CyberWire Daily - AI or I-Spy?

Episode Date: February 12, 2026

Malicious Chrome extensions pose as AI tools. Google says nation-states are increasingly abusing its Gemini artificial intelligence tool.  Data extortion group World Leaks deploys a new malware tool ...called RustyRocket. An Atlanta healthcare provider data breach affects over 625,000. Apple patches an iOS zero-day that’s been around since version 1.0. A government shutdown would furlough more than half of CISA’s staff. Dutch police arrest the alleged seller of the JokerOTP phishing automation service. Our guest is Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. Fun with filters provides fuel for phishers.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. If you enjoyed this conversation, tune into Hacking Humans to hear the full interview. Selected Reading Fake AI Chrome extensions with 300K users steal credentials, emails (Bleeping Computer) Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says (The Record) World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks (Infosecurity Magazine) ApolloMD Data Breach Impacts 626,000 Individuals (SecurityWeek) Apple patches decade-old iOS zero-day exploited in the wild (The Register) CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff (Gov Infosecurity) CISA Shares Lessons Learned from an Incident Response Engagement (CISA.gov) Police arrest seller of JokerOTP MFA passcode capturing tool (Bleeping Computer) What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI? (Fortra) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Identity is a top attack vector. In our interview with Kvitha Maria Pan from Rubrik, she breaks down why 90% of security leaders believe that identity-based attacks are their biggest threat. Throughout this conversation, we explore why recovery times are getting longer, not shorter, and what resiliency will look like in this AI-driven world. If you're struggling to get a handle on identity risk,
Starting point is 00:00:35 this is something you should tune into. Check out the full interview at thecyberwire.com slash rubric. Maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Dopple is the AI-native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated,
Starting point is 00:01:11 Dopple uses it to fight back. from automatically dismantling cross-channel attacks to building team resilience and more. Doppel. Outpacing what's next in social engineering. Learn more at doppel.com. That's D-O-P-P-E-L.com. Malicious Chrome extensions pose as AI tools. Google says nation states are increasingly abusing its Gemini artificial intelligence tool. Data Extortion Group World Leaks deploys a new malware tool called Rusty Rocket.
Starting point is 00:01:55 An Atlanta health care provider data breach affects over 625,000. Apple patches an iOS zero day that's been around since version 1.0. A government shutdown would furlough more than half of SISA's staff. Dutch police arrest the alleged seller of the Joker OTP fishing automation service. Our guest is Simon Horswell, senior fraud specialist at Entrust, discussing evolving romance scams ahead of Valentine's Day. And fun with filters provides food. fuel for fishers. It's Thursday, February 12, 26. I'm Dave Bittner, and this is your Cyberwire
Starting point is 00:02:44 Intel briefing. Thanks for joining us here today. It's great as always to have you with us. Researchers have identified 30 malicious Chrome extensions posing as AI tools that have been installed by more than 300,000 users, discovered by browser security firm Layer X and dubbed the AI frame campaign. The extensions share the same code structure and communicate with infrastructure under the domain tapnetic.pro. While the most popular extension, Gemini AI Sidebar, previously had 80,000 users and has been removed, several others remain on the Chrome Web Store with tens of thousands of installs. The extensions load AI features through remote eyeframes, allowing operators to change functionality without store review.
Starting point is 00:03:48 They harvest browsing data, and in at least 15 cases, target Gmail by extracting visible email content, including drafts, and transmit it to external servers. Some also enable remote voice capture using the Web Speech API. Users are advised to remove affected extensions and reset passwords if compromised. Google says, As nation-state hacking groups are increasingly using its Gemini AI tool to accelerate reconnaissance, malware development, and targeting.
Starting point is 00:04:23 In a new report, Google's Threat Intelligence Group, or G-TIG, detailed activity by groups linked to China, Iran, and North Korea. Chinese actors used Gemini to gather information on individuals in Pakistan and analyze vulnerabilities. Iran's APT-42 used it to craft fishing personas, translate lures and support malware developer. A North Korean group targeting the defense sector leveraged Gemini to synthesize open source intelligence and profile technical roles.
