
Loading summary
Claire Aird
Zoom has a remote control feature, so of course crypto thieves are abusing it. Hackers make $700 million in unauthorized stock trades, a Chinese APT leaks its exploits and Euro MPs traveling to Hungary are offered anti spying pouches for their phones. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 21st of April and and this podcast episode is brought to you by Devicee. In today's top story, a hacking group has stolen millions of dollars in cryptocurrency by abusing Zoom's little known remote control feature. Members of the group Elusive Comet pose as podcast hosts, reporters and venture firms to lure crypto owners into video conferences. The attackers name themselves Zoom on the call, so when they request control of the victim's system, it appears the software itself is asking. Once in, they install malware and steal fund. In other news, hackers have made unauthorised trades worth more than $700 million using Japanese stock brokerage accounts. The attackers gained access to the accounts through phishing attacks. They sold the victims stocks and bought artificially inflated shares in Chinese companies with the proceeds. Japan's financial regulator says most of the hacks occurred between February and April this year. Microsoft Entra customers are reporting a sudden spike in security alerts and account lockouts, according to Reddit users, The issue appears to be caused by Entra's new Mace credential revocation feature. The feature warns companies when employees are using an insecure password that was leaked in a previous breach. Some customers who have investigated suggest the alerts may be false positives from Microsoft's new system. Five European MPs were offered Faraday bags to protect their phones when visiting Hungary last week. The EU has taken steps to protect MPs after a previous delegation was spied on and followed by Hungarian intelligence. EU officials told Politico Europe that the use of Faraday pouches to protect phones is not a common practice. A previous report suggested that EU officials were advised to use burner phones when travelling abroad, including to the US. CISA has discontinued its contracts with Census and VirusTotal, according to a Nextgov report. The agency notified threat hunting teams last week and said it would find alternatives. But both tools are used to identify and investigate signs of compromise and threat actor activity, according to Axios. CISA has also fired 75 contractors who worked with its threat hunting teams. The Dutch government is seeking to recruit new cyber reservists for its armed forces. A recruitment campaign will begin later this year, according to Dutch news outlet. The Dutch Defence Cyber Command operated six platoons with a total of 110 cyber reservists last year. Zambia has passed a cyber security law requiring lawful interception capabilities for all types of electronic communications. The new rule has spooked some countries and the US has issued a travel advisory for Americans visiting the country. Zambian officials say other countries have similar laws and the capability will only be used with judicial oversight. They say it's needed to fight fraud, disinformation and CSAM content. US authorities have indicted a man accused of stealing the personal data of more than 65,000 people. Nicholas Moses used the hacker name Scrublord and was an alleged customer of the Smoke Loader botnet. He is accused of renting access to the botnet and deploying infostealers on victims computers. Authorities discovered his actions after taking down the Smoke Loader botnet in May last year. The U.S. justice Department has charged an Iranian man accused of running the Nemesis Dark web marketplace. The indictment says Behrou's Pasarad launched the website in 2021. It was active until German authorities seized it last year. Nemesis was known for selling drugs and hacking services. Pasarad was also sanctioned by the U.S. treasury last month. The U.S. federal Trade Commission says Americans reported losing $470 million to text message scams last year. The agency says the true figure is likely much higher since most incidents are not reported. The most common scams related to package deliveries, phony job opportunities, fake fraud alerts and unpaid road toll fees. The FBI says scammers are impersonating employees of its Internet Crime Complaint Centre as part of a new campaign. The scammers begin by posing as attractive women on support forums for fraud victims. These Personas advise victims to contact an account posing as an IC3 agent. Targets are led to believe the fake IC3 agent can help rec stolen funds, but instead they're just scammed again. The Kairos data extortion group has leaked files from the Baltimore State Attorney's office. The small leak is likely part of an ongoing extortion attempt. The office was listed on the group's leak portal at the end of March. The Kairos group publicly emerged in November and has attempted to extort more than 30 organisations. A Chinese cybercrime group is renting out access to its Android malware that automates NFC relay attacks. The capability lets attack hackers withdraw Victims funds at ATMs or make point of sale purchases. There's a growing trend of NFC capable malware which was first spotted last year in Russia. A Chinese cyber espionage group misconfigured one of its servers and briefly exposed some of its attack tools. The leak contained exploit scripts for Fortinet firewalls and VPNs, PHP web shells and network reconnaissance scripts specific to a major Japanese company. Security firm Hunt Intelligence, says the server was likely operated by the apt it tracks as redgolf, a hacking group is planting backdoors inside Russian companies that use the VPN software VIPnet. According to Kaspersky, the attackers are leveraging the software's update mechanism to install a backdoor. Infotex, which makes VIPnet, confirmed the attacks but said they can only be carried out if hackers already have access. Asus has fixed the vulnerability affecting its routers, which have the AI cloud service enabled. The company said users should disable AI Cloud if they can't install the firmware updates. The service allows Asus users to connect back to their home networks remotely, and attackers too, apparently. Google is working on a new web API to help websites detect bots and online fraud. The new Private Proof API is meant to replace existing bot and fraud detection systems. Current systems rely on cookies and device fingerprinting or making users complete a captcha. The API uses zero knowledge proofs to allow websites to check whether a browser profile is too fresh. And finally, Discord is testing a new Age verification system that requires users to scan their faces before viewing sensitive content. Users can opt out and still verify their age by submitting a scan of their photo id. The feature is currently being tested in Australia and the uk and that is all for this podcast edition. Today's show was brought to you by our sponsor Device. Find them@device.com thanks for your company.
