Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire network, powered by N2K.
Dave Bittner (0:12)
Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, Deleteme is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K.
Maria Varmazes (1:32)
Qilin ransomware gang claims responsibility for attack against Li Enterprises Thai police arrests suspected hacker behind more than 90 data leaks JavaGhost uses compromised AWS environments to launch phishing campaigns Lotus Blossom cyber espionage campaigns target Southeast Asia malware abuses Microsoft DEV tunnels for C2 communication protecting the food supply. Today's guest is Keith Milarsky, Chief Global Ambassador at Q Intel and former FBI special agent, discussing crypto being the target of the cyber underground and an interview with Ironman. Today is Friday, February 28, 2023. I'm Maria Varmazes, host of T Minus Space Daily, in for Dave Bittner and this is your Cyber Wire intel briefing. The Qilin Ransomware group yesterday claimed responsibility for an attack against Iowa based newspaper publisher Lee Enterprises, reports Security Weekly. The group claims to have stolen around 350 gigabytes of data, including investor records, financial arrangements that raise questions, payments to journalists and publishers, funding for tailored news stories and approaches to obtaining insider information. Qilin is threatening to publish the data on March 5 unless the company pays the ransom. LI Enterprises, which publishes more than 350 newspapers across 25 United States states, sustained a cyber attack on February 3 which disrupted at least 75 of its publications. The company has avoided using the term ransomware, but it did mention in an SEC filing that the attackers encrypted critical applications and exfiltrated certain files. Security Week reports that police in Thailand have arrested a 39 year old Singaporean man suspected of involvement in over 90 data leaks. Group IB, which assisted in the joint operation between the Royal Thai Police and the Singapore Police Force, said in a press release that the arrested individual was one of the most active cybercriminals in Asia Pacific since 2021, targeting companies and businesses in Thailand, Singapore, Malaysia, Indonesia, India and many more. The security firm added that the main goal of his attacks was to exfiltrate the compromised databases containing personal data and to demand payment for not disclosing it to the public. If the victim refused to pay, he did not announce the leaks on Dark Web forums. Instead, he notified the media or personal data protection regulators with the aim of inflicting greater reputational and financial damage on his victims. Later, he also asserted pressure on his victims by sending direct customer notifications via email or via instant messengers to force them into submission. Palo Alto Networks Unit 42 warns that the Java Ghost threat actor is compromising misconfigured AWS environments and using them to launch phishing campaigns. The group gains entry to the AWS environments via exposed long term access keys, and once they've gained access, the attackers use the victim's Amazon simple email service or ses, and Workmail services to send out phishing emails. Since the emails are sent from a legitimate source, they're more likely to bypass security filters. And to defend against these attacks, Unit 42 recommends that AWS users limit access to administrative rights, rotate IAM credentials regularly, use short term or just in time access tokens, and enable multi factor authentication. Cisco Talos is tracking multiple cyber espionage campaigns by the Lotus Blossom threat actor targeting government, manufacturing, telecommunications and media entities in Vietnam, Taiwan, Hong Kong and the Philippines. The researchers note that the operation appears to have achieved significant success. The campaigns involve the Sage Run X remote access tool, which is exclusively used by Lotus Blossom. The Sage Run X backdoor abuses legitimate cloud services such as Dropbox, Twitter or now X and Zimbra for its C2 communication. Talos does not attribute Lotus Blossom to any particular nation state, but Microsoft has previously linked the group to China. In a new twist, cybercriminals are exploiting Microsoft's Dev Tunnel service to send data back and forth from malware infected devices. This service, designed for developers to test apps and collaborate securely, is now being abused to help malware avoid detection. Recently, researchers found two versions of NJRAT malware using Microsoft's dev tunnels to connect to command and control servers. The malware communicates through hidden URLs, making it harder for traditional security systems to spot the malware checks in with its remote servers, reporting its status, and then can even spread through USB devices. Experts say that organizations that are not using dev tunnels should keep an eye on DNS logs for any unusual dev tunnel URLs as a way to spot potential attacks early. According to Longwall Security, cybercriminals are using pass the cookie attacks to bypass multi factor authentication. Instead of stealing passwords, attackers target session cookies, which allow them to hijack active sessions without triggering MFA info Stealer malware like Luma C2 is often used to extract authentication cookies from victims browsers. Once stolen, these cookies let attackers impersonate users and access accounts. These stolen cookies are even being traded on dark Web marketplaces, making it easier for cybercriminals to access accounts undetected. Longwall Security recommends shortening session expiration times, monitoring login behavior, and educating users on phishing to defend against this rising threat. As attackers evolve, organizations must strengthen their security to stay ahead. Cyber threats to agriculture are no longer hypothetical. The Farm and Food Cybersecurity act, reintroduced in Congress, aims to secure the US Food supply chain from digital attacks. With bipartisan support, the bill mandates the USDA to conduct biennial cybersecurity assessments and coordinate crisis response exercises with homeland security and intelligence agencies. Recent attacks, like the 2021 JBS ransomware incident, highlight the growing risks to precision agriculture and food production. A new Food and Ag Sector Cyber Threat report found that 90% of cyberattacks exploit readily available tools and 83% of them involve spear phishing. With backing from key industry groups, this legislation pushes for stronger public private collaboration. The message is clear. Food security is national security and cyber resilience must be a priority. Coming up next, we've got Dave Buettner's conversation with Q Intel Chief Global Ambassador and former FBI Special Agent Keith Milarsky discussing crypto being the target of the cyber underground and an interview with a superhero courtesy of N2K producer Liz Stokes. We'll be right back.
