CyberWire Daily - CISA furlough sparks fears.
Episode Date: October 2, 2025CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targe...ting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat’s private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. Selected Reading Shutdown guts U.S. cybersecurity agency at perilous time (CISA) Air Force admits SharePoint privacy issue; reports of breach (The Register) Google warns executives are being targeted for extortion with leaked Oracle data (IT Pro) Researchers uncover spyware targeting messaging app users in the UAE (The Record) Red Hat confirms security incident after hackers claim GitHub breach (Bleeping Computer) 766,000 Impacted by Data Breach at Dealership Software Provider Motility (Security Week) Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload (GB Hackers) GOP senator confirms pending White House quantum push, touts legislative alternatives (CyberScoop) Bitcoin Fixer Convicted for Role in Money Laundering Scheme (Bank Infosecurity) Nursing Home Fined $182K for Posting Patient Photos Online (Bank Infosecurity) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
At TALIS, they know cybersecurity can be tough and you can't protect everything,
but with TALIS, you can secure what matters most.
With TALIS's industry-leading platforms, you can protect critical applications,
data and identities, anywhere and at scale with the highest RR.
That's why the most trusted brands and largest banks, retailers, and health care companies in the world rely on TALIS to protect what matters most.
Applications, data, and identity.
That's TALIS.
T-H-A-L-E-S.
Learn more at talusgroup.com slash cyber.
Sissa furloughs most of its workforce due to the government shutdown.
The U.S. Air Force confirms its investigating a SharePoint-related breach.
Google warns of a large-scale extortion campaign targeting executives.
Researchers uncover Android spyware campaigns disguised as popular messaging apps.
An extortion group claims to have breached Red Hat's private GitHub repositories,
A software provider for recreational vehicle and power sports dealers suffers a ransomware breach.
Patchwork APT deploys a new power shell loader using scheduled tasks for persistence.
A Tennessee senator urges aggressive U.S. action to prepare for a post-quantum future.
Our guest is Cynthia Kaiser, SVP of Halcyon's Ransomware Research Center,
and former Deputy Assistant Director at the FBI's Cyber Division,
joining us with insights on the government shutdown.
And a Malaysian man pleads guilty to supporting a massive crypto fraud
and protected health information is not a marketing tool.
It's Thursday, October 2, 2025.
I'm Dave Bittner, and this is your Cyberwire Intel briefing.
Thanks for joining us here today.
It's great to have you with us.
The U.S. Cybersecurity and Infrastructure Security Agency,
responsible for safeguarding the electric grid, water, and other vital services,
has furloughed most of its workforce due to the government shutdown.
Only 35% of staff remain active, though more may be recalled.
for emergencies, according to the Department of Homeland Security.
The disruption coincides with the expiration of SISA 2015, the law shielding companies from
liability when sharing cyber threat information. Without reauthorization, some corporations are
pulling back from industry security groups, raising fears of weakened collective defense.
Experts warn this could hamper efforts against ransomware and Chinese state-linked hacking campaign,
The timing is especially awkward, arriving during Cybersecurity Awareness Month,
when collaboration and vigilance are traditionally emphasized.
Be sure to stay tuned for my conversation with Cynthia Kaiser, Senior Vice President of Halcyon's
Ransomware Research Center.
We're discussing her experience with previous government shutdowns.
The U.S. Air Force has confirmed its investigating a privacy-related issue after reporting
reports surfaced of a Microsoft SharePoint breach that may have exposed personally identifiable
and health information. An alleged breach notice shared online warned that all Air Force
SharePoint systems would be shut down service-wide, potentially disabling Teams' dashboards
for up to two weeks. The Air Force has not confirmed which services, if any, are offline
with some personnel reporting continued access.
Microsoft declined to comment on any link to earlier SharePoint vulnerabilities
that Chinese hackers, data thieves, and ransomware gangs exploited this summer,
compromising hundreds of organizations worldwide.
The timing has raised concerns about operational disruptions
and sensitive data exposure within the military.
Google has warned of a large-scale extortion campaign
targeting executives after attackers claimed to have stolen data from Oracle's e-business suite.
Since late September, victims have received emails demanding ransoms ranging from millions to as much as
$50 million. The campaign appears linked to Finn 11, a group affiliated with the Klopp ransomware gang,
though Google says it cannot yet verify the breach claims. Mandeant confirmed the extortion emails
are being sent from hundreds of compromised accounts,
with contact details tied to Klop's leak site.