Risky Bulletin: Crypto-Thieves Abuse Zoom's Remote Control Feature
Host: Claire Aird | Date: April 21, 2025
In the latest episode of Risky Bulletin, hosted by Claire Aird and prepared by Catalyn Kim Panu, the Risky Business team delves into a range of pressing cybersecurity issues. From sophisticated crypto theft schemes leveraging Zoom’s remote control feature to alarming stock market manipulations and significant legislative changes in cybersecurity laws worldwide, this episode provides a comprehensive overview of the current threat landscape.
Timestamp: [00:04]
The episode opens with a concerning development in cryptocurrency security. Hackers from the group Elusive Comet have been exploiting Zoom’s remote control feature to orchestrate large-scale crypto thefts. Claire Aird explains:
“Members of the group Elusive Comet pose as podcast hosts, reporters, and venture firms to lure crypto owners into video conferences. The attackers name themselves Zoom on the call, so when they request control of the victim's system, it appears the software itself is asking.” ([00:04])
Once granted control, the attackers install malware to siphon funds, resulting in millions of dollars stolen from unsuspecting cryptocurrency owners. This method highlights the growing sophistication of cybercriminals in exploiting legitimate software features for malicious purposes.
Timestamp: [00:04]
In a significant breach impacting the financial sector, hackers have executed unauthorized trades totaling over $700 million through Japanese stock brokerage accounts. The breach was primarily facilitated through phishing attacks, allowing attackers to:
Japan’s financial regulator reported that most of these hacks took place between February and April of the current year, raising concerns about the security measures in place within the Japanese financial systems.
Timestamp: [00:04]
Microsoft Entra customers have noticed a sudden surge in security alerts and account lockouts, as discussed by Claire:
“The issue appears to be caused by Entra's new Mace credential revocation feature. The feature warns companies when employees are using an insecure password that was leaked in a previous breach.” ([00:04])
While intended to enhance security by alerting organizations to compromised passwords, some customers believe these alerts may be false positives, potentially disrupting business operations and raising questions about the feature's reliability.
Timestamp: [00:04]
In a move to bolster cybersecurity for its officials, five European MPs received Faraday bags to safeguard their phones during visits to Hungary. Claire elaborates:
“EU officials told Politico Europe that the use of Faraday pouches to protect phones is not a common practice.” ([00:04])
This initiative follows previous incidents where EU delegations were allegedly surveilled by Hungarian intelligence, prompting the EU to reconsider the security measures for its members traveling abroad.
Timestamp: [00:04]
The Cybersecurity and Infrastructure Security Agency (CISA) has made significant changes by terminating contracts with Census and VirusTotal. Additionally, the agency has dismissed 75 contractors from its threat hunting teams. According to Claire:
“But both tools are used to identify and investigate signs of compromise and threat actor activity.” ([00:04])
These actions suggest a strategic shift within CISA, possibly due to budget reallocations or restructuring efforts aimed at enhancing internal capabilities.
Timestamp: [00:04]
Responding to the increasing need for cybersecurity expertise, the Dutch government plans to launch a recruitment campaign for cyber reservists later this year. Claire notes:
“The Dutch Defence Cyber Command operated six platoons with a total of 110 cyber reservists last year.” ([00:04])
This initiative aims to expand the country’s defensive capabilities against cyber threats, ensuring a robust response framework within the armed forces.
Timestamp: [00:04]
Zambia has recently passed a cybersecurity law mandating lawful interception capabilities for all electronic communications. Claire discusses the international reaction:
“Zambian officials say other countries have similar laws and the capability will only be used with judicial oversight.” ([00:04])
Despite assurances of oversight, the law has prompted unease among other nations, leading the US to issue a travel advisory for Americans visiting Zambia. The law is justified by Zambian authorities as a necessary measure to combat fraud, disinformation, and Child Sexual Abuse Material (CSAM).
