Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. These days, attackers rarely start with a bang. They start quietly. A leaked credential, A stolen session cookie, A lookalike domain that shouldn't exist. That's where Nord Stellar comes in. Nord Stellar is a threat exposure management platform that helps organizations see what attackers already know about them. Turns into an incident. It brings together data breach monitoring, dark web monitoring, attack surface management and cyber squatting detection in a single platform. That means visibility into leaked credentials and malware logs, insight into brand impersonation attempts, and a clear picture of exposed Internet facing assets. And shadow it for CISOs. It's a way to reduce response costs, prioritize real risk and communicate clearly with the board. For security teams, it's real time alerts, contextual intelligence and faster investigations without the noise. Most companies only react after the damage is done. Don't wait until your data is already for sale. Protect your business today with Nord Stellar. Learn more@nordstellar.com CyberWire Daily don't forget to mention CyberWire 10 for an exclusive offer. GPS jamming hits the Strait of Hormuz An Iran linked threat actor uses AI to target Iraqi government officials. Activists leak thousands of DHS contract records. A Hawaii cancer center suffers a data breach. Google patches over 100 Android vulnerabilities. A new report tallies the scale of third party breaches. An Ms. Agent AI framework flaw allows full system compromise. On today's Threat vector segment, Evan GordonKer, director of AI security and DPRK operations at Palo Alto Networks Unit 42, joins David Moulton to unpack North Korea's hiring scams and tire tech turns Tattletail.
B (2:29)
Foreign
A (2:31)
March 3, 2026 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. Shipping through the Strait of Hormuz has nearly stalled following the start of US and Israeli strikes against Iran on February 28, as military attacks and widespread GPS and automatic identification systems, or AIs, disruptions raise safety risks. According to Maritime Intelligence from windward, more than 1100 ships from Iranian, Emirati, Qatari and Omani waters have experienced electronic interference with vessels falsely appearing inland or at sensitive sites like a nuclear power plant. The firm identified 21 new clusters of AIs jamming, with most incidents involving signal jamming rather than spoofing. Maritime authorities have labeled the threat critical, warning that degraded positioning data increases the risk of collisions, groundings or oil spills. As the conflict expands, analysts say broader attacks could further escalate electronic interference and navigational danger in the region. Amazon confirmed drone strikes damaged three AWS data centers in the UAE and one in Bahrain, disrupting cloud services across the Middle East. The company says facilities in the AWS Middle East UAE region and ME Central One and the AWS Middle East Bahrain region sustained structural damage, power disruptions and in some cases water damage from fire suppression efforts. Two UAE facilities were directly struck and a nearby strike affected infrastructure in Bahrain. Three availability zones remain significantly impaired or affected by localized power issues. Amazon is restoring physical infrastructure and pursuing software based recovery paths. Customers have been advised to activate disaster recovery plans and migrate workloads to other regions. The United Kingdom's National Cybersecurity center also warned of heightened Iranian cyber risk amid the conflict. An Iran linked threat actor targeted Iraqi government officials by impersonating Iraq's Ministry of Foreign affairs and using AI assisted malware. Zscaler Threat Labs detected the campaign in January of this year and tracks the actor as dust specter, attributing it to Iran with medium to high confidence. Government related infrastructure in Iraq was compromised to host malicious payloads. Researchers identified previously undocumented malware including Split Drop, Twin Task, twintalk and a Net remote access Trojan called ghostform. One attack chain used a password protected RAR archive, delivering a dropper that deployed DLLs for command execution and data exfiltration. A second chain consolidated capabilities into a single binary using Google Forms lures and in Memory powershell execution. Threat labs observed emojis and unusual Unicode patterns in the code, suggesting generative AI tools were used in development. Activists calling themselves Department of Peace claim they breached the Department of Homeland Security and leaked thousands of contract records. The nonprofit DDoS Secrets published data Sunday tied to contracts between DHS, Immigration and Customs Enforcement and more than 6,000 companies. Named firms include defense contractors Andarel and L3Harris Raytheon, surveillance provider Palantir and tech companies Microsoft and Oracle. The hackers say the data came from DHS's Office of Industry Partnership, which procures private sector technology. Security researcher Mika Lee organized