CyberWire Daily - A softer touch on cyber.

Episode Date: February 4, 2026

The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&T and Verizon after months of silenc...e on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Zach Edwards, Senior Threat Researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach’s team here. Selected Reading White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership (Web Pro News) Another Misstep in U.S.-China Tech Security Policy (Lawfare) Cantwell claims telecoms blocked release of Salt Typhoon report (Cyberscoop) Hackers exploit critical React Native Metro bug to breach dev systems (Bleeping Computer) New Amaranth Dragon cyberespionage group exploits WinRAR flaw (Bleeping Computer) Wave of Citrix NetScaler scans use thousands of residential proxies (Bleeping Computer) Fresh SolarWinds Vulnerability Exploited in Attacks (SecurityWeek) ‘It defies belief’: Names of PSNI officers published on court website in new breach (Belfast Telegraph) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Most security conferences talk about zero-trust. Zero-Trust world puts you inside. This is a hands-on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs, where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert-led sessions, practical case studies, and technical deep dives focused on real-world implementation. Whether your blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful.
Starting point is 00:00:55 You'll earn CPE credits, connect with peers across the industry, and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now at ZTW.com and take your zero-trust strategy from theory to execution. The White House preps a major overhaul of U.S. cybersecurity policy. A key commerce security office loses staff as regulatory guardrails weaken. Lawmakers press AT&T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a Wynr-R flaw. A coordinated reconnaissance campaign
Starting point is 00:01:56 targets Citrix net-scaler infrastructure. Sissal warns a solar winds web help desk flaws under active exploitation. Our guest is Zach Edwards, senior threat researcher at Silent Push, discussing a hole in the kill chain, leaving law enforcement empty-handed. And cops in Northern Ireland get an unwanted data breach encore. It's Wednesday, February 4th, 2026. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. The Trump administration is preparing a major overhaul of U.S. cybersecurity policy led by National Cyber Director Harry Coker Jr. with a strong emphasis on private sector collaboration and regulatory reform. The forthcoming National Cybersecurity Strategy
Starting point is 00:03:09 aims to reduce overlapping and contradictory federal requirements that industry leaders say divert resources from real security improvements. Koker has signaled a shift away from top-down mandates toward a more bottom-up approach, actively soliciting industry input on which rules create friction without improving outcomes. The strategy is also expected to modernize threat intelligence sharing by strengthening legal protections for companies that disclose cyber incidents, addressing long-standing fears of liability and regulatory retaliation. Cross-sector coordination will be prioritized to reflect how modern cyber attacks cascade across industries,
Starting point is 00:03:54 while longer-term goals include expanding the cybersecurity workforce and investing in emerging technologies like AI. Despite the ambitious vision, success will hinge on, sustained funding, cultural change within government and rebuilding trust with a private sector wary of past unfulfilled promises. The Wall Street Journal reports that the Trump administration has removed two senior officials from the Commerce Department's Bureau of Industry and Security, specifically within its Office of Information and Communications, Technology, and Services.