Timestamp: [00:04]
The U.S. Justice Department has filed charges against Nicholas Moses, known online as Scrublord, for stealing personal data of over 65,000 individuals. Claire explains:
“He is accused of renting access to the botnet and deploying infostealers on victims' computers.” ([00:04])
His activities were uncovered following the takedown of the Smoke Loader botnet in May of the previous year, illustrating the persistent efforts by authorities to dismantle cybercriminal infrastructures.
Timestamp: [00:04]
An Iranian man, Behrou's Pasarad, has been indicted for operating the Nemesis Dark Web marketplace. The platform, active from 2021 until its seizure by German authorities last year, was notorious for trading drugs and hacking services. Additionally, Pasarad was sanctioned by the U.S. Treasury in the previous month, underscoring the international crackdown on dark web activities.
Timestamp: [00:04]
The Federal Trade Commission (FTC) revealed that Americans lost approximately $470 million to text message scams in the past year, a figure likely underrepresented due to unreported cases. Common scam themes include:
This highlights the escalating sophistication of scammers targeting individuals through seemingly legitimate text communications.
Timestamp: [00:04]
The FBI has identified a novel scam where fraudsters impersonate employees of its Internet Crime Complaint Centre (IC3). Claire describes the scheme:
“The scammers begin by posing as attractive women on support forums for fraud victims.” ([00:04])
These impostors direct victims to interact with a fake IC3 agent, convincing them that stolen funds can be recovered. Instead, victims fall prey to another layer of deception, further exacerbating their losses.
Timestamp: [00:04]
The Kairos data extortion group has leaked files from the Baltimore State Attorney's office, likely as part of an ongoing extortion attempt. Claire provides insight:
“The small leak is likely part of an ongoing extortion attempt.” ([00:04])
Since emerging publicly in November, Kairos has targeted over 30 organizations, utilizing data leaks as leverage to demand ransoms.
Timestamp: [00:04]
A Chinese cybercrime faction is renting out access to its Android malware, which automates Near Field Communication (NFC) relay attacks. This malware enables attackers to:
This development is part of a growing trend of NFC-capable malware, first observed in Russia last year, demonstrating the expanding arsenal of tools available to cybercriminals.
Timestamp: [00:04]
A Chinese cyber espionage group inadvertently exposed some of its attack tools due to a server misconfiguration. Claire elaborates:
“The leak contained exploit scripts for Fortinet firewalls and VPNs, PHP web shells and network reconnaissance scripts specific to a major Japanese company.” ([00:04])
Security firm Hunt Intelligence attributes the server to the Redgolf APT group, which is known for embedding backdoors in VPN software like VIPnet. Despite confirmation from Infotex, the manufacturer of VIPnet, that such attacks require prior access, this incident underscores vulnerabilities in widely-used cybersecurity tools.
Timestamp: [00:04]
Asus has addressed a critical vulnerability affecting its routers equipped with the AI Cloud service. Claire advises users:
“The company said users should disable AI Cloud if they can't install the firmware updates.” ([00:04])
The AI Cloud feature facilitates remote connections to home networks, posing a dual threat where both legitimate users and attackers can exploit this access point.
Timestamp: [00:04]
Google is developing a new web API, Private Proof API, designed to aid websites in identifying bots and preventing online fraud. Unlike traditional methods that rely on cookies, device fingerprinting, or CAPTCHAs, this API utilizes zero-knowledge proofs to verify if a browser profile is suspiciously new, enhancing privacy and security simultaneously.
Timestamp: [00:04]
In an effort to regulate access to sensitive content, Discord is testing an age verification system that requires users to scan their faces before viewing such material. Users have the option to opt out and instead verify their age by submitting a scanned photo ID. Currently, this feature is under trial in Australia and the UK, reflecting a broader industry trend towards stricter content access controls.
The April 21, 2025 episode of Risky Bulletin underscores the dynamic and multifaceted nature of cybersecurity threats and responses. From exploitations within popular platforms like Zoom to geopolitical cybersecurity initiatives and legislative changes, the landscape requires continuous vigilance and adaptive strategies. Claire Aird’s comprehensive coverage ensures that listeners are well-informed about the latest developments, equipping them with the knowledge to navigate and safeguard against emerging cyber threats.
For more insights and updates, visit riskybiz.com and stay tuned to the Risky Bulletin podcast series.