Loading summary
Claire Aird
China privately admits to hacking American critical infrastructure the US treasury was compromised by password spraying. America will sign a global spyware agreement after all and a Chinese apt is abusing the Windows sandbox to hide its malware. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 14th of April and this podcast episode is brought to you by application. Allow Listing software maker Airlock Digital China has privately admitted to American officials that it hacked U.S. critical infrastructure. The Wall Street Journal says the rare admission came during a secret meeting between Chinese and US officials in December. They indicated the hacks were a result of America's support for Taiwan. China's so called vault typhoon operation was first detected in mid 2023. The group has pre positioned itself in the computer networks of US Port ports, airports and water utilities. Hackers behind a recently discovered U.S. treasury attack used password spraying to compromise a privileged account. According to Bloomberg sources, the account was accidentally left enabled and without multi factor authentication following the agency's migration to Asia. The Office of the Comptroller of the Currency was hacked in June 2023 and the attack was discovered by CISA in January this year. The the attacker allegedly used the access to intercept emails for over 100 employees. The US government says it will sign onto the Paul Maul process a voluntary international agreement to combat the proliferation of commercial spyware. The US was noticeably absent from the list of 21 countries that signed the agreement in Paris last week. The agreement introduces a code of practice for companies that sell spyware and surveillance products. Russian hacktivists have ddosed Finnish political party websites ahead of the country's local elections this week. The attacks also hit election related websites over the weekend. The country's cybersecurity agency has said the attacks will not affect the election as they use pen and paper. Ikea's Eastern European branch lost 20 million euros in potential sales due to a ransomware attack in November last year. The incident took place ahead of Black Friday, a period of high consumer demand, so some stores experienced supply chain issues for four months following the attack. UnitedHealth is pressuring doctors to repay the loans it offered after its systems were hacked, according to cnbc. Some practices were asked to repay hundreds of thousands of dollars within days. UnitedHealthcare offered interest free loans last year after a ransomware attack crippled its Change healthcare payments service. Many US Healthcare practices were unable to process transactions and had to take loans to cover expenses. Police in the Philippines have arrested a 28 year old man for selling SMS text blasters. The suspect was detained in late March during an operation in the city of Tarlac. Authorities have seized 16 devices from the suspect. The devices are designed to send SMS spam to nearby mobile devices. Chinese Authorities have detained 48 suspected members of a fraud ring. The suspects were detained in the city of Puer, at the intersection of the Chinese, Laos and Myanmar borders. Authorities Authorities say 25 of the arrested suspects were running the syndicate. The rest claim to be victims. Fortinet has urged customers to install a recent Fortigate firmware update that fixes a persistence technique. The technique allows attackers to maintain read only access to Fortigate devices after they've been evicted. Fortinet says attackers were creating symlinks that connected a publicly available folder from the device's Web dashboard to the root directory of the devices. This allowed attackers to retrieve config files and recompromise the device. A Chinese cyber espionage group is abusing the Windows Sandbox virtual environment to hide its malware. The attacks have been linked to a group tracked as Mirrorface and APT10. The group executes its malware inside the Windows Sandbox, where Windows Defender and other solutions don't Detect malicious activity. 35 malicious Chrome extensions have been found on the Google Web Store. The extensions used broad permissions to collect data and could also execute remotely retrieved code. Security Firm Secure and 10X discovered the extensions, which had 4 million installs despite being sent to private and unlisted on the Web Store. This suggests that they were being installed as part of a larger campaign. Security firm Prodaft says it will buy accounts on popular underground hacking forums to improve its visibility into cybercrime operations. The company is buying verified accounts on forums such as XSS exploit, ramp4u verified and breach forums. Prodaf says it will pay more for accounts with moderator or admin access and finally remote code execution. Flaws in Kallax GigaCentre Home Internet routers won't be patched. SSD disclosure reported the vulnerability to the vendor, but Calix says the affected devices were developed by a third party and are now end of life. The flaw is an unauthenticated admin command prompt on the device's carrier management port. And that is all for this podcast edition. Today's show was brought to you by our sponsor, Airlock Digital. Find them@airlockdigital.com thanks for your company.
Risky Bulletin: China Privately Admits to Hacking US
Hosted by Claire Aird | Released on April 14, 2025
In this episode of Risky Bulletin, host Claire Aird delves into the latest cybersecurity developments, highlighting significant breaches, geopolitical cyber tensions, and emerging threats. The episode provides an in-depth analysis of China's covert admission of hacking US infrastructure, the US's stance on international spyware agreements, and a series of other notable cyber incidents impacting various sectors globally.
China has clandestinely acknowledged to American officials its involvement in hacking US critical infrastructure, marking a rare and significant admission in the realm of international cybersecurity.
Vault Typhoon Operation:
Detected in mid-2023, China's APT group, known as Vault Typhoon, has strategically embedded itself within the computer networks of key US infrastructures, including ports, airports, and water utilities. According to The Wall Street Journal, this admission was made during a secret December meeting between Chinese and US officials. The hackers justified their actions as a response to US support for Taiwan.
