CyberWire Daily - A city goes dark as cyber questions multiply.

Episode Date: January 5, 2026

Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek of...ficials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf botnet infects more than two million devices worldwide. ZoomStealer uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident. Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today’s Afternoon Cyber Tea host Ann Johnson welcomes Troy Hunt, founder of Have I Been Pwned. A researcher swipes left on white supremacy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On this segment of Afternoon Cyber Tea with host Ann Johnson, Ann is joined by Troy Hunt, founder of Have I Been Pwned, to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. To listen to Ann and Troy's full conversation, visit the episode page. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.  Selected Reading Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (POLITICO) US Action in Venezuela Provokes Cyberattack Speculation (GovInfosecurity) COMUNICADO | CORPOELEC denuncia ataque perpetrado contra el Sistema Eléctrico Nacional (MPPEE) President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests (SecurityWeek) Treasury removes sanctions for three executives tied to spyware maker Intellexa (The Record) Greece says a radio failure that grounded flights is unlikely to be a cyberattack (WRAL.com) US Army to Establish AI Officer Corps for High-Tech Military Management (ForkLog) The Kimwolf Botnet is Stalking Your Local Network (Krebs on Security) Zoom Stealer browser extensions harvest corporate meeting intelligence (Bleeping Computer) European Space Agency Confirms Server Breach (Infosecurity Magazine) Time to restore America’s cyberspace security system (CyberScoop) Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol (Hackread) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Ever wished you could rebuild your network from scratch to make it more secure, scalable, and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full-stack, zero-trust networks, including hardware, firmware, and software, all designed to work seamlessly together. The result, fast, reliable, and secure connectivity without the constant patching, vendor juggling, or hidden costs. From wired and wireless to routing, switching firewalls, DNS security, and VPN,
Starting point is 00:00:46 every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless. Transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo at meter.com slash cyberwire. That's M-E-T-E-R dot com slash cyberwire.
Starting point is 00:01:29 Venezuela blames physical attacks for blackouts as cyber questions swirl. Trump reverses a chip technology sale over national security issues and removes sanctions linked to predator spyware. Greek officials say an air traffic shutdown was not a cyber attack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kim Wolf Botnet infects more than 2 million devices worldwide. Zoom Steeler uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident.
Starting point is 00:02:12 Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today's afternoon, CyberT., host Anne Johnson welcomes Troy Hunt, founder of Have I Been Poned. And a researcher swipes left on white supremacy. It's Monday, January 5th, 2026. I'm Dave Bittner, and this is your Cyberwire Intel briefing. Happy New Year, and thanks for joining us. It is great to have you with us here today. The United States launched a coordinated military operation in Caracas that led to the capture of Venezuelan President Nicolas Maduro, accompanied by widespread power and internet outages.
Starting point is 00:03:18 President Donald Trump suggested the blackout reflected U.S. expertise, while Joint Chiefs Chair John Daniel Kane said U.S. Cyber Command and Space Command helped layer different effects to enable the operation. Officials did not confirm whether cyber attacks were used. Internet Monitoring Group net blocks recorded connectivity losses during the outage, noting any cyber role would likely have been targeted. Venezuela's government claims the blackout resulted from physical attacks on substations not hacking. The incident has renewed attention on cyber-enabled warfare, especially given recent allegations by state oil firm PDVSA that the U.S. previously targeted its infrastructure. If confirmed, the Caracas outage
Starting point is 00:04:10 would represent one of the most visible uses of U.S. cyberpower in a military operation. President Trump ordered the reversal of a $2.9 million chip technology sale, citing U.S. security risks tied to foreign ownership. The deal, approved in 2024 under Joe Biden, transferred computer chip and wafer fabrication assets from M-Core Corporation to Haifo Corporation. Trump said credible evidence shows Haifo's owner as a citizen of the People's Republic of China
Starting point is 00:04:44 and ordered divestment within 180 days. Elsewhere, the Treasury Department removed sanctions on three individuals linked to the information Intellexa Consortium, reversing Biden-era designations tied to the Predator Spyware operation. Those delisted include Merrim Harpaz, Andrea Gambazi, and Sarah Hamal, all sanctioned in 2024 for roles supporting Intellexa's opaque corporate structure. Treasury said the decision followed a reconsideration petition and concluded the individuals had sufficiently distanced themselves from the consortium.