the records into a searchable website listing contract amounts and contractor contact details. DHS and ICE did not respond to requests for comment. The group said it acted in response to the killings of two protesters and to expose companies supporting DHS operations, including immigration enforcement and deportations. The University of Hawaii says a ransomware attack on its cancer center's epidemiology division exposed data tied to nearly 1.2 million individuals. The August 2025 breach affected research files, including names, Social Security numbers, driver's license numbers and health data from long running epidemiological studies and public records. Clinical operations and student records were not impacted. The attackers encrypted systems, delaying recovery, and the university says it paid for a decryption tool and the secure destruction of stolen data. Google has released March Android security updates addressing 129 vulnerabilities, including an actively exploited zero day in a Qualcomm display component. The flaw involves an integer overflow in Qualcomm's graphics sub component that can lead to memory corruption. Google says there are indications of limited targeted exploitation. Qualcomm disclosed the issue in February, noting it affects 235 chipsets and that customers were notified earlier that month. The March bulletin also patches 10 critical flaws in Android's system framework and kernel components, including one that could allow remote code execution without user interaction. Google issued two patch levels with broader fixes in the March 5 release. Pixel devices receive updates immediately, while other vendors may face delays. Elsewhere, researchers have disclosed a high severity Google Chrome flaw that lets malicious extensions hijack the browser's Gemini Live AI panel and inherit elevated privileges. The bug was discovered by Palo Alto Networks Unit 42. Rogue extensions could abuse Chrome's extension network rules to intercept traffic to the embedded Gemini Live panel and inject their own JavaScript. Because Gemini live is tightly integrated with Chrome and can access screenshots, local files, cameras and microphones, a compromised panel could grant extensions access beyond their intended permissions. Researchers say this could have enabled webcam or microphone activation, file access or phishing content injection. Google patched the issue in January with Chrome 143 stable updates. The case highlights how deeply integrated AI features can expand the browser threat model. A new report from Black Kite finds third party breaches affected more than 433 million individuals across 136 verified incidents in 2025. Underscoring the expanding blast radius of supply chain attacks, the firm identified an average of 5.2 named downstream victims per breached vendor, totaling 719 companies. Vendors also reported 26,000 additional unnamed corporate victims, suggesting the total impact may be higher. Software service providers accounted for 28% of breaches, with healthcare, education and financial services mostly affected. Downstream detection and disclosure delays were significant, with a median 10 days to detect intrusions and 73 days to notify customers. Black Kite also found widespread critical vulnerabilities and exposed credentials among major vendors, warning that traditional third party risk management is failing to keep pace with evolving threats. A high severity flaw in the open source model Scope Ms. Agent framework allows attackers to execute arbitrary operating system commands through crafted input. The issue stems from the framework's shell tool, which relies on an unsafe regex based blacklist to filter dangerous commands. Researchers say attackers can inject malicious content into prompts or other data sources, tricking the agent into generating and executing attacker influenced shell commands. Successful exploitation could lead to full host compromise, data exfiltration and persistence. The vendor has not responded to coordination. Coming up after the break from today's Threat Vector segment, Evan Gordonker and David Moulton unpack North Korea's hiring scams and tire tech turns tattletail. Stay with us. Maybe that's an urgent message from your CEO. Or maybe it's a deepfake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel outpacing what's next in social engineering? Learn more@doppel.com that's.p p e l.com. No, it's not your imagination. Risk and regulation really are ramping up and customers expect proof of security before they'll sign that deal. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk and customer trust together on one AI powered platform. Whether you're preparing for SOC 2 or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and RYTR spend 82% less time on audits with Vanta. Or that's not just faster compliance, that's more time for growth. Take it from me, if you're thinking about compliance, take the time to check out Vanta. Get started@vanta.com cyber. Evan Gordonker is Director of AI Security and DPRK Operations at Unit 42 Operations. On today's threat Vector segment, he joins David Moulton to unpack North Korea's hiring scams.
