CyberWire Daily - AI or I-Spy?
Episode Date: February 12, 2026Malicious Chrome extensions pose as AI tools. Google says nation-states are increasingly abusing its Gemini artificial intelligence tool. Data extortion group World Leaks deploys a new malware tool ...called RustyRocket. An Atlanta healthcare provider data breach affects over 625,000. Apple patches an iOS zero-day that’s been around since version 1.0. A government shutdown would furlough more than half of CISA’s staff. Dutch police arrest the alleged seller of the JokerOTP phishing automation service. Our guest is Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. Fun with filters provides fuel for phishers. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. If you enjoyed this conversation, tune into Hacking Humans to hear the full interview. Selected Reading Fake AI Chrome extensions with 300K users steal credentials, emails (Bleeping Computer) Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says (The Record) World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks (Infosecurity Magazine) ApolloMD Data Breach Impacts 626,000 Individuals (SecurityWeek) Apple patches decade-old iOS zero-day exploited in the wild (The Register) CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff (Gov Infosecurity) CISA Shares Lessons Learned from an Incident Response Engagement (CISA.gov) Police arrest seller of JokerOTP MFA passcode capturing tool (Bleeping Computer) What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI? (Fortra) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
Identity is a top attack vector.
In our interview with Kvitha Maria Pan from Rubrik,
she breaks down why 90% of security leaders believe
that identity-based attacks are their biggest threat.
Throughout this conversation, we explore why recovery times are getting longer,
not shorter, and what resiliency will look like in this AI-driven world.
If you're struggling to get a handle on identity risk,
this is something you should tune into.
Check out the full interview at
thecyberwire.com slash rubric.
Maybe that's an urgent message from your CEO,
or maybe it's a deep fake trying to target your business.
Dopple is the AI-native social engineering defense platform
fighting back against impersonation and manipulation.
As attackers use AI to make their tactics more sophisticated,
Dopple uses it to fight back.
from automatically dismantling cross-channel attacks to building team resilience and more.
Doppel. Outpacing what's next in social engineering.
Learn more at doppel.com.
That's D-O-P-P-E-L.com.
Malicious Chrome extensions pose as AI tools.
Google says nation states are increasingly abusing its Gemini artificial intelligence tool.
Data Extortion Group World Leaks deploys a new malware tool called Rusty Rocket.
An Atlanta health care provider data breach affects over 625,000.
Apple patches an iOS zero day that's been around since version 1.0.
A government shutdown would furlough more than half of SISA's staff.
Dutch police arrest the alleged seller of the Joker OTP fishing automation service.
Our guest is Simon Horswell, senior fraud specialist at Entrust,
discussing evolving romance scams ahead of Valentine's Day.
And fun with filters provides food.
fuel for fishers. It's Thursday, February 12, 26. I'm Dave Bittner, and this is your Cyberwire
Intel briefing. Thanks for joining us here today. It's great as always to have you with us.
Researchers have identified 30 malicious Chrome extensions posing as AI tools that have been
installed by more than 300,000 users, discovered by browser security firm Layer X and dubbed
the AI frame campaign. The extensions share the same code structure and communicate with
infrastructure under the domain tapnetic.pro. While the most popular extension, Gemini AI Sidebar,
previously had 80,000 users and has been removed, several others remain on the Chrome Web Store
with tens of thousands of installs. The extensions load AI features through remote eyeframes,
allowing operators to change functionality without store review.
They harvest browsing data, and in at least 15 cases,
target Gmail by extracting visible email content, including drafts,
and transmit it to external servers.
Some also enable remote voice capture using the Web Speech API.
Users are advised to remove affected extensions and reset passwords if compromised.
Google says,
As nation-state hacking groups are increasingly using its Gemini AI tool to accelerate reconnaissance,
malware development, and targeting.
In a new report, Google's Threat Intelligence Group, or G-TIG, detailed activity by groups linked to China,
Iran, and North Korea.
Chinese actors used Gemini to gather information on individuals in Pakistan and analyze vulnerabilities.
Iran's APT-42 used it to craft fishing personas,
translate lures and support malware developer.
A North Korean group targeting the defense sector
leveraged Gemini to synthesize open source intelligence
and profile technical roles.
G-Tig also observed malware called Honest Q
that uses the Gemini API to generate C-sharp code for follow-on payloads.
Google says it disrupted some activity
but acknowledges actors continue targeting similar victims.
Large language models are helping threat groups scale reconnaissance and move from research to active targeting faster, according to G-TIG.
