Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Rob Allen (0:14)
And now a word from our sponsor, Cloudrange. At Cloudrange, they believe cybersecurity readiness starts with people, not just technology. That's why their proactive simulation based training helps security teams build confidence and skill from day one by turning potential into performance. They empower SOC and incident response teams to respond quickly, smartly and in sync with evolving threats. Learn how Cloudrange is helping organizations stay ahead of Cyber Risks at www.cloudrange.com Ingram Micros suffers a ransomware attack the SafePay gang Spanish police dismantle a large scale investment fraud ring the Satan Lock ransomware group says it's shutting down Brazilian police arrest a man accused of stealing over $100 million from the country's banking system. Qantas confirms contact from a potential cybercriminal following its recent customer data breach. The Exworm rat evolves to better evade detection. Cybercriminals ramp up fraudulent domains ahead of Amazon Prime Day. Apple sues a former engineer allegedly stealing Confidential Our guest is Rob Allen, Chief product officer at ThreatLocker, discussing why default Deny could be the antidote to security fatigue and AI image editing blurs the evidence. It's Monday, July 7th, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Thanks for joining us here today. It's great to have you with us. Ingram Micro, a major global IT distributor, suffered a ransomware attack by the SafePay gang last Thursday, leading to an ongoing outage of its website and ordering systems. Employees discovered ransom notes on their devices, although it's unclear if files were encrypted. Sources say attackers likely breached the company via its Global Protect VPN platform. Impacted services include its AI powered Xvantage distribution platform and Impulse license provisioning, while Microsoft 365 Teams and SharePoint remain operational. Initially, Ingram Micro did not disclose the attack, citing only IT issues. SafePay, active since November 2024 with over 220 victims, uses VPN breaches and password spraying to infiltrate targets. On Sunday, Ingram Micro confirmed the ransomware incident, stating it's working with cybersecurity experts to investigate and restore systems. Spanish police have dismantled a large scale investment fraud ring that caused over $11.8 million in damages in coordinated raids across Barcelona, Madrid, Mallorca and Alicante. 21 suspects were arrested and officers seized seven luxury cars and more than $1.5 million in cash in crypto. The group began operations in 2022, targeting victims nationwide with fake investments in CR, crypto tech stocks and gold via manipulated websites and call centers posing as professional advisors. Victims saw fake profits and could make small withdrawals initially before losing larger sums to blocked withdrawals and fake processing fees. The call centers had panic buttons to erase data during raids. This operation follows recent major fraud takedowns in Spain, including a $540 million crypto scam dismantled last week. The Satan Lock ransomware group announced it's shutting down and plans to leak all stolen victim data today. The group, active since April 2025, posted the news on its Telegram channel and Dark website, which now displays a shutdown notice. Satan lock had listed 67 victims, though over 65% were already on other ransomware leak sites, suggesting shared infrastructure linked to groups like Babak Bjorka and GD Locker Sec. Satan Lock's sudden closure remains unexplained. Brazilian police arrested Yao Rocha, an IT employee at software company CNM, for his role in a cyberattack that stole over $100 million from the country's banking system. Hackers breached CNM, which connects banks to Brazil's instant payment platform Pix, used by over 76% of the population. Roque admitted selling his credentials to hackers who recruited him earlier this year. The attack targeted financial institutions, not individual clients, and losses from just One bank reached $100 million. Police believe at least four others were involved. The fraud occurred overnight via fake PIX transactions. Brazil's central bank suspended parts of CNM's operations. CNM stated the breach was due to social engineering, not system flaws. Qantas has confirmed contact from a potential cybercriminal following its recent customer data breach. The airline is verifying the individual's authenticity and and has involved the Australian Federal Police, but declined to share further details. The breach, contained on June 30, compromised personal data, including names, emails, phone numbers, dates of birth and frequent flyer numbers of potentially up to 6 million customers. No credit card, financial or passport data was affected. Attackers targeted a third party customer service platform via a call center. Qantas has not detected further threat activity and says its systems remain secure. Customers were notified by email and warned to watch for phishing attempts, as Qantas says they'll never request passwords or sensitive