Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire the lockbit ransomware gang has been hacked. Google researchers identify a new info stealer called Lost Keys. Sonicwall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw and Cisco patches 35 vulnerabilities across multiple products. Iranian hackers clone a German modeling agency's website to spy on Iranian dissidents. Researchers bypass Sentinel One's EDR protection. Education tech firm Power School faces renewed extortion. CrowdStrike leans into AI amidst layoffs Our guest is Kayla Barlow, CEO of Cyberbit, discussing the mixed messages of the cyber skills gap and honoring the legacy of Joseph Nye.
Caleb Barlow (2:02)
Foreign.
Dave Bittner (2:08)
It's Thursday, May 8, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. The Lockbit ransomware gang has been hacked, leading to a major leak of its internal data. Yesterday, Lockbit's Dark web affiliate panels were defaced with a message stating don't do crime, Crime is bad. Xoxo from Prague and including a link to download a MySQL database dump. The leaked database contains 20 tables including nearly 60,000 unique Bitcoin addresses, detailed ransomware build configurations and over 4,400 chat logs from victim negotiations between December 2024 and April of this year. This breach exposes the inner workings of Lockbit's ransomware as a service operation, revealing how affiliates customized attacks and communicated with victims. The incident follows previous law enforcement actions against Lockbit, including infrastructure seizures and arrests, further destabilizing the group. Google researchers have identified a new malware called Lost Keys used by the Russian state backed hacking group Cold river, also known as Star Blizzard, UNC4057 and Callisto. This group, known for phishing, now uses Lost Keys to steal files and system data via a fake captcha site that tricks victims into running malicious PowerShell code. Cold river active since 2022 targets diplomats, journalists and NATO linked groups. Lost keys like earlier malware, Spica is used in selective espionage operations tied to Russian intelligence services. Elsewhere, scammers are spreading a new malware called Noodle File Stealer using fake AI tools and Facebook ads. The campaign targets users with a multi stage attack that begins on phony AI websites offering free image or video generation. Victims download a zip file disguised as a video editing tool, which installs malware that steals browser credentials, crypto wallets and can deploy remote access tools like Xworm. The malware uses Telegram for data exfiltration and evades detection by running payloads in memory. SonicWall is urging customers to patch three critical vulnerabilities in its SMA 100 series devices, one of which is being actively exploited. Discovered by Rapid7, the flaws can be chained to allow remote code execution as root multiple devices are affected. Patches are available in recent firmware versions. SonicWall advises enabling MFA checking logs for unauthorized access and using the Web Application Firewall for added protection. A critical remote execution flaw in macOS allows attackers to run arbitrary code if a user opens a malicious ICC profile found by Trend Micro's Zero Day Initiative. The bug stems from improper bounds checking in macOS's SIPs utility. Apple has patched it in recent OS versions. No active exploitation has been seen, but users should update immediately due to the risk and technical details now being public. Cisco has released patches addressing 35 vulnerabilities across multiple products, including critical flaws in iOS XE wireless LAN controllers and identity services. Engine 1 significant vulnerability in iOS XE wireless controllers allows unauthenticated attackers to upload arbitrary files via crafted HTTPs requests, potentially leading to full device compromise. In ise, two critical vulnerabilities enable remote attackers with read only access to execute arbitrary commands and alter configurations due to insecure deserialization and improper input validation. Additionally, Cisco addressed high severity SNMP flaws in iOS, iOS XE and iOS XR that could cause denial of service conditions. Users are strongly advised to update affected systems promptly, as no workarounds are available for these vulnerabilities. Iranian State Linked hackers tied to APT 35 charming kitten cloned a German modeling agency's website to spy on Iranian dissidents. The fake site discovered this month mimics Hamburg's Mega Model Agency and features a fake model profile with a dormant private Album link, likely a fishing lure. Obfuscated JavaScript collects detailed visitor data including browser and device fingerprints, IP addresses, and plugin info. The data is sent to a disguised analytics endpoint aiding in stealthy surveillance and future targeted cyberattacks. Researchers at AONS Strozfriedberg discovered a technique called Bring your own installer that can bypass SentinelOne's EDR protection. By exploiting the upgrade downgrade process of the SentinelOne agent, attackers can briefly disable its defenses, leaving endpoints exposed. One threat actor used this method to gain admin access and Deploy Babook ransomware. SentinelOne responded with mitigations, including enabling local upgrade authorization by default. While no current EDRs are confirmed vulnerable when properly configured, other vendors were privately notified of the risk. Despite paying a ransom After a December 2024 breach, education tech firm PowerSchool now faces renewed extortion as the hacker targets individual school districts with stolen data. The breach affected over 60 million students and 9 million teachers. PowerSchool had believed the incident was contained after the hacker shared a deletion video. However, recent threats prove otherwise. At least four school boards have been contacted and the reused data matches that from the initial attack. PowerSchool has alerted law enforcement and is assisting affected districts. CrowdStrike is laying off about 500 employees 5% of its workforce, in a move aimed at boosting efficiency. CEO George Kurtz framed the decision around the growing role of AI, which he says will streamline operations and fuel growth toward $10 billion in annual revenue. While the company highlights AI as a force multiplier, its own regulatory filings caution about AI risks, including potential errors and legal liabilities. Despite increasing revenue, CrowdStrike posted a $92.3 million loss in its latest quarter. The layoffs are a harsh blow to affected employees and the company acknowledged the pain caused layoff. Related costs are expected to total up to $53 million. CrowdStrike joins other tech firms turning to automation while cutting staff amid economic uncertainty Coming up after the break, my conversation with Kayla Barlow from Cyberbit on the mixed messages of the cyber skills gap and honoring the legacy of Joseph Nye. Traditional pen testing is resource intensive, slow and expensive, providing only a point in time snapshot of your application's security, leaving it vulnerable between development cycles. Automated scanners alone are unreliable in detecting faults within application logic and critical vulnerabilities. Outpost 24's continuous pen testing as a service solution offers year round protection with recurring manual penetration testing conducted by Crest certified pen testers, allowing you to stay ahead of threats and ensure your web applications are always secure. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy just Use Indeed. When it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed. Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus we with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed According to Indeed Data worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. It is always my pleasure to welcome back to the show Caleb Barlow. He is the CEO at Cyberbit. Caleb, welcome back.