Starting point is 00:04:56 G-Tig also observed malware called Honest Q that uses the Gemini API to generate C-sharp code for follow-on payloads. Google says it disrupted some activity but acknowledges actors continue targeting similar victims. Large language models are helping threat groups scale reconnaissance and move from research to active targeting faster, according to G-TIG. Accenture Cybersecurity says the data extortion group World Leaks has deployed a previously unseen malware tool called Rusty Rocket to enhance its attacks. According to Accenture, Rusty Rocket is written in Rust and targets both Microsoft Windows and Linux systems. The tool enables stealthy data exfiltration and traffic proxying through heavily obfuscated,
Starting point is 00:05:49 multi-layered encrypted tunnels, blending malicious activity with legitimate network traffic. It also requires a pre-encrypted configuration at runtime, a guardrail, researchers say, makes it difficult to detect and monitor. World leaks, active since early 2025, steals sensitive data and threatens to publish it rather than encrypting files. The group is claimed victims, including Nike. Accenture says a rusty rocket supports persistence and long-term data theft. Increasingly stealthy tooling complicates traditional detection. Accenture recommends monitoring anomalous outbound traffic
Starting point is 00:06:28 and strengthening segmentation and testing defenses. Apollo MD, a healthcare physician and practice management provider based in Atlanta, disclosed that a May 22nd to May 23rd, 2025 cyber attack exposed sensitive data belonging to over 626,000 individuals. According to the company's notice and the U.S. Department of Health and Human Services breach portal, accessed files contained personally identifiable information and protected health information, including names, birth dates, diagnostic, and treatment details, insurance data, and in some cases, social security numbers.
Starting point is 00:07:10 By September of last year, Apollo MD had notified affiliated practices and begun mailing letters offering free credit monitoring. The company has not identified a responsible threat actor, although the Keelan Ransomware Group listed Apollo MD on its leak site in June of last year. Apple has patched a zero-day vulnerability that affects every iOS version since 1.0 and was used in what the company described as an extremely sophisticated attack against targeted individuals. Discovered by Google's threat analysis group, the flaw resides in DYLD, Apple's dynamic linker, and allows an attacker with memory-right capability to execute
Starting point is 00:07:55 arbitrary code. Apple said the issue may have been exploited as part of a chain on versions prior to iOS 26. Security researchers noted the vulnerability could be combined with WebKit flaws addressed in iOS 26.3 to enable zero-click or one-click device compromise.
Starting point is 00:08:16 Apple also fixed other issues, including bugs that could grant route access or expose sensitive data, but said the zero-day was the only vulnerability confirmed exploited in the wild. More than half of SISA's 2300,
Starting point is 00:08:32 41 employees would be furloughed if Congress fails to extend Department of Homeland Security funding by Friday, acting director Madhu Gadamukala told lawmakers. Sisa plans to designate 888 employees as accepted to maintain 24-7 operations, respond to imminent threats, and share urgent vulnerability information, but most proactive cybersecurity work would pause. Gada Mukala warned a funding lapse would delay deployment of cybersecurity services to federal agencies and weaken timely guidance to infrastructure operators. Strategic planning, new capability development, training, and work on mandated cyber incident reporting rules would halt. Lawmakers remain divided over a broader Department of Homeland Security policy disputes, raising the risk of a shutdown during what officials describe as a sensitive period for federal
Starting point is 00:09:29 cyber defense efforts. Staying with SISA, the agency published an advisory outlining key lessons from its response to a real-world compromise at a federal civilian executive branch agency. The incident stemmed from exploitation of a known geoserver vulnerability, giving threat actors, remote access, persistence, and lateral movement across systems. Sisa mapped observed tactics, techniques, and procedures using the Miter Attack Framework, and provided indicators of compromise to help defenders detect similar activity. The advisory emphasizes swift patching of critical vulnerabilities,
Starting point is 00:10:08 maintaining and exercising incident response plans, and centralized logging for effective detection. It also includes mitigation recommendations to improve an organization's preparedness and resilience against sophisticated post-compromise activity. SISA encourages all organizations to apply these lessons and use the associated technical details in the advisory to strengthen their security posture. Dutch police have arrested a 21-year-old man for allegedly selling the Joker OTP Fishing Automation Service,
Starting point is 00:10:44 a tool designed to intercept one-time passwords and hijack online accounts. The arrest follows a three-year investigation that dismantled the Joker OTP Fishing-as-A-Service operation in April of last year. year, including prior arrests of its developer and a co-developer. Authorities say the platform caused at least $10 million in losses across more than 28,000 attacks in 13 countries. Sold via telegram license keys, the tool automated calls to victims, posing as legitimate companies while prompting them to enter one-time passwords sent during login attempts. Targets included PayPal, Venmo, Coinbase, Amazon, and Apple users. Police have identified dozens of buyers and say the investigation remains ongoing.
