Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. AI agents are now reading sensitive data, executing actions and making decisions across our environments. But are we managing their access safely? Join Dave Bittner and Barak Shalef from Oasis Security on on Wednesday, December 3rd at 1pm Eastern for a live discussion on agentic access management and how to secure non human identities without slowing. Innovation can't make it live. Register now to get on demand access after the event, visit events.thecyberwire.com that's events with an s.thecyberwire.com to save your spot.
B (1:01)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. Shadypanda plays the long game India mandates tracking software on mobile devices Korea weighs punitive damages after a massive breach Qualcomm patches a critical boot flaw impacting millions OpenAI patches a codec CLI vulnerability Google patches Android zero days Cybersecurity issues prompt an FDA permanent recall for an at home ventilator system Switzerland questions the security of Hyperscale clouds and SaaS services one of the world's largest cyber insurers pulls back from the market on our Threat Vector segment. David Moulton sits down with Stavsetti to unpack the Jingle Thief campaign. And in Russia, Porsches take a hol. It's Tuesday, December 2, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. A seven year campaign used seemingly legitimate Chrome and Edge extensions to infect 4.3 million users with backdoors and spyware, according to KOI researchers. The group dubbed Shadypanda published clean extensions, waited years to build large user databases, then pushed malicious updates that auto installed across all devices. Five extensions with more than 4 million installs remain live in the Microsoft Edge store. One campaign delivered a remote code execution backdoor to 300,000 users through five extensions, including one named CleanMaster, which exfiltrated full browsing activity to attacker controlled servers and included anti analysis features. Another set of five edge extensions, including the 3 million install WeTab, still collects extensive behavioral data and sends it in real time to servers in China and Google Analytics. Earlier campaigns silently monetized user traffic or hijacked searches. Koi says the incidents highlight a core marketplace weakness. Extension stores review submissions but do not monitor updates after approval. India is expanding its anti theft and cybersecurity program to cover new and used smartphones, according to reporting from Reuters and also confirmed by the Telecom Ministry. Companies that buy or trade second hand devices must now verify each phone's IMEI number against a central database. The move follows a directive requiring manufacturers to pre install the government's Sanchar Saathi app on new phones and push it to existing devices through software updates. Sanchar Saathi has blocked or traced millions of stolen phones and has seen rapid adoption since its 2023 launch. Critics say mandatory installation expands state access to personal devices without adequate safeguards. Apple has told officials it will not comply, citing privacy and security concerns for its ecosystem. South Korean President Lee Jae Myung ordered a rapid investigation into Coupang's massive data breach, calling the five month undetected leak astonishing in scale. Officials say information tied to at least 30 million users was accessed after an attacker exploited an electronic signature key. The government is considering punitive damages to deter future lapses, a shift from Korea's compensatory only model. Coupang's CEO said the company will comply with penalties that could reach record levels. Police have not confirmed the attacker's identity. Qualcomm issued an urgent security bulletin warning of six high priority vulnerabilities across millions of devices. The most serious threatens the secure boot process that protects devices during startup. Qualcomm says an attacker could bypass checks, install persistent malware or gain control before the operating system loads. The flaw was found internally, raising questions about how long it existed in deployed devices. Five additional vulnerabilities affect the high level operating system, trusted zone firmware, audio, DSP services and camera functions. Qualcomm is distributing patches to manufacturers and urges immediate deployment. Users should check with their device makers for update timelines. OpenAI patched a Codex CLI vulnerability that allowed malicious commands to run automatically on developers machines, according to Checkpoint. The tool implicitly trusted configuration files inside local repositories and executed their instructions without user approval. Attackers who could commit or merge crafted configs could trigger remote access, command execution, credential theft and lateral movement, creating a reproducible supply chain backdoor. Compromised templates or popular repos could also infect downstream users. Google's latest Android Security Bulletin disclosed 107 zero day vulnerabilities affecting Android and the Android Open Source Project. 51 flaws were patched on December 1, including three high impact issues in the Android framework. Google says two may be under limited targeted exploitation and can enable unauthorized information disclosure or elevated access across Android 13 through 16. A third flaw could trigger remote denial of service. Google says they'll release the remaining 56 patches on December 5th. The FDA has issued a permanent recall for Baxter's Life 2000 at Home ventilator system, citing an unspecified cybersecurity issue that could let someone with physical access alter therapy settings or access device data. Baxter began notifying patients in April, but the FDA's public alert came in late November, warning that continued use could cause serious injury or death. Patients are urged to stop using the device and consult providers for replacements. Baxter reports no related injuries or Deaths as of April 10. It remains unclear whether this recall is connected to earlier life 2000 advisories involving multiple vulnerabilities. Security experts say a permanent recall for a cyber issue is rare and signals significant patient safety concerns, while noting that neither Baxter nor the FDA has detailed the specific flaw involved. Switzerland's Conference of Data Protection Officers, Privatim issued a resolution urging public bodies to avoid hyperscale clouds and most SaaS services due to security risks. The group warns that many SaaS platforms lack true end to end encryption and that providers, especially those subject to the US Cloud act, could access sensitive data. Privatim also notes that vendors can change terms unilaterally, reducing government control. The resolution concludes that large international SaaS offerings, including Microsoft 365, are generally inappropriate for handling particularly sensitive Swiss government data. Beasley, one of the world's largest cyber insurers, is pulling back from the market as rising ransomware and hacking claims drive higher losses. According to the Financial Times, the company's cyber gross written premiums fell 8% to $848 million through September, and executives cite geopolitical volatility as fueling more costly attacks. While Beasley reduces its exposure, rivals like Chubb and AIG are maintaining or expanding their cyber books. Premiums have been declining since early 2024 due to intense competition for a limited pool of buyers the sector strain shows up in the UK as well, where the association of British insurers reports a 230% year over year surge in cyber claims driven largely by malware and ransomware incidents. Coming up after the break on our Threat Vector segment, David Moulton sits down with Stav Seti to unpack the Jingle Thief campaign. And in Russia, Porsches take a holiday, stick around. What's your 2am Security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks and keep your program audit ready all a time. With Vanta, you get everything you need to move faster, scale confidently and finally get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber. AI is transforming every industry, but it's also creating new risks that traditional frameworks can't keep up with. Assessments today are fragmented, overlapping and often specific to industries, geographies or regulations. That's why Black kite created the BKGA3AI assessment framework to give cybersecurity and risk teams a unified, evolving standard for measuring AI risk across their own organizations and their vendors. AI use it's global, research driven, built to evolve with the threat landscape and free to use because Black Kite is committed to strengthening the entire cybersecurity community. Learn more@blackkite.com. On today's Threat Vector segment, David Moulton, Senior Director of thought leadership at Unit 42 with Palo Alto Networks, sits down with Stav Seti, principal researcher at Palo Alto Networks, to unpack the Jingle Thief Cloud Only Identity Driven campaign.