Starting point is 00:05:25 The move marks a sharp shift from the Biden administration's aggressive crackdown on spyware vendors. Digital rights groups warned the delisting risks undermining accountability, noting Predator was used to target dozens of U.S. officials and remains active globally despite signs of reduced use. Greece temporarily shut its airspace after a major radio communications failure disrupted air traffic control systems nationwide. Transport Minister Christos DeMas said the incident, caused by noise across multiple communication channels,
Starting point is 00:06:04 was unlikely to be a cyber attack, though investigations continue. Flights were grounded, delayed, or diverted for hours, stranding thousands of passengers. The Greek Civil Aviation Authority said backup systems were also affected. Authorities launched judicial and internal problems, probes, while controllers renewed calls to modernize aging equipment. The U.S. Army is creating a new officer specialization in artificial intelligence and machine
Starting point is 00:06:36 learning, designated 49B, set to begin in January. The move aims to build a data-centric force by improving decision-making, intelligence, logistics, and robotic system integration. Officers with relevant backgrounds are encouraged to apply and will receive advanced master's level training through 2026. The initiative follows the Pentagon's launch of GenaI. Mill, an AI system based on Google's Gemini model amid broader government efforts to accelerate AI adoption in defense. Krebson's security highlights a rapidly growing botnet called Kim Wolf that has infected more than 2 million devices worldwide, exposing a major blind spot in home network security. According to researchers at Synthiant, Kim Wolf spreads by abusing residential proxy services
Starting point is 00:07:34 to tunnel through firewalls and compromised devices assumed to be protected behind home routers. The botnet primarily infects unofficial Android TV boxes and digital photo frames, many of which ship with malware pre-installed or with insecure features like Android Debug Bridge enabled by default. Synthiant traced much of Kim Wolf's growth to vulnerabilities in the residential proxy network IPedia, which attackers use to access internal local networks and deploy malware at scale. While IPedia says it has since patched the flaws, researchers warn the campaign highlights how proxy networks and insecure consumer devices can enable large-scale abuse, including DDoS attacks, fraud, and deep intrusion into private home networks. Researchers have uncovered a large-scale browser extension
Starting point is 00:08:31 campaign dubbed Zoom Steeler that has affected roughly 2.2 million users across Chrome, Firefox, and Microsoft Edge. According to Coy Security, 18 malicious but fully functional extensions collected sensitive online meeting data, including URLs, IDs, embedded passwords, participant details, and corporate metadata from platforms like Zoom, Microsoft Teams, and Google Meet. Zoom Steeler is one of three related campaigns reaching more than 7.8 million users over seven years
Starting point is 00:09:07 attributed to a single-threat actor tracked as Dark Specter, believed to be China-linked. Researchers say the stolen data, enables corporate espionage, sales intelligence, and highly convincing social engineering. Despite being reported, several extensions remain available, highlighting ongoing risks from overly permissive browser add-ons. The European Space Agency has confirmed it's investigating a cybersecurity incident after reports that hackers access data from servers linked to the agency.
