Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers, so I decided to try Deleteme. I have to say, Deleteme is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data Privacy is protected. DeleteMe's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Deleteme now at a special discount for our listeners today. Get 20% off your delete me plan when you go to JoinDeleteMe.com N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com n2k and enter code N2K at checkout. That's JoinDeleteMe.com N2k code N2K President Trump rolls back AI regulations and throws TikTok a lifeline Attackers pose as Ukraine's cert UA tech support a critical vulnerability is found in the Brave browser. Sophos observes hacking groups abusing Microsoft 365 services and exploiting default Microsoft Teams. SETT researchers uncover critical flaws in tunneling protocols. A breach exposes personal information of thousands of students and educators. Oracle patches 320 security vulnerabilities. Kaspersky reveals over a dozen vulnerabilities in a Mercedes Benz infotainment system. Tim Starks from CyberScoop discusses executive orders on cybersecurity and the future of CISA on today's Threat Vector. David Moulton speaks with Dr. May Wang, CTO of IoT Security at Palo Alto Networks, about AI and how it's transforming IoT security. And honesty is not always the best policy. It's Tuesday, January 21st, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Foreign hello and thank you for joining us here today. It is great to have you with us. Donald Trump was sworn in as the 47th president of the United States yesterday amongst a flurry of executive orders signed during the first few hours of his second term. President Trump revoked a 2023 executive order by former President Biden aimed at reducing AI related risks to consumers, workers and national security. Biden's order required AI developers to conduct safety tests, share results with the government and establish testing standards under the Defense Production Act. Critics, including Republicans, claimed it stifled innovation. Meanwhile, Biden issued a separate order to support AI data centers energy needs, which Trump left intact, at least for now. TikTok resumed service in the US after President Trump announced an extension of the 90 day deadline for the company to secure a US buyer. The app had been shut down following a Supreme Court decision allowing a potential ban. Trump plans to issue an executive order to formalize the extension, but TikTok must still find a buyer to avoid another band. While accessible to existing users, the app remains unavailable for download on Google and Apple stores. Trump also suggested partial U.S. ownership of TikTok. Ukrainian researchers uncovered a cyber campaign where attackers posed as Ukraine's CERT UA tech support to gain access to devices via AnyDesk, a legitimate remote desktop tool. The hackers falsely claim to conduct security audits, exploiting trust and authority, Certua clarified. It only uses such tools with prior agreement and secure channels. The attackers, likely affiliated with Russia, often impersonate state agencies and apps. Ukraine faces a surge in cyber attacks, with Cert ua detecting over 4,300 incidents in the past year, a 70% increase. These attacks primarily involve malware, phishing and compromised accounts. Recent campaigns include phishing targeting military enterprises and fraudulent websites mimicking official platforms. Russian linked actors like Sandworm continue to exploit vulnerabilities, escalating cybersecurity challenges for Ukraine. A critical vulnerability in the Brave browser allows malicious sites to impersonate trusted domains in File select dialogs. The flaw misrepresents a site's origin during file uploads or downloads, enabling attackers to exploit user trust. When combined with an open redirect vulnerability on trusted sites, this issue can facilitate phishing and malware distribution, it was disclosed by bug hunter Sarif Mohammad Sajad. Sophos has observed two hacking groups, Stack5143 and Stack5777, abusing Microsoft 365 services and exploiting default Microsoft Teams settings to target organizations. These attackers, likely aiming for ransomware deployment and data theft, initiated chats and calls with internal users posing as tech support. Using legitimate Microsoft tools like Quick Assist and Teams, they gained remote access to victim devices, deployed malware, and performed reconnaissance. Stack 5143, first seen in November of last year, used spam messages followed by teams calls from accounts like Help Desk Manager. Attackers ran PowerShell commands, dropped malicious payloads, and installed backdoors. Techniques resemble those of FIN7, but with distinct methods. Stack 5777 employed similar tactics but focused more on manual actions, lateral movement and credential theft, even attempting to deploy Black Basta ransomware. Sophos emphasizes raising employee awareness of such advanced social engineering tactics. Critical flaws in tunneling protocols have left millions of devices, including home routers, VPN servers and CDNs vulnerable to exploitation. Discovered by top 10 VPN and researcher Matthew Vanhoff, these vulnerabilities allow attackers to hijack hosts for anonymous attacks, network access and powerful denial of service techniques like ping pong amplification. A scan revealed 4.2 million affected devices, including infrastructure from major players like Facebook and Tencent. Vulnerable systems accepted unauthenticated tunneling traffic, enabling attackers to act as proxies or access private networks. Countries most affected are China, the U.S. france, Japan and Brazil. Vulnerabilities impact consumer VPNs, routers and business networks. Enhanced security measures, regular updates and increased awareness are essential to protect against these threats. Education tech company PowerSchool suffered a data breach in December of last year exposing personal information of students and educators from its student information system. The breach, accessed through the Power Source Support Portal, compromised data such as names, contact details, Social Security numbers and medical records. Though no financial data was affected. Impacted individuals will receive two years of free credit monitoring. PowerSchool, serving over 18,000 schools in 90 countries, disclosed the incident in early January. Affected districts include Virginia's Charlottesville, Richmond and others, as well as California's Menlo park, where 14,000 individuals were impacted. Canadian schools, including Toronto District School Board were also affected. Authorities suggest the breach may involve ransomware as credentials were used to export data, which power school claims was later deleted. Oracle plans to release patches for 320 security vulnerabilities across over 90 products in 27 categories today, including communications, construction, E business suite and middleware. Some flaws are critical, with CVSS scores up to 9.9, notably affecting Oracle Agile Engineering, Data Management and Agile PLM framework. Five other vulnerabilities have CVSS scores of 9.8. The finalized January 2025 critical patch update urges immediate application to mitigate risks from potential attacks. Kaspersky revealed over a dozen vulnerabilities in Mercedes Benz's first generation MBUX infotainment system. These flaws could enable denial of service attacks, data extraction, command injection, privilege escalation and disabling anti theft protections. Exploitation requires physical access to the vehicle's interior and removal of the head unit using USB or custom UPC connections. Mercedes Benz confirmed it was aware of the issues since 2022 and has since patched the vulnerabilities. Newer MBUX versions are unaffected. The company emphasized its commitment to security, encouraging researchers to report issues via its Vulnerability disclosure program. Coming up after the break, Tim Starks from CyberScoop discusses executive orders on cybersecurity and the future of CISA. On our Threat Vector segment, David Moulton speaks with Dr. May Wang about how AI is transforming IoT security. And honesty isn't always the best policy. Stay with us. If you need three new reasons to love Jack Wraps at Jack in the Box even more, here they are. Chicken fajita, Chicken Caesar and delicious starting at $3. Coincidentally, those are the same three reasons you should come to Jack in the Box Right now at Jack, Everybyte's a big deal. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. More than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. And now a message from Blackcloak. Did you know the easiest way for cybercriminals to bypass your company's defenses is by targeting your executives and their families at home? Blackcloak's award winning digital executive protection platform secures their personal devices, home networks and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one third of new members discover they've already been breached. Protect your executives and their families 247365 with BlackCloak. Learn more at BlackCloak IO on today's preview of this week's Threat Vector podcast, David Moulton speaks with Dr. May Wang, CTO of IoT Security at Palo Alto Networks. They're discussing how AI is transforming IoT security.