U.S. Treasury Breach:
In a recent attack on the U.S. Treasury, hackers employed password spraying techniques to compromise a privileged account. Bloomberg sources revealed that the account was inadvertently left enabled without multi-factor authentication during the agency's migration to Asia. Claire Aird notes, "The Office of the Comptroller of the Currency was hacked in June 2023, with the breach going undetected until CISA identified it in January this year" [07:45].
Email Interception:
The compromised account allowed attackers to intercept emails of over 100 employees, raising concerns about the depth and potential implications of the breach.
In a strategic move to combat the spread of commercial spyware, the US government has committed to signing the Paul Maul Process, a voluntary international agreement aimed at establishing a code of practice for companies involved in the sale of spyware and surveillance tools.
International Participation:
Claire highlights, "The US was noticeably absent from the list of 21 countries that signed the agreement in Paris last week, making this a pivotal decision for global cooperation against cyber surveillance" [12:30].
Code of Practice:
The agreement seeks to regulate the ethical standards of spyware vendors, ensuring that such tools are not misused for malicious purposes or unauthorized surveillance.
In the lead-up to Finland's local elections, Russian hacktivists launched Distributed Denial of Service (DDoS) attacks targeting political party websites.
IKEA's Eastern European branch suffered a significant ransomware attack in November 2024, resulting in a loss of 20 million euros in potential sales.
Following a ransomware incident that crippled its Change Healthcare payments service, UnitedHealth is reportedly pressuring medical practices to repay previously offered interest-free loans.
Loan Repayment Pressure:
According to CNBC, certain practices were instructed to repay loans amounting to hundreds of thousands of dollars within days. Claire comments, "This move has raised ethical concerns about the company's handling of the aftermath of the cyberattack" [25:00].
Impact on Healthcare Practices:
Many healthcare providers were forced to take loans to manage expenses due to their inability to process transactions during the system downtime.
Fortinet has urged its customers to update their Fortigate devices promptly to address a newly discovered persistence technique exploited by attackers.
Persistence Technique Explained:
Attackers were creating symbolic links (symlinks) connecting publicly accessible folders from the device's web dashboard to the root directory. This loophole allowed them to retrieve configuration files and regain access after initial eviction.
Action Required:
Claire advises, "Users must install the latest firmware to protect their devices from these sophisticated attacks" [33:40].
A Chinese cyber espionage group, associated with Mirrorface and APT10, has been leveraging the Windows Sandbox virtual environment to conceal its malware operations.
Security firms have identified 35 malicious Chrome extensions infiltrating the Google Web Store, utilizing broad permissions to harvest data and execute remotely retrieved code.
Underground Forum Infiltration:
Security firm Prodaft is acquiring verified accounts on prominent underground hacking forums such as XSS Exploit, ramp4u verified, and breach forums. Their strategy includes purchasing accounts with moderator or admin access and those capable of remote code execution to gain deeper insights into cybercriminal operations [42:10].
Objective:
By enhancing their visibility within these forums, Prodaft aims to better understand and mitigate emerging cyber threats [44:00].
A critical vulnerability in Kallax GigaCentre routers remains unaddressed as the manufacturer, Calix, has declared the affected devices end-of-life.
Vulnerability Details:
The flaw involves an unauthenticated admin command prompt on the device's carrier management port, posing significant security risks.
Vendor Response:
Emily Aird states, "Despite SSD Disclosure's efforts to notify Calix, the reliance on a third-party developer and the device's end-of-life status have stalled any patch deployment" [47:50].
This episode of Risky Bulletin underscores the intricate and escalating landscape of global cybersecurity threats. From state-sponsored hacking and ransomware attacks to vulnerabilities in widely-used hardware and deceptive software practices, the need for robust security measures and international cooperation has never been more critical. Claire Aird effectively highlights the multifaceted challenges organizations and governments face in safeguarding digital infrastructure against sophisticated adversaries.
Notable Quotes:
"The Office of the Comptroller of the Currency was hacked in June 2023, with the breach going undetected until CISA identified it in January this year." — Claire Aird [07:45]
"The US was noticeably absent from the list of 21 countries that signed the agreement in Paris last week, making this a pivotal decision for global cooperation against cyber surveillance." — Claire Aird [12:30]
"The attacks will not affect the election as they use pen and paper." — Finland's Cybersecurity Agency [16:50]
"Some stores experienced severe supply chain issues, underscoring the far-reaching consequences of such cyberattacks on global retail operations." — Claire Aird [21:10]
"This move has raised ethical concerns about the company's handling of the aftermath of the cyberattack." — Claire Aird [25:00]
"Users must install the latest firmware to protect their devices from these sophisticated attacks." — Claire Aird [33:40]
This summary is based on the transcript provided and aims to encapsulate the key discussions and insights from the Risky Bulletin episode hosted by Claire Aird.