Accenture Cybersecurity says the data extortion group World Leaks has deployed a previously unseen malware tool called Rusty Rocket to enhance its attacks.
According to Accenture, Rusty Rocket is written in Rust and targets both Microsoft Windows and Linux systems.
The tool enables stealthy data exfiltration and traffic proxying through heavily obfuscated,
multi-layered encrypted tunnels, blending malicious activity with legitimate network traffic.
It also requires a pre-encrypted configuration at runtime, a guardrail, researchers say,
makes it difficult to detect and monitor.
World leaks, active since early 2025, steals sensitive data and threatens to publish it rather than encrypting files.
The group is claimed victims, including Nike.
Accenture says a rusty rocket supports persistence and long-term data theft.
Increasingly stealthy tooling complicates traditional detection.
Accenture recommends monitoring anomalous outbound traffic
and strengthening segmentation and testing defenses.
Apollo MD, a healthcare physician and practice management provider based in Atlanta,
disclosed that a May 22nd to May 23rd, 2025 cyber attack
exposed sensitive data belonging to over 626,000 individuals.
According to the company's notice and the U.S. Department of Health and Human Services breach portal,
accessed files contained personally identifiable information and protected health information,
including names, birth dates, diagnostic, and treatment details,
insurance data, and in some cases, social security numbers.
By September of last year, Apollo MD had notified affiliated practices
and begun mailing letters offering free credit monitoring.
The company has not identified a responsible threat actor,
although the Keelan Ransomware Group listed Apollo MD on its leak site in June of last year.
Apple has patched a zero-day vulnerability that affects every iOS version
since 1.0 and was used in what the company described as an extremely sophisticated attack
against targeted individuals. Discovered by Google's threat analysis group, the flaw resides in
DYLD, Apple's dynamic linker, and allows an attacker with memory-right capability to execute
arbitrary code. Apple said the issue may have been exploited as part of a chain on versions prior
to iOS 26.
Security researchers noted
the vulnerability could be combined
with WebKit flaws addressed in
iOS 26.3
to enable zero-click or
one-click device compromise.
Apple also fixed other issues,
including bugs that could grant
route access or expose sensitive
data, but said the zero-day
was the only vulnerability confirmed
exploited in the wild.
More than half
of SISA's 2300,
41 employees would be furloughed if Congress fails to extend Department of Homeland Security funding by Friday,
acting director Madhu Gadamukala told lawmakers. Sisa plans to designate 888 employees as accepted to maintain 24-7 operations,
respond to imminent threats, and share urgent vulnerability information, but most proactive cybersecurity work would pause.
Gada Mukala warned a funding lapse would delay deployment of cybersecurity services to federal agencies
and weaken timely guidance to infrastructure operators.
Strategic planning, new capability development, training, and work on mandated cyber incident reporting rules would halt.
Lawmakers remain divided over a broader Department of Homeland Security policy disputes,
raising the risk of a shutdown during what officials describe as a sensitive period for federal
cyber defense efforts.
Staying with SISA, the agency published an advisory outlining key lessons from its response
to a real-world compromise at a federal civilian executive branch agency.
The incident stemmed from exploitation of a known geoserver vulnerability, giving threat
actors, remote access, persistence, and lateral movement across systems.
Sisa mapped observed tactics, techniques, and procedures using the Miter Attack Framework,
and provided indicators of compromise to help defenders detect similar activity.
The advisory emphasizes swift patching of critical vulnerabilities,
maintaining and exercising incident response plans,
and centralized logging for effective detection.
It also includes mitigation recommendations
to improve an organization's preparedness and resilience
against sophisticated post-compromise activity.
SISA encourages all organizations to apply these lessons
and use the associated technical details in the advisory to strengthen their security posture.
Dutch police have arrested a 21-year-old man for allegedly selling the Joker OTP Fishing Automation Service,
a tool designed to intercept one-time passwords and hijack online accounts.
The arrest follows a three-year investigation that dismantled the Joker OTP Fishing-as-A-Service operation in April of last year.
year, including prior arrests of its developer and a co-developer.
Authorities say the platform caused at least $10 million in losses across more than 28,000
attacks in 13 countries. Sold via telegram license keys, the tool automated calls to
victims, posing as legitimate companies while prompting them to enter one-time passwords
sent during login attempts. Targets included PayPal, Venmo, Coinbase, Amazon, and Apple
users. Police have identified dozens of buyers and say the investigation remains ongoing.
