Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. Bad actors don't break in, they log in. Attackers use stolen credentials in nearly nine out of 10 data breaches. Once inside, they're after one thing your data. Varonis AI powered data security platform secures your data at scale across las SaaS and hybrid cloud environments. Join thousands of organizations who trust Varonis to keep their data safe. Get a free data risk assessment@varonis.com Things get worse in the T dating app breach CISA adds three vulnerabilities to its known exploited vulnerabilities catalog Researchers uncover a critical flaw in Google's AI coding assistant. A Missouri health system agrees to a $9.25 million settlement over claims it used web tracking tools. Sploit Light could let attackers bypass Apple's TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the CH ransomware gang. Our guest is Jason Schultz, technical leader for Cisco Talos Security Intelligence and Research Group, to talk about their work on the security of PDF files and the unintended privacy paradox of data brokers. It's Tuesday, July 29th 9th, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. A second major Data breach at women's dating safety app T exposed over 1.1 million private messages. Many recent and highly sensitive users discussed cheating abortions and shared personal information like phone numbers and social handles, making real identities easy to uncover. Despite T's claim the earlier breach was from a legacy system, this new leak affected messages as recent as last week. Hackers could even send push notifications to all users. The vulnerability stemmed from users being able to access a live database using their own API keys. The first breach, involving Firebase, had already leaked selfies and IDs, now being misused on a site mocking user appearances. T says it's investigating with cybersecurity help and has contacted law enforcement. The App reportedly has 1.6 million users. CISA added three vulnerabilities to its known exploited vulnerabilities catalog yesterday. Two critical flaws in Cisco, ISE and ISE pick allow remote, unauthenticated attackers to gain root access via crafted API requests rated CVSS 10. They affect multiple ISE versions with no workarounds except patching. Cisco has confirmed attempted exploits. A third flaw impacts PaperCut NG&MF print management software. CISA set an Aug. 18 deadline for organizations to apply patches. Researchers at Tracebit uncovered a critical flaw in Google's Gemini CLI, an AI coding assistant that could have allowed silent remote code execution. The bug, disclosed and patched before going public, stemmed from improper input, validation, prompt injection and misleading ux. Researchers tricked Gemini into exfiltrating data, including credentials, via malicious readme file. The AI processed buried instructions as commands, bypassing developer scrutiny. Gemini also supports web shells, which can be exploited if commands are whitelisted. Google initially downplayed the issue, but later upgraded it to highest severity and patched it on July 25. This incident highlights growing risks in agentic AI tools, which act with broad system access and unpredictable behavior. Privacy experts warn these systems could dangerously blur boundaries between user facing applications and operating systems. BJC Health System in Missouri has agreed to pay up to $9.25 million to settle a lawsuit over claims it used web tracking tools that shared patients private data without consent. The tools allegedly sent sensitive information from Mychart and other BJC websites to firms like Facebook and Google. The settlement covers patients who use the portal between June 2017 and August 2022. BJC denies wrongdoing. Eligible patients can claim $35 by October 8, with final approval set for October 16. A recently patched macOS flaw, dubbed Sploitlite, could let attackers bypass Apple's Transparency, Consent and Control framework to steal sensitive data. TCC restricts app access to private data by but Microsoft researchers found Spotlight plugins could be exploited to bypass these protections. Using this method, attackers could access Apple intelligence cache data, geolocation information, search history, facial recognition metadata, and even data from other iCloud linked devices. Though Apple patched the bug in MacBooks Sequoia 15.4, the researchers warned its impact is more severe than past TCC bypasses. This is due to sploitlight's ability to quietly extract large amounts of sensitive user data using Spotlight's privilege access, putting both local and remote iCloud linked device data at risk. Endgame Gear has confirmed malware was embedded in a recent version of their mouse configuration tool, hosted on their official site from June 26th through July 9th of this year. Users who downloaded the tool during that window from the product page were infected. Other sources, like the main downloads page, GitHub and Discord provided clean versions. The company, known for high performance gaming mice, didn't detail the breach method. Reddit users initially flagged the issue, noting suspicious differences in the Installer since early June 2025 threat actors have been spreading the Oyster backdoor, also known broomstick or cleanup loader, via trojanized versions of IT tools like Putty and WinSCP in a sophisticated malvertising and SEO poisoning campaign. They created fake sites mimicking legitimate software portals targeting IT pros searching for admin tools. Once victims run the fake installers, Oyster gains persistence through scheduling tasks to execute malicious DLLs. This enables remote access, reconnaissance and further malware deployment. The campaign, active since at least 2023, has also used fake Chrome and Teams installers and may involve keepass. In July, a malicious putty installer signed with a revoked certificate was found on a fake site, while one recent infection was blocked before damage. This underscores the danger of downloading unverified software. The FBI has seized over $2.4 million in Bitcoin from the Chaos ransomware gang, initially confiscating 20.2 Bitcoin in April of this year, then valued at $1.7 million. The US government is now seeking formal forfeiture, alleging the funds are tied to cybercrime, including extortion and money laundering. Chaos is believed to include former Black Suit and royal members and has targeted a variety of sectors. This seizure aligns with a broader Strategy under a March 2025 executive order to build a US strategic Bitcoin reserve from forfeited digital assets. Coming up after the break, my conversation with Jason Schultz, technolog technical leader for Cisco Talos Security. We're talking about their work on the security of PDF files and the unintended privacy paradox of data brokers. Compliance regulations, third party risk and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you're thinking there has to be something more efficient than spreadsheets, screenshots and all those manual processes, you're right. GRC can be so much easier, and it can strengthen your security posture while actually driving revenue for your business. You know, one of the things I really like about Vanta is how it takes the heavy lifting out of your GRC program. Their trust management platform automates those key compliance, internal and third party risk, and even customer trust so you're not buried under spreadsheets and endless manual tasks. Vanta really streamlines the way you gather and manage information across your entire business. And this isn't just theoretical. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. That's a pretty impressive number. So what does it mean for you? It means you get back more time and energy to focus on what actually matters, like strengthening your security posture and scaling your business. Vanta GRC Just imagine how much easier trust can be. Visit vanta.com cyber to sign up today for a free demo. That's V A N-T A.com cyber.
