Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Hey everybody, Dave here. Join me and my guests Outpost 24's Laura Enriquez and Michaelo Steppa on Tuesday, May 13th at noon Eastern time for a live discussion on the biggest threats hitting web applications today and what you can do about them. We're going to talk about why attackers still love Web apps in 2025. The latest threat trends shaping the security landscape how to spot and prioritize critical vulnerabilities fast along with scalable practical steps to strengthen your defenses Again, the webinar is Tuesday, May 13th for our live conversation on the state of modern Web application security. You can register now by visiting events.thecyberwire.com that's events.thecyberwire.Com we'll see you there. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic Identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire, the messaging app used by CBP and the White House, faces continued security scrutiny. Hacktivists breach the airline used for US Deportation flights. The FBI warns that threat actors are exploiting outdated unsupported routers. Education giant Pearson confirms a cyber attack Researchers report exploitation of Windows remote management for stealthy lateral movement in active directory environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross platform rat. A zero day vulnerability in SAP Netweaver enables remote code execution and Indiana Health System reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of information security at LastPass, discussing tax related lures, targeting refunds and AI empowers a murder victim to speak from beyond the grave. It's Friday, May 9, 2025. I'm Dave Bittner and this is your Cyberwire Intel Brief. Happy Friday and thanks for joining us here today. It is great to have you with us. The U.S. customs and Border Protection confirmed it uses at least one app from Telemessage, a service that clones popular messaging apps like signal and WhatsApp, but adds archiving features for compliance following a detected cyber incident CBP disabled the app. Telemessage, now owned by US based Smarsh, paused all services amid investigations into multiple security breaches and flaws in its Android app's source code. A recent photo showed former national Security Adviser Mike Waltz using the app, appearing to chat with officials including Vice President J.D. vance. Senator Ron Wyden has urged the DOJ to investigate, calling the software a national security risk. Despite being a federal contractor, Telemessage's consumer apps aren't approved under FedRAMP. The full scope of government use remains unclear. Hacktivists claiming ties to anonymous breached Global X Airlines, a US Government contractor used for deportation flights, stealing flight records, passenger lists and months of itinerary data. They defaced the airline's website with a political message and a Guy Fawkes mask image criticizing the company's role in deportations. The hackers contacted journalists and leaked data showing details of flights deporting hundreds of Venezuelan migrants, some mid flight while legal challenges were still pending. According to 404 Media, the hackers accessed GlobalX's AWS cloud by exploiting a developer token and retrieving access keys. They also reportedly sent messages to pilots using a flight operations tool and accessed the company's GitHub. The breach highlights several security lapses. As of now, neither GlobalX nor US immigration officials have commented. The FBI has warned that threat actors are exploiting outdated, unsupported routers, likely from brands like Cisco's Linksys and Ericsson's Cradlepoint. Using unpatched vulnerabilities and remote management software, hackers bypassed authentication to gain shell access, installed malware and turned the devices into part of a botnet. These compromised routers were then used as proxies via the AnyProxy and 5Socks networks, helping criminals hide their activities. Malware communications included a two way handshake with a command and control server. While no specific group was named, the FBI noted that Chinese cyber actors have exploited similar vulnerabilities in the past. Users are urged to replace old routers or disable remote access. This alert follows the release of OpenEOX, a proposed standard to better manage end of life disclosures for tech products. UK based education giant Pearson confirmed a cyber attack in which threat actors stole corporate and consumer data, mostly described as legacy data. The breach reportedly stemmed from an exposed GitLab personal access token in a public git config file, allowing attackers to access source code and embedded cloud credentials over months. They allegedly exfiltrated terabytes of data from aws, Google Cloud and services like Salesforce and Snowflake. Pearson says no employee data was stolen and is continuing its investigation. Researchers at Practical Security analytics report that threat actors are increasingly exploiting Windows remote management for stealthy lateral movement in active directory