Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire network, powered by N2K.
Dave Bittner (0:14)
Secure access is crucial for US public sector missions, ensuring that only authorized users can access certain systems, networks or data. Are your defenses ready? Cisco's security service Edge delivers comprehensive protection for your network and users. Experience the power of zero trust and secure your workforce wherever they are. Elevate your security Strategy by visiting Cisco.com Go SSE that's Cisco.com Go SSE.
Maria Varmazes (1:03)
UK court blocks government's attempt to keep Apple encryption case secret Port of Seattle says last year's breach affected 90,000 people Verizon call filter app flaw exposes millions of call records Hackers hit Australian pension funds A global threat hiding in plain sight Cybercriminals are yelling Captcha Meta retires US fact checking program Our guest today is Rob Boyce from Accenture, and he's discussing advanced persistent teenagers and Google's AI goes under the sea. Today is April 7th, 2025. I'm Maria Varmazes, host of T Minus Space Daily, in for Dave Bittner, and this is your Cyber Wire Intel Briefing. Happy Monday, everybody. Hope you're having a great one. Let's get into the headlines. According to a report from Bloomberg, the UK Investigatory Powers Tribunal has blocked the British government's effort to keep secret a case involving its request to circumvent Apple's encrypted icloud services. The court, which hears complaints related to government surveillance, ruled that the government's efforts were a fundamental interference with the principle of open justice. The tribunal's ruling, which also publicly confirmed the existence of the case for the first time, said it would have been, quote, a truly extraordinary step to conduct a hearing entirely in secret without any public revelation of the fact that a hearing was taking place. The Port of Seattle, the agency that oversees Seattle's Seaport and Airport, has disclosed that the ransomware attack that it sustained in August affected data belonging to approximately 90,000 people. According to a report from Bleeping Computer, around 71,000 of the victims are residents of Washington state. The port says the breached information included some combination of names, dates of birth, Social Security numbers or last four digits of Social Security numbers, driver's license or other government identification card numbers, and some medical information. The agency previously disclosed that the Ryseider ransomware gang posted the stolen data to its leak site after the port refused to pay the ransom. Cybersecurity researcher Evan Connolly discovered a vulnerability in Verizon's call filter iOS app that could have allowed unauthorized access to users incoming call records. The flaw involved API requests lacking proper verification, enabling attackers to retrieve call data by specifying arbitrary phone numbers. This exposed phone numbers and timestamps of incoming calls potentially affecting millions of users. Verizon, which has over 140 million subscribers, addressed the issue with a patch in mid March 2025 following responsible disclosure practices. Hackers have recently targeted multiple Australian superannuation funds, attempting to access and steal members retirement savings. The association of Superannuation Funds of Australia, or the asfa, reported that while most attempts were thwarted, some breaches did occur. Australian super, managing over 365 billion Australian dollars for more than three and a half million members, confirmed that stolen passwords were used to access 600 member accounts, resulting in four members losing a combined 500,000 Australian dollars. The company responded by locking the affected accounts and notifying the impacted members. Prime Minister Anthony Albanese acknowledged the incident, noting that cyberattacks occur in Australia approximately every six minutes. Neptune RAT is a sophisticated RAT or remote access Trojan, actively targeting Windows users worldwide. Distributed through platforms like GitHub, Telegram and YouTube, it is often marketed as the most advanced rat. The malware employs stealthy infection techniques using PowerShell commands to bypass traditional security measures. Once installed, Neptune RAT can exfiltrate credentials from over 270 applications, deploy ransomware, monitor desktops in real time and disable antivirus software. It establishes persistence via scheduled tasks and registry modifications. Cybercriminals are employing deceptive tactics involving fake captchas and cloudflare Turnstile to distribute Legion loader malware. This campaign targets users searching for PDF documents. Online victims encounter a fake captcha and upon interaction they are led through a series of steps including browser notification requests, culminating in the download of an MSI installer. Executing this installer initiates a complex infection chain, ultimately installing a malicious browser extension designed to steal sensitive information such as cookies, browsing history and Bitcoin activities. The malware affects multiple browsers including Chrome, Edge, Brave and Opera. Meta has officially ended its third party fact checking program in the United states as of April 7, 2025. This initiative, which previously involved external organizations to assess the accuracy of content on Facebook, Instagram and Threads, has been replaced by a user driven system called Community Notes. This model allows the users to collaboratively add context to posts, aiming to enhance information accuracy through collective input. Meta's CEO Mark Zuckerberg stated that this shift is intended to promote free expression and reduce perceived biases associated with traditional fact checking methods. The company plans to continue its third party fact checking efforts outside the United States and intends to expand the Community Notes system internationally in the future. Security Week is reporting that a 20 year old Florida man named Noah Urban has pleaded guilty to his involvement in the Scattered Spider cybercriminal group. Urban, who was arrested in January 2024, was accused of launching phishing and sim swapping attacks that led to the theft of millions of dollars worth of cryptocurrency. Urban pleaded guilty to conspiracy to commit wire fraud, wire fraud and aggravated identity theft. As part of the deal, he has agreed to pay $13 million in restitution to 59 victims. Stick around after the break to hear Dave Buettner's conversation with Rob Boyce, Global Lead for Cyber Resilience at Accenture, as they discuss Advanced Persistent Teenagers or AP teens and facial recognition could help save the planet.
