Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
John Miller (0:12)
And now a word from our sponsor. Spy Cloud Identity is the new battleground and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware and phishing to neutralize identity based threats like account takeover, fraud and ransomware. Don't let invisible threats compromise your business. Get your free corporate Darknet exposure report@spycloud.com cyberwire and see what attackers already know. That's spycloud.com cyberwire Google issues an emergency patch for a Chrome zero day a new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high severity splunk vulnerability allows non admin users access to modify critical directories. Experts warn Congress that Chinese infiltrations are preparations for war. Senators look to strengthen cybersecurity collaboration in the US Energy sector. Crocodiles Android malware adds fake contacts to victims phones. Sentinel 1 publishes a detailed analysis of their recent outage. Cartier leaves some of its Cyber Sparkle exposed. Our guest is John Miller, CEO and co founder of Halcyon, discussing Bring your own vulnerable driver attacks and Microsoft and CrowdStrike tackle hacker naming or do they? It's Tuesday, June 3rd, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Google has issued an emergency update patch to a Chrome Zero day, the third such vulnerability in Chrome exploited in the wild this year. The flaw, found in Chrome's version 8 JavaScript engine, allows out of bounds memory access and was discovered by Google's Threat Analysis Group. A mitigation was applied within a day and the full fix is included in recent versions for Windows and Mac and Linux. Google is withholding full details of the exploit until more users apply the patch. Earlier in 2025, Chrome Zero Days were used in espionage and account hijacking campaigns. Last year, Google Patch 10 exploited or demoed Chrome Zero Days. A new malware campaign is using fake DocuSign CAPTCHA pages to trick users into installing the NetSupport remote access trojan, according to Domain Tools. The attack begins with a spoofed website that mimics DocuSign branding. Users are prompted to check a box which triggers clipboard poisoning. A malicious PowerShell script is copied to the clipboard with instructions to run it manually. If executed, the script downloads further payloads, sets up persistence via GitHub hosted malware, and ultimately installs NetSupport RAT for remote control. The campaign uses familiar tools and layered tactics like ROT 13 encoding and script chaining to evade detection. Domains mimicking Okta, Netflix and Spotify were also used. Domain Tools warns users to be cautious of sites prompting script execution and to inspect URLs and certificates carefully to avoid deception based threats. A high severity vulnerability in Splunk Universal Forwarder for Windows allows non admin users to access and modify critical directories due to incorrect permission settings during installation or upgrades. With a CVSS score of 8, this flaw affects multiple versions, posing significant risks to organizations that rely on Splunk for log forwarding and security. The bug enables potential exposure or manipulation of log data, which could lead to data breaches or tampered audit trails. Splunk urges immediate upgrades to patched versions for those unable to upgrade. A mitigation is available to strip vulnerable permissions. This fix must be applied after any install, upgrade or reinstall to prevent unauthorized access and maintain security integrity. Retired Lt. Gen. H.R. mcMaster warned lawmakers that China's deep infiltration into U.S. telecommunications and critical infrastructure is part of a broader war preparation strategy. Speaking at a House Homeland Security committee field hearing, McMaster linked recent cyber campaigns like Volt Typhoon to China's growing military ambitions, including a 44 fold defense budget increase and a possible first strike nuclear capability. He also cited Chinese surveillance balloons aimed at U.S. strategic communications. Palo Alto Network's Wendy Whitmore echoed concerns, noting that China, alongside Russia, Iran and North Korea, is becoming more aggressive in cyberspace. Palo Alto blocks up to 31 billion attacks daily, including millions of new threats. Whitmore stressed the need for faster two way public private collaboration and supported legislation to strengthen the Joint Cyber Defense Collaborative. The FCC has issued a proposed rule that would expand ownership reporting requirements for nearly all entities it regulates, aiming to identify control by foreign adversaries. The rule would affect companies not currently required to report ownership and including private radio license holders and video service providers. Entities must disclose if they are controlled by foreign adversaries like China, Russia, Iran or North Korea, including if such parties hold 10% or more in voting or equity interest. Failure to comply could result in fines or license revocation. If foreign control is reported, detailed ownership disclosures would be made public and could trigger national security reviews. The FCC is also considering requiring updates or periodic reporting, with final rules likely to take effect by 2026. Senators Jim Risch, Republican from Idaho, and John Hickenlooper, Democrat from Colorado, have introduced the Energy Threat Analysis Program act to strengthen cybersecurity collaborations in the US Energy sector. The bill would formalize the Department of Energy's Energy Threat Analysis center as a central hub for cyber threat intelligence, coordinating efforts between the doe, CISA intelligence agencies and private energy operators. The goal is to improve early warnings and threat mitigation in response to increasingly complex cyber attacks. The legislation comes amid growing concern over fragmented threat reporting and critical infrastructure vulnerabilities highlighted by a recent blackout in Spain and Portugal. Both senators emphasize the need for a resilient energy grid and improve data sharing to safeguard national security. The latest version of the Krakadielis Android malware introduces a new feature that adds fake contacts to victims phones, allowing attackers to spoof calls from trusted sources like banks or friends. First observed in Turkey in early 2025, Krakodylus has since expanded globally, now targeting victims on every continent alongside enhanced social engineering. Recent updates also include stronger evasion techniques such as code packing and local data parsing. Researchers warn Krokodylis is evolving fast and urge users to download apps only from trusted sources. SentinelOne has published a detailed analysis of the global outage that impacted its services on May 29, attributing it to a flaw in a legacy infrastructure control system. The disruption, lasting about 20 hours, affected access to the SentinelOne management console but did not compromise endpoint protection or customer data. The incident began when a new account triggered faulty configuration logic to erasing critical DNS and network routes. Sentinelon has since taken steps to prevent recurrence, including accelerating its move to a new infrastructure as code architecture, backing up transit gateway settings and enhancing automated recovery and customer communication protocols. Notably, GovCloud customers were unaffected due to infrastructure segregation. Tomasz Szabo, a 26 year old Romanian citizen, pleaded guilty to conspiracy and making bomb threats as part of a swatting campaign targeting about 100 individuals, including a former US president and members of Congress. The plot involved false emergency calls to provoke aggressive police responses. Szabo, extradited last year, acted with Serbian co defendant Namanja Radovanovic, who faces pending charges. The indictment describes politically neutral targeting and includes a January 2024 hoax involving a fake murder and bomb threat at a former official's home. Cartier, the luxury brand known for diamond studded discretion, has disclosed a data breach that left some of its sparkle exposed. In a politely worded note, Cartier admitted that an unauthorized party briefly wandered through its systems, collecting names, emails and countries of residence and presumably not for a holiday card list. The company assures customers it's now added extra polish to its cybersecurity, but advises staying wary of any mysterious messages. Fashionably late to the breach club, Cartier joins DeOrr and Tiffany in May's cyber soiree. Here's the thing to do. Spend a grand or two at Cartier. Coming up after the break, my conversation with John Miller from Halcyon. We're discussing bring your own vulnerable driver attacks and Microsoft and CrowdStrike tackle hacker naming or do they stick around?
