Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire Network powered by N2K.
Dave Bittner (0:14)
We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need.
Maria Varmazes (2:01)
Law Enforcement Shutters Guarantec's Crypto Exchange NTT discloses breach affecting corporate customers Malvertising campaign hits nearly a million devices AI's role in Canada's next election Scammers target Singapore's PM in AI fraud Botnets exploit critical IP camera vulnerability in our International Women's Day and Women's History Month special. Join producer Liz Stokes as she shares the inspiring stories of women who are shaping the future of cybersecurity and how did insider threats turn a glitch into a gold min? Today is Friday, March 7, 2025. I'm Maria Varmazes from N2K's own T minus Space Daily podcast in for Dave Bittner and this is your Cyber Wire Intel Briefing. Thanks for rounding out the first week of March with us. Let's get into your Friday intel briefing. The U.S. secret Service, working with international law enforcement partners, has seized domains used by the Russian cryptocurrency exchange Guarantex, which was frequently used by ransomware gangs for money laundering. A Secret Service spokesman told the Register that the US Secret Service has seized website domains associated with the administration and operation of Russian cryptocurrency Exchange. Garantex is part of an ongoing investigation. We are unable to provide additional comments at this time and will release additional information when available. A notice on the Exchange's website states. Everyone's favorite seizure notice the domain for Garantex has been seized by the United States Secret Service pursuant to a seizure warrant obtained by the United States Attorney's Office for the Eastern District of Virginia under the authority of 18 USC sections 981 and 982. Stablecoin operator Tether has also blocked Garantech's wallets as part of the EU sanctions levied last week. Japanese telecom giant NTT Communications Corporation has disclosed a breach that affected nearly 18,000 of its corporate customers, according to a report from Bleeping Computer. The breach, which was discovered in February, affected names, contract numbers, phone numbers, email addresses, physical addresses and service usage information. The hackers gained access to NTT's order information distribution system, which holds information on corporate customers. NTT says some of the information, quote might have been leaked externally, Microsoft says a malvertising campaign impacted nearly 1 million devices around the world, originating on illegal streaming websites. Malvertising redirectors on these sites sent users to a GitHub repository designed to trick them into installing malware as part of a tech support scam. Microsoft states that once the redirection to GitHub occurred, the malware hosted on GitHub established the initial foothold on the user's device and functioned as a dropper for additional payload stages and running malicious code. The additional payloads included information stealers to collect system and browser information on the compromised device, of which most were either Lummus dealer or an updated version of Doanerium. Canada's Communications Security Establishment, or cse, warns that foreign adversaries and hacktivists are likely to exploit generative artificial intelligence to influence voters ahead of the next federal election. The agency anticipates the use of AI generated deepfakes, realistic but fabricated videos and images depicting politicians and officials to deceive the public and so discord. These deepfakes can misrepresent events or statements, potentially leading to political polarization. The CSE's report highlights that such AI driven disinformation campaigns are expected to become more prevalent within the next two years, posing a significant threat to democratic processes. Singapore's Prime Minister Lawrence Wong has alerted the public to the proliferation of deepfake videos, misusing his likeness to promote fraudulent services including cryptocurrency schemes and permanent residency application services. In a Facebook post dated March 7, 2020 5:00pm, Wong emphasized that these AI generated videos are scams and urged citizens to refrain from engaging with such content or sharing personal information. The U.S. cybersecurity and Infrastructure Agency, otherwise known as CISA, has published an advisory on an actively exploited vulnerability affecting EdiMax IP cameras. The flaw can lead to remote code execution and received a CVSS score of 9.3. Security Week reports that multiple Mirai based botnets are exploiting the vulnerability. Researchers at Akamai, who discovered this flaw, told Security Weeks that attackers have been exploiting it since fall of last year. And speaking of Akamai, Akamai recently thwarted a magecart attack targeting a global retailer's e commerce platform. Magecart groups specialize in injecting malicious scripts into websites to steal customers payment information during transactions. In this incident, Akamai's security team detected unusual activity and promptly identified the malicious code embedded in the retailer's website. By collaborating closely with the retailer, Akamai facilitated the swift removal of the threat, safeguarding customer data and preserving the retailer's reputation. This case underscores the critical importance of continuous monitoring and rapid response mechanisms and defending against sophisticated web based threats. And that's your Friday intel briefing everybody. Coming up after the break, we celebrate International Women's Day a little bit early as we shine a spotlight on incredible women in and around our network for shaping the future of cybersecurity and stick around for how insider threats turn a glitch into a gold mine.