Starting point is 00:04:33 While little known publicly, ICTS plays a critical role in protecting U.S. technology supply chains from foreign adversary influence. Its sideline is portrayed as part of a broader rollback since January of last year that has weakened federal technology and national security oversight through staffing cuts and reduced regulatory enforcement. Created under Donald Trump's 2019 executive order, ICTS was designed to block or restrict high-risk technologies tied to countries like China and Russia. It has acted only twice, including bans on Kasperski software and certain connected vehicles. Critics argue that recent personnel moves, combined with cuts across agencies like SISA and regulatory reversals, collectively undermine U.S. efforts to counter-escalating
Starting point is 00:05:25 cyber and supply chain threats with damage that may be difficult to reverse. Senator Maria Cantwell, the top Democrat on the Senate-Cubrower, Committee overseeing telecommunications, is calling for public hearings with the CEOs of AT&T and Verizon following revelations that the Chinese-linked hacking group Salt Typhoon infiltrated U.S. telecom networks. In a letter to committee chair Ted Cruz, Cantwell said both companies have refused to provide documentation supporting claims their networks are now secure, raising concerns about ongoing risks to Americans' communications. The intrusion Exposions exposed sensitive data tied to U.S. officials, yet congressional action and regulatory
Starting point is 00:06:12 oversight have largely stalled. An investigation by the Department of Homeland Security's Cyber Safety Review Board was terminated, and emergency FCC rules issued late in the Biden administration to hold telecoms accountable were rescinded by the Trump administration. Cantwell argues telecoms have taken minimal action due to cost concerns and says executives must testify to restore public confidence. Researchers warn that attackers are actively exploiting the vulnerability dubbed Metro for Shell in the React Native Metro Development Server to compromise developer systems. Discovered by JFrog, the flaw allows remote code execution via an exposed open URL endpoint.
Starting point is 00:07:02 Volchek observed real-world exploitation delivering Windows and Linux payloads that disable defenses, and fetch malware. Roughly 3,500 exposed metro servers remain online, despite available fixes and ongoing attacks. Researchers at Checkpoint report that a newly identified threat actor, Amaranth Dragon, linked to state-sponsored Chinese operations associated with APT-41,
Starting point is 00:07:30 is exploiting a vulnerability in espionage campaigns. The attacks targeted government and law enforcement organizations across Southeast Asia, including Singapore, Thailand, and the Philippines. Amaranth Dragon leveraged the Wyn RR flaw to achieve persistence by planting malicious files in Windows startup folders, later deploying a custom Amarath loader to fetch encrypted payloads from Cloudflare-protected command and control servers. Campaigns were tightly geofenced and used region-specific lures.
Starting point is 00:08:04 More recent attacks delivered a new telegram-based remote access tool, TG Amaranth Rat. Researchers warn the activity shows high technical maturity and urge organizations to upgrade WynRAR to patched versions. Researchers at Grey Noise report a coordinated reconnaissance campaign targeting Citrix net-scaler infrastructure between January 28th and February 2nd. The activity used more than 63,000 IP addresses,
Starting point is 00:08:36 largely residential proxies, to identify exposed login panels and enumerate product versions. Gray noise says the behavior indicates pre-exploitation mapping rather than random scanning, potentially tied to exploit development. The campaign follows recent critical Citrix flaws, raising concerns of imminent follow-on attacks. CISO warns that attackers are actively exploiting a critical remote code execution flaw in SolarWind's web help desk.
Starting point is 00:09:09 The unauthenticated decerealization bug was patched last week, but SISA has now added it to the known-exploited vulnerabilities catalog, ordering federal agencies to remediate within three days. The move confirms in the wild exploitation and highlights continued risk to unpatched solar winds deployments. Coming up after the break, Zach Edwards from Silent Push discusses a hole in the kill chain, leaving law enforcement empty-handed. And cops in Northern Ireland get an unwanted data breach on core. Stay with us.
Starting point is 00:10:05 Ever wished you could rebuild your network from scratch to make it more secure, scalable, and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full-stack zero-trust networks, including hardware, firmware, and software, all designed to work seamlessly together. The result? fast, reliable, and secure connectivity without the constant patching, vendor juggling, or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security, and VPN, every layer is integrated and continuously protected in one unified platform.