Coming up after the break, Simon Horswell from Entrust discusses evolving romance scams ahead of
Valentine's Day, and fun with filters provides fuel for fissures. Stick around.
What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my
vendors secure, or the one that really keeps you up at night, how do I get out from under
these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual
works, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out
endless questionnaires. Their trust management platform continuously monitors your systems,
centralizes your data, and simplifies your security at scale. And it fits right into your workflows,
using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time.
With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep.
Get started at Vanta.com slash cyber. That's V-A-N-T-A.com slash cyber.
Simon Horswell is Senior Fraud Specialist at Intrust.
I recently caught up with him over on the Hacking Humans podcast to discuss evolving romance scams for Valentine's Day.
So today we are talking about romance scams, being that it is right around Valentine's Day.
I would love to start off with some high-level stuff here.
My understanding is that romance scams go way before we actually had an internet.
That this is, as long as people have been in love, there have been people trying to scam each other and use it as a way of doing that.
Is that an accurate perception?
Yeah, I think that's fair.
As long as people have had the ability to take advantage of one another, then unfortunately they have.
So what are we seeing here today when it comes to romance scams?
What is the current, let's call it, state of the art?
Yeah, so what we're seeing now are people.
reaching out to, well, we see fraudsters reaching out to people via social media platforms.
So this could be using dating apps with a view to getting them off the dating apps and into private messaging service.
Or it could be on Instagram or Facebook or one of those other social media platforms that are a lot broader.
And that can make the trouble, that can make the problem a bit harder to spot.
because those platforms aren't necessarily geared up to monitor certain patterns of behavior.
Can you walk us through the playbook?
I mean, how does something like this begin and what happens as they progress?
So initially someone will reach out to you.
They're not going to be an ugly person, right?
This is going to be someone who is probably like a 10, a 9, somewhere sort of unbelievable,
where you're like, wow.
Someone way out of my league.
Right, not you personally, but us as a people, right?
These are going to be people that are objectively good looking.
They will reach out to you out of the blue and they'll say, hey, look, I just stopping by, I saw you like this, or I saw you were into this,
or I just saw your profile and I thought I just wanted to say hello because you look friendly, right?
Or you look beautiful.
But what will then progress from there is a really intense period of the relationship.
So normal relationships progress at, you know, various different speeds.
But one of the hallmarks of this particular trend, this scam, is that it will go straight up to 100 and it won't lay off the gas.
It will be very intense.
You will have the most attentive person ever.
They will find everything you say amusing.
you will have no disagreements as long as you're not talking about not giving money.
Let's put it that way.
Everything's going to be the best thing they've ever heard or they're going to think that you are the only thing that they think of all day long.
They will not miss a call.
They will not miss a message.
And they will, yeah, we see this technique called love bombing.
For those of you who aren't familiar with it, love bombing is when you basically, you basically,
just spam someone with affection. You're constantly telling them how important they are to you,
how much you miss them, how you dream of being together, you're sending poems, you're sending
stories, you're sending songs, just really intense, but over a very short period of time.
And this is all to progress and accelerate the relationship to the point where the victim
is emotionally invested. And then it's very, very, very.
difficult for them to pull away. How much time is there typically between this this period of time
where they're building the relationship and then when the ask comes for something, for money,
for something out of the ordinary? Well, it can vary. It really can vary. In some cases it can be
sort of a couple of weeks, but in other cases we've known this to go on for a few years.
But with the use of AI now, it's sort of
relatively simple. We live these lives online and if you've never met someone in person,
it can be very easy to fall into this trap. Some victims have reported the fact that the tone
changes when they're talking to this person over a period of years. That's generally not the case,
right? If you're talking to a genuine person, they tend to be the same person. But this is, you know,
considered to be fraudsters sharing these victims with other people or if you like if you think of
it in terms of the business I've got someone who goes out and does the research and initiates the
contact and then they pull them in then I give them to somebody else to keep them warm and then
later on down the line when it's required I have my closer so that kind of pattern this is why it can
feel like sometimes you're talking to a different person or the tone changes likely it is you
may have been sold on, your profile, as it were, may have been sold on to somebody else to go to
the next stage. So it can be any period of time, but it does have some hallmarks to it that you can
look out for that will let you know that you're trapped in this situation. What sorts of things
should people be on the lookout for? Well, as I say, this intense period right at the beginning,
this is someone who can never meet you in person
because the person they presented to you doesn't exist
so look out for the fact that you can't meet this person in real life
now it could be that from the beginning the scenario they've given you
is that they work overseas that they can't be with you in person otherwise they
would or they work all the time or they're constantly traveling
some excuse that is baked into the scenario from the beginning,
which means that seeing them in person is going to be very difficult
and we should just put that to the back burner for the time being.
