CyberWire Daily - A picture worth a thousand breaches.
Episode Date: January 12, 2026The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and governme...nt communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Sasha Ingber, host of the International Spy Museum's SpyCast podcast, on the return of SpyCast to the N2K CyberWire network. Selected Reading North Korea–linked APT Kimsuky behind quishing attacks, FBI warns (Security Affairs) Advantech patches maximum-severity SQL injection flaw in IoT products (Beyond Machines) Russia's APT28 Targeting Energy Research, Defense Collaboration Entities (SecurityWeek) Malaysia and Indonesia block X over deepfake smut (The Register) New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim (Hackread) BreachForums hacking forum database leaked, exposing 324,000 accounts (Bleeping Computer) Former NSA insider Kosiba brought back as spy agency’s No. 2 (The Record) Vega raises $120 million in a Series B round led by Accel. Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters (Rasmus Moorats) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
Most environments trust far more than they should, and attackers know it.
Threat Locker solves that by enforcing default deny at the point of execution.
With Threat Locker Allow listing, you stop unknown executables cold.
With ring fencing, you control how trusted applications behave.
And with Threat Locker, DAC, defense against configurations, you get real assurance that your environment is free,
of misconfigurations and clear visibility into whether you meet compliance standards.
Threat Locker is the simplest way to enforce zero-trust principles without the operational pain.
It's powerful protection that gives CISO's real visibility, real control, and real peace of mind.
Threat Locker makes zero-trust attainable, even for small security teams.
See why thousands of organizations choose Threat Locker to minimize alert fatigue,
stop ransomware at the source, and regain control over their own.
environments. Schedule your demo at Threatlocker.com slash N2K today.
The FBI warns of Kimsuki-Quishing. Singapore warns of a critical vulnerability in
Advantec IOT management platforms. Russia's fancy bear targets energy research, defense
collaboration, and government communications. Malaysia and Indonesia suspend access to
X Twitter. Researchers warn a large-scale fraud.
operation is using AI-generated personas to trap mobile users in a social engineering scam.
Breach forums gets breached.
The NSA names a new deputy director.
We got our Monday business brief.
Our guest is Sasha Ingber, host of the International Spy Museum's Spycast podcast.
And the commuter who hacked his scooter.
It's Monday, January 12, 2025.
I'm Dave Bittner, and this is your Cyberwire Intel briefing.
Thanks for joining us here today. It's great as always to have you with us.
The FBI is warning that North Korea-linked advanced persistent threat group Kim Suu Kyi
is using QR-code-based spearfishing, known as Quishing, to target governments,
think tanks, and academic institutions. According to the FBI,
the campaigns embed malicious QR codes in emails that bypass traditional security tools
by hiding destination URLs.
When scanned, the codes redirect victims through attacker-controlled infrastructure that profiles devices and presents mobile-optimized fake login pages impersonating services like Microsoft 365, Google, or VPN portals.
The activity observed in May and June of last year involved impersonation of trusted figures such as foreign advisors and embassy staff, with lures including fake questionnaires and
conference invitations. These attacks often begin on unmanaged mobile devices and can enable
session token theft, allowing attackers to bypass multi-factor authentication. The FBI says this makes
quishing a highly effective MFA resilient identity attack vector and urges layered defenses, including user
training, mobile security controls, and fishing-resistant authentication to reduce risk from groups,
like Kemsuki.
The Cybersecurity Agency of Singapore is warning of a critical vulnerability in multiple
Advantec IOT management platforms. The flaw is a SQL injection bug that allows unauthenticated
attackers to run database commands and achieve remote code execution. Effected products
include several IoT Suite and IOTE edge versions on Linux, Windows, and Docker,
Advantec urges immediate patching, noting some fixes require direct customer coordination.
Researchers at Recorded Future report that Russian state-sponsored threat group APT-28 is conducting an ongoing
credential harvesting campaign against organizations tied to energy research, defense collaboration,
and government communications. Also known as Fancy Bear and Sophocy, the group has been active since
at least 2004 and is linked to Russia's GRU. The campaign relies on fishing pages impersonating
Microsoft Outlook Web Access, Google, and Sophos VPN portals, often paired with PDF
lures and redirection to legitimate sites after credentials are stolen. Recorded Future says APT-28
heavily abuses free hosting, tunneling, and link-shortening services to host fishing infrastructure,
collect victim data and obscure attribution,
suggesting the activity is likely to continue.
