Transcript
A (0:02)
You're listening to the CyberWire network, powered by N2K. And now a word from our sponsor, arcova. Formerly Morgan Franklin Cyber, arcova is a global cybersecurity and AI consulting firm built by practitioners who've been in the seat. They work directly with enterprise teams to solve complex security challenges, building secure by design programs that hold up as technology and threats evolve. From focused engagements to long term partnership, arcova delivers outcomes that endure because no one should navigate complexity alone. Learn why leading Global Enterprises Trust arcova@www.arcova.com that's a R C O V A.com. A fake WhatsApp spreads spyware the State Department pushes embassies to counter influence ops Cisco patches critical bugs Crystal rat hits telegram A Texas hospital breach affects a quarter million HHS reshuffles IT oversight Chinalink spies target Europe Evil tokens hijack Microsoft accounts Ransomware hits a North Dakota water plant Our guest is Sumed Thakur, President and CEO of Qualys, discussing how cybersecurity is shifting toward managing real business risk and tales of a tortoise's termination have been greatly exaggerated. Thursday, April 2, 2026 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. WhatsApp says roughly 200 users, mostly in Italy, were targeted with spyware through a fake iPhone version of its messaging app. According to a statement shared with TechCrunch. The company linked the malicious unofficial client to Italian spyware maker Sio and logged affected users out after detection. WhatsApp urged users to delete the app and reinstall the official version, spokesperson Margarita Franklin said. User roles remain unclear. Fake mobile clients remain an effective delivery method for government surveillance spyware and signal continued targeting activity in Italy. WhatsApp also said it plans legal action to halt the alleged campaign and protect affected users in the region. The State Department has ordered US Embassies worldwide to counter foreign influence campaigns and, as officials warn, anti American narratives are gaining ground internationally, according to current and former officials cited by the New York Times. The directive followed concerns about messaging from adversaries including Russia, China and Iran, especially after US Military actions involving Venezuela and Iran. The administration is also restoring limited broadcasts from Voice of America, Radio Free Asia and Radio Free Europe Radio Liberty after earlier shutdowns tied to legal and political disputes over alleged censorship claims weakened counter disinformation infrastructure can create openings for adversaries to shape global perceptions of US Policy and alliances, officials say. Diplomats are now being encouraged to coordinate with Pentagon information operations and challenge false claims online. As part of renewed messaging efforts, Cisco has released patches for two critical and six high severity vulnerabilities affecting enterprise networking and management products. The most serious issues include a vulnerability in Smart Software Manager on prem, which allows root level command execution through an exposed internal device, and another vulnerability which enables attackers to change administrator passwords via crafted requests. Additional flaws affect evolved Programmable Network Manager and Integrated management controller deployments across multiple server platforms. Successful exploitation could allow attackers to gain administrative control or access sensitive data across widely deployed infrastructure. Cisco says it has no evidence of active exploitation. Researchers report a new malware as a service platform called Crystal Rat, which is being promoted on Telegram with tools for remote access, data theft and device surveillance. According to Kaspersky, the malware appeared in January with tiered subscriptions and marketing on Telegram and YouTube. Crystal Rat shares similarities with Webrat, including Go based code and panel design. Its features include command execution, file transfers, browser data theft, key logging, microphone and video capture, and clipboard hijacking of cryptocurrency wallet addresses. The platform also supports anti analysis protections and encrypted communications with command and control infrastructure. Subscription based malware lowers barriers for entry level threat actors and expands access to surveillance grade tooling. Researchers say prank style disruption features may also distract victims while data theft occurs. Nacogdoche's Memorial Hospital says a January network breach exposed personal and health information belonging to more than a quarter million individuals. The Texas hospital reported that attackers accessed Internal Systems on January 31 and may have obtained sensitive data, including Social Security numbers, medical record numbers and contact information. Officials say there's no evidence of misuse so far. The organization secured its network and notified law enforcement but did not identify a responsible threat actor. Healthcare breaches expose high value identity and medical data that can enable fraud and long term identity risks for victims. The Department of Health and Human Services is restructuring its technology leadership, shifting cybersecurity and enterprise IT authority back to its Office of the Chief Information Officer. HHS reversed a 2024 change that expanded the Office of the National Coordinator for Health Information Technology, or onc, into a department wide technology policy role under the name Assistant Secretary for technology policy, ONC. The agency restored ONC's narrower focus on health IT standards and interoperability while returning cybersecurity, AI, cloud and data operations oversight to the CIO office. Officials said the move reinforces statutory enterprise IT responsibilities across the department. Centralized oversight could strengthen internal cybersecurity coordination and governance across HHS systems, though experts say the change is unlikely to immediately affect broader healthcare sector's cybersecurity risks, researchers report. A China linked cyber espionage group has resumed targeting European diplomatic and government organizations after shifting focus elsewhere in recent years, according to Proofpoint. The group, known as TA416, also tracked as Twil, Typhoon and Mustang Panda, began renewed activity in mid-2025 targeting individuals and mailboxes tied to NATO and European Union delegations. The campaign coincided with rising eu, China tensions over trade, rare earth exports and the Russia Ukraine war. Researchers also observed new targeting of Middle Eastern diplomatic entities following the start of the Iran conflict, shifting geographic targeting by state aligned actors, signals evolving intelligence priorities and continued credential harvesting and malware delivery risks for diplomatic networks. Researchers observed repeated use of PlugX backdoor delivery techniques. Researchers at Sequoia report a phishing as a service kit called Evil Tokens, which is enabling attackers to hijack Microsoft accounts using device code phishing techniques. The toolkit is sold via Telegram and targets employees with lures disguised as financial documents, meeting requests or shared files from services like DocuSign or SharePoint. Victims are redirected to legitimate Microsoft device login pages after entering attacker supplied verification codes, allowing threat actors to obtain access and refresh tokens. These tokens enable persistent access to email files, teams data and single sign on across Microsoft services. Device code Phishing bypasses traditional credential theft defenses and supports automated business email compromise activity at scale across multiple countries, including the United States and France, officials in Manoeu, N.D. say a ransomware attack struck a city water treatment plant but did not disrupt water safety or system operations, according to city officials. The intrusion was discovered March 14 and affected a server that was quickly disconnected. Staff operated systems manually for about 16 hours while monitoring pressure and safety conditions, officials said. Attackers left only a message on a screen with no ransom demand or direct contact reported. The FBI is reviewing the message as part of an investigation. Water utilities remain frequent cyberattack targets, with recent campaigns linked to criminal groups and nation state actors highlighting ongoing risks to critical infrastructure resilience. Coming up after the break, my conversation with Sumed Thakur from Qualys. We're discussing how cybersecurity is shifting toward managing real business risk, and tales of a tortoise's termination have been greatly exaggerated. Stay with us. Foreign maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation as attackers use AI to make their tactics more sophisticated. Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel Outpacing what's next in Social engineering? Learn more@doppel.com that's D O P E L dot com. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling, or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity, and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. Sumed Thakur is President and CEO of Qualys. I caught up with him at the RSAC 2026 conference for this sponsored Industry Voices conversation about how cybersecurity is shifting toward managing real business risk.
