Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire the UK's Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. Pupkin stealer targets Windows systems.
Sponsor (1:31)
An Alabama man gets 14 months in.
Dave Bittner (1:34)
Prison for a SIM swap attack on the sec. Our guest is Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration and ethical Hackers win the day at PWN to own Berlin Foreign May 19, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us. Happy Monday. It is great to have you with us as always. In the uk, hackers breached the Ministry of Justice's systems in April, stealing a significant amount of personal data from the Legal Aid agency. The stolen data may include names, addresses, birth dates, national insurance numbers, criminal records and financial details of Legal aid applicants since 2010. While the attackers claim to have accessed 2.1 million records, this figure is unconfirmed. The breach was discovered on April 23, but its scale became clear on May 16. The LAA's digital services were taken offline. Officials blame long standing vulnerabilities and mismanagement. The Ministry of Justice, working with national cybersecurity bodies, urges past applicants to stay vigilant for fraud. The breach follows a wave of recent cyberattacks on UK firms like ms.co op and Dior, raising concerns about systemic digital security failures. Meanwhile, BBC cybersecurity journalist Joe Tidey received a tip on telegram from hackers claiming responsibility for the cyber attacks on MNS and Co Op. Over a five hour exchange, they provided data samples confirming their involvement. The hackers, likely linked to the ransomware group Dragonforce, were frustrated that Co Op refused to pay the ransom after Tidy alerted Co Op the company acknowledged the breach publicly. Dragon Force operates a ransomware as a service model, offering tools and support to cybercriminals in exchange for a cut of ransoms. Recently rebranded as a cartel, the group has been active since 2023. Though linked to numerous attacks, it remained silent on the retail hacks, possibly due to ransom payments. Some experts suggest the broader scattered spider collective may be behind the campaign, but their exact role remains unclear. Mozilla has issued an emergency security update for Firefox to patch two critical JavaScript engine flaws that allow remote code execution. Discovered by security researchers from Palo Alto Networks and Trend Micro's Zero Day initiative, the vulnerabilities involve out of bounds read Write issues in JavaScript objects. Attackers can exploit them by luring users to malicious websites requiring minimal interaction. Mozilla urges users to update Firefox immediately to protect against potential system compromise. Over 210,000 patients of Georgia based Harbin Clinic had sensitive data exposed in a breach linked to third party vendors and national recovery services. The breach, which occurred In July of 2024, targeted NRS, a debt collection service provider for Harbin. However, Harbin only began notifying affected individuals in May of this year. Nearly 10 months later, exposed data includes names, addresses, Social Security numbers, birth dates and financial account details. The delay and the severity of the stolen information raise concerns about identity theft and financial fraud risks. Harbin recommends affected individuals monitor their financial accounts but has not confirmed offering credit monitoring services. The clinic, headquartered in Rome, Georgia, runs multiple locations statewide and employs over 1400 staff elsewhere. ServiceAid, a California based enterprise solutions provider, reported a data leak affecting over 400 Catholic health patients to the Department of Health and Human Services. The breach involved an Elasticsearch database that was accidentally exposed online from September 19 through November 5, 2024. While there's no evidence the data was stolen, ServiceAid can't rule it out. Exposed information includes names, Social Security numbers, medical and insurance details and login credentials. Affected individuals are being offered 12 months of free identity protection services. A new report from Ximperium warns that iOS devices, often seen as secure, are increasingly targeted through sideloaded and unvetted apps. Attackers exploit flaws in iOS using tools like Trollstore, C Shell and vulnerabilities such as Mac, Dirty Cow and KFD to bypass Apple's protections. These apps may appear benign but can exfiltrate data or compromise devices without detection. Ximperium found over 40,000 apps using private entitlements and over 800 using private APIs, posing serious risks. Organizations, especially in regulated sectors, should adopt stricter app vetting, monitor permissions and detect sideloaded apps. Zimperium urges proactive defenses to counter these threats. Just because an app runs on iOS doesn't mean it's safe. Its behavior and origin matter more than its appearance. If you've bought a UV inkjet printer from the brand procolored recently, you might want to scan your system for malware. YouTuber Cameron Coward, known for his DIY tech reviews, first raised the alarm while reviewing a $6,000 printer. His antivirus flagged threats on the included USB device, specifically a worm, and Floxif, a file infector. When procolord dismissed this as a false positive, Coward turned to Reddit, catching the attention of cybersecurity firm GData. Their investigation found malware including a backdoor and a crypto stealing Trojan called Snipvex, in official Pro colored software downloads. GData traced around $100,000 in stolen Bitcoin linked to Snipvex. ProColor later admitted malware might have been introduced via USB and has since cleaned up its downloads. Experts now urge users to scan their systems and consider full reinstallation if infected. Pupkin Stealer is a newly discovered information stealing malware written in C and first observed in April of this year. Lightweight and lacking advanced evasion tactics, it targets Windows systems to steal browser credentials, messaging app sessions like Telegram, and Discord desktop files and screenshots. The malware exfiltrates data using Telegram's bot API, allowing it to hide within legitimate traffic. Despite its simplicity, pupkinstealer is effective, compressing stolen data into a zip archive enriched with system metadata. It operates without persistence mechanisms, suggesting a quick hit and run strategy. Researchers believe it may be distributed via malware as a service and linked to a developer using the alias Ardent, possibly of Russian origin, The malware highlights a growing trend of cybercriminals exploiting legitimate services like Telegram or for stealthy attacks posing risks to e commerce and individual users alike. Eric Council Jr. A 25 year old from Alabama, has been sentenced to 14 months in prison for a SIM swap attack that compromised the SEC's X Twitter account. In January of 2024, Mr. Counsel used a fake ID to obtain a replacement SIM card tied to a government phone linked to the SEC account. He then activated the card, retrieved a password reset code and passed it to a co conspirator. The hacker posted a false statement claiming SEC approval of Bitcoin ETFs, briefly spiking Bitcoin prices by over $1,000 before a $2,000 drop when the post was debunked. Counsel, who was paid $50,000 for his role, pleaded guilty to identity theft and fraud. He must also forfeit the payment and will be on supervised release for three years post prison with Internet restrictions. Coming up after the break, my conversation with Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration and ethical hackers Win the day at PWN to own BERLIN Stay with U.S.
