Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:12)
These days, attackers rarely start with a bang. They start quietly. A leaked credential, A stolen session cookie, A lookalike domain that shouldn't exist. That's where Nord Stellar comes in. Nord Stellar is a threat exposure management platform that helps organizations see what attackers already know about them. Turns into an incident. It brings together data breach monitoring, dark web monitoring, attack surface management and cyber squatting detection in a single platform. That means visibility into leaked credentials and malware logs, insight into brand impersonation attempts, and a clear picture of exposed Internet facing assets. And shadow it for CISOs. It's a way to reduce response costs, prioritize real risk and communicate clearly with the board. For security teams, it's real time alerts, contextual intelligence and faster investigations without the noise. Most companies only react after the damage is done. Don't wait until your data is already for sale. Protect your business today with Nord Stellar. Learn more@nordstellar.com CyberWire Daily don't forget to mention CyberWire 10 for an exclusive offer. Cyber war shadows the U S Israel attack on Iran Hackers hijack Pakistani news broadcasts President Trump orders all federal agencies to stop using AI technology from Anthropic the Health Care Cybersecurity and Resiliency act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero day targeting Ivanti Connect Secure Devices. A North Korea linked group targets air gapped systems. We've got our Monday business breakdown on our afternoon Cyber Tea segment from Microsoft. Ann Johnson speaks with Rob Suarez, Vice President and Chief Information security officer at CareFirst Blue Cross Blue Shield about cybersecurity in healthcare. Tim Starks from cyberscoop has the latest goings on at cisa and Microsoft says the slop stops here. It's Monday, march 2, 2026. I'm dave buettner and this is your cyberwire intel brief. Thanks for joining us here today. Welcome to March. It's great to have you with us. The escalating conflict between the United States, Israel and Iran has unfolded alongside a parallel cyber campaign marked by widespread disruptions, infrastructure targeting and mounting warnings of retaliation after coordinated US and Israeli airstrikes on February 28 killed Iranian Supreme Leader Ali Khamenei and other senior officials. Iran responded with missile and drone attacks on US Bases and Israel, causing limited casualties and damage in cyberspace. Reported U S Israeli operations disrupted Iranian news outlets, government service services and Islamic Revolutionary Guard Corps communications and allegedly included distributed denial of service attacks and deeper intrusions into energy and aviation systems. A prolonged nationwide Internet blackout followed, though it remains unclear whether that outage stemmed from external cyber activity or internal government controls. Iranian and pro Iranian groups have since escalated activity targeting Israeli industrial control systems, regional fuel infrastructure and US And Israeli logistics providers. Security firms warn that reconnaissance and denial of service attacks may precede more destructive operations, including data wiping malware and ransomware. While impact claims on all sides may be exaggerated, experts caution that cyber operations are now tightly integrated with kinetic conflict, raising risks for critical infrastructure across the region and in Western nations. Several major Pakistani news channels were disrupted on March 1 after hackers hijacked satellite broadcasts during peak evening programming. The breach occurred shortly after Iftar and continued into the widely watched 9pm Bulletins displaying unauthorized anti military messages earlier urging citizens to oppose the armed forces. Geo News said it had been battling hacking attempts for nearly 24 hours before the intrusion. While authorities have not issued a formal statement, reports suggest retaliatory cyber attacks followed, allegedly targeting Indian media outlets. Investigations are ongoing. President Trump ordered all federal agencies to stop using artificial intelligence technology from Anthropic, escalating a dispute over how its systems can support military operations. Defense Secretary Pete Hegseth designated Anthropic a supply chain risk to national security, a rare label typically applied to foreign adversaries, effectively barring military contractors from working with the company. Anthropic said it would challenge the decision in court, calling it unprecedented and legally unsound. The clash centers on the Pentagon's demand for broad, unrestricted access to Anthropic's AI models. The company refused to allow uses involving fully autonomous weapons or mass domestic surveillance. The directive could disrupt intelligence analysis at agencies such as the NSA and the CIA, which rely on Anthropic's CLAUDE system, and force a transition to alternative AI providers. Speaking of claude, there are reports of a significant outage with elevated error rates affecting users across Web, mobile and API platforms this morning. The incident appears to be widespread rather than confined to a specific region or service. Users may see failed requests, timeouts or inconsistent responses elsewhere. OpenAI said it has reached an agreement with the U.S. department of Defense to deploy its large language models on classified military networks. CEO Sam Altman announced the deal shortly after President Trump ordered agencies to stop using rival Anthropics technology. Altman said the agreement includes prohibitions on domestic mass surveillance and requires human responsibility in the use of force, including autonomous weapons. It remains Unclear how quickly OpenAI's models can be integrated into classified defense systems. A bipartisan group of senators has advanced the Healthcare Cybersecurity and Resiliency act, with the Senate Health, Education, labor and pensions committee voting 22. 