Starting point is 00:10:44 And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meader even buys back your old infrastructure to make switching, effortless. Transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo at meter.com slash cyberwire. That's M-E-T-E-R dot com slash cyberwire. If securing your network feels harder than it should be, you're not imagining it. Modern businesses need strong protection, but they don't always have the time, staff, or patients for complex setups. That's where Nordlayer comes in. Nordlayer is a toggle-ready
Starting point is 00:11:42 network security platform built for businesses. It brings VPN, access control, and threat protection together in one place. No hardware, no complicated configuration. You can deploy it in minutes and be up and running in less than 10. It's built on zero-trust principles, so only the right people can get access to the right resources. It works across all major platforms, scales easily as your teams grow, and integrates with what you already use. And now Nordlayer goes even further through its partnership with CrowdStrike, combining Nordlayer's network security with Falcon endpoint protection for small and mid-sized businesses. Enterprise-grade security made manageable. Try Nordlayer risk-free and get up to 22% off yearly plans, plus an extra 10,000,
Starting point is 00:12:30 with the code Cyberwire 10. Visit Nordlayer.com slash Cyberwire Daily to learn more. Zach Edwards is senior threat researcher at Silent Push. I recently got together with him to discuss a hole in the kill chain that leaves law enforcement empty-handed. Yeah, thank you so much. Our team at Silent Push has been looking at different ways to classify the internet since we were founded.
Starting point is 00:13:11 We are essentially a company that scans the internet, and we are creating feeds of known bad infrastructure for our clients. So pretty much an early thing that we were looking at was malicious ASN ranges, bulletproof hosts, and how could we classify large groups of the infrastructure as bad? Well, define for us what exactly bulletproof hosting entails today. Yeah, that's a good question. bulletproof posting is a practice that's been around for about two decades, and it really was a term created to describe the Russian business network, which was essentially a malicious hosting company based out of Moscow around 2006, and they were essentially hosting anything bad they could possibly find from malware, fishing, financial fraud, CSAM, and pretty much everything bad on the internet that some criminal wanted to host. they were open to hosting it. And so when that sort of came about, a lot of folks were trying to figure out,
Starting point is 00:14:16 what is this? How do we talk about this? And so we sort of came up with the idea of a bulletproof host, or rather the industry did. And it really is a hosting company that ignores legitimate abuse complaints. So when a cybersecurity company identifies a domain that's promoting malware or fishing infrastructure,
Starting point is 00:14:39 they may send in abuse complaints to that hosting company or the registrar that registered the domain and try and get that infrastructure taken offline. And when you do that with a Cloudflare or Google or Microsoft or any of the major hosting companies, they absolutely review those requests and they take action when something is malicious. But a Bulletproof hosting company, you may send that in to some email address they have. And really that complaint just kind of goes right into the dumpster. They explicitly say they're going to ignore entire categories of abuse, and threat actors love that. And is it the fact that, as you mentioned, most of these folks are operating out of Russia, does the government simply turn a blind eye?
Starting point is 00:15:27 Yeah, that's the geography of where these BPHs are hosted is really interesting. They are typically and historically have been in jurisdictions which essentially, ignore international laws which they don't have within that country. So Russia has very specific legal frameworks. And so if there's a basically a hosting company that's violating the laws in the United States, that hosting company isn't technically under the same pressure in Russia, whereas many other countries, let's say Europe, Latin America, Africa, African countries, there's a lot of places where they play ball, where it may not be their law,
Starting point is 00:16:14 but let's say someone is violating a U.S. law, like the DMCA, the Digital Millennium Copyright Act. That's sort of the classic law that was used to take down illicit sports streaming, illicit movie and TV show streaming, and that's the basis of torrenting. And there's many BPAs that love to have this type of illicit streaming. because it's, quote, not illegal in their home country.
Starting point is 00:16:43 And so they're essentially just ignoring certain U.S. laws. And that is sort of the modus operandi where a BPA is ignoring laws from other countries. And they're based in specific jurisdictions where they usually aren't worried about law enforcement, raiding them or holding them accountable to foreign laws. And so for decades, it really, the first decade or so, it was primarily in Russia where we were seeing these. But now two decades or so since the start of this problem, they're everywhere. We're tracking over 100 ASNs that are operating as Bulletproofos. And while many are located in Russia, they're located in Hong Kong, other places in Asia.