Now, most of the time, you know, you can have a long-distance relationship
and it can work.
But you're on the assumption that you're eventually going to meet.
And if the person on the other end is never going to do that
and has never got that intention,
then you're working under false pretenses.
Now my understanding here is that when someone gets drawn into something like this,
it's very hard for them to admit that they've been taken.
First of all, does that match your research?
And I guess the second question is,
if you suspect your loved one is involved with something like this,
what's the best way to try to break the spell?
Yeah, it's very difficult.
It's very difficult because these are,
social manipulation.
That's how these scams work.
They manipulate the individual, the target.
Quite often we're seeing people that are,
well, they're being targeted
based on things that they put out on social media.
So fraudsters now can find out an awful lot about you,
build a profile,
and then they kind of know what buttons are going to work
through tried and tested means.
So it can be very difficult
once someone's caught in this
or the phrase that I'm hearing quite a lot
or the phrase that we're using quite a lot
is breaking the spell.
You have banks that are trying to warn people
about these payments saying like,
you know, we have seen this before,
this is going to be a scam.
And again, the fraudsters have got that
as part of their script.
So they'll be saying like,
don't worry, the bank is going to tell you this,
but I just need you to put this money in this location
or I need you to buy this amount of crypto.
By this time, because of the intensity of the relationship,
the attentiveness that they're giving the victim,
the fact that they are making it for the victim feel incredibly real
and the dream relationship,
the victim is emotionally invested,
and it's not a case of not being able to admit it.
They're so emotionally invested
that they can't get away from this.
It is everything to them.
They are in love.
It is very real for them.
So the fact that other people are coming along
and waving bits of evidence
or trying to pull them away from it,
the fraudsters know what they're doing
when they're creating this scenario.
It's very difficult for loved ones
to pull them away.
The fraudsters know what the regular objections
are going to be
and almost counterattack them
before they happen.
So trying to isolate that person
more and more from their support,
network from their family, from their loved ones, from their friends, discrediting the warning signs
that banks will put up. And a bank can't stop you spending your money. They're not allowed to do that.
But it's in their interest to warn you several times. To hear the full-length version of my
conversation with Simon Horswell from InTrust, be sure to check out the Hacking Humans podcast
wherever you get your favorite shows. And finally, chances are you're
You've seen this Instagram trend, inviting users to ask ChatGPT to create a caricature of me and my job based on everything you know about me.
The results are playful, detailed, and now widely shared using the platform's Add Yours feature.
According to Josh Davies of Fortra, that harmless fun may be doing more than boosting engagement.
With more than two million images posted, public profiles now neatly.
link faces, job roles, and evidence of large language model use. A banker here, a developer there,
an engineer in between. For a threat actor, it could be reconnaissance at scale. Davy's notes,
the real risk is not the caricature itself, but what it implies. If users entered sensitive work
data into a public LLM, that information may sit in prompt history outside corporate controls.
Combine that with doxing, credential reuse, and fishing, and account takeover becomes plausible.
The trend, he argues, spotlights, shadow AI, data leakage, and the quiet security cost of oversharing.
And that's The Cyberwire.
For links to all of today's stories, check out our daily briefing at thecyberwire.com.
We'd love to know what you think of this podcast.
Your feedback ensures we deliver the insights to keep you a step ahead and the rapidly
changing world of cybersecurity.
If you like our show, please share a rating and review in your favorite podcast app.
Please also fill out the survey in the show notes or send an email to Cyberwire at
N2K.com.
N2K's senior producer is Alice Caruth.
Our Cyberwire producer is Liz Stokes.
We're mixed by Trey Hester with original music by Elliot Kaltzman.
Our executive producer is Jennifer Iben.
Peter Kilby is our publisher, and I'm Dave Bittner.
Thanks for listening.
We'll see you back here tomorrow.
If you only attend one cybersecurity conference this year, make it R-SAC 2026.
It's happening March 23rd through the 26th in San Francisco,
bringing together the global security community for four days of expert insights,
hands-on learning, and real innovation.
I'll say this plainly, I never miss this conference.
The ideas and conversations stay with me all year.
Join thousands of practitioners and leaders tackling today's toughest chat.
and shaping what comes next.
Register today at rsacconference.com slash cyberwire 26.
I'll see you in San Francisco.
