Loading summary
Claire Aird
Cellebrite bans Serbia from using its products Chinese hackers breached the Belgian security service, the Republican National Committee hid a Chinese hack and Microsoft removes malicious extensions from the VS Code Marketplace. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 28th of February and this podcast episode is brought to you by vulnerability management and analysis platform Nucleus Security. Israeli tech company Celebrite has banned the Serbian government from using its products over its alleged misuse of the technology. MSD International says the Serbian security service unlocked dissidents phones and installed spyware on them with cellebrite's tools. The company says it's committed to human rights and democracy. Amnesty International has praised Cellebrite, saying the withdrawal of life licenses from Serbia is a critical first step. Chinese state sponsored hackers have allegedly breached an email server belonging to a Belgian intelligence service. The 2023 hack was part of a campaign exploiting a zero day in email security product Barracuda. According to local media, the hackers stole two years of unclassified email from the intelligence service. Chinese state sponsored hackers also breached the email system of the Republican national committee in July 2024. The the mostly unreported incident came a month after Iranian hackers gained access to the Trump campaign's email. An upcoming book from journalist Alex Eisenstart claims the RNC chose not to notify the FBI about the intrusion. A hacking group calling itself the Philippine Exodus Security has leaked data from the country's armed forces on a cybercrime forum. The leaked data allegedly includes sensitive details about 10,000 military personnel, including medical records, financial information and contact details. The Philippine army has confirmed the breach. New evidence has shown that North Korea's $1.5 billion Bybit heist was pulled off by hacking a developer at multisignature wallet provider Safewallet. The hackers compromised the developer and injected malicious code targeting Bybit into SafeWallet's web interface. SafeWallet says it's removed the code and will publish further details following an investigation. Initial reports claim that the intrusion involved malware being deployed to BYB Network. The FBI has confirmed North Korea's involvement in the hack and linked it to a group it tracks as Traitor Traitor, which is better known by us mere mortals as the Lazarus Group. A threat actor has stolen $50 million worth of assets from Defi protocol Infini. The attacker compromised private keys and drained the funds on Monday. It may not quite have the same pizazz as the $1.5 billion theft but $50 million was close to all that Infini had. According to reports, the private keys belonged to a former develop still had access. Thai police have detained a hacker who allegedly sold data stolen from more than 70 companies. The 39 year old Singaporean is believed to have targeted companies throughout Southeast Asia. Local news reports say he's confessed to the crimes. Microsoft is suing four individuals for allegedly abusing its AI services to generate deep fakes of celebrities and sexually explicit content. The four allegedly used leaked Microsoft customer credentials to access the services. They then resold access to the generative AI capabilities to their own customers on underground forums. The four are based in Iran, the uk, China and Vietnam and are part of a group that Microsoft tracks as Storm 2139. The US has extradited a Russian national from Portugal for allegedly manipulating cryptocurrency markets. Gotbit founder Alexei Andrunyan and two of the company's executives were charged with market manipulation last year. Gotbit allegedly inflated trading volumes for cryptocurrencies currency companies to boost the value of their assets. The FBI created its own crypto token last year to catch Gotbit and several other fraud as a service companies. The operators of cyber scam centres in Myanmar are now using Starlink for Internet access. Starlink equipment has been spotted on top of at least eight scam compounds since June. The move to Starlink came after Thai authorities seized shipments of network equipment and cut fibre optic cables in the area. Microsoft has removed two malicious theme extensions from the VS Code marketplace. The themes were from the same developer and were downloaded a combined 9 million times. Microsoft says the malicious code was found by a member of the VSCode community, but did not give further details. The company has said it's reviewing the developer's other extensions. The developer claims the malicious code came from a compromise dependency. The number of voice phishing attacks grew more than 400% last year, according to CrowdStrike's annual threat report. The technique is used to trick recipients into calling a fake tech support line that talks them through deploying remote access tools and ransomware to enterprise networks. It's become a common vector amongst cybercrime groups in China and Russia. A new variant of the void IoT botnet has infected over 1.6 million devices, most of which are smart TVs. Chinese security firm Xianxin has said that the sheer volume of traffic to the botnet's infrastructure has earned some of its command control service a spot in Tranko's million most popular websites. A vulnerability in the Nakevo backup software allows unauthenticated attackers to help themselves to backed up files. The vulnerability discovered by Watchtower Labs can be used to retrieve the backup server's password or the backup files themselves. Watchtower says the vendor patched the bug but did not reply to its disclosure. And finally, a new type of radio jamming transmitter has been developed by a team of academics. Known as Reconfigurable Intelligent Surfaces, it allows fine grained spatial control over signal jamming. An RIS jamming attack can be tuned to target specific devices while avoiding impact to others as little as millimetres away. And that is all for this podcast edition. Today's show was brought to you by our sponsor, Nucleus Security. Find them@nucleussec.com Thanks E Company.
