Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:14)
No, it's not your imagination. Risk and regulation really are ramping up, and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk and customer trust together on one AI powered platform. So whether you're getting ready for a SoC2 or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and RYTR spend 82% less time on audits with Vanta. That means less time chasing paperwork and more time focused on growth. For me, it comes down to this. Over 10,000 companies, from startups to large enterprises, trust Vanta to help prove their security. Get started@vanta.com cyber. CISA faces a $700 million budget cut Russian and Iranian cyber cooperation raises concerns New BPF door variants emerge Cybercrime losses climb Researchers advance a GPU rowhammer attack Northern Ireland schools go offline after a breach an alleged hacker for hire faces US Charges German police name the suspected are evil mastermind Our guest is John Anthony Smith, founder and chief security officer at Phoenix24, explaining why more technology hasn't made us more secure and a frustrated researcher drops the hammer. It's Tuesday, april 7, 2026. I'm dave bittner and this is your cyberwire intel briefing. Thanks for joining us here today. It's great as always to have you with us. The Trump administration has proposed a $707 million cut to the Cybersecurity and Infrastructure Security Agency's fiscal year 2027 budget, reducing it to about $2 billion, according to the Office of Management and Budget. The move is intended to refocus CISA on protecting federal networks and critical infrastructure while eliminating what the administration describes as weaponization and waste. The proposal would remove programs considered redundant, including school safety initiatives, and dissolve offices handling international affairs, stakeholder engagement and efforts to counter misinformation. Similar cuts proposed in 2025 were reduced by Congress. The plan follows earlier workforce reductions of roughly 1,000 staff, even as CISA now seeks to hire more than 300 mission critical employees. Nick Anderson is serving as acting director, and Sean Plenke has been renominated for director. A Ukrainian intelligence assessment reviewed by Reuters alleges that Russian satellites conducted at least 24 imagery surveys of 46 military and infrastructure sites across 11 Middle Eastern countries between March 21st and 31st, with intelligence shared to support Iranian strikes on US and regional targets, according to the assessment. Several surveyed sites were hit by Iranian missiles and drones within days, suggesting a coordinated pattern. A Western military source and a regional security source also reported increased Russian satellite activity. The report further claims Russian and Iranian hacker groups collaborated on cyber operations targeting regional infrastructure, including Israeli energy systems. Reuters could not independently verify the assessment. U.S. officials downplayed the operational impact, while Russia and Iran did not comment. The findings reflect deepening security cooperation under a bilateral strategic partnership agreement. Advanced persistent threat actors are adapting the BPF door malware after widespread deployment of static indicators of compromise force changes to their tactics. Rapid7 Labs identified seven new BPF door variants, including HTTPShell and ICMP shell, which enhance stealth and persistence. The kernel level Backdoor uses Berkeley packet filters to monitor traffic inside the operating system and activates through specially crafted magic packets. The variants enable stateless command and control routing and ICMP relays, allowing attackers to evade advanced defenses and maintain covert access in global telecommunications infrastructure. The FBI's Internet Crime Complaint center reported continued growth in cyber enabled crime activity in 2025, highlighting ongoing financial losses from scams, fraud and account takeover schemes. Since January 2025, IC3 received more than 5,100 complaints tied to financial account takeover fraud alone, with losses exceeding $262 million. The report also notes continued impersonation campaigns targeting victims through messages claiming to originate from IC3 officials, as well as spoofed websites designed to harvest sensitive data. Mail theft enabled check fraud and infrastructure focused cyber incidents remain active concerns. Overall, IC3 reporting emphasizes that social engineering, credential theft and impersonation continue to drive losses across sectors. The data underscores the importance of rapid incident reporting to support law enforcement response and and trend tracking across evolving cybercrime campaigns. Researchers at the University of Toronto have demonstrated a new Rowhammer based attack called GPU Breach that enables privilege escalation by targeting GPU memory. Rowhammer exploits electrical interference from repeated memory access to trigger bit flips historically affecting CPU memory. The team previously showed GPU Hammer, which degraded deep neural network accuracy by flipping bits in Nvidia GPU memory. Their latest work shows attackers can corrupt GDDR6 GPU page tables to gain arbitrary read write access to memory. Combined with memory safety flaws in Nvidia drivers, the attack can escalate privileges to root level system compromise. The technique poses a particular risk in cloud environments where GPUs are shared among users and requires only GPU code execution privileges, not physical access. Nvidia, Microsoft AWS and Google were notified. Researchers recommend enabling error correcting code memory, though it is not a complete mitigation. A cyber attack on Northern Ireland's centralized C2K school IT networks has disrupted access to digital learning systems used by most schools across the region, affecting services relied on by roughly 300,000 students and 20,000 teachers. The education authority said it detected the incident last week and shut down system access to contain the breach, officials report. The investigation remains ongoing and it is not yet confirmed whether personal data was compromised, though there is currently no evidence of data loss or corruption. The EA is working with service provider Capita and an incident response firm to assess the situation and restore access. Recovery efforts are underway, with some schools already back online and priority given to students preparing for exams. Authorities say restoration will continue over the coming days. A man named Emit Forlet has been extradited from the United Kingdom to New York to face US Charges tied to an alleged hacking for hire operation targeting environmental groups and other entities. Prosecutors say Forlet led a global enterprise from 2012 to 2019 that generated tens of millions of dollars through computer hacking and wire fraud schemes. He's charged with conspiracy to commit computer hacking and wire fraud offenses carrying potential sentences of up to 45 years. The indictment also links him to previously convicted hacker Aviram Azari and identifies lobbying firm DCI Group working for ExxonMobil, among the operation's clients. Germany's Federal Criminal Police Office BKA has identified Russian national Daniil Maksimovich Shukin as the alleged leader behind the GandCrab and REvil ransomware operations between 2019 and 2021. Authorities link him to 130 extortion attempts, including 25 ransom payments totaling more than $2 million, with overall damages estimated above $40 million. Operating under a ransomware as a service model, the group's targeted enterprises and public institutions. Shukin, also known by several aliases, is believed to remain in Russia and has previously been linked to are evil by US Authorities and investigative reporting. Coming up after the break, my conversation with John Anthony Smith, founder and chief security officer at Phoenix 24. We're discussing why more technology hasn't made us more secure. And a frustrated researcher drops the hammer. Stay with us. Maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated. Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel outpacing what's next in social engineering. Learn more@doppl.com that's-o P P E L.com.