Starting point is 00:09:44 With more on that story, here's Maria. Vermazas, host of the T-minus Space Daily podcast. Now, it's not the best way to kick off an intelligence briefing for a new year, but we are hoping that the story of a cybersecurity breach at a space agency will be a bit of a motivator to start 2026 with the right security procedures in place. That's because the European Space Agency has confirmed that some of its systems have been breached after a hacker offered to sell data allegedly stolen from the organization. Although it is unclear at this stage which data has been compromised,
Starting point is 00:10:20 it's understood that the attack has not impacted any classified or highly sensitive mission systems. Threat actors have claimed a total of 200 gigabytes of data has been compromised. On December 30th, 2025, Issa shared on X the following statement about this breach. Issa is aware of a recent cybersecurity issue involving servers located outside the ESA corporate network. We have initiated a forensic security analysis, currently in progress, and implemented measures to secure any potentially affected devices. Our analysis so far indicates that only a very small number of external servers may have been impacted. These servers support unclassified collaborative engineering activities within the scientific community. All relevant stakeholders have been informed, and we will provide further updates as soon as additional information becomes available.
Starting point is 00:11:11 reports have suggested that the attackers had systems access for potentially up to a week, possibly mapping continuous integration, continuous deployment pipelines, and uncovering hard-coded credentials. This could leave the potential, at least, for adversaries to better understand ESA's infrastructure, to identify potential vulnerabilities and even execute further supply chain tax in the future. Here is hoping that the damage is contained and that this is the extent of the breach. that's maria vermasis be sure to check out t-minus wherever you get your podcasts in an op-ed for cyberscoop former lawmakers and cyber policy leaders warn that u.s cyber defenses are slipping
Starting point is 00:11:57 as adversaries accelerate offensive operations former congressman jim langovin and mark montgomery retired rear admiral and former executive director of the congressionally mandated Cyber Space Solarium Commission, argue that China is persistently infiltrating U.S. government and critical infrastructure networks, while Russia, Iran, and North Korea continue disruptive and preparatory cyberactivity. Meanwhile, America's defensive posture is eroding. The authors draw on their experience with the Cyberspace Solarium Commission, which produced 116 recommendations in 2020 that temporarily strengthened U.S. cyber strategy. They say those gains are now fading due to leadership gaps,
Starting point is 00:12:47 workforce shortages, weakened public-private collaboration, and lagging international coordination. They call for urgent action, including Senate-confirmed leadership and stable funding for the cybersecurity and infrastructure security agency, expanded cyber workforce programs, restored information-sharing mechanisms, and renewed cyber diplomacy.
Starting point is 00:13:11 Their message is blunt. Waiting for a cyber catastrophe is not an option. Coming up after the break, afternoon's cyber tease Ann Johnson speaks with Troy Hunt from Have I Been Poned, and a researcher swipes left on white supremacy. What's your 2 a.m. security worry. Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires.
Starting point is 00:14:17 Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep. Get started at vanta.com slash cyber.
Starting point is 00:14:46 That's v-a-t-a-com slash cyber. Microsoft's Ann Johnson is host of the afternoon CyberT podcast, and in this week's episode, she's joined by Troy Hunt, founder of Have I Been Poned. Security often fails not because of technology that is broken, but because the technology does not work for people. Breach data is really a story about us. It is about how attackers adapt and how people keep repeating the same mistakes. As of the time of recording, we've got just over 17 billion breached records in this service.
Starting point is 00:15:30 Nearly 7 billion unique email addresses when someone gets breached, they usually get breached more than once. time on the internet increases risk and increases likelihood of exposure. I find that really that the biggest blocker for organisations disclosing is that their number one priority is not to their customers, despite what the disclosure emails often say. Their number one priority is probably not surprising is to shareholders. And what that means is protecting organisational value,
Starting point is 00:16:03 making sure that the share price doesn't take a hit, that investors don't lose confidence. And that's this conundrum that people are referring to as data breach fatigue, where we're getting so many of these notices that were sort of like, oh, well, you know, it happened again. But maybe what it's doing as well is changing our behaviours or necessitating that we change our behaviours and we stop sort of treating each individual incident as some major thing. And we structure ourselves such that we expect breach and we're resilient to breach. I'm the have a been pined cyber security guy.
