Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire network, powered by N2K.
Dave Buettner (0:12)
Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, Deleteme is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Deleteme's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.comN2K and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K.
Maria Varmazes (1:32)
FBI attributes $1.5 billion Bybit hack to DPRK hackers Cellebrite suspends services in Serbia following allegations of misuse A Belgian spy agency is hacked New groups, bigger attacks Sticky Werewolf strikes again USDNI orders legal review of UK's request for iCloud backdoor a cybersecurity veter takes CISA's lead doge accesses sensitive HUD data Cleveland Municipal Court remains closed following cyber incident Arctic Wolf's CISO and former FBI Special Agent Adam Murray joins Dave Buettner to discuss banning TikTok and increasing regulations for social media companies and Can Hacking be treason? Today is February 27, 2025. I'm Maria Varmazes, host of the T Minus Space Daily podcast on the mic for Dave Buettner and this is your Cyberwire intel briefing. The U.S. federal Bureau of Investigation has confirmed that North Korean hackers were behind last week's theft of one and a half billion dollars worth of Ethereum from the Bybit cryptocurrency exchange. The FBI attributes the hack to an activity cluster tracked as Traitor Traitor, which is tied to Pyongyang's Lazarus Group. The Bureau provided A list of 51 Ethereum addresses holding assets from the theft, stating that the FBI encourages private sector entities including RPC node operators, exchanges, bridges, blockchain and Linux firms, Defi services and other virtual asset service providers to block transactions with or derived from addresses. Trader Trader actors are using to launder the stolen assets. Bleeping Computer reports that Bybit CEO Ben Joe has shared the results of two investigations into the hack. First, investigators from Signia concluded that the root cause of the attack is malicious code originating from Safe Wallet's infrastructure. Second, researchers at Vericain added that the attack specifically targeted Bybit by injecting malicious JavaScript into App Safe Global, which was accessed by Bybit's signers. The payload was designed to activate only when certain conditions were met. This selective execution ensured that the backdoor remained undetected by regular users while compromising high value targets. Based on the investigation results from the machines of Bybit's signers and the cached malicious JavaScript payload found on the Wayback Archive, we strongly conclude that AWS S3 or Cloudfront account API key of Safe Global was likely leaked or compromised. The hack currently stands as the largest heist of any kind in history, surpassing Saddam Hussein's theft of $1 billion from the Central bank of Iraq in 2003. Israeli cell phone data extraction firm Cellebrite has dropped the Serbian government as a customer following a report that the Serbian police had used the company's tools to hack the phones of a journalist and an activist. According to a report from TechCrunch, Amnesty International published a report in December 2024 asserting that Serbian authorities used Cellebrite's hacking software in combination with an Android focused spyware tool to covertly infect individuals devices during periods of detention or police interviews, cellebrite said in a statement. We take seriously all allegations of a customer's potential misuse of our technology in ways that would run counter to both explicit and implied conditions outlined in our end User Agreement. After a review of the allegations brought forth by the December 2024Amnesty International report, Cellebrite took precise steps to investigate each claim. In accordance with our ethics and integrity policies, we found it appropriate to stop the use of our products by the relevant customers at this time. Belgium has initiated a judicial investigation into an alleged Chinese cyber espionage operation that compromised the email system of its State security service, or VSSE, between 2021 and 2023, unidentified Chinese state sponsored hackers reportedly siphoned off 10% of the agency's incoming and outgoing emails. The attackers exploited a vulnerability in an email security product from Barracuda Networks, deploying malware strains Saltwater, CSPY and Seaside in order to establish backdoors into compromised systems while classified internal communications remained secure. The breach affected an external server handling communications with government ministries and law enforcement, potentially exposing personal data of nearly half of the VSSE staff and past applicants. Belgian officials have refrained from commenting on the specifics, citing the ongoing nature of the investigation. In 2024, China significantly advanced its cyber espionage capabilities with a 150% increase in nation state backed intrusions across all sectors compared to 2023. As reported by CrowdStrike, industries such as financial services, media, manufacturing, industrials and engineering experienced triple or quadruple the number of China related intrusions. Notably, CrowdStrike identified seven new China linked threat groups, five