1 to send the bill to the full Senate. The legislation aims to strengthen healthcare cybersecurity by requiring updated federal guidance, including support tailored to rural medical practices, and improve coordination among agencies. The bill would codify key elements of a proposed overhaul of the HIPAA security rule, mandating measures such as multi factor authentication, encryption and regular audits, including penetration testing. It also directs the Department of Health and Human Services to establish additional minimum standards based on emerging threats. The measure includes grants and training for under resourced providers. Lawmakers say the bill could improve sector resilience, though its prospects in Congress remain uncertain. Researchers have identified a new remote access trojan called Steelite that streamlines double extortion attacks against Windows 10 and 11 systems marketed on cybercrime forums as fully undetectable. The malware combines ransomware, data theft, credential and cryptocurrency stealers and and live surveillance tools into a single browser based control panel, according to researchers at Black Fog. Steel Light begins harvesting browser stored passwords, session cookies and tokens as soon as a victim connects, even before an operator issues commands. Its dashboard includes remote code execution, webcam and microphone access, key logging, hidden remote desktop protocol access and ransomware deployment. A built in cryptocurrency clipper can swap wallet addresses during copy paste operations. By integrating data exfiltration and encryption in one platform, Steel Light lowers the barrier for criminals to conduct double extortion attacks. CISA has released updated technical details on Resurge, a malicious implant used in zero day attacks to compromise Ivanti Connect secure devices. The vulnerability was reportedly exploited since mid December 2024 by a China linked threat actor tracked by Mandiant as UNC5221. Resurge is a 32 bit Linux shared object file that acts as a passive command and control implant. Instead of beaconing out, it waits for specially crafted inbound TLS connections using fingerprinting and a forged Ivanti certificate for authentication to evade detection. Once validated, it establishes encrypted mutual TLS sessions for covert access. The malware also includes log tampering capabilities and boot level persistence, allowing it to survive reboots. CISA warns the implant may remain dormant and urges administrators to use updated indicators of compromise to detect and remove infections. Zscaler reports that North Korea linked APT37, also known as Scarcruft and Ruby. Sleet has deployed five new tools in a campaign targeting air gapped systems. The operation discovered in December 2025, uses malicious LNK files to launch PowerShell scripts and in memory payloads. A loader called Restleaf retrieves shellcode from Zoho WorkDrive, ultimately deploying Snake Dropper, which installs a backdoored Ruby runtime for persistence. Snake Dropper drops Thumbs bd, a backdoor that uses USB drives as bi directional relays to exfiltrate data and receive commands, and Virus Task, which spreads via malicious shortcut files on removable media. Zscaler also observed an Android surveillance tool called Footwine. Researchers warn the toolkit is designed to bypass network isolation and and recommend close monitoring of endpoints and physical access points. Turning to our Monday business breakdown, Cybersecurity investment and consolidation continue across global markets with multiple funding rounds and acquisitions announced this past week. Israeli exposure management Firm Astellia raised $35 million in seed and Series A funding to expand its AI driven analysis partnerships and global teams. Lithuania based compliance Startup Copla secured 6 million euros to support product expansion and growth across the EU and beyond. Saudi GRC automation platform SolidRange raised $2.4 million to advance its AI powered governance and compliance roadmap. In the US, Virginia based AI assurance startup Hardshell closed $1.1 million in pre seed funding to to grow in regulated sectors such as healthcare and defense. MA Activity was also active. Arctic Wolf acquired Sevco Security to strengthen exposure assessment capabilities, Booz Allen Hamilton agreed to acquire MSSP Defi Security, Valiant Solutions acquired Abile Group, quickstart bought training platform Iron Circle and UK based Littlefish Group acquired MSSP Stripe Olt. Be sure to check out our weekly Pro Business Briefing that is on our website and is part of Cyberwire Pro. Coming up after the break, Microsoft's Ann Johnson speaks with Rob Suarez from CareFirst Blue Cross Blue Shield about cybersecurity and healthcare. Tim Starks from cyberscoop has the latest goings on at CISA and Microsoft says the slop stops here. Stay with us. Maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel outpacing what's next in social engineering? Learn more@dopl.com that'S-O-P p e l.com. No, it's not your imagination risk and regulation really are ramping up and customers expect proof of security before they'll sign that deal. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk and customer trust together on one AI powered platform. Whether you're preparing for SOC 2 or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and RYTR spend 82% less time on audits with Vanta. That's not just faster compliance, that's more time for growth. Take it from me, if you're thinking about compliance, take the time to check out Vanta. Get started@vanta.com cyber foreign. Johnson is host of the Microsoft Security Afternoon Cyber Tea podcast. In a segment from this week's show, she sits down with Rob Suarez, Vice President and Chief Information security officer at CareFirst Blue Cross Blue Shield, to talk about cybersecurity in healthcare.