Starting point is 00:17:30 Some of these are legally registered in the UK. some are legally registered in Wyoming. There's a whole different ecosystem now. So looking at the research here, what are some of the things that you hope people take away from it, that maybe they don't know about bulletproof hosts? Yeah, so we think it's really important for everyone to be not only trying to understand what is a bulletproof host,
Starting point is 00:17:58 what are the crimes that they support, who are their criminal clients, but also how are they getting online? And so we have a lot of details in our report about peering. And without getting two in the weeds on the technical details, the internet is a series of tubes. And a famous former senator from Alaska Ted Stevens said that many years ago. And a lot of people were critical of that.
Starting point is 00:18:22 But it is actually a really simple way to think about it, where the internet is broken up by ASNs and autonomous system numbers. they essentially are where IP addresses are associated. And so an organization like Cloudflare, Google, Microsoft, they have an ASN number or maybe even a couple ASN numbers, and they could have tens of thousands or hundreds of thousands of IPs they map to it. And then in order for people to be able to connect to their websites,
Starting point is 00:18:54 they basically need to connect their ASN up to other ASNs. And so imagine I'm a Cox communication ISPsps, user and I want to connect to infrastructure on Cloudflare, that Cox ASN needs to have a peering relationship in some way that connects to Cloudflare. And so someone like a Cloudflare or these other enterprise hosts typically have hundreds of peers or thousands even, but the Bulletproof hosting providers may only have one or two peers. And what this means in practice is that really suspicious hosting company that's operated out of the basement of someone's house. They maybe rented some infrastructure.
Starting point is 00:19:36 They've been able to get an ASN, but no one can connect to their infrastructure. They're just sitting off alone. The internet doesn't connect to them because they have no peers. They can start reaching out to other bulletproof hosting companies, other low-quality hosting companies, and say, hey, will you peer your ASN to my ASN so that everyone in the world can connect to us? And so when you start to investigate a BPH, you can see who they're basically working with, how those data flows between their malicious host and the rest of the internet work.
Starting point is 00:20:12 And we can start to hold these peering partners accountable. And there was a really interesting law enforcement action just last month against Medialand and HyperCore. And these are basically BPH operators that were, financially sanctioned in the U.S., the U.K. and Australia. But what's really important about it is these are basically Russian bulletproof hosts. We are not going to be able to raid their facilities. We're not going to be able to seize the servers. But they took this opportunity to issue the financial sanctions because the primary
Starting point is 00:20:49 peer for those bulletproof hosts is an ISP located in the UK. And so by having those financial sanctions, they could then go to that peer in the UK and say, hey, one of your partners actually is completely doing illegal stuff. And there's now financial sanctions so that if you continue to do business with them, you're going to be held accountable for all of these sanctions frameworks and potentially face fines or other ramifications. And so it was a really savvy way to try and disconnect that BPH from, the internet. Are law enforcement efforts like that effective? I mean, you know, we always, it was that old chestnut about this being a game of whackamol. Yeah, that's absolutely the case.
Starting point is 00:21:37 And with BPH operators, it is absolutely true that whackamol would be the simplest way to describe them, where when there is a takedown, their clients may all run to another BPA, BIPs that were rented at that BPA may suddenly show up somewhere else. And we see that. And we see that. that basically every month. There's law enforcement actions happening that are quite public and others somewhat more behind the scenes. But in just the last couple of years, there's been a dramatic increase in law enforcement actions against BPH providers. And we should all be really encouraged by that, where in November, Dutch authorities literally raided one Bulletproof hosting provider named Crazy RDP and seized the servers.