Starting point is 00:11:35 Coming up after the break, Simon Horswell from Entrust discusses evolving romance scams ahead of Valentine's Day, and fun with filters provides fuel for fissures. Stick around. What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure, or the one that really keeps you up at night, how do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual works, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows,
Starting point is 00:12:44 using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep. Get started at Vanta.com slash cyber. That's V-A-N-T-A.com slash cyber. Simon Horswell is Senior Fraud Specialist at Intrust. I recently caught up with him over on the Hacking Humans podcast to discuss evolving romance scams for Valentine's Day. So today we are talking about romance scams, being that it is right around Valentine's Day. I would love to start off with some high-level stuff here. My understanding is that romance scams go way before we actually had an internet.
Starting point is 00:13:48 That this is, as long as people have been in love, there have been people trying to scam each other and use it as a way of doing that. Is that an accurate perception? Yeah, I think that's fair. As long as people have had the ability to take advantage of one another, then unfortunately they have. So what are we seeing here today when it comes to romance scams? What is the current, let's call it, state of the art? Yeah, so what we're seeing now are people. reaching out to, well, we see fraudsters reaching out to people via social media platforms.
Starting point is 00:14:24 So this could be using dating apps with a view to getting them off the dating apps and into private messaging service. Or it could be on Instagram or Facebook or one of those other social media platforms that are a lot broader. And that can make the trouble, that can make the problem a bit harder to spot. because those platforms aren't necessarily geared up to monitor certain patterns of behavior. Can you walk us through the playbook? I mean, how does something like this begin and what happens as they progress? So initially someone will reach out to you. They're not going to be an ugly person, right?
Starting point is 00:15:07 This is going to be someone who is probably like a 10, a 9, somewhere sort of unbelievable, where you're like, wow. Someone way out of my league. Right, not you personally, but us as a people, right? These are going to be people that are objectively good looking. They will reach out to you out of the blue and they'll say, hey, look, I just stopping by, I saw you like this, or I saw you were into this, or I just saw your profile and I thought I just wanted to say hello because you look friendly, right? Or you look beautiful.
Starting point is 00:15:44 But what will then progress from there is a really intense period of the relationship. So normal relationships progress at, you know, various different speeds. But one of the hallmarks of this particular trend, this scam, is that it will go straight up to 100 and it won't lay off the gas. It will be very intense. You will have the most attentive person ever. They will find everything you say amusing. you will have no disagreements as long as you're not talking about not giving money. Let's put it that way.
Starting point is 00:16:20 Everything's going to be the best thing they've ever heard or they're going to think that you are the only thing that they think of all day long. They will not miss a call. They will not miss a message. And they will, yeah, we see this technique called love bombing. For those of you who aren't familiar with it, love bombing is when you basically, you basically, just spam someone with affection. You're constantly telling them how important they are to you, how much you miss them, how you dream of being together, you're sending poems, you're sending stories, you're sending songs, just really intense, but over a very short period of time.
Starting point is 00:17:02 And this is all to progress and accelerate the relationship to the point where the victim is emotionally invested. And then it's very, very, very. difficult for them to pull away. How much time is there typically between this this period of time where they're building the relationship and then when the ask comes for something, for money, for something out of the ordinary? Well, it can vary. It really can vary. In some cases it can be sort of a couple of weeks, but in other cases we've known this to go on for a few years. But with the use of AI now, it's sort of relatively simple. We live these lives online and if you've never met someone in person,
Starting point is 00:17:50 it can be very easy to fall into this trap. Some victims have reported the fact that the tone changes when they're talking to this person over a period of years. That's generally not the case, right? If you're talking to a genuine person, they tend to be the same person. But this is, you know, considered to be fraudsters sharing these victims with other people or if you like if you think of it in terms of the business I've got someone who goes out and does the research and initiates the contact and then they pull them in then I give them to somebody else to keep them warm and then later on down the line when it's required I have my closer so that kind of pattern this is why it can feel like sometimes you're talking to a different person or the tone changes likely it is you
Starting point is 00:18:39 may have been sold on, your profile, as it were, may have been sold on to somebody else to go to the next stage. So it can be any period of time, but it does have some hallmarks to it that you can look out for that will let you know that you're trapped in this situation. What sorts of things should people be on the lookout for? Well, as I say, this intense period right at the beginning, this is someone who can never meet you in person because the person they presented to you doesn't exist so look out for the fact that you can't meet this person in real life now it could be that from the beginning the scenario they've given you
Starting point is 00:19:20 is that they work overseas that they can't be with you in person otherwise they would or they work all the time or they're constantly traveling some excuse that is baked into the scenario from the beginning, which means that seeing them in person is going to be very difficult and we should just put that to the back burner for the time being. Now, most of the time, you know, you can have a long-distance relationship and it can work. But you're on the assumption that you're eventually going to meet.
