Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic Identity Threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire President Trump signs the Take It down act into law A UK grocer logistics firm gets hit by ransomware Researchers discover Trojanized versions of the Keepass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA adds six actively exploited vulnerabilities to the known exploited vulnerability catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on the 2025 dbir and doge downsizes and the UAE recru. It's Tuesday, May 20, 2025. I'm Dave Bittner and this is your Cyberwire Intel Brief. Thanks for joining us here today. It's great to have you with us. President Trump has signed the Take It down act into law, criminalizing the distribution of non consensual intimate images, including AI generated deep fakes. The law mandates that social media platforms remove such content within 48 hours of notification and gives the FTC enforcement power. Violators face up to three years in prison and fines. While tech companies and some advocacy groups supported the law, others like the Cyber Civil Rights Initiative and the Electronic Frontier foundation, warn it could harm victims and chill free expression. Critics fear the takedown process is vague and could be abused, especially under a politically charged ftc. Trump even hinted at using the law to protect himself from online criticism, adding to concerns about selective enforcement and legal overreach. Peter Green Chilled A UK logistics firm supplying major grocers like Tesco and Aldi was hit by a ransomware attack last week, halting order processing but not affecting transport. The firm is working around the disruption and updating clients regularly. This attack adds to a growing pattern targeting the UK's food sector. Recent victims include Marks Spencer, Co Op and Harrods, all of which faced system outages from ransomware. Cybersecurity experts warn that the cold chain's tight delivery schedules and complexity make it a prime target. These attacks risk not just operations but also food waste and financial fraud through compromised communications. The Cold Chain Federation notes a surge in unreported incidents, while security firms say threat activity is only accelerating, putting the entire food supply chain at ongoing risk. Threat actors have been using Trojanized versions of the Keepass password manager to infiltrate networks and launch ransomware attacks. The campaign, active for at least eight months, was uncovered by with Secure. During a ransomware investigation, attackers altered KeePass's open source code to create KeyLoader, a version that functions normally but secretly installs a Cobalt strike beacon and exports users. Password databases in Cleartext. Distribution occurred through malicious Bing ads and fake software sites with domains mimicking Keepass's name. The beacons used carry watermarks tied to a known initial access broker linked to blkbasta ransomware operations. Some variants of keyloader were even signed with legitimate certificates. One such domain remains active, still pushing the Trojanized installer, raising concerns about continued exposure. Researchers from CISA and NIST have introduced a new metric called likely exploited vulnerabilities to better predict which software flaws are being actively exploited. Developed by Peter Mel from NIST and Jonathan Spring from cisa, LEV uses equations that combine data from the Exploit Prediction Scoring System, known exploited vulnerabilities lists, and key dates tied to each vulnerability. The goal is to improve patch prioritization by estimating the probability that a flaw has been exploited. Unlike KEV or EPSS alone, which can be incomplete or inaccurate, LEV helps fill gaps by identifying high risk vulnerabilities that might be overlooked. It can also gauge how comprehensive Kev lists really are. NIST is now seeking industry partners to test and refine LEV with real world data. A new malware campaign using SEO Poisoning on Microsoft Bing is delivering Bumblebee malware by luring users searching for technical software. Discovered in May by syjax researchers, the campaign targets IT professionals and developers by spoofing download sites for tools like WinMTR and Milestone XProtect threat actors registered typo squatted domains hosting them on the same server as Nairobi. When users downloaded from these sites, a malicious installer delivers both the legitimate app and the Bumblebee malware using stealthy techniques to evade detection. Bumblebee linked to ransomware groups like Conti connects to multiple command and control servers via the life domain. This shift from targeting common software to niche technical tools signals a strategic focus on high value targets with elevated system access. A sophisticated phishing campaign is impersonating zoom meeting invites to steal user credentials, exploiting workplace urgency and trust. Victims receive emails mimicking real zoom notifications, complete with company branding and a fake video of participants prompting users to enter login details on a spoofed meeting page. These fake sites use subtly altered domain names to appear legitimate, researchers note. The use of personalized URLs suggests attackers may be leveraging leaked data to tailor emails and increasing believability. Stolen credentials are likely exfiltrated via compromised APIs or messaging services, potentially granting access to broader corporate systems. Experts warn this targeted approach is more dangerous than generic phishing and recommend verifying unexpected invites, enabling multi factor authentication, and using email security tools and user awareness training to defend against such threats. CISA has added six actively exploited vulnerabilities to its known Exploited vulnerabilities catalog. These include flaws in Ivanti epmm M. Damon Email Server, srimax Output Messenger, Zimbra Collaboration Suite and ZK Techo biotime. Federal agencies must remediate these issues by the set deadlines. CISA urges all organizations to prioritize patching kev listed vulnerabilities to reduce exposure to cyber threats. A new bipartisan bill, the Federal Cyber Workforce Training act, aims to strengthen the shrinking federal cybersecurity workforce. Introduced by Representatives Pat Fallon, Republican from Texas, and Marcy Kaptor, Democrat from Ohio, the bill tasks the National Cyber Director with creating a centralized training center focused on hands on role specific onboarding. The initiative would target entry level and transitioning workers while also developing modules for HR staff to improve recruitment and hiring. The curriculum would be crafted in coordination with DHS and dod. Lawmakers say the effort is in response to ongoing challenges in federal cyber hiring worsened under the Trump administration by workforce cuts, hiring freezes and program disruptions. Critics like Representative Eric Swalwell warn these actions have had long term effects on recruitment, especially following layoffs at cisa. The bill seeks to reverse these trends by creating sustainable cyber career paths and raising training standards across federal agencies. Coming up after the break, Chris Novak from Verizon shares insights on the 2025 DBIR and DOGE downsizes and the UAE recruits stay with US compliance regulations, third party risk and customer security demands are all growing and changing fast. Is your manual GRC program actually slowing you down? If you've ever found yourself drowning in spreadsheets, chasing down screenshots or wrangling manual processes just to keep your GRC program on track. You're not alone, but let's be clear, there is a better way. Vanta's trust management platform takes the headache out of governance, risk and compliance. It automates the essentials from internal and third party risk to consumer trust, making your security posture stronger. Yes, even helping to drive revenue. And this isn't just nice to have. According to a recent analysis from IDC, teams using Vanta saw a 129% boost in productivity. That's not a typo, that's real impact. So if you're ready to trade in chaos for clarity, check out Vanta and bring some serious efficiency to your GRC game. Vanta GRC how much easier trust can be? Get started@vanta.com Cyber Worried about cyber attacks? Cyber Care from Storm Guidance is a comprehensive cyber incident response and resilience service that helps you stay prepared and protected. A unique onboarding process integrates your team with industry leading experts, so if an incident occurs, your response is optimal. Get priority access to deeply experienced responders, digital investigators, legal and crisis PR experts, ransom negotiators, trauma counselors, and much more. The best part? 100% of unused response time can be repurposed for a range of proactive resilience activities. Find out more at Cyber Care Cyberwire. Chris Novak is Vice President of Global Cybersecurity Solutions at Verizon and I recently caught up with him for insights on the 2025 dbir. Well, Chris, it is always a treat for me to be able to catch up with you, it seems on an annual basis to talk about the Verizon DBIR as it comes out every year. So welcome back.
