabling relay attacks that could lead to server compromise. Attackers can use these flaws to gain domain admin privileges and compromise all connected EPM clients. Ivanti initially released a patch that caused issues followed by a second update. Organizations should install the latest fix to mitigate the risk. Microsoft has patched a critical improper access control vulnerability in Power Pages, its low code software, as a service platform for business websites. The flaw already exploited in attacks allows attackers to elevate privileges and bypass user registration controls. Microsoft automatically mitigated the issue and notified affected customers, advising them to review their sites for signs of compromise. No additional patch installation is needed. The company has not disclosed details on the attacks. This follows recent research on misconfigured power pages exposing sensitive data the NSA has released Ghidra 11.3, a major update to its open source software reverse engineering framework, introducing advanced debugging, faster emulation and improved integrations for cybersecurity professionals. Key enhancements include kernel level analysis tools, cross platform debugging, and collaborative workflows, making Ghidra even more effective for analyzing malware and vulnerabilities. The update enhances low level debugging with Trace RMI connectors, supports macOS kernel debugging via LLDB, and improves Windows kernel analysis using Microsoft's EXDI framework. This is crucial for reverse engineering advanced persistent threats that manipulate the kernel to evade detection. Ghidra 11.3 also replaces Eclipse based tooling with Visual Studio code integration, accelerates P code emulation via JIT compilation, and improves binary visualization and processor support. Security teams can now analyze modern cryptographic algorithms, IoT firmware, and complex malware more efficiently. US army soldier Cameron John Waginius has admitted to leaking private call records from AT and T and Verizon. He intends to plead guilty to two counts of unlawfully transferring confidential phone records without a plea deal. Prosecutors suspect Wiginius is Khyber Phantom, a hacker who allegedly compromised at least 15 telecom firms and threatened to leak US government call logs. Authorities also link Wiginius to a major extortion scheme involving stolen data from 150 snowflake cloud accounts. He was allegedly recruited by Alexander Connor Mocha and John Bins, who extorted $2 million from AT& T, Ticketmaster and others. After Bins arrest, Khyber Phantom threatened further leaks unless AT and T negotiated. Waginius faces up to 20 years in prison. Mouka and Bins, arrested in Canada and Turkey, await extradition on multiple fraud and hacking charges. Coming up after the break minute, my conversation with Stephen Hilt from Trend Micro. We're discussing the current state of the English cyber underground market and the pen tester's breach was simulated. Their arrest was not. Stay with us. Cyber threats are evolving every second, and staying ahead is more than just a challenge, It's a necessity. That's why we're thrilled to partner with ThreatLocker, the cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers. So I decided to try delete me. I have to say, delete me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com N2K and use promotion promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com n2k and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K. Stephen Hilt is senior threat researcher at Trend Micro. I recently caught up with him to discuss the current state of the English cyber underground market.
