
Loading summary
Claire Aird
An Iranian security firm is behind an airline hacking spree Chinese hackers breach Singapore's critical infrastructure, new SharePoint and Crush FTP zero days are being used in the wild and Japan releases free ransomware decryptors. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 21st of July and and this podcast episode is brought to you by thinkst, the makers of the much loved thinxt Canary. A hacking campaign targeting global airlines has been attributed to an Iranian security firm. The company Amanban is allegedly a contractor behind the Iranian hacking group APT39. The company also targeted freight and logistics firms. Its operations were revealed in a leak of internal documents obtained by Iranian security researcher Nariman Harib. In other news, Singapore has detected Chinese hackers in its critical infrastructure. The country's cybersecurity agency has attributed the intrusions to a group tracked as UNC3886. The group is known for using exploits to target unpatched network equipment. The Dutch public prosecution office disconnected its internal network from the Internet on Friday. The Ministry of Justice said the office was likely hacked via a vulnerability in its Citrix data netscaler appliances. The Citrix Bleed 2 info leak vulnerability is currently being exploited in the wild. One of Russia's largest alcohol retailers closed more than 2,000 stores following a ransomware attack. The NovaBev group said the attack last week impacted its ability to process orders at its physical stores as well as online. The company has refused to pay the ransom and has since restored operations. Ukraine's military intelligence service claims to have hacked Russia's largest gas producer. Gazprom officials claim to have wiped servers, disabled over 20,000 workstations and deleted backups. The hack allegedly impacted almost 390 Gazprom subsidiaries. Gazprom has not confirmed the attack, but its website is down. Russian authorities have charged seven suspects with leaking government data. Two individuals remain in police custody and the rest are under house arrest. All seven are employees at either the Ministry of Internal Affairs Analytical and Data Department or IT providers. If found guilty, they could face up to 10 years in prison. The UK government has sanctioned three units of the Russian Military Intelligence Service and 18 of their officers. The GRU used cyber campaigns and influence operations to destabilise the uk, Ukraine and NATO. The sanctioned units conducted online reconnaissance to help target missile strike attacks, including one that killed hundreds of civilians at the Mariupol Theatre in 2022. They also used malware to support the poisonings of Sergei and Yulia Skripil. The sanctions also hit three GRU officers who run a social media content mill operating out of West Africa. US Authorities have arrested two Venezuelan nationals for stealing more than $100,000 through ATM jackpotting. The two allegedly used electric scooters to drive to the ATMs and cover sensor glue. They returned hours later, opened the ATMs and installed malware that emptied the cash hoppers. Authorities used facial recognition to identify one of the suspects and confirmed his identity using Facebook photos. A new zero day vulnerability is being exploited in on premise Microsoft SharePoint servers. It's a variant of an older bug that allows for remote code execution attacks. The Zero day is based on an exploit used at the pwn to Own Hacking contest in February. An exploit is already available online. Microsoft says it's working on a patch but has not provided a deadline. Hackers are exploiting a Crush FTP zero day to take over unpatched servers, Crush FTP said. The hackers reverse engineered a recent patch and discovered another bug. The flaw allows attackers to take over the Crush FTP admin interface. The bug's been fixed in versions of Crush FTP released this month. Hackers have added malware to five popular NPM packages. The malicious code specifically targets Windows systems. The attackers phished the library's maintainer last week to gain access. The five affected packages collectively have over 95 million weekly downloads. The libraries are also used in thousands of other downstream packages. The Arch Linux team has removed three malicious packages from the AUR repository. The packages appeared to be browser modifications but installed a Trojan. The packages were for two days before they were removed. Japanese authorities have released free decryptors for the Phobos and 8base ransomware. The decryptor was developed after the arrests of the admins of both ransomware variants. The Phobos ransomware as a service has operated since 2018. The eight base group launched in 2023 on a leaked version of the Phobos code. And finally, an upcoming change to Bitcoin will prevent the use of funds secured with outdated encryption. Bitcoin wallets and exchanges will have to quantum resistant cryptography or owners assets will be frozen on the blockchain. The Bitcoin team says quantum computing is an existential threat to the currency. It estimates the migration will take at least five years. And that is all for this podcast edition. Today's show was brought to you by our sponsor thinxt, the makers of the much loved thinxt Canary. Find them at Canary Tools. Thanks for your company.
