Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Your business needs AI solutions that are not only ambitious, but also practical and adaptable. That's where Domo's AI and data products platform comes in. With Domo, you can channel AI and data into innovative uses that deliver measurable impact. Secure AI agents connect Prepare and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more@AI.domo.com that's AI.domo.com Authorities dismantle a Pakistan based cybercrime network Lawmakers question the feasibility of establishing a US Cyber force as a standalone military branch. The DOJ sues to block HPE's acquisition of Juniper Networks Tangerine Turkey deploys crypto mining malware Major healthcare providers send breach notifications Norwegian police seize a Russian crewed ship suspected of damaging a communications cable Researchers discover Critical vulnerabilities in GitHub CoPilot D link patches, a critical router vulnerability CISA and the FDA have warned U.S. health care organizations of severe security vulnerabilities in Chinese made patient monitors. Pauses in funding create confusion for federal cybersecurity vendors we bid a fond farewell to a pair of N2K colleagues and the case of the disappearing government data. It's Friday, January 31st, 2020. I'm Dave Buettner and this is your Cyberwire Intel Briefing. Happy Friday and thanks for joining us here. It's great to have you with us. US and Dutch authorities have dismantled a Pakistan based cybercrime network that sold hacking and fraud tools online. Dubbed Operation Heart Blocker, the crackdown led to the seizure of 39 domains operated by Sim Raja, also known as Heartsender, who had been selling phishing toolkits, scam pages and email extractors since 2020. His tools, marketed as undetectable by security solutions, were widely used in business email compromise scams, leading to over $3 million in losses. Thousands of cybercriminals purchased these tools to steal credentials and conduct fraud. Authorities also uncovered millions of stolen data records, prompting Dutch police to launch a website where users can check if their credentials were compromised. Those affected are urged to change their passwords and stay vigilant against phishing attempt. A bipartisan group of lawmakers is urging the National Academy of Sciences, Engineering and Medicine to fully evaluate the feasibility of establishing a US cyber force as a standalone military branch. In a January 29 letter, Representatives Morgan Luttrell, Republican from Texas Pat Fallon, Republican from Texas, and Senator Kirsten Gillibrand, Democrat from New York, stressed that while the defense policy bill altered the study's focus to broader cyber force models, it must still answer whether a cyber force is the best option. Lawmakers also suggested a deadline of November 30th and requested updates every two months to ensure timely input for the fiscal year 2027 defense discussions. The debate continues over whether US Cyber Command should remain under its current structure, akin to Special Operations Command, or if an independent cyber force is necessary to address ongoing readiness challenges. The letter signals Congress commitment to reassessing military cyber capabilities. The U.S. department of justice has sued to block Hewlett Packard Enterprise's $14 billion acquisition of Juniper Networks, arguing it would stifle competition by leaving only HPE and Cisco controlling over 70% of the US networking market. The companies dispute the claim, saying the deal would enhance competition. The lawsuit marks the first antitrust case under President Trump's new term, despite approvals from the UK and eu. HPE and Juniper face an eight month legal battle before the October deadline. Tangerine Turkey is a VBS worm that spreads via USB drives to deploy crypto mining malware. First observed by Red Canary in November of last year, IT ranked number eight in their January 2025 threat report. The malware hijacks PrintUI DLL to execute mining software and has been linked to a global cryptojacking campaign. Azerbaijan's CERT found strong overlaps between Tangerine Turkey and a massive crypto mining operation called Universal Mining, which had infected over 270,000 computers in 135 countries. VirusTotal samples indicated sometimes drops XMRig, though configuration files are often pulled from remote servers and GitHub repositories. Several related GitHub profiles and domains used for configuration were taken down. Reports from QuickHeal and Azerbaijan SERT suggest Tangerine Turkey is part of a larger, evolving crypto mining campaign, possibly with new variants beyond VBS, including BAT, PowerShell and EXE based execution methods. Community Health Center, a major Connecticut healthcare provider, is notifying over 1 million patients of a data breach, exposing their personal and health information. Attackers accessed CHC's network in October 2024, but the breach was only discovered in January of this year. The stolen data includes