Malaysia and Indonesia have suspended access to X Twitter,
citing concerns that the service enables the creation of non-consensual sexual imagery.
Malaysia's communications regulator said X failed to implement safeguards required under local law,
prompting a block until compliance is achieved.
Indonesia's communications ministers said sexual deepfakes violate human rights and digital safety.
India has also warned X over similar issues.
Owner Elon Musk has argued the actions amount to censorship,
though the countries have a history of restricting platforms over objectionable content.
Security researchers at Checkpoint warned that a large-scale fraud operations,
dubbed Opco Pro is using AI-generated personas and fake communities to trap mobile users in a long-running
social engineering scam. The campaign begins with SMS messages impersonating brands like Goldman Sachs,
promising outsized investment returns. Victims who click the links are funneled into private
WhatsApp groups populated largely by bots posing as enthusiastic investors and guided by fictional
experts with AI-generated profiles. After weeks of trust-building, targets are directed to download
a fraudulent Opco Pro app from the Apple App Store or Google Play Store lending false legitimacy.
The app contains no real trading functionality but collects identity documents and selfies
under the guise of Know Your Customer Checks. Researchers say the stolen identities enable financial
theft, account takeovers, and sim swapping, making Opco Pro a highly scalable industrialized
fraud model.
The latest version of breach forums has suffered another data breach with a leaked user database
and administrative PGP key circulating online.
The leak appeared in a 7-Zip archive posted on a site named after the Shiny Hunter's gang,
though Shiny Hunters denied involvement, according to Bleeping Computer.
The archive contains a MyBB users table with nearly 324,000 records, including usernames,
registration dates, and IP addresses, while most IPs resolve to a local loopback address,
more than 70,000 mapped to public IPs, raising operational security concerns.
Breach Forum's administrator said the data originated from an August 2025 backup briefly exposed
during site recovery and claimed it was downloaded only once.
However, researchers later confirmed the leaked PGP key password was also published,
increasing potential risk to users.
The National Security Agency has named veteran intelligence official Tim Kosiba as its new deputy director,
ending months of leadership uncertainty.
Koseba returns after more than three decades of government service,
including senior roles at the NSA and FBI, and most recently as deputy commander of NSA Georgia.
The appointment follows the administration's decision to drop a previous nominee amid political backlash, a move first reported by recorded future news.
As deputy, Kosovo will oversee daily operations and support the NSA director, who also leads U.S. Cyber Command.
attention now shifts to Senate confirmation hearings for the agency's permanent leader scheduled later this month.
Turning to our Monday business brief, a wave of global funding and consolidation highlights continued investor confidence in cybersecurity and adjacent markets.
Israeli security analytics firm Vega raised $120 million in a Series B led by Excel,
valuing the company at $700 million, while Saudi OT security provider DS Shield secured $54 million
to scale operations and prepare for a potential public listing.
Israeli AI Identity Startup Act Security closed a $40 million Series A,
and U.S.-based Armadin, founded by Kevin Mandia, raised $24 million in seed funding amid talks of a much larger round.
Smaller raises included South Korea's Logpresso, Utah-based Paramify, Belgium's Wodon AI, and Turkey's Guardian.
The sector also saw multiple MSSP acquisitions across Australia, Europe, and the United States, underscoring ongoing market consolidation.
Coming up after the break, my conversation with Sasha Ingber, host of the International Spy Museum's
Spycast podcast and the commuter who hacked his scooter. Stay with us. Sasha Ingber is host of the
International Spy Museum's Spycast podcast. We sat down to discuss that show's return to the N2K
Cyberwire Network. Sasha, I am so pleased to welcome you here to the Cyberwire Daily podcast.
Welcome back, I suppose I should say. Well, thank you for having me, Dave.
It's very exciting that Spycast is joining the N2K Cyberwire Network.
You were with us for a few years there and then went away for a little while, but now you're back, and we couldn't be more excited.
Well, we're glad to be back with you.
Well, let's talk about the Spycast podcast.
What's the origin story and what's the value proposition for your listeners?
Oh, I didn't know we were starting from all the way back.
I wasn't really ready for that one.
But all right, all right, I got you.
I got a little something I can share with you, Dave.
So Spycast is actually the first podcast on espionage and spying in the United States.
