Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:11)
Today's sponsor, Rapid7, has an irresistible invitation for you CISOs and security practitioners out there. A free two day virtual summit. The subject Preemptive security Join the Global CyberSecurity Summit on May 12th and 13th from wherever you like. A list speakers will show you how organizations are disrupting attacks before they can blowtorch your day. You'll see how exposure management, MDR and AI together let you make the decisive move. Registration is open at rapid7.brighttalk.com. The FBI disrupts a multimillion dollar phishing ring A North Korea linked supply chain attack hits OpenAI developers face a Slack phishing campaign A critical Python notebook flaws
C (1:12)
exploited in hours Shiny Hunters Target Rockstar
B (1:16)
Games a Japanese shipping firm reports a breach tracking the cybersecurity winners and losers in Trump's 2027 budget plus a claimed cyber attack on UAE infrastructure We got our Monday business breakdown. Our guest is Justin Kohler, Chief Product Officer at Spectre Ops, discussing identity attack path management and crackdowns at home Push scam networks abroad. It's Monday, april 13, 2026. I'm dave buettner and this is your cyberwire intel briefing. Thanks for joining us here today. It's great as always to have you with us. Happy Monday. US And Indonesian law enforcement have dismantled well a phishing operation linked to more than $20 million in fraud worldwide. Well, we note, is spelled W3LL because of course it is led by the FBI's Atlanta Field Office. The takedown targeted the well phishing kit, which allowed criminals to spoof login pages and steal credentials. The kit sold for about $500 through the members only well Store Active from 2019 to 2023, and investigators believe the marketplace enabled the sale of over 25,000 compromised accounts. Activity continued after the store's closure via encrypted messaging apps with more than 17,000 victims targeted between 2023 and 2025. The FBI seized the well Store domain and identified the suspected developer as gl. Researchers at Group IB previously described well as a full business email compromise ecosystem supporting attacks across the phishing kill chain the Trump administration's proposed 2027 budget would reduce civilian federal cybersecurity spending from $12.455 billion in 2026 to $12.228 billion, a decline of about $227 million with uneven impacts across agencies. The Department of Justice and State Department would see the largest increases, alongside smaller gains at Transportation, Commerce, Housing and Urban Development and energy. Major cuts would fall on the Department of Homeland Security, largely affecting cisa as well as the Department of Veteran affairs, the National Science Foundation, Health and Human Services and Treasury. Notably, cybersecurity funding for the SEC and FCC would drop to zero. Under the proposal, CISA alone could lose $707 million and hundreds of positions, raising concerns about reduced collaboration with the private sector. Experts warn that lower federal cyber investment amid rising nation, state and criminal threats may increase long term national risk and weaken public private defense partnerships. According to Iranian news sources, the Handala Hacking group claims responsibility for a cyber attack targeting three UAE institutions, the Dubai Courts Authority, Dubai Land Authority and Dubai Roads and Transport Authority. The group says it destroyed six petabytes of data and exfiltrated 149 terabytes of sensitive documents, causing reported disruptions across Dubai's legal and infrastructure systems. HANDELA framed the operation as political retaliation and warned of further action. The claims, if accurate, suggest a significant challenge to the UAE's critical infrastructure cybersecurity posture. Again, we emphasize these claims have not yet been independently verified. The Open Source Security foundation is warning of a phishing campaign targeting software developers through the to do group Slack Workspace. Attackers impersonate Linux foundation leaders and promote a supposed invite only artificial intelligence tool to lure victims. Targets are redirected through a fake Google workspace style page that requests an email access code and installation of a malicious root certificate, enabling attackers to monitor encrypted traffic and steal data. The attack varies by platform. On macOS, victims are prompted to run a file called GAPI, potentially enabling full system compromise on Windows. Users are urged to trust the fake certificate. Researchers note similarities to recent campaigns against Node JS developers, which Mandiant has linked to North Korean state sponsored actors. OpenSSF advises developers never to install certificates from unsolicited links and to enable multi factor authentication. OpenAI says it was affected by the recent Axios supply chain attack linked by researchers to North Korean hackers. Attackers compromised a maintainer's NPM account and briefly distributed malicious Axios packages containing a cross platform Remote Access Trojan. A GitHub Actions workflow used in OpenAI's macOS app signing process executed the tainted version, exposing signing materials. OpenAI believes its certificate was not compromised, but revoked and rotated it as a precaution. Researchers observed infections on at least 135 machines. Hackers began exploiting a critical vulnerability in the Marimo Open Source Python notebook platform within 10 hours of its disclosure. The flaw, rated 9.3 by GitHub, allows unauthenticated remote code execution through the exposed terminal WSOCKET endpoint. Researchers at Sysdig observed attackers quickly validating access, conducting reconnaissance and extracting credentials from ENV files and SSH related locations in under three minutes. The vulnerability affects multiple versions, particularly deployments exposed on shared networks in edit mode mode. The attackers appeared to prioritize credential theft rather than persistence or crypto mining. Marimo released an updated version to address the issue and advised users to upgrade immediately, restrict endpoint access, monitor connections and rotate potentially exposed secrets. Hackers claiming to be the Shiny Hunters group say they breached Rockstar games by accessing servers hosted by a third party cloud provider and threaten to release stolen data unless paid a ransom. Rockstar confirmed that a limited amount of non material company information was accessed, but said the incident had no impact on its operations or players. The group previously linked to breaches, including Ticketmaster claims it will publish the data after unmet demands. The incident marks Rockstar's second major cyber attack in three years, following a 2023 breach tied to a Lapsus member that exposed early Grand Theft Auto 6 development footage. Japanese shipping company Nippon Yusen Kabushiki Kaisha reported unauthorized access to a marine fuel procurement system detected on March 24, resulting in the possible exfiltration of data, including personal information. The company isolated the affected system and suspended its use, restoring operations. On March 27, NYK notified regulators and police and launched an internal investigation. It said there's no evidence of ransomware activity, financial demands or secondary damage linked to the incident. So far it's Monday and that means we have our business breakdown. Cybersecurity firms announced multiple funding rounds and acquisitions last week, led by 10x AI raising $250 million in Series B funding to expand hiring partnerships, EMEA operations and its artificial intelligence security operations platform. Depth first secured $80 million to grow research and enterprise adoption, while Alcatraz and Link security each raised $50 million to support expansion and product development. Additional early stage funding went to Trent AI Huskies and Test of Things in mergers and acquisitions activity. Fortra acquired Zero Point Security to expand offensive security training capabilities, while Effects acquired Priority One IT to strengthen healthcare sector technical services. Be sure to check out our regular business briefing, which publishes Wednesday on our website. It's part of Cyberwire Pro. Coming up after the break, my conversation with Justin Kohler, chief product officer at Spectrops. We're discussing identity attack path management and crackdowns at home push scam networks abroad. Stay with us.