names, Social Security numbers, medical diagnoses and insurance details, but CHC states that no systems were encrypted and operations remain unaffected. Investigators found that a skilled criminal hacker was behind the attack but was stopped within hours. Meanwhile, North Bay health is notifying 569,000 individuals of a separate data breach in early 2024, which may have involved ransomware. Although North Bay says there's no evidence of identity theft, it is offering free identity protection. The attack disrupted hospital operations for weeks. These incidents highlight the growing trend of cybercriminals targeting healthcare providers for data theft and extortion. Norwegian police have seized the Silver Danje, a Norwegian registered Russian crewed ship suspected of damaging a communications cable between Sweden and Latvia. This marks the third vessel detained in recent weeks amid rising concerns over subsea infrastructure sabotage in the Baltic Sea. The ship was detained at Norway's request after sailing from St. Petersburg to Murmansk. Latvian authorities are investigating three ships over the cable cut, with Sweden having already detained a ship. Meanwhile, Finland has seized the Eagle S, suspected of intentionally dragging its anchor for 60 miles, severing multiple cables with heightened NATO concerns Baltic Century A new military initiative has been launched to protect critical infrastructure. NATO allies have warned of potential actions against Russian vessels if subsea threats persist. Researchers have discovered two critical vulnerabilities in GitHub Copilot, Microsoft's AI powered coding assistant, exposing major security flaws in enterprise AI tools. The affirmation jailbreak trick allows users to bypass CoPilot's ethical safeguards by simply adding affirmations like sure to prompts, enabling it to generate malicious code such as SQL injection scripts or deauthentication attacks. The proxy hijack exploit is even more secure, allowing attackers to reroute CoPilot's API traffic capture authentication tokens and gain unrestricted access to OpenAI's models. This could lead to enterprise wide financial risks by generating high cost AI queries or leaking sensitive proprietary code. With 83% of Fortune 500 companies using Copilot, the risks are widespread. Researchers urge better AI security controls, including adversarial training, certificate pinning and stricter API token policies. As AI coding tools advance security frameworks like NIST's AI risk management are needed to prevent exploitation. A critical, unauthenticated remote execution vulnerability in D link DSL3788 routers allows attackers to gain full control remotely. The flaw was discovered by Max Belia of secure network BVTech. Potential risks include complete router takeover, network compromise and malware deployment. D Link has released a patched firmware version and urges users to update immediately to protect against exploitation. CISA and the FDA have warned US healthcare organizations to remove Contec CMS 8000 patient monitors due to severe security vulnerabilities that risk remote code execution and patient data leaks. The Chinese made device used in the US and EU contains a firmware backdoor that allows attackers to overwrite files, execute arbitrary code, and exfiltrate patient data. One of the flaws enables unauthorized remote control. A second exposes patient data by transmitting unencrypted information to a hard coded IP address. A third flaw allows out of bounds writes leading to remote code execution. These issues affect multiple firmware versions, including rebranded models like the EPSMED MN120. No patches exist, and CISA advises immediate removal from networks. Past vulnerabilities in the same device have also exposed serious security risks, but no known attacks have been reported yet. The General Services Administration has paused new federal contract awards, creating confusion among vendors and raising concerns about broader impacts. The Jan. 24 memo cites the need for new leadership to review acquisition strategies, but allows exceptions for emergency obligations and IT spending. The pause follows President Trump's freeze on federal funds, though some restrictions were lifted after state Medicaid websites went down. Despite concerns in the cybersecurity sector and experts believe the GSA pause won't cause long term harm. However, uncertainty about cybersecurity funding, especially given the administration's stance on agencies like cisa, could deter small vendors. Industry groups including the Professional Services Council have called for clearer guidance on contract spending. Meanwhile, the Department of Defense clarified that its contracts remain unaffected, ensuring that critical national security missions continue. Vendors are seeking clarity to avoid disruption in cybersecurity and other federal services. Coming up after the break, a fond farewell to a pair of N2K colleagues and the case of the disappearing government data. Stay with us.