Starting point is 00:22:25 And that's really the gold standard where when law enforcement is able to physically locate the bulletproof hosting operator and has jurisdiction to go into that location, then that shuts down the operation. All of those clients immediately lose their infrastructure and it really creates chaos for them. But the second best option really is still that those financial sanctions. And we've seen quite a few financial sanctions being issued, not only Media Land and HyperCorp, the funnel CDN out of China was sanctioned in May 2025 by U.S. authorities. And the funnel CDN is a very interesting threat actor hosting company because they've been hosting investment scam websites that have resulted in more losses than any other network that exists with U.S. victims losing over $200 million through just this one
Starting point is 00:23:25 bulletproof hosting provider. And so we're at a place where the losses are significant with some of the infrastructure that can be hosted on a bulletproof host. And they're clearly, those threat actors that host on them target a lot of those malicious sites to U.S. folks. For the defenders who are in our audience here, where should bulletproof hosting be on their spectrum of awareness. How important a thing is this to keep an eye on? Yeah, I would say it's easily in the top five for all priorities. And the way we sort of advise our clients, there's over
Starting point is 00:24:08 100 BPHs and 99.99% of the stuff on those is malicious. It could be malware, could be C2 hosting, could be fishing infrastructure, financial fraud, C-SAM, all types of horrible things. And the reality of that is that if we aren't approaching it as though it's a threat that every threat actor loves to use, a tool set that every threat actor loves to use, then you're going to be attacked by a lot of stuff that you don't have defenses for. And so we urge people to know what the BPAs are, to have a defense strategy, and at the very least be alerting on connections from those. BPH hosts. And we know many of our clients and many folks in the industry actually block, outright block connections from BPHs. And that's absolutely also a good strategy. But at the bare minimum, folks need to have knowledge of what these ASNs are and have a process that allows them to alert when any domains that are mapped to an IP on one of those BPAs somehow
Starting point is 00:25:19 either connects to their infrastructure or one of their users reaches out and has their device reaching out to one of those hosts. That's Zach Edwards from Silent Push. We have a link to his team's research in the show notes. Local news is in decline across Canada, and this is bad news for all of us. With less local news, noise, rumors, and misinformation fill the void, and it gets harder to separate truth from fiction. That's why CBC News is putting more journalists in more places across Canada,
Starting point is 00:26:02 reporting on the ground from where you live, telling the stories that matter to all of us, because local news is big news. Choose news, not noise. CBC News. With Amex Platinum, $400 in annual credits for travel and dining means you not only satisfy your travel bug, but your taste buds too. That's the powerful backing of Amex.
Starting point is 00:26:27 Conditions apply. And finally, for some police service of Northern Ireland officers, a 2023 data breach is starting to look less like a one-off disaster and more like an unwanted subscription service. After their names were mistakenly exposed last year, dozens of those same officers briefly reappeared this week on the N.I. Court's website. Their Department of Justice says the listings were promptly removed and emphasis. that court information is usually public unless lawyers ask otherwise, a policy that works best when nobody is already living through a privacy nightmare. Police Federation Chair Liam Kelly called the episode avoidable and embarrassing, while politicians warned of renewed anxiety for officers and families. The timing, however, has not gone unnoticed. These same officers are still pursuing
Starting point is 00:27:28 compensation over the original breach, and some are now openly wondering whether this latest slip-up might qualify as a sequel. That possibility lands, just as the Police Federation for Northern Ireland welcomed a 7,500-pound compensation offer for the thousands affected in 2023. In Northern Ireland's data-handling saga, even mistakes appear to be compounding and possibly accruing interest. And that's the Cyberwire for links to all of today's stories. Check out our daily briefing at the Cyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app.
Starting point is 00:28:34 Please also fill out the survey in the show notes or send an email to Cyberwire at n2k.com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Heltzman. Our executive producer is Jennifer Ibn. Peter Kilby is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow.
Starting point is 00:28:58 If you only attend one cybersecurity conference this year, make it R-SAC 2026. It's happening March 23rd through the 26th in San Francisco, bringing together the global security community for four days of expert insights, hands-on learning, and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges
Starting point is 00:29:48 and shaping what comes next. Register today at rsacconference.com slash cyberwire 26. I'll see you in San Francisco.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.