Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a brief message from our sponsor, DropZone AI. Is your SoC drowning in alerts with legitimate threats sitting in queues for hours or even days? The latest SANS SOC survey report reveals alert fatigue and limited automation are SOC Team's greatest barriers. Drop Zone AI, recognized by Gartner as a cool vendor, directly addresses these challenges through autonomous recursive reasoning investigations, quickly eliminating false positives, enriching context, and enabling analysts to prioritize real incidents faster. Take control of your alerts and investigations with Dropzone AI. Critical remote code execution vulnerabilities affect Kubernetes controllers Senior Trump administration officials allegedly used unsecured platforms for national security discussions. Even experts like Troy Hunt get phished. Google acknowledges user data loss, but doesn't explain it. Chinese hackers spent four years inside an Asian telecom firm. Snake Keylogger is a stealthy multi stage credential stealing malware. A cybercrime crackdown results in over 300 arrests across seven African countries, and the Pew Research center figures out how its online polling got slightly borked. Foreign March 25, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. Great to have you with us. Wiz Research discovered four critical remote code execution vulnerabilities dubbed Ingress Nightmare in the Ingress nginx controller for kubernetes. These flaws allow unauthenticated attackers to inject malicious nginx configurations, leading to full cluster takeover and unauthorized access to all secrets across namespaces. The attack targets the Admission controller, which lacks authentication and is often exposed to the public Internet. With a CVSS score of 9.8, this issue affects at least 6,500 clusters, including Fortune 500 environments. Exploits use NGINX features like SSL engine to load malicious libraries. Mitigation includes patching to the latest versions, disabling or securing the Admission controller, and applying strict network policies. The research also highlights systemic security weaknesses in Kubernetes Admission controllers and calls for better hardening practices. A major national and cybersecurity concern surfaced after the Atlantic's editor in chief Jeffrey Goldberg, was accidentally added to a Signal Group chat involving senior Trump administration figures discussing potential airstrikes in Yemen. The encrypted messaging thread, believed authentic, included sensitive military details like weapons, targets and timing. Though Defense Secretary Pete Hegseth denied it was a war plan, Goldberg noted the chat mirrored Centcom's operational timeline and included high level coordination. The use of Signal a commercial unclassified app for such discussions raises alarms about secure communication practices. Goldberg exited the group after realizing it was likely real and no one noticed his presence. The White House confirmed it's reviewing the incident, underscoring risks of misrouted sensitive information and the vulnerabilities introduced when officials use unsecured platforms for national security discussions. Stay tuned for my discussion of this story with our policy expert Ben Yellen. Speaking of Signal, Mandiant warns that Russian hacking groups are exploiting Signal's Linked devices feature to secretly spy on encrypted chats. By tricking users into scanning malicious QR codes, attackers can add their own device to the victim's Signal account, receiving messages in real time without breaking encryption. Targets include military personnel, journalists and politicians. The technique has low detection risk and has been used in both remote fishing and battlefield operations. Mandiant urges users to audit linked devices and follow strong security practices. Security expert Troy Hunt fell for a convincing mailchimp phishing attack while jet lagged, resulting in the compromise of his account and the export of his 16,000 subscriber mailing list. The Phish, hosted on a spoofed Mailchimp site, tricked him into entering login credentials and a one time password. Moments later, attackers accessed his account from a New York IP and exported the list, which included both active and unsubscribed users, raising concerns about mailchimp's data retention practices. Hunt quickly changed his credentials and notified subscribers, but reflected on how fatigue and subtle social engineering contributed to the breach. He emphasized the limitations of 1 time password based 2fa and called for phishing resistant authentication like passkeys. The phishing site was disabled within hours. Hunt plans a deeper technical analysis and urges users to remain vigilant against sophisticated scams. Google says a technical issue caused the loss of Timeline data for some Google Maps users, possibly permanently. The Timeline feature tracks users location history and can include photos, creating a visual travel log. Users noticed missing data over the weekend, and Google confirmed the issue in emails. Those with encrypted backups can restore their data manually, but users without backups have lost it for good. Google hasn't detailed the cause or scope of the incident, but raising broader concerns about data resilience. Chinese state linked hackers, dubbed Weaver Ant, infiltrated an unnamed Asian telecom firm and remained undetected for over four years. According to incident response firm Signia. The hackers initially breached the network using compromised Zyzyl home routers and maintained persistence through a network of web shells, including the China Chopper tool. Weaver Ant used an orb network of hijacked routers and IoT devices to mask their activity and move laterally across systems. Their objective was long term espionage and data theft. Signia discovered the intrusion during a separate investigation and linked it to Chinese actors based on tools, working hours and targeted infrastructure. The attackers demonstrated high level sophistication using multiple custom tools and evasion techniques to stay hidden. Snake Keylogger is a stealthy multi stage credential stealing malware that uses malicious spam emails with deceptive disk image files to trick victims. The attached file mimics a business document, increasing the chance of user interaction. Once opened, it deploys an executable that initiates an infection chain, downloading and decrypting a hidden payload disguised as an MP3. The malware executes in memory via process hollowing, targeting installutil exe to evade detection. It harvests credentials from web browsers, email clients, FTP apps and WI fi settings, exfiltrating data to attacker controlled servers. Interpol coordinated a major international crackdown on cybercrime resulting in over 300 arrests across seven African countries between November and February. Authorities in Nigeria, South Africa, Zambia and others dismantled cross border cybercrime networks behind mobile banking, investment and messaging app scams which defrauded over 5,000 victims. Nigeria arrested 130 suspects, including 113 foreign nationals, some allegedly coerced into scams via human trafficking. South Africa disrupted a simbox fraud operation used in SMS phishing attacks, while Zambia arrested hackers targeting banking data through malicious links. Seized assets include vehicles and properties. Private cybersecurity firms like Kaspersky and Group IB supported the effort by analyzing malware and sharing data. Interpol cited Africa's growing cybercrime risks, with the region leading in average weekly cyber attacks per organization back in 2023. Coming up after the break, my conversation with Ben Yellen over the senior Trump administration officials using unsecured platforms for national security discussions and Q Research center figures out how its online polling got slightly forked. Stay with us. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs we rely on point in time checks. More than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off.