Starting point is 00:19:52 And if the person on the other end is never going to do that and has never got that intention, then you're working under false pretenses. Now my understanding here is that when someone gets drawn into something like this, it's very hard for them to admit that they've been taken. First of all, does that match your research? And I guess the second question is, if you suspect your loved one is involved with something like this,
Starting point is 00:20:21 what's the best way to try to break the spell? Yeah, it's very difficult. It's very difficult because these are, social manipulation. That's how these scams work. They manipulate the individual, the target. Quite often we're seeing people that are, well, they're being targeted
Starting point is 00:20:42 based on things that they put out on social media. So fraudsters now can find out an awful lot about you, build a profile, and then they kind of know what buttons are going to work through tried and tested means. So it can be very difficult once someone's caught in this or the phrase that I'm hearing quite a lot
Starting point is 00:21:02 or the phrase that we're using quite a lot is breaking the spell. You have banks that are trying to warn people about these payments saying like, you know, we have seen this before, this is going to be a scam. And again, the fraudsters have got that as part of their script.
Starting point is 00:21:21 So they'll be saying like, don't worry, the bank is going to tell you this, but I just need you to put this money in this location or I need you to buy this amount of crypto. By this time, because of the intensity of the relationship, the attentiveness that they're giving the victim, the fact that they are making it for the victim feel incredibly real and the dream relationship,
Starting point is 00:21:43 the victim is emotionally invested, and it's not a case of not being able to admit it. They're so emotionally invested that they can't get away from this. It is everything to them. They are in love. It is very real for them. So the fact that other people are coming along
Starting point is 00:22:04 and waving bits of evidence or trying to pull them away from it, the fraudsters know what they're doing when they're creating this scenario. It's very difficult for loved ones to pull them away. The fraudsters know what the regular objections are going to be
Starting point is 00:22:20 and almost counterattack them before they happen. So trying to isolate that person more and more from their support, network from their family, from their loved ones, from their friends, discrediting the warning signs that banks will put up. And a bank can't stop you spending your money. They're not allowed to do that. But it's in their interest to warn you several times. To hear the full-length version of my conversation with Simon Horswell from InTrust, be sure to check out the Hacking Humans podcast
Starting point is 00:22:51 wherever you get your favorite shows. And finally, chances are you're You've seen this Instagram trend, inviting users to ask ChatGPT to create a caricature of me and my job based on everything you know about me. The results are playful, detailed, and now widely shared using the platform's Add Yours feature. According to Josh Davies of Fortra, that harmless fun may be doing more than boosting engagement. With more than two million images posted, public profiles now neatly. link faces, job roles, and evidence of large language model use. A banker here, a developer there, an engineer in between. For a threat actor, it could be reconnaissance at scale. Davy's notes, the real risk is not the caricature itself, but what it implies. If users entered sensitive work
Starting point is 00:24:02 data into a public LLM, that information may sit in prompt history outside corporate controls. Combine that with doxing, credential reuse, and fishing, and account takeover becomes plausible. The trend, he argues, spotlights, shadow AI, data leakage, and the quiet security cost of oversharing. And that's The Cyberwire. For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights to keep you a step ahead and the rapidly changing world of cybersecurity.
Starting point is 00:24:57 If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Caruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Kaltzman. Our executive producer is Jennifer Iben. Peter Kilby is our publisher, and I'm Dave Bittner.
Starting point is 00:25:22 Thanks for listening. We'll see you back here tomorrow. If you only attend one cybersecurity conference this year, make it R-SAC 2026. It's happening March 23rd through the 26th in San Francisco, bringing together the global security community for four days of expert insights, hands-on learning, and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year.
Starting point is 00:26:10 Join thousands of practitioners and leaders tackling today's toughest chat. and shaping what comes next. Register today at rsacconference.com slash cyberwire 26. I'll see you in San Francisco.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.