Security firm Halcyon suggested attackers
may be exploiting password resets in Oracle systems.
With Oracle silent so far,
Google advises companies receiving these emails
to investigate for signs of compromise.
Researchers at ESET
uncovered two Android spyware campaigns,
pro-spy and two-spy,
disguised as popular messaging apps signal and to-talk to target users in the UAE.
Spread through fake websites and app stores, the spyware steals contacts, chat backups, media,
and other sensitive data while reinstalling legitimate apps to avoid detection.
Two-spy appears active since 2022, while Pro-Spy emerged in 2024.
Both require manual installation via third-party sites, including
one impersonating Samsung's App Store and are designed for persistent regionally-focused operations.
An extortion group calling itself Crimson Collective claims to have stolen 570 gigabytes of data
from Red Hat's private GitHub repositories, including 28,000 internal projects and around 800
customer engagement reports. These reports often contain detailed client infrastructure
information, configuration data, and authentication tokens that could be exploited to breach networks.
Red Hat confirmed a security incident affecting its consulting business but did not validate
claims about the stolen repositories or CERs, stressing that its software supply chain remains
intact. The attackers, who say the breach occurred two weeks ago, published repository listings
and CERR directories, naming major corporations and U.S. government entities.
Crimson Collective alleges Red Hat ignored their extortion demands,
responding only with automated support instructions.
Motility Software Solutions, which provides dealership software for recreational vehicle
and power sport dealers, is notifying just over three-quarters of a million people of a
Ransomware breach. Hackers accessed business servers on August 19th, encrypted files, and
stole personal data, including names, contact details, dates of birth, social security numbers,
and driver's license numbers. Motility says there's no evidence of misuse. They've restored
systems from backups, and they're offering 12 months of identity protection. The Paira ransomware
gang later claimed 4.3 terabytes of stolen data, likely from Motility.
Patchwork, also known as dropping elephant, monsoon, and hangover group, an advanced persistent
threat actor since at least 2015, is deploying a new multi-stage power shell loader that abuses
Windows scheduled tasks to persist and run its final payload. Infection begins with a malicious
office macro that drops a shortcut and runs a power shell script. The script installs a faux
VLC, EXC, places a decoy PDF and creates a scheduled task named Windows Error Report to launch the
loader. The loader establishes an encrypted command and control channel, fingerprints
hosts, and uses layered obfuscation for communications. Capabilities include in-memory
payload execution, chunked resumable exfiltration, and screenshot capture. In terms of defenses,
Experts say enable macros only from trusted sources,
monitor for suspicious scheduled tasks,
enforce application whitelisting,
and run up-to-date endpoint protections.
Senator Marcia Blackburn, Republican from Tennessee,
is urging aggressive U.S. action
to prepare for a post-quantum future,
where current encryption may be broken.
Speaking at a Politico event,
she confirmed elements of a White House quantum initiative
while promoting her own legislative push.
Blackburn co-sponsored the National Quantum Cybersecurity Migration Strategy Act,
requiring agencies to move at least one high-risk system
to quantum-resistant encryption by 2027.
She emphasized the need to counter Chinese ambitions in emerging technologies
while praising White House officials' leading federal quantum strategy.
Blackburn highlighted workforce development,
commercial involvement, and stronger encryption as priorities.
She's also backing bills to accelerate Defense Department quantum planning,
create a quantum sandbox at NIST,
and to establish a federal institute for quantum manufacturing.
A Malaysian man pleaded guilty in a London court
to supporting a massive crypto fraud tied to Chinese national Jiming Kwan,
also known as Yadi Zhang.
Prosecutors say,
Sen Ling, age 46, acted as a fixer for Kwan, who ran a Ponzi-style scheme in China that stole
$6.2 billion from 128,000 victims. Ling admitted to transferring criminal property and cryptocurrency
and helping evade capture by arranging accommodations across the U.K. Police surveillance led to
their arrests in York in April 2024, seizing $15 million in assets.
Authorities are now pursuing confiscation of 61,000 bitcoins valued at $7.1 billion.
Both face sentencing in November.
The case could set a precedent for compensating overseas victims in cross-border crypto fraud.
Coming up after the break, my conversation with Cynthia.
