Loading summary
Claire Aird
China accuses the US of new cyber attacks a $14.5 billion crypto hack discovered five years later. The US National Cyber Director is named and Lovense considers legal action over a security floor Disclosure this is the Risky Bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 4th of August and this podcast episode is brought to you by no Code Automation Plat Platform Tines China has accused US intelligence agencies of hacking one of its major military contractors. US hackers allegedly used a Microsoft exchange zero day to breach the company in July 2022. They spent a year inside the victims network and have been accused of stealing sensitive data and military research. Beijing officials did not name the company or provide further details about the zero day. The Chinese government has demanded details from US chipmaker Nvidia about a possible kill switch. A proposed US law would require Nvidia to include location, tracking code and remote shutdown mechanisms in its products. If passed, the US Chip Security act will allow America to keep track of processes once they're exported. The U.S. senate has named Sean Cancross as the next National Cyber Director. He'll be responsible for advising the president on critical cyber issues, coordinating cyber security efforts and implementing national cyber security policies. Can Cross is the first cyber official to be confirmed during the second Trump administration. The head roles for cisa, the NSA and the US Cyber Command are yet to be filled. The contract to support a major CISA private sector collaboration program has been allowed to expire. The Joint Cyber Defence Collaborative lost more than 100 staff staff when the contract with security firm ICF expired last week. The JCDC works with private sector companies and foreign governments to warn of ongoing attacks and publish advisories. It's widely considered one of CISA's most successful projects. Call centres operating in Pakistan will now require licences. To obtain a licence, call centres will have to be cleared by the country's telecommunications authority and cybercrime agency. The new licensing system is designed to reduce the number of call centres involved in online fraud and scams. Singapore's government said that attributing a recent critical infrastructure hack to a specific country would not be in Singapore's best interests. The country's cybersecurity agency disclosed the hack two weeks ago. It attributed the intrusion to a group tracked as UNC3886. Previous reporting has described the group as having a China nexus. Cyber attacks have disrupted several government bodies across the Dutch Caribbean islands. Curacao's Tax and Customs Administration shut down its IT systems following a ransomware attack Last week, hackers also gained access to the email accounts of politicians in Aruba. The discovery of a computer virus also shut down the court system across all six Dutch Caribbean islands. Several lawsuits were delayed as a result of the outage. The recent cyber attack against Luxembourg Post crashed Huawei routers across the telco. Last month's hack caused widespread disruption to flights and emergency services. Government officials said the attack was intentionally disruptive. No group has claimed responsibility for the attack yet. A German mobile phone repair and insurance company has begun insolvency proceedings two years on from a major cyber attack. The Einhaus Group paid a $230,000 ransom in 2023 but suffered millions in financial damage. The company cut more than 90% of its staff. Details have emerged about the largest Bitcoin heist ever. In December 2020, more than 125,000 Bitcoin was stolen from Chinese mining pool Lubyan. The stolen funds were valued at 3.5 billion at the time, but they're now worth more than $14.5 billion. Lubyan was unable to contact the hacker via blockchain messages following the theft and shut down two months later. The PiHole adblocker's user donation system's been hacked. Email addresses of almost 30,000 individuals who donated to the project have been stolen. A U.S. biotech contractor has settled with the U.S. government for $9.8 million over alleged subs. Cybersecurity failings Illumina Inc. Was accused of selling genomic sequencing systems with cybersecurity flaws to federal agencies. The DOJ said Illumina did not incorporate cybersecurity in its software design, have a product security team or address reported flaws. Sonicwall VPN devices are being attacked in a campaign designed to deploy the Akira ransomware. The coordinated campaign began in mid July. Security firm Arctic Wolf has not been able to confirm the vulnerability being used and said it may be a new zero day. A new backdoor has been spotted on Linux systems, security firm Nextron Systems said. The plague Backdoor masquerades as a malicious PAM component. It allows attackers to bypass authentication and connect via SSH to infected hosts. Several versions of the malware have been discovered. Adult toymaker Lovense is considering legal action over the recent disclosure of security flaws in one of its products. The company did not specify who the legal action might target. Security researcher Bob Dehacker disclosed two bugs last week. TechCrunch reported that the bugs would have allowed attackers to leak email and takeover accounts of Lovense users. Lovense fixed the bugs following the disclosure and finally, the Chinese government is censoring websites that use the QUIC protocol. According to a team of academics, the filtering began in April last year. Research suggests the Great Firewalls Quick Filter blocks a different set of domain names than regular HTTP traffic. And that is all for this podcast edition. Today's show was brought to you by our sponsor, Tynes. Find them@tynes.com thanks for your Sam.
Risky Bulletin: China with the Accusations Again – Detailed Summary
Published on August 4, 2025, by Risky.biz
In the latest episode of Risky Bulletin, host Claire Aird delves into a spectrum of pressing cybersecurity issues, spanning international tensions, legislative developments, significant cyber attacks, and emerging security vulnerabilities. This comprehensive summary captures the key discussions, insights, and conclusions presented during the episode.
Claire Aird opens the episode by highlighting escalating tensions between China and the United States in the cyber realm.
Alleged US Cyber Intrusion:
Legislative Developments:
Claire Aird [02:15]: "If passed, the US Chip Security Act will empower America to maintain oversight of critical processes even after they've left its borders."
A significant development in US cybersecurity leadership was discussed.
Sean Cancross' Appointment:
Claire Aird [05:30]: "Sean Cancross steps into a pivotal role at a time when national cyber resilience is paramount."
Unfilled Key Positions:
The episode transitions to global cybersecurity initiatives and notable attacks affecting various nations.
Pakistan's New Call Centre Licensing:
Singapore's Strategic Cyber Attribution:
Dutch Caribbean Cyber Attacks:
Luxembourg and German Cyber Incidents:
Claire reveals insights into a monumental cryptocurrency theft.
The discussion shifts to recent vulnerabilities exploited by cybercriminals.
PiHole Adblocker Breach:
Illumina Inc.'s Cybersecurity Failings:
SonicWall VPN Vulnerability:
New Linux Backdoor – The Plague Backdoor:
The episode touches upon the intersection of cybersecurity vulnerabilities and legal actions.
Lovense's Legal Considerations:
Claire Aird [22:40]: "Lovense's proactive measures post-disclosure highlight the fine line companies walk between transparency and liability."
Concluding the content-rich discussions, Claire examines China's ongoing internet censorship strategies.
Notable Quotes:
Claire Aird [02:15]: "If passed, the US Chip Security Act will empower America to maintain oversight of critical processes even after they've left its borders."
Claire Aird [05:30]: "Sean Cancross steps into a pivotal role at a time when national cyber resilience is paramount."
Claire Aird [22:40]: "Lovense's proactive measures post-disclosure highlight the fine line companies walk between transparency and liability."
This episode of Risky Bulletin underscores the escalating complexities in the global cybersecurity landscape. From nation-state accusations and legislative shifts to high-profile cyber attacks and emerging vulnerabilities, the discussions emphasize the critical need for robust cybersecurity measures and international cooperation. Host Claire Aird effectively navigates these multifaceted topics, providing listeners with a thorough understanding of the current cybersecurity milieu.
For more in-depth analysis and regular updates, subscribe to Risky Bulletin by Risky.biz.