Risky Bulletin: Cellebrite Fires Serbia as a Customer Hosted by risky.biz | Released on February 28, 2025
In this episode of Risky Bulletin, host Claire Aird delivers a comprehensive update on the latest happenings in the cybersecurity landscape. From significant corporate decisions to sophisticated cyberattacks orchestrated by state-sponsored actors, the bulletin covers a wide array of topics that highlight the evolving threats and responses in the digital realm. Below is a detailed summary of the key points discussed, enriched with notable quotes and timestamps for reference.
Timestamp: [00:04]
The episode opens with a significant development in the realm of digital forensics. Cellebrite, an Israeli technology firm renowned for its mobile data extraction tools, has taken a decisive stand by banning the Serbian government from utilizing its products. This action stems from allegations that the Serbian security service misused Cellebrite's technology to unlock dissidents' phones and install spyware, thereby infringing on human rights and democratic principles.
Claire Aird reports, “Israeli tech company Celebrite has banned the Serbian government from using its products over its alleged misuse of the technology” ([00:04]). Cellebrite emphasizes its commitment to upholding human rights, a stance that has been lauded by Amnesty International. Aird notes, “Amnesty International has praised Cellebrite, saying the withdrawal of live licenses from Serbia is a critical first step” ([00:04]). This move marks a pivotal moment in corporate responsibility within the cybersecurity industry, setting a precedent for ethical usage of powerful technological tools.
Timestamp: [00:04]
In another alarming update, Chinese state-sponsored hackers have reportedly breached an email server belonging to a Belgian intelligence service. The intrusion, part of a broader 2023 campaign, exploited a zero-day vulnerability in the Barracuda email security product. As Aird explains, “According to local media, the hackers stole two years of unclassified email from the intelligence service” ([00:04]). This breach underscores the persistent threats posed by nation-state actors targeting governmental institutions to siphon sensitive information.
Timestamp: [00:04]
The Republican National Committee (RNC) also fell victim to a cyberattack attributed to Chinese state-sponsored hackers in July 2024. This incident occurred shortly after Iranian hackers accessed the Trump campaign's email system. Aird highlights, “An upcoming book from journalist Alex Eisenstart claims the RNC chose not to notify the FBI about the intrusion” ([00:04]). The alleged delay in reporting raises concerns about the effectiveness of inter-agency communication and the transparency of political entities in handling cybersecurity breaches.
Timestamp: [00:04]
A hacking group identifying itself as Philippine Exodus Security has leaked sensitive data from the Philippines' armed forces. The exposed information includes details on approximately 10,000 military personnel, encompassing medical records, financial information, and contact details. Claire Aird states, “The Philippine army has confirmed the breach” ([00:04]), highlighting the gravity of the situation and the potential national security implications stemming from such extensive data exposure.
Timestamp: [00:04]
One of the most substantial cyber heists reported involves North Korea, responsible for a $1.5 billion theft from Bybit. The operation hinged on infiltrating a developer at SafeWallet, a multisignature wallet provider, and injecting malicious code into their web interface. Aird notes, “The FBI has confirmed North Korea's involvement in the hack and linked it to a group it tracks as Traitor Traitor, which is better known by us mere mortals as the Lazarus Group” ([00:04]). This sophisticated attack not only underscores the technical prowess of state-sponsored groups but also the increasing integration of cryptocurrencies in global financial crimes.
Timestamp: [00:04]
The DeFi (Decentralized Finance) sector isn't immune to cyber threats, as evidenced by a recent $50 million theft from the Infini protocol. The attacker compromised private keys associated with a former developer who still had access, allowing them to drain the funds effectively. Aird remarks, “According to reports, the private keys belonged to a former developer who still had access” ([00:04]). While this theft may not rival the scale of the Bybit heist, it represents a significant financial loss for Infini and highlights vulnerabilities within DeFi platforms concerning key management and access controls.
Timestamp: [00:04]
Law enforcement made a notable arrest in Thailand, detaining a 39-year-old Singaporean hacker accused of selling data stolen from over 70 companies across Southeast Asia. Contrite and cooperative, the individual has reportedly confessed to the crimes. Aird succinctly states, “Thai police have detained a hacker who allegedly sold data stolen from more than 70 companies” ([00:04]). This incident showcases the regional efforts to curb cybercrime and the international nature of data theft activities.