This is our 20th year.
And our first host was the founding director of the International Spy Museum, Peter Ernest,
who himself was a spy.
So some good credentials there for starting a spy focused podcast.
Yeah, we're not making things up.
No, no, not at all.
And I'll add that anyone who has had the chance to visit your facilities in Washington, D.C., if you haven't, you're in for a treat.
It really is one of the premier museums in Washington.
I mean, how many places can you go where you can see a bra with a camera between the
bulges and also crawl through a duct.
That's right.
And let's not forget James Bond's car, right?
Yeah, we have that.
We used to have a Iranian drone in the lobby that had actually been taken from Ukraine during
the full-scale invasion.
I mean, we have a lot here.
Well, let's talk about the podcast itself.
What do you all talk about week to week?
Well, every week it's a different voice from the spy community here in the United States or abroad.
Some of my favorite episodes in the past year when I started hosting it include Bill Evanina,
who was the former director of counterintelligence.
And we talked about how the massive layoffs that we were seeing across the federal government opened up this new threat vector for foreign intelligence services to start recruiting.
China and Russia on places like LinkedIn.
And that conversation we had actually led the federal government to institute a new policy
to educate people before they left their jobs.
I also remember a conversation with a former CIA officer named Ralph Mariani, who talked about he was serving,
who talked about how he was serving in Athens.
And the station chief was assassinated by a terrorist organization.
called the 17 of November.
This led the agency to start building in more protections for their officers.
There's this guy, Nick F. Timiades, who used to work at the CIA,
and is just an encyclopedia of information about Chinese espionage tactics,
from the impressive to the laughably bad.
And he's been building this database of more than 900 cases from around the world
that he's continued to follow.
There's one woman named Christine Kuhn. She talked about how her family history was really a mystery to her.
She gets a phone call one day asking her about her grandfather. And this ultimately unfolds what becomes years of research where she learns that her family actually spied for the Japanese and the Nazis.
And her grandfather was the only person who was ever convicted and charged of gathering information on the eve.
of Pearl Harbor for the Japanese.
How you handle the shame of that.
She wrote a book called Family of Spies.
And one other person who stands out to me was this journalist, Fariba Nawa.
She is based in Turkey, and she talked about how this is a country that is rife with spy games
between the Israelis and the Iranians, who are both looking to recruit those who have left
Iran and how dangerous it really ultimately becomes.
Well, tell us a little bit about yourself, Sasha. How did you find yourself hosting this podcast?
Well, my story definitely starts before this moment when I, as a journalist who specializes in the intelligence community, was just looking for a job, looking to pay my bills in Washington, D.C., where I live.
I couldn't find a job in journalism, so I ended up taking a job as a writer and an editor at the State Department.
Somehow I got pulled into this tiny team that was tasked with debunking Russian disinformation
after Russia seized the Crimean Peninsula from Ukraine.
And that catapulted me into this fascinating world where all of a sudden now I'm meeting
with the CIA and Ukrainians who are trying to dispel the Russian propaganda that has been
pervading their country.
When I left that job, I did eventually break into journalism.
became a breaking news reporter at NPR, where I got to cover the dissolution of important treaties
between the United States and Russia. And then I moved into a job at an organization called Scripps
News, where I became their national security correspondent. A lot of my reporting had to do with
intelligence. It took me into China's secret police station above a ramen shop in New York City.
I was the only journalist who got in.
The FBI had just raided it.
I was shocked that they actually let me in, Dave.
And then I started my own media outlet.
It's on substack.
It's called Human, standing for Human Intelligence.
And I do these reports.
I do these reports on what's happening inside the intelligence community a couple times a week.
It could be the developments in Venezuela and the United States'
involvement in taking Maduro out of the country, China, Russia, Iran, what's happening inside
the CIA and NSA, all of it is fair game. So I come into this role with all of those experiences,
and for some reason, this museum pays me to ask questions.
I joke, half joke, I suppose, that that is one of the things I love most about my
job is that I get to talk to smart people about interesting things. And it sounds like you have,
you enjoy the same privilege. It's one of the coolest things that any human can ever do. And it's weird
to kind of consider yourself a professional conversationalist. But I definitely like the side of asking
questions more than what you're making me do right now. Fair enough. Well, can you give us a preview of some
of the things that you have, things that you have planned for this coming year? Our first interview of the
year, and again, it's our 20th year, so we wanted to start off big. Features a person who you've
probably never, ever heard of, you've never seen, you don't even know his name. It's Brian Carbaugh.
