Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network, powered by N2K.
Maria Vermazes (0:11)
Looking for a career where innovation meets impact? Vanguard's technology team is shaping the future of financial services by solving complex challenges with cutting edge solutions. Whether you're passionate about AI, cybersecurity or cloud computing, Vanguard offers a dynamic and collaborative environment where your ideas drive change. With career growth opportunities and a focus on work life balance, you'll have the flexibility to thrive both professionally and personally. Explore open cybersecurity and technology roles today@vanguard.jobs.com A cyber attack targeting Oracle Health conference compromises patient data the DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China linked APT group conducting cyber espionage. A new Android banking trojan called Crocodilis has emerged. North Korea's Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware variant targeting Ivanti Connect Secure appliances. Maria vermazes, host of N2K's T minus Space Daily show, chats with Jake Braun, former White House Princip Deputy National Cyber Director and Chairman of Defcon Franklin. They discuss designating space as critical infrastructure and nulling out your pizza payment. It's Monday, March 31, 2025. I'm Dave Buettner and this is your CyberWire Intel Brief. Thanks for joining us here today. Happy Monday. It is great to have you with us. A cyber attack targeting Oracle Health, formerly Cerner, compromised patient data from legacy servers not yet migrated to Oracle Cloud. The breach, discovered on February 20, affected multiple US hospitals and healthcare providers. A threat actor reportedly used stolen credentials to access and exfiltrate patient records from these outdated systems. Oracle Health privately informed affected customers but has not publicly acknowledged the breach. The attacker, using the alias Andrew, is demanding millions in cryptocurrency and has launched public websites to pressure victims. Oracle's response has drawn criticism for its lack of transparency and formal documentation. Although Oracle is offering support tools, it's leaving HIPAA notifications to hospitals. Healthcare remains a top target for ransomware due to its large undersecured attack surface and critical need for operational continuity. Hatching medical devices is slow, often delayed over a year due to FDA regulations and outdated systems. Clarity's Team 82 analyzed over two and a quarter million IOMT and 647,000 OT devices across 351 healthcare organizations. They found that 99% are vulnerable to known exploits and 20% of hospital systems with these vulnerabilities are also insecurely connected to the Internet using a triage method based on exploit presence, ransomware links and insecure connectivity. Researcher identified the most at risk devices for OT. Only 0.3% of devices met all three risk criteria for IOMT, about 1%. Clarity has published a five step process to identify and remediate these threats. The US Department of Justice has seized over $8.2 million in USDT. That's Tether cryptocurrency tied to romance baiting scams, also known as pig butchering. In these scams, victims are manipulated into investing on fake platforms that appear to offer high returns. Once large sums are invested, victims are blocked from withdrawing funds and ultimately discover the platforms are fraudulent. The FBI traced laundering patterns linked to these scams, enabling a legal forfeiture under wire fraud and money laundering laws. Tether froze and reissued the stolen funds to law enforcement controlled wallets. The seizure could help compensate victims including 38 individuals with losses over $5.2 million. The scam operation is believed connected to human trafficking rings in Southeast Asia. Authorities stress vigilance when approached with guaranteed return investments. Researchers at Trend Micro take a closer look at Earth Alux, a China linked APT group which has been conducting cyber espionage operations since mid 2023. Initially targeting the Asia Pacific region before expanding into Latin America, the group focuses on government, tech, telecom and retail sectors, exploiting exposed servers to implant web shells like Godzilla. Their primary backdoor, Vargheat allows persistent access, data theft and stealthy operations using multiple communication channels including Microsoft outlook via Graph API. A unique technique involves injecting malicious code into MSPaint EXE processes enabling fileless attacks. This method uses Windows APIs to avoid detection while performing reconnaissance and exfiltrating data to attacker controlled cloud storage. Earth Alyx's use of sophisticated stealthy malware and long term infiltration tactics highlights the growing cyber threat to critical industries in targeted regions. A new Android banking trojan called Crocodilus has emerged with advanced capabilities for remote device takeover, key logging and stealing credentials, according to ThreatFabric targeting users in Spain and Turkey. It bypasses Android 13 security using a custom drone proper and gains full control through accessibility services. Once permissions are granted, Crocodylus connects to its command and control server, runs silently in the background and uses overlays to steal login data. It also logs accessibility events to capture text inputs and even reads one time passwords from Google Authenticator. The malware can mute sound, display black screens to hide activity, and deploy social engineering tricks like fake wallet backup prompts to steal crypto keys. Though linked to actor Cybra, evidence suggests a new likely Turkish speaking developer is behind it North Korea's Lazarus Group is back with a new cyber campaign, Click Fake Interview, targeting job seekers in the crypto industry. Using fake interview websites built with React js, attackers trick victims into downloading malware during staged recruitment processes. These sites deploy Golang Ghost, a cross platform backdoor that enables remote control, data theft and credential exfiltration on Windows and macOS. The campaign expands on the earlier contagious interview tactic and now focuses on centralized finance platforms like Coinbase and Bybit. It also targets non technical roles, exploiting their lower cybersecurity awareness. Malware like Frosty Ferret and Scripts in VBS or Bash help establish persistence and avoid detection. This campaign highlights Lazarus's continued evolution and its strategic pivot to support North Korea's financial and military goals through crypto heists. CISA has identified a new malware variant named Resurge, targeting Ivanti Connect secure appliances via an already patched vulnerability. This flaw, exploited since December and flagged in January, allowed threat actors to gain access to critical infrastructure upon analyzing compromised systems. CISA discovered Resurge alongside another variant, Spons Cloth, an open source shell script bundled with Busybox Tools. Resurge shares traits with spawn chimera such as reboot persistence, but adds new functions like web shell deployment, file manipulation and integrity check tempering. It can also embed itself into Ivanti's boot disk and manipulate the core boot image. CISA advises full factory resets along with widespread credential and password resets to mitigate the threat. Coming up after the break, Maria Vermasis sits down with Jake Braun, former White House Principal Deputy National Cyber Director. They discuss designating space as critical infrastructure and nulling out your pizza payment. Stay with us. Foreign Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Delete Me. I have to say, Delete Me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K. Are you frustrated with cyber risk scores backed by mysterious data, zero context and cloudy reasoning? Typical cyber ratings are ineffective and the true risk story is begging to be told. It's time to cut the bs. Black Kite believes in seeing the full picture with more than a score. One where companies have complete clarity in their third party cyber risk using reliable quantitative data. Make better decisions, reduce your uncertainty. Trust Black Kite. Jake Braun is former White House Principal, Deputy National Cyber Director and Chairman of DEFCON Franklin. He recently sat down with my N2K colleague Maria Vermazes, host of N2K's T Minus Space daily podcast, to discuss designating space as critical infrastructure.