Kaiser from Halcyon's ransomware research center, we're discussing the government shutdown.
And protected health information is not a marketing tool. Stay with us.
Compliance regulations, third-party risk, and customer
security demands are all growing and changing fast.
Is your manual GRC program actually slowing you down?
If you're thinking there has to be something more efficient than spreadsheets,
screenshots, and all those manual processes, you're right.
GRC can be so much easier.
And it can strengthen your security posture while actually driving revenue for your business.
You know, one of the things I really like about Vanta is how it takes the heavy lifting out of your
GRC program. Their trust management platform automates those key areas, compliance, internal,
and third-party risk, and even customer trust, so you're not buried under spreadsheets and
endless manual tasks. Vanta really streamlines the way you gather and manage information across
your entire business. And this isn't just theoretical. A recent IDC analysis found that
compliance teams using Vanta are 129% more productive.
It's a pretty impressive number.
So what does it mean for you?
It means you get back more time and energy to focus on what actually matters,
like strengthening your security posture and scaling your business.
Vanta, GRC, just imagine how much easier trust can be.
Visit Vanta.com slash cyber to sign up today for a free demo.
That's V-A-N-T-A.com slash cyber.
AI adoption is exploding, and security teams are under pressure to keep up.
That's why the industry is coming together at the Datasec AI conference, the premier event for cybersecurity data and AI leaders, hosted by data security leader,
Saira. Built for the industry, by the industry, this two-day conference is where real-world insights and bold solutions take center stage.
Datasek AI 25 is happening November 12th and 13th in Dallas. There's no cost to attend. Just bring your perspective and join the conversation.
Register now at Datasek AI 2025.com backslash cyberwire.
Cynthia Kaiser is senior vice president of Halcyon's Ransomware Research Center
and former deputy assistant director at the FBI's Cyber Division.
We caught up for insights on the government shut down.
Cynthia, thanks for taking the time for us today.
I'd love to start with your own personal insights,
your time in the government with the FBI.
You've experienced some of these government.
shutdowns, what's it like? Well, at the FBI, almost all the work that we do is accepted. And what
that means is it's essential for the American people. So people still come into work. And they
continue to do the work they need to do to keep the American people safe. But that being said,
there's obviously a lot of stress around not knowing when your next paycheck's going to come.
it will come, but not kind of knowing that, like having that kind of personal stress on you.
I mean, it's trying and it was good to be able to go through that with everybody else at the
same time, right, have that support network.
But you also find that you don't necessarily have all of your counterparts across government
that can help you.
So sometimes it almost becomes more busy.
Yeah.
Yeah. We are dealing with the, I guess, end of legislation that allowed information sharing, CISA 2015.
What do you suppose the impact of that's going to be?
Well, from what I'm hearing, it sounds like some of those efforts to get that legislation reauthorized,
you know, whether it's in the CISA 2015 name or in a different name, those continue.
pace. And I think the ideal outcome would be if when the budget's passed, there's a way in which
to include CISA 2015 reauthorization within that. And I'm hearing there's some like good movement
towards there. But right now what we find ourselves in is after a decade of having protections,
liability protections, antitrust protections, those don't exist anymore. And companies are going to have to
make choices about what their risk tolerance is. At Helcyon, because we have faith that there are
some of these ongoing efforts, that it will likely be reauthorized at some point, hopefully in
the near future. We're not going to change our sharing posture, our sharing posture with
government, our sharing posture across industry. But not every company has that luxury, and especially
especially if you're a company and you're dealing with very intimate PII type information,
you just can't share the way you would have if you don't have legal protections in place
that allow you to give the information about compromises, attacks, campaigns to the government.
And take that to its natural conclusion.
If the government doesn't have that information, they can't warn others.
Yeah.
Well, let's switch gears to the other SISA, cybersecurity infrastructure and security administration.
They are saying that they're furlowing up to two-thirds of their folks there.
What could the impact of that be?
Since I don't have knowledge of who, you know, may.
be furloughed and for what amount of time. It's hard to get into the details of impacts. But,
you know, I would say that SISA was probably my closest partner when I was in government. Every day,
multiple times a day, I was talking to my Sisa counterparts. We were going back and forth on who
was going to be able to do threat hunting, learning information from victims, especially when
there's multi-victum campaigns. And it kind of goes back.
to my point from earlier, FBI's coming in every day.
