Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:12)
And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. EDU MSSI HR software giant work discloses a data breach researchers uncover a zero day in Elastics EDR software Ghost tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald's systems. There's a new open source framework for testing 5G security flaws. New York's Attorney General sues the banks behind Zelle over fraud allegations. The DOJ charges the alleged Zeppelin ransomware operator and seizes over $2.8 million in cryptocurrency. Tim Starks from CyberScoop discusses the overlooked changes that two Trump executive orders could bring to cybersecurity and Bots build their own echo chambers It's Monday, August 18, 2025. I'm Dave Pitt and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It is great to have you with us. HR software giant Workday has disclosed a data breach after attackers accessed a third party CRM platform through a social engineering campaign. While customer tenants and their data were not affected, some business contact information like names, emails and phone numbers was exposed. Workday said attackers impersonated HR or IT staff via phone and text to trick employees into giving access. The breach discovered on August 6, appears to be linked to the Shiny Hunters extortion group, which has recently targeted Salesforce CRM systems at several major companies including Adidas, Qantas, Google, Louis Vuitton and Chanel. The group uses malicious OAuth apps to steal CRM data, then extorts victims by threatening leaks. Workday emphasized that only commonly available contact data was exposed, but warned it may fuel further phishing attempts. Researchers at Ash's Cybersecurity have uncovered a zero day flaw in Elastics endpoint detection and response software. The bug, a null pointer dereference in a Microsoft signed driver, can be used to crash systems bypass security, execute remote code, or plant malicious drivers for persistence. The issue affects multiple versions with no patch available. Despite multiple disclosure attempts, Elastic has not responded. The flaw poses a serious risk, allowing attackers to undermine Elastic's security stack. Recorded futures Insect Group have published research on ghost tapping, an emerging fraud technique where Chinese speaking cybercriminals use NFC relay attacks to exploit stolen payment card data linked to mobile wallets like Apple Pay or Google Pay. An NFC relay attack is a type of cyber attack where criminals intercept and forward communication between a contactless payment card or mobile wallet like Apple Pay or Google Pay and a payment terminal. Mules equipped with burner phones make in person purchases of luxury goods, which are later resold for profit. Analysts at Insic Group identified an individual on Telegram advertising ghost tapping services and burner devices to syndicates. Following the May 2025 disclosure of Huon Guarantee, criminals have shifted to Zinbe Guarantee and Tudao Guarantee marketplaces to coordinate fraud, recruit mules and launder money. Operations are concentrated in China and Southeast Asia but can be executed globally. Ghost tapping's effectiveness stems from weak know your customer checks at retailers, making detection difficult. Victims include retailers, banks, payment providers and insurers. A recent ruling from Germany's Federal Supreme Court threatens the legality of ad blockers, raising concerns about user choice and privacy online. The case stems from a decade long legal battle between publisher Axel Springer and ayeo, maker of AdBlock Plus. While lower courts largely upheld ad blockers as tools that enable user choice, Germany's Supreme Court overturned part of a 2022 ruling and sent the case back for review. The court asked whether ad blockers alter copyright protected code and under what conditions such interference is lawful. Critics warn the decision could set a precedent that undermines not just ad blocking but also browser extensions that enhance privacy, accessibility and security. If Germany restricts ad blockers, it risks joining China as one of the few jurisdictions to ban them. A security researcher who goes by the name Bob Dehacker uncovered multiple serious flaws in McDonald's systems affecting employees and internal platforms worldwide. Initial testing revealed that the McDonald's app failed to validate reward points server side allowing free food. Further digging exposed wider vulnerabilities. Their design hub used weak client side protections, allowed anyone to register accounts, emailed passwords in plain text and exposed API keys and Algolia indexes with personal data. Crew level accounts could access executive systems, impersonate staff and even alter franchise content through the GRS portal or which lacked authentication. Misconfigurations also exposed internal documents and the new Cosmics platform allowed coupon abuse and order manipulation. Reporting these flaws was difficult. McDonald's had removed its security TXT contact file, forcing the researcher to cold call HQ. While most issues were fixed, reporting channels remain inadequate. Researchers from the Singapore University of Technology and Design have released Sniffject spelled SNI5G E C T because of course it is for f ck's sake. An open source framework for testing 5G security flaws unveiled at USENIX Security 2025, the tool exploits the pre authentication phase of 5G connections when traffic between devices and base stations is unencrypted. Using off the shelf radios, Sniffject can sniff uplink and downlink traffic with 80% accuracy at ranges up to 20 meters and inject packets with a 70 to 90% success rate. Demonstrated attacks include a 5G to 4G downgrade exploit, enabling surveillance and further compromise. The tool also supports denial of service fingerprinting and multi stage payload injection. While the core framework is public on GitHub, more dangerous exploits are restricted to vetted institutions. The GSMA confirmed the downgrade flaw and assigned it a CVE under its disclosure program. New York Attorney General Letitia James has filed a lawsuit against the banks behind Zelle, alleging the payment platform facilitated over $1 billion in fraud between 2017 and 2023. James claims Zelle's operator, Early Warning Services owned by major banks including JPMorgan Chase, bank of America and Wells Fargo, rushed the product to market without proper safeguards. The lawsuit cites weak registration processes that allowed scammers to pose as legitimate businesses or government agencies, tricking victims into sending unrecoverable funds. James also alleges ews failed to act quickly on fraud complaints, remove bad actors or reimburse victims despite marketing Zell as safe. While Zell denies wrongdoing, James seeks restitution and damages. For New Yorkers, the case echoes earlier scrutiny by the Consumer Financial Protection Bureau. The U.S. department of justice has charged Ioannis Alexandrovich Antropenko, an alleged Zeppelin ransomware operator, and seized over $2.8 million in cryptocurrency, plus cash and a luxury vehicle tied to his crimes. Antropenko and co conspirators encrypted and stole victims data demanding ransom to prevent leaks. They allegedly laundered funds through Chipmixer and structured cash deposits. Zeppelin, first seen in 2019 and linked to Vega Locker, mainly targeted healthcare and tech sectors. Antropenko faces charges of computer fraud, abuse and money laundering conspiracy. Coming up after the break, Tim Starks from cyberscoop discusses the overlooked changes that Two Trump executive orders could bring to cybersecurity and bots build their own echo chambers. Stay with us. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first. And it works. Sponsored jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed According to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. Foreign machine identities now outnumber humans by more than 80 to 1. And without securing them, trust, uptime, outages and compliance are at risk. Cyber Arc is leading the way with the only unified platform purpose built to secure every machine identity, certificates, secrets and workloads across all environments, all clouds and all AI agents. Designed for scale, automation and quantum readiness, Cyber Arc helps modern enterprises secure their machine future. Visit cyberark.com machines to see how. And it's always my pleasure to welcome back to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, welcome back.
