
Loading summary
Claire Airdrop
The US sanctions another Russian bulletproof hosting provider, the International Criminal Court discloses a security breach, the US dismantles 29 North Korean laptop farms and a Chinese student gets jailed in the UK for SMS blasting. This is the Risky bulletin prepared by Catalyn Kim Panu and read by me, Claire airdrop. Today is the 2nd of July and this podcast episode is brought to you by Sandfly Security the US Treasury Department has sanctioned the Russian bulletproof web hosting provider ASA Group. Sanctions were levied on the group and its subsidiaries, plus its three owners and a fourth executive. The company is known for hosting infostealers, ransomware disinformation campaigns and dark web marketplaces. Russian police arrested two of the group's owners separately in April and ASA Group is the third Russian bulletproof hosting provider sanctioned this year, following Z Service and Stark Industries. The International Criminal Court says it's detected and contained a security breach. The intrusion was spotted last week. The ICC described it as sophisticated but hasn't provided further details. The ICC suffered a similar breach in September 2023. A ransomware gang has stolen sensitive data belonging to the Swiss government. The files were stolen in mid from the non profit organisation Radix, which works with Swiss federal agencies. The ransomware operation Sacom has taken credit for the attack. The group leaked over one terabyte of files on the Dark Web last week after Radix refused to pay a ransom. Iranian hackers are threatening to sell emails stolen from Donald Trump's election campaign last May. The hackers claim to have more than 100 gigabytes of emails belonging to campaign staff. They include the accounts of White House chief of staff Susie Wiles, lawyer Lindsay Halligan and the president's advisor Roger Stone. The hackers told Reuters if they don't find a buy it, they may still release the files. The US charged three Iranian intelligence agents with the hack. A US senator has urged the FBI to update its mobile device security guidelines for government officials. Senator Ron Wyden says the current advice is obsolete. An official should be advised to enable ad blocking features and disable ad tracking IDs. Officials should also be directed to enable the enhanced security modes available in mobile operating systems. Europol has arrested five members of a crypto investment scam ring. The suspects are accused of stealing more than £460 million from 5,000 victims. They ran a global network of money mules that withdrew cash from ATMs and moved funds between bank and crypto accounts. The five were detained in Spain last week. The FBI has dismantled 29 laptop farms that were used in North Korean remote IT worker schemes. The farms hosted more than 200 total laptops, and these allowed the North Korean workers to appear to be based in the U.S. according to the FBI, the workers used stolen identities to obtain jobs at more than 100 U.S. companies. The Justice Department has charged eight individuals over running the laptop farms for four North Korean workers who stole crypto assets from their employees have also been charged. A Chinese student has been sentenced in the UK to one year in prison for using an SMS Blaster to send phishing texts. Rui Chen Xeon installed the SMS Blaster in a car and drove around London. He sent tens of thousands of messages over a week. In March, he was caught. Following a joint investigation between police and UK mobile operators. A group of Pakistani web developers created a network of websites advertising cracked software. The cracks are laced with malware that infects users with infostealers. Security firm Intrinsic says the group has built hundreds of websites over four years. They were likely built for a third party. A suspected Chinese hacking group is behind three Avanti zero days exploited in the wild last year. France's cybersecurity agency has named the group it believes the hackers work as an initial access broker for a larger APT. The agency has linked Hukin with UNC5174, which Google has described as a cyber contractor for China's Ministry of State Security. Major vulnerabilities have been found in the Wind FTP server RCE security says attackers can bypass authentication on the web interface by appending a null byte to the username. This this issue can be chained together with two other flaws to gain root access to the server. Wind has only patched two of the three reported issues Google has patched and actively exploited Chrome Zero day. The vulnerability is a type confusion issue in the browser's V8 JavaScript engine. It was discovered by Google's security team and is the fourth Chrome Zero Day patch this year. US mobile carrier AT&T has launched a feature to prevent SIM swapping attacks. The wireless account lock feature prevents number porting and changes to billing details. It can be enabled via the AT&T app. Similar features already exist on other carriers, including T Mobile, Verizon and Google fi. Apple is adding post quantum cryptography support to its operating systems. Upcoming versions of iOS and macros will support the MLChem algorithm. MLChem will protect TLS connections against quantum computing attacks with which may break encrypted comms in the future. Microsoft announced its own post quantum crypto support for Windows in May and finally the developers of Ubuntu Linux have disabled side channel attack protection in Intel's graphics drivers for the platform. Its developers said it now uses protections in the Linux kernel and GPU driver level protections are no longer needed. They expect the change to result in a 20% improvement in graphics performance. And that is all for this podcast edition. Today's show show was brought to you by Sandfly Security. Find them at sandflysecurity. Com. Thanks for your company.