You know, they're all there, a little stressed about the financial situation,
but doing that same work.
But if the same people at SISA aren't there,
that makes that job all the more difficult because you can't just have one agency
doing their activities and be the same level of effectiveness.
If the other agencies that have complementary activities, that's not occurring.
In your estimation, what is the material impact of a government shutdown like this on the cybersecurity of our nation?
In every shutdown that I was part of, whether partial or full, it felt like we weren't able to have kind of the full spectrum picture of cyber activity that was going on.
We would have partial pictures.
We would be able to still counter the threats, but it took longer.
And when the shutdown was done, you felt like you were playing catch up.
And so really, I think there's just a, there's always going to be a natural slowing, not stop,
but slowing of some of the important work that we all rely on to keep ourselves safe.
what are your recommendations for the folks who are in the midst of this any words of wisdom based on your own experience
especially to the employees who may be going through their first shutdown that's the most stressful
my advice is that most of america is really really accommodating and great to these employees
and so i could remember talking to a credit card company when there's i think
that, like, one that was almost a month long, and them saying, oh, you work for the government,
like, that's fine. You'll just pay us when you get paid. So, like, don't be afraid to kind of call,
ask for help would be my advice to them financially, because you want to free yourself up emotionally
to be able to do the important work that still has to get done. And so ultimately, do what you
need to do, ask for the help that you need, because we all rely on you. And,
We want you to be able to counter these criminals that don't care for shutdown or not.
That's Cynthia Kaiser, senior vice president of Calcian's Ransomware Research Center.
Think your certificate security is covered.
By March 26, TLS certificate lifespans will be cut in half, meaning double today's renewals.
And in 2029, certificates will expire every 47 days, demanding between 8 and 12 times the renewal volume.
That's exponential complexity, operational workload, and risk, unless you modernize your strategy.
CyberArk, proven in identity security, is your partner in certificate security.
CyberArc simplifies life cycle management with visibility, automation, and control at scale.
Master the 47-day shift with CyberArk. Scan for vulnerabilities, streamline operations, scale security.
Visit cyberark.com slash 47-day. That's cyberarc.com slash the numbers 47-D-A-Y.
And now, a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks.
Allow listing is a deny-by-default software that makes application control simple and fast.
Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, network resources, and other applications they truly need to function.
Shut out cybercriminals with work.
world-class endpoint protection from Threat Locker.
And finally, Kadia Healthcare thought it had found a clever marketing angle,
a success stories campaign showcasing patients' recoveries on social media.
Unfortunately, regulators saw it less as inspiration and more as a HIPAA-violet.
The Office for Civil Rights says the Delaware nursing home chain posted names, photos, and
medical details of about 150 patients without the legally required consent forms.
One complaint in 2021 unraveled the entire program, leading to a $182,000 fine and a two-year
corrective action plan.
Kadia has since pulled the campaign and now faces the less glamorous task of
rewriting policies, training staff, and sending belated breach notices.
As OCR dryly noted, marketing is important, but valid written authorization tends to be even more so
when dealing with protected health information.
And that's the CyberWire.
For links to all of today's stories,
check out our daily briefing at theCiberwire.com.
We'd love to know what you think of this podcast.
Your feedback ensures we deliver the insights
that keep you a step ahead
in the rapidly changing world of cybersecurity.
If you like our show,
please share a rating and review
in your favorite podcast app.
Please also fill out the survey in the show notes
or send an email to Cyberwire at N2K.com.
N2K's senior producer is Alice Carruth.
Our Cyberwire producer is Liz Stokes.
We're mixed by Trey Hester with original music by Elliot Peltzman.
Our executive producer is Jennifer Ivan.
Peter Kilpe is our publisher, and I'm Dave Bittner.
Thanks for listening.
We'll see you back here tomorrow.
Cyber Innovation Day is the premier event for cyber startups, researchers, and top VC firms building trust into tomorrow's digital world.
Kick off the day with unfiltered insights and panels on securing tomorrow's technology. In the afternoon, the afternoon, the eighth annual day.
Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration, and funding.
The Innovation Expo runs all day, connecting founders, investors, and researchers around breakthroughs in cybersecurity.
It all happens November 4th in Washington, D.C. Discover the startups building the future of cyber.
Learn more at c.id.d. datatribe.com.
Thank you.
