Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:14)
We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. CISA warns that pro Russia hacktivist groups are targeting targeting US Critical infrastructure Google patches three new Chrome zero days North Korean actors exploit react to shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero day in Gogs. The self hosted git service IBM patches more than 100 vulnerabilities Storm 0249 abuses Endpoint detection and response tools the DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariapan, Chief Transformation Officer at Rubrik, talking about understanding and building resilience against identity driven threats. And a malware tutor gets schooled by the law. It's Thursday, December 11, 2025. I'm Dave Bittner and this is your Cyberwire Intel Brief. Foreign. Thanks for joining us here today. It is great as always to have you with us. The US Government is warning that pro Russia hacktivist groups are targeting US Critical infrastructure, attempting to access operational technology systems through poorly secured Internet facing VNC connections. An advisory from the FBI, CISA, NSA and international partners identifies four main Cyber army of Russia Reborn also known as CAR, Z Pentest, no Name O5716 and Sector 16, which have recently targeted water and wastewater facilities, food and agriculture, and the energy sector. These actors are considered unsophisticated but opportunistic, using brute force attacks to access human machine interfaces with weak or default passwords, then modifying device settings, disabling alarms and causing operational disruptions. Some groups show ties or indirect alignment with Russian state interests, with CAR in particular linked by researchers to the gru. The DOJ has also announced related indictments. Although current impacts have been limited, authorities warn the activity could escalate. CISA urges OT operators to harden authentication, reduce Internet exposure, and strengthen recovery plans elsewhere Global cybersecurity agencies have issued their first unified guidance on using artificial intelligence in critical infrastructure, signaling a shift from theory to practical safeguards. The document warns that AI introduces new safety and reliability risks for ot, including model drift and unsafe process changes. Agencies stress that large language models should not make safety decisions. They recommend strong architectural boundaries, push based data flows and human oversight. The guidance urges operators to demand transparency from vendors and maintain manual skills as AI adoption expands. Google has issued patches for three new Chrome zero day vulnerabilities, including a high severity flaw already exploited in the wild. The primary zero day has no CVE and remains under coordination, with details withheld until most users update or dependent third party libraries are fixed. The update also addresses two medium severity issues, one a use after free in Password Manager and the second an inappropriate implementation in the Chrome toolbar. This marks Chrome's eighth zero day exploited in 2025. North Korea linked actors are exploiting the React to Shell flaw to deploy a new backdoor called etherrat. According to Sysdig, React to Shell is a maximum severity deserialization bug in React server components that enables unauthenticated remote code execution and has been widely abused since its Dec. 3 disclosure. Sysdig recovered Ether Rad from a compromised Next JS app and reports traits consistent with Lazarus Group tooling, including similarities to Beavertail. Ether Rad establishes persistent access and uses the Ethereum blockchain for command and control resolution through an Ether hiding technique. The backdoor regularly polls its C2, replaces its own code to hinder analysis, and uses multiple Linux persistence mechanisms. Sysdig urges immediate updates to patched React and Next JS versions, and checks for Ether Rat's persistence artifacts and unusual Ethereum RPC traffic. Research from Flare into Docker Hub shows that secret leakage is now a systemic problem, not an Edge case. In one month of scanning, they found more than 10,000 container images with exposed credentials affecting over 100 organizations, including a Fortune 500 and a major national bank. 42% of those images contained five or more secrets, often enough to unlock entire cloud environments, CI CD pipelines and databases. AI model keys were the most frequently leaked, with nearly 4,000 exposed, and many secrets came from shadow IT accounts outside corporate monitoring. Even when developers removed exposed secrets from images, 75% failed to revoke the underlying keys. Flair argues that modern breaches increasingly follow a new pattern. Attackers do not hack in they authenticate in using credentials companies accidentally publish themselves. Attackers are exploiting an unpatched zero day in gogs, the self hosted Git service, to gain remote code execution and compromise hundreds of Internet facing servers. The flaw abuses a path traversal weakness in the Put Contents API, allowing symbolic links to overwrite files outside a repository and revive a previously patched RCE bug. Wiz research found over 1400 exposed Gogs servers, with more than 700 showing signs of compromise linked to automated attacks. Deploying Super Shell based malware Users should disable open registration and restrict access immediately. IBM has released security updates addressing more than 100 vulnerabilities across its product line, including several critical flaws largely tied to third party components. Storage Defender received fixes for six critical bugs in its Data Protect module, while IBM Guardium patched a tomcat flaw enabling code execution. Additional critical issues were resolved in Maximo's form data library, Edge Data Collector's Django SQL injection bug and Instagna's Tomcat LibXML2 and WebKit components. IBM DB2 updates also addressed a critical corosync flaw. Numerous other products received high and Medium severity fixes. Storm 0249, an initial access broker, is abusing endpoint detection and response tools and trusted Windows components to stealthily deploy malware and prepare environments for ransomware operators. ReliaQuest analyzed an attack where users were tricked through ClickFix Social Engineering into executing curl commands that installed a malicious MSI with system privileges. The payload sideloaded a Rogue dll through SentinelOne's legitimate Sentinel agent Worker executable, allowing persistent privileged execution that appears benign to security tools. The attacker then used Windows utilities for system profiling and funneled encrypted command and control traffic through the trusted EDR process. ReliaQuest notes the profiling aligns with Ransomware group requirements and recommends behavior based monitoring for unsigned DLL loading and tighter controls over Curl, powershell and living off the land binaries. The Justice Department has charged Danielle Hilmer, a former product manager at Accenture federal services with misleading federal customers about the security of a cloud platform intended for government use, according to the indictment. Between March 2020 and November 2021, she obstructed auditors and falsely claimed the system met required controls under FedRAMP and the Department of Defense risk management framework. Prosecutors say she hid security gaps, directed others to mask deficiencies during assessments, and provided false information to secure approvals despite internal warnings that more than 100 controls were missing. Accenture says it self reported the issue and is cooperating. The case reflects growing federal enforcement against contractors that misrepresent cybersecurity compliance to win or retain government business. Coming up after the break, my conversation with Kavitha Maryapan, Chief transformation officer at Rubrik. We're discussing building resilience against identity driven threats and a malware tutor gets schooled by the law. Stay with us. Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave. And with Threat Locker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. Its powerful protection that gives CISOs real visibility, real control and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose ThreatLocker to minimize alert fatigue, stop ransomware at the source and regain control over their environments. Schedule your demo@threatlocker.com n2k today.