Risky Bulletin: The US Sanctions Another Russian Bulletproof Hosting Provider
Hosted by risky.biz | Released on July 2, 2025
In the latest episode of Risky Bulletin, host Claire Airdrop delivers a comprehensive update on significant cybersecurity events shaping the global landscape. From international sanctions to sophisticated cyberattacks, the episode covers a spectrum of issues pertinent to cybersecurity professionals and enthusiasts alike.
At the outset, Claire announces, “[00:04]... the US Treasury Department has sanctioned the Russian bulletproof web hosting provider ASA Group.” This action targets ASA Group and its subsidiaries, including three owners and a fourth executive. The group stands accused of facilitating various cybercrimes, such as hosting infostealers, ransomware operations, disinformation campaigns, and dark web marketplaces.
Key Points:
Claire updates listeners on a recent security incident at the International Criminal Court (ICC): “[00:04]... the International Criminal Court discloses a security breach.” The breach, detected last week, is described as sophisticated, although specific details remain undisclosed. Notably, the ICC experienced a similar breach in September 2023.
Consequences:
A significant threat emerges from Iranian hackers who are threatening to sell emails purportedly stolen from Donald Trump’s election campaign in May [00:04]. The compromised emails reportedly include sensitive communications from key figures such as White House Chief of Staff Susie Wiles, lawyer Lindsay Halligan, and advisor Roger Stone.
Details:
Senator Ron Wyden has called for an urgent update to the FBI's mobile device security guidelines for government officials [00:04]. He critiques the current recommendations as outdated and inadequate for the evolving threat landscape.
Recommendations Include:
Europol has successfully arrested five members of a crypto investment scam ring responsible for defrauding over £460 million from approximately 5,000 victims [00:04]. The operation involved a global network of money mules who facilitated the withdrawal of funds from ATMs and the transfer of funds between bank and cryptocurrency accounts.
Operational Insights:
In a significant move against North Korean cyber operations, the FBI has dismantled 29 laptop farms used to host over 200 laptops [00:04]. These farms were part of remote IT worker schemes that allowed North Korean operatives to appear as legitimate employees within the United States.
Implications:
Rui Chen Xeon, a Chinese national, has been sentenced to one year in prison in the UK for deploying an SMS Blaster to send phishing texts [00:04]. Operating from a vehicle, Chen sent tens of thousands of fraudulent messages over the span of a week.
Investigation Highlights:
A group of Pakistani web developers has constructed a network of websites advertising cracked software, which is embedded with malware disseminating infostealers [00:04]. Over four years, hundreds of such websites were developed, likely for a third-party operative.
Security Firm Insights:
France's cybersecurity agency has attributed three Avanti zero-day exploits used last year to a suspected Chinese hacking group [00:04]. This group operates as an initial access broker within a larger Advanced Persistent Threat (APT) network.
Agency Findings:
Wind FTP Server Vulnerabilities:
Chrome Zero-Day Exploit:
To combat SIM swapping attacks, AT&T has introduced a new wireless account lock feature [00:04]. This feature prevents unauthorized number porting and changes to billing details and can be activated through the AT&T app.
Industry Context:
Apple's Initiative:
Microsoft's Commitment:
Ubuntu's Performance Enhancement:
Claire Airdrop wraps up the Risky Bulletin by highlighting the multifaceted nature of current cybersecurity challenges, from state-sponsored cyber threats and sophisticated malware operations to advancements in security technologies. The episode underscores the critical need for continuous vigilance, updated security protocols, and international cooperation in combating ever-evolving cyber threats.
For more detailed insights and updates, subscribe to Risky Bulletin on your preferred podcast platform.