login details. Arbor Associates, which processes data for healthcare providers, reported a breach compromising patient data detected on April 17th. The breach occurred between April 15th and 17th. Exposed information includes names, contact details, birth dates, biological sex, service dates, CPT and diagnosis codes, medical record numbers and insurance provider names. The number of affected individuals and Attack details remain undisclosed. Arbor has set up a helpline and urges patients to review statements for errors and monitor credit reports for suspicious activity. The exworm Remote Access Trojan has evolved with advanced stagers and loaders to evade detection. Widely used for key logging, remote desktop access, data theft and command execution, Xworm now targets sectors like software supply chains and gaming. Recent campaigns paired Xworm with Asyncrat for initial access, later deploying ransomware crafted from the leaked Lockbit Black builder. Xworm's infection chain is highly dynamic, using multiple file types and scripting languages delivered via phishing emails, mimicking invoices and shipping notices. It employs base 64 encoding, AES encryption, and tampers with Windows security features like AMSI and ETW to avoid detection. Exworm also spreads via removable media, uses persistence mechanisms and disables Microsoft Defender, making it a persistent threat for security teams worldwide. Ahead of Amazon Prime Day this week, cybercriminals are ramping up phishing attacks targeting shoppers. Researchers at Check Point security say over 1,000Amazon like domains were registered in June alone, with 87% flagged as malicious. Many use Amazon prime in their names to trick users into entering login credentials on fake sites. Common tactics include spoofed websites mimicking Amazon's checkout, and phishing emails claiming refund errors to lure clicks. With these scams rising before Prime Day, extra caution can prevent identity theft, unauthorized purchases and and stolen gift card balances. Apple has filed a lawsuit against former employee Dee Liu for allegedly stealing confidential data related to its Vision Pro headset and sharing it with Snap, his current employer. Liu, who worked at Apple for seven years as a senior product design engineer, reportedly transferred proprietary Vision Pro design hardware, testing and unreleased capability files to his personal cloud storage before resigning. Apple claims Lou misled them about his departure, citing family reasons for leaving instead of joining Snap to avoid offboarding protocols that would cut his access. Forensic analysis revealed he deleted evidence from his MacBook to hide the transfers. Apple is seeking the immediate return of its trade secrets, financial damages and access to Lou's devices and cloud accounts. Snap denied any involvement in Lou's actions. Coming up after the break, my conversation with Rob Allen from Threat Locker. We're discussing why default Deny could be an antidote to security fatigue and AI image editing blurs the evidence. Stay with us. Compliance regulations, third party risk and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you're thinking there has to be something more efficient than spreadsheets, screenshots and all those manual processes. You're right. GRC can be so much easier and it can strengthen your security posture while actually driving revenue for your business. You know, one of the things I really like about Vanta is how it takes the heavy lifting out of your GRC program. Their trust management platform automates those key compliance, internal and third party risk, and even customer trust so you're not buried under spreadsheets and endless manual tasks. Vanta really streamlines the way you gather and manage information across your entire business. And this isn't just theoretical. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. That's a pretty impressive number. So what does it mean for you? It means you get back more time and energy to focus on what actually matters, like strengthening your security posture and scaling your business. Vanta GRC Just imagine how much easier trust can be. Visit vanta.com cyber to sign up today for a free demo that's V A n t a dot com cyber CISOs and CIOs know machine identities now outnumber humans by more than 80 to 1. And without securing them trust, uptime outages and compliance are at risk. Cyberark is leading the way with the only unified platform purpose built to secure every machine identity, certificates, secrets and workloads across all environments, all clouds and all AI agents. Designed for scale, automation and quantum readiness, Cyberark helps modern enterprises secure their machine future. Visit cyberark.com machines to see how Rob Allen is Chief product officer at ThreatLocker. And on today's sponsored Industry Voices segment, we discuss why default deny could be the antidote to security fatigue. Rob, let's start with the big picture here. Can you describe to us what we mean when we say security fatigue and how it became such a widespread issue in cybersecurity these days?