Starting point is 00:16:35 and I got fished earlier this year, like proper successfully fished. I was jet lagged and I had this email allegedly from MailChimp about my account being locked because of spam complaints and that seemed very feasible. And I followed the link and my password manager didn't auto-complete my strong unique password. So I copied and pasted it. I had two-factor turned on and it requested the six-digit token
Starting point is 00:17:00 which I copied and pasted from my code generator into the fishing site and about five seconds later, my brain went, hang on a second, you know, this isn't right. So I demonstrated these human weaknesses that social engineering and scams and attackers take advantage of. One of them was fear losing access to my mailing list. It caught me in a moment of weakness. People have moments of weakness. You know, they're tired, they're rushed, they're concerned about losing something. And the great thing about transparency is that it's almost like a self-evident proof. Open transparency can very quickly disprove in this case, fraudulent claims.
Starting point is 00:17:37 In the same vein, do you think that we're moving toward more transparency, more disclosure, openness, or will organizations try to minimize what they share unless it's mandated or regulated? Yeah, and unfortunately, I think that's what it is. One of the things that a lot of people don't understand is around what are the obligations, the regulatory obligations of organizations for disclosure. For things like disclosure, the regulatory obligations are usually around reporting to the regulator. So you might have to, if you're in the UK, for example, report to
Starting point is 00:18:10 the Information Commissioner's office and you have to report to them within 72 hours. But then you get to self-assess around the necessity report to individuals. And GDPI uses terms like jeopardising the rights and freedoms of individuals. In Australia, we have a what we call the notifiable data breach scheme. And if the breach is likely to cause serious harm to the individuals, you need to disclose to them. But outside of that and outside of particular, specific classes of data, such as medical data or other financial data or other sensitive classes, you just don't need to disclose. And people, when the penny drops, they're outrage. They're like, how on earth do we not have to hear about this? So what will often
Starting point is 00:18:49 happen for me is someone will send me data. And while we're doing this podcast, I saw one pop up where someone said, look, this organisation has had a data breach. And also here's a link to them denying it. And the link is to a tweet, which basically just says fake news. Now, I'll have a look at that data and I'll be able to verify it. And if it's legitimate, I'll get in touch to that organisation and say, look, I think you should look at this more closely. It's not consistent with what you've said online. And the advice I normally then give is, look, the truth is in the data. We will get to the bottom of the truth. And particularly if it's in public circulation, you cannot escape that truth. Now, this is your opportunity to have some control
Starting point is 00:19:29 over the narrative. You can either analyze this, come up with reasonable conclusions, make statements about it, and deal with it appropriately, or everyone will draw their own conclusions. And they have the data. They will be able to draw accurate conclusions in some cases, inaccurate conclusions and others. But unless you control the narrative, you have no ability to control what people say about it. Be sure to check out the complete episode of Afternoon CyberT. You can find that on the Cyberwire website or wherever you get your favorite podcasts. And finally, the lights dimmed at the Chaos Communication Congress, and on to the
Starting point is 00:20:25 stage, walked one Martha Root, dressed as a pink power. Ranger, carrying a story about ideology, automation, and deeply neglected WordPress security. Over the next hour, Root calmly narrated how she infiltrated White Date, a white supremacist dating site and two related platforms, quietly harvesting more than 8,000 user profiles while the site's operators remained blissfully unaware. She described unleashing a custom AI chatbot to flirt, chat, and socially engineer at scale, efficiently collecting photos, bios, messages, and metadata, some complete with GPS coordinates.
Starting point is 00:21:11 Then came the punchline. Live on stage, Root deleted the site's infrastructure, turning extremist matchmaking into a 404 error. A satirical preview of the leak now lives on OKstupid. www.l, with the full archive preserved by distributed denial of secrets, the lesson landed gently but firmly. Even self-proclaimed master races still need better patch management. And that's the Cyberwire, or links to all of today's stories. Check out our daily briefing at thecyberwire.com.
Starting point is 00:22:06 We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at n2K.com. N2K's senior producer is Alice Caruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Peltzman.
Starting point is 00:22:37 Our executive producer is Jennifer Ibin. Peter Kilby is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.