He's the head of the Special Activities Center. That's the CIA's Armed for Covert Action,
which is authorized by the president. They do the most secretive, dangerous work in our country.
and we ticked through what it was like to serve in this center in the years where we saw the fall of Afghanistan,
COVID, China rising up. So that's one example of what we have awaiting listeners.
We're also about to do a month of content on operations in Latin America. So we start off by talking about
the anniversary of the U.S. invasion of Panama. And then we're,
we also move into other topics. And then we also move into the stories of a former DEA agent
who created the country's first intelligence database on gangs and how he literally walked from
prison to prison in Guatemala to gather the data for this database. And we end on Brian Stern,
a man who actually went into Venezuela a few weeks ago and extracted Maria Carina Machado,
the Nobel Peace Prize winner, who is the opposition leader,
who wants to go back into Venezuela and try to run that country.
So explain to me how the podcast has evolved over time,
how this new version differs from some of the previous ones.
Well, Peter Ernest was Peter Ernest.
He got to do whatever he wanted.
we were living in a very, very different kind of world than we are today.
It was also just a free-flowing conversation.
By this time, we have a format that is specific to about 30 minutes,
basically to try to join you on your commute home.
And it's tighter, it's more focused, but still retains the intimacy as well as the expertise.
And, you know, we have just gotten some really, really exclusive voices from the spy world that you will not hear anywhere else.
Well, I can say with confidence that the crossover of interests of the folks who are listening to us here on the Cyberwire and Spycast is huge.
I mean, it is the type of thing that if you enjoy listening to this every day, you really should do yourself a favor and check out the Spycast podcast.
It's really compelling edge of your seat stories quite regularly.
So, Sasha, thank you so much for taking the time.
And like I said, we're really thrilled to have you back joining our network.
Thanks.
It's good to be with you.
And we're really excited for the year ahead.
Be sure to check out the Spy Museum's Spycast podcast wherever you get your favorite podcasts.
You can also find a link to it on our website.
And finally, a few years ago, a self-described ethical hacker named Rasmith Moratz bought a new electric scooter,
not because it was the best on paper, but because it was proudly local, custom-built in his home nation of Estonia, and that felt right.
The charm dulled when the scooter maker went bankrupt and their cloud-dependent app began quietly losing features,
Since even basic functions like unlocking depended on servers that might disappear,
Moratz did what any calm, rational commuter would do, and reverse-engineered the entire system.
Digging through a React native app, Bluetooth traffic, and some unhelpfully obscure bytecode,
he uncovered an awkward truth.
Every scooter shared the same default Bluetooth authentication key.
In practice, that meant any more.
nearby could unlock any of this particular brand of scooter.
Oops.
With a bit more work, he mapped the scooter's command structure,
wrote his own control app, and restored independence from the cloud.
The scooter still works, the servers can vanish, and the lesson stands.
Local pride is great, but cryptographic defaults are forever.
And that's the Cyberwire.
For links to all of today's stories, check out our daily briefing at the cyberwire.com.
Don't forget to check out the Grumpy Old Geeks podcast where I contribute to a regular segment on Jason and Brian's show every week.
You can find Grumpy Old Geeks where all the fine podcasts are listed.
We'd love to know what you think of this podcast.
Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity.
If you like our show, please share a rating and review in your favorite podcast app.
Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com.
N2K's senior producer is Alice Carruth.
Our Cyberwire producer is Liz Stokes.
We're mixed by Trey Hester with original music by Elliot Pelsman.
Our executive producer is Jennifer Ivan.
Peter Kilby is our publisher, and I'm Dave Bittner.
Thanks for listening.
We'll see you back here tomorrow.
If you only attend one cybersecurity conference this year,
make it RASAC 2026. It's happening March 23rd through the 26th in San Francisco,
bringing together the global security community for four days of expert insights,
hands-on learning, and real innovation. I'll say this plainly, I never miss this conference.
The ideas and conversations stay with me all year. Join thousands of practitioners and leaders
tackling today's toughest challenges and shaping what comes next. Register today at RSA conference
dot com slash cyberwire 26. I'll see you in San Francisco.