Podcast Information:
In the July 21, 2025 episode of Risky Bulletin, host Claire Aird delves into a series of critical cybersecurity incidents impacting global infrastructure, state-sponsored hacking activities, emerging vulnerabilities, and significant developments in ransomware mitigation. This summary encapsulates the episode's key discussions, insights, and conclusions, providing a comprehensive overview for those who haven't tuned in.
At the outset of the episode, Claire Aird highlights a disturbing trend in state-sponsored cyberattacks targeting the aviation sector.
“A hacking campaign targeting global airlines has been attributed to an Iranian security firm,” Claire Aird announces [00:04].
Claire shifts focus to Southeast Asia, where Singapore faces renewed cyber threats.
“Singapore has detected Chinese hackers in its critical infrastructure,” Claire Aird reports [00:04].
The Netherlands grapples with vulnerabilities in widely-used software, affecting governmental operations.
“The Citrix Bleed 2 info leak vulnerability is currently being exploited in the wild,” Claire Aird informs listeners [00:04].
Ransomware continues to wreak havoc across industries, with significant repercussions in the retail sector.
“One of Russia's largest alcohol retailers closed more than 2,000 stores following a ransomware attack,” Claire Aird states [00:04].
Geopolitical tensions manifest in sophisticated cyberattacks targeting energy sectors.
“Ukraine's military intelligence service claims to have hacked Russia's largest gas producer,” Claire Aird relays [00:04].
In response to ongoing cyber aggressions, the UK takes decisive action against Russian entities.
“The UK government has sanctioned three units of the Russian Military Intelligence Service and 18 of their officers,” Claire Aird notes [00:04].
Cybercriminal activities transcend national boundaries, with inventive methods employed to execute financial theft.
“US Authorities have arrested two Venezuelan nationals for stealing more than $100,000 through ATM jackpotting,” Claire Aird explains [00:04].
The cybersecurity landscape continues to evolve with the discovery of new vulnerabilities.
“A new zero day vulnerability is being exploited in on-premise Microsoft SharePoint servers,” Claire Aird reports [00:04].
“Hackers are exploiting a Crush FTP zero day to take over unpatched servers,” Claire Aird continues [00:04].
Supply chain attacks remain a persistent threat, with malicious code infiltrating widely-used software repositories.
“Hackers have added malware to five popular NPM packages,” Claire Aird informs [00:04].
Open-source ecosystems are not immune to security breaches, necessitating proactive measures from maintainers.
“The Arch Linux team has removed three malicious packages from the AUR repository,” Claire Aird announces [00:04].
In a significant stride against ransomware, authorities have developed tools to aid victims.
“Japanese authorities have released free decryptors for the Phobos and 8base ransomware,” Claire Aird conveys [00:04].
The intersection of cryptocurrency and emerging technologies brings new challenges to digital security.
“An upcoming change to Bitcoin will prevent the use of funds secured with outdated encryption,” Claire Aird concludes [00:04].
The July 21, 2025 episode of Risky Bulletin presents a comprehensive overview of the dynamic and often perilous landscape of cybersecurity. From state-sponsored hacking campaigns and sophisticated ransomware attacks to emerging vulnerabilities and proactive defense mechanisms, the episode underscores the critical importance of continuous vigilance, timely updates, and collaborative efforts in safeguarding digital infrastructure.
For further details and ongoing updates, listeners are encouraged to subscribe to Risky Bulletin and stay informed about the latest in cybersecurity news and insights.