of which demonstrated specialized skills targeting specific sectors. Groups like Liminal Panda, Locksmith Panda and Operator Panda, also known as Salt Typhoon focused on telecommunications networks, with Operator Panda linked to attacks on US and global telecom providers. These groups have adopted advanced tactics including the use of operational Relay Box or ORB networks, which are botnets of compromised edge devices, in order to obfuscate their activities and maintain persistent access. This evolution reflects China's long term investment in cultivating a highly skilled technical workforce, enhancing its offensive cyber capabilities to rival other global users. While primarily focused on intelligence gathering, the sophistication and specialization of these groups pose significant threats to global critical infrastructure. For instance, Volt typhoon, tracked by CrowdStrike as Vanguard Panda, has targeted logistics networks related to maritime operations, air transportation and international travel, underscoring the pressing need for robust cybersecurity measures to counteract China's expanding cyber espionage activities. In early 2025, cybersecurity researchers at Kaspersky's Secure List reported the resurgence of the Angry Lyco Advanced Persistent Threat Group, also known as Sticky Werewolf, targeting organizations in Russia and Belarus. Active since 2023, angry Lyco apt has been linked to cyber attacks on government agencies and large corporate contractors within these regions. The group's modus operandi involves highly targeted spear phishing emails directed at employees of major organizations, including governmental bodies and their contractors. These emails contain malicious RAR archives, embedding harmful shortcut files alongside seemingly benign documents. Once the archive is opened, a sophisticated infection chain is initiated, culminating in the deployment of the lumastealer malware. This malware is engineered to exfiltrate sensitive information such as system details, installed software, data, browser cookies, login credentials, banking information and cryptocurrency wallet contents. US Director of National Intelligence Tulsi Gabbard has ordered a legal review of the UK government's secret demand for Apple to provide a backdoor to access users icloud data. According to the Record, Apple recently said it would stop offering its Advanced Data Protection or ADP feature in the UK rather than comply with the demand, gabbard said in a response to a letter from Senator Ron Wyden, Democrat of Oregon, and Representative Andy Biggs, Republican of Arizona. I share your grave concern about the serious implications of the United Kingdom or any foreign country requiring Apple or any company to create a backdoor that would allow access to Americans personal encrypted data. This would be a clear and egregious violation of Americans privacy and civil liberties and open up a serious vulnerability for cyber exploitation by adversarial actors. Gabbard also added, my lawyers are working to provide a legal opinion on the implications of the reported UK Demands against Apple on the Bilateral Cloud Act Agreement. Upon initial review of the US And UK Bilateral Cloud Act Agreement, the United Kingdom may not issue demands for data of U.S. citizens, nationals or lawful permanent residents, nor is it authorized to demand the data of persons located inside the United States. The same is true for the United States. It may not use the Cloud Act Agreement to demand data of any person located in the United Kingdom. The Department of Government Efficiency, or doge, led by Elon Musk, has obtained access to the Department of Housing and Urban Developments, or HUDS Enforcement Management System, which contains sensitive personal data on individuals alleging housing discrimination, including domestic violence survivors. This system holds unredacted records such as medical histories, financial documents, Social Security numbers and confidential addresses. While other agencies have resisted doge's attempts to access confidential information, HUD granted access, raising significant privacy concerns. Doge's mission to modernize government technology and reduce improper spending has faced opposition, including legal challenges and resignations due to potential privacy violations. The Cleveland Municipal Court is closed for the fourth day in a row following a cyber incident earlier this week. The court hasn't disclosed the nature of the incident, but News 5 Cleveland cites an expert as saying that ransomware is the most likely cause, the court said in a Facebook post. As a precautionary measure, the court has shut down the affected systems while we focus on securing and restoring services safely. These systems will remain offline until we have a better understanding of the situation. All internal systems and software platforms will be shut down until further notice. The Ohio National Guard and Ohio Cyber Reserve are assisting in the response. Arctic Wolf's CISO and former FBI Special Agent Adam Murray joins Dave Buettner to discuss banning TikTok and increasing regulations for social media companies. And a soldier who Googles can hacking be treason? Well finds out the hard way. We'll be right back.