environments. WinRM, used for legitimate remote administration via PowerShell, becomes a powerful tool for attackers once they obtain valid credentials through phishing or brute force or credential dumping. Using WinRM commands like invoke Command, attackers scan for accessible systems on ports 5985 and 5986, authenticate remotely and execute malicious payloads under normal looking processes. Advanced techniques, including powershell cradles and reflective net loaders allow payloads to run entirely in memory, bypassing AMSI and logging. The researchers outline a typical attack chain initial access reconnaissance, credential abuse, payload deployment and privilege escalation. They recommend restricting WinRM access, monitoring anomalies and enhancing endpoint detection to catch misuse of this native Windows tool. Researchers at Fortinet have uncovered a sophisticated email attack campaign using using malicious PDF invoices to deliver a cross platform remote access trojan called rati. While primarily targeting Windows, the malware also affects Linux and macOS systems running Java. The attack starts with deceptive emails that pass SPF validation using the Servicio decorillo ES service, luring victims into clicking buttons in the PDF that launch a multi stage infection. The process uses Dropbox and mediafire to host files, ngrok tunneling and geofencing to evade detection. Victims in Italy receive a Java based JAR file while others see harmless documents fooling email scanners Once active, RADI enables attackers to execute commands, log keystrokes and access webcams and files. The campaign highlights how attackers combine social engineering and advanced evasion to bypass security and maintain persistent access. A critical zero day vulnerability in SAP netweaver has been exploited by threat actors to compromise hundreds of systems worldwide, enabling remote code execution. Anapsis and Mandiant began tracking attacks as early as January, with active exploitation confirmed before SAP issued patches on April 24. Attackers deployed web shells and executed commands to maintain access, targeting industries from energy to government. Anapsis warns that attackers possess deep SAP knowledge and urges immediate patching, compromise, assessment and updated detection measures. Union Health System in Indiana has reported a data breach affecting nearly 263,000 individuals linked to a January cyber attack on legacy Cerner systems during a migration to Oracle's cloud. The compromised data includes sensitive patient information such as Social Security numbers, medical records and insurance details. The breach, confirmed by Oracle in March, did not impact Union Health's Live systems. Lawsuits allege negligence by both Union Health and Oracle and claim a threat actor named Andrew is extorting affected hospitals. Oracle denies a breach of its cloud infrastructure but acknowledged unauthorized access to outdated servers. While Oracle will cover credit monitoring costs, it won't notify individuals directly. Union Health is offering free credit protection and is facing mounting legal pressure over its handling of the incident. Coming up after the break, my conversation with Alex Cox, Director of information security at LastPass. We're discussing tax related lures targeting refunds and AI empowers a murder victim to speak from beyond the grave. Stay with us. Traditional pen testing is resource intensive, slow and expensive, providing only a point in time snapshot of your application's security, leaving it vulnerable between development cycles. Automated scanners alone are unreliable in detecting faults within application logic and critical vulnerabilities. Outpost 24's continuous pen testing as a service solution offers year round protection with recurring manual penetration testing conducted by Crest certified pen testers, allowing you to stay ahead of threats and ensure your web applications are always secure. And now a word from our sponsor, Black Kite. If third party risk is keeping you up at night, you're not alone. It's a constant battle. Black Kite's third party cyber risk platform is built on real world threat intelligence straight from their research team's ongoing breach analysis, dark web monitoring and attacker tactics. That means you get a hacker's eye view of your supply chain to proactively spot risks. And speaking of research, they just dropped their 2025 third party breach report, breaking down last year's biggest trends and what's coming next. Grab the report now at www.blackkite.com. our guest is Alex Cox, Director of information security at LastPass, discussing tax related lures targeting refunds. So I'm glad we get to catch up here today because, you know, there's a flurry of activity and I think on people's minds as we come up to tax season, which of course here in the US is in April. But then on the other side of that, I think a lot of times people get their guard down and you and your colleagues at LastPass are saying maybe not so fast, there's still some things that need your attention.