Timestamp: [00:04]
In a move addressing the misuse of artificial intelligence, Microsoft is suing four individuals accused of exploiting its AI services to generate deepfakes of celebrities and create sexually explicit content. These individuals allegedly accessed the services using leaked Microsoft customer credentials and then resold the AI capabilities on underground forums. Claire Aird explains, “The four are based in Iran, the UK, China, and Vietnam and are part of a group that Microsoft tracks as Storm 2139” ([00:04]). This legal action highlights the growing concern over AI-generated malpractices and the responsibilities of tech companies in mitigating such abuses.
Timestamp: [00:04]
The United States has successfully extradited a Russian national from Portugal implicated in manipulating cryptocurrency markets. Alexei Andrunyan, founder of Gotbit, along with two company executives, faces charges of market manipulation for allegedly inflating trading volumes to artificially boost asset values. Aird notes, “The FBI created its own crypto token last year to catch Gotbit and several other fraud as a service companies” ([00:04]). This case underscores the complexities of regulating and policing the burgeoning cryptocurrency ecosystem and the lengths authorities will go to enforce market integrity.
Timestamp: [00:04]
Cyber scam operations in Myanmar are adapting to increased regional law enforcement by shifting their internet access to Starlink satellites. Starlink equipment has been observed atop at least eight scam compounds since June, according to Aird: “The move to Starlink came after Thai authorities seized shipments of network equipment and cut fiber optic cables in the area” ([00:04]). This strategic transition illustrates the resilience of cybercriminal networks in circumventing local restrictions and maintaining their illicit activities.
Timestamp: [00:04]
Microsoft has taken action against two malicious theme extensions previously available in the VS Code Marketplace, which collectively amassed over 9 million downloads. Claire Aird reports, “Microsoft says the malicious code was found by a member of the VSCode community, but did not give further details” ([00:04]). The developer implicated claims the compromise originated from a dependency, suggesting a broader issue of supply chain security within software development ecosystems. Microsoft is currently reviewing the developer's other extensions to prevent further malicious activities.
Timestamp: [00:04]
Voice phishing, or "vishing," has seen a dramatic increase, growing more than 400% last year according to CrowdStrike's annual threat report. These attacks typically deceive victims into calling fake tech support lines, leading them to inadvertently install remote access tools and ransomware on their systems. Aird explains, “It's become a common vector amongst cybercrime groups in China and Russia” ([00:04]). The surge highlights the need for heightened awareness and robust security measures to combat evolving phishing tactics.
Timestamp: [00:04]
A new variant of the Void IoT botnet has been identified, infecting over 1.6 million devices, predominantly smart TVs. Xianxin, a Chinese security firm, reports that the botnet's traffic volume has elevated its command and control (C2) services to a position among Tranco's top million websites. Aird notes, “The sheer volume of traffic to the botnet's infrastructure has earned some of its command control service a spot in Tranko's million most popular websites” ([00:04]). This development underscores the critical vulnerabilities in IoT devices and the expansive reach of modern botnets.
Timestamp: [00:04]
A significant vulnerability has been discovered in Nakevo backup software, which allows unauthenticated attackers to access backed-up files. Disclosed by Watchtower Labs, the flaw can be exploited to retrieve either the backup server's password or the backup files themselves. While the vendor has patched the bug, Aird points out, “The vendor patched the bug but did not reply to its disclosure” ([00:04]). This incident emphasizes the importance of prompt vulnerability disclosures and the need for vendors to engage proactively with security researchers.
Timestamp: [00:04]
The bulletin concludes with an exploration of a new development in radio jamming technology: Reconfigurable Intelligent Surfaces (RIS). Developed by a team of academics, RIS allows for fine-grained spatial control over signal jamming, enabling attacks that can be precisely targeted to disrupt specific devices while minimizing collateral impact on neighboring devices just millimeters away. Aird describes, “An RIS jamming attack can be tuned to target specific devices while avoiding impact to others as little as millimeters away” ([00:04]). This innovation represents a significant leap in the sophistication of signal interference techniques, with potential implications for both cybersecurity defenses and offensive capabilities.
Today's Risky Bulletin episode encapsulates a broad spectrum of cybersecurity challenges and advancements. From corporate ethical stances and state-sponsored cyberattacks to technological innovations and legal actions against cybercriminals, the bulletin provides listeners with a nuanced understanding of the current threat landscape. As cyber threats continue to evolve in complexity and scale, such updates are invaluable for professionals and enthusiasts alike to stay informed and prepared.
For more detailed updates and in-depth analysis, subscribe to Risky Bulletin at risky.biz.
This episode was sponsored by Nucleus Security, a leading vulnerability management and analysis platform. Visit nucleussec.com to learn more.