CyberWire Daily - Cyber defenders pulled into deportation duty.
Episode Date: October 9, 2025DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Cha...os ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment in pro-Russian hacking operations. Ukraine’s parliament approves the establishment of Cyber Forces. Troy Hunt criticizes data breach injunctions as empty gestures. Our guest is Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their report, "Mythical Beasts: Diving into the depths of the global spyware market." And, Spy Dog’s secret site goes off leash. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market." Selected Reading Homeland Security Cyber Personnel Reassigned to Jobs in Trump’s Deportation Push (Bloomberg) Massive DDoS Attack Knocks Out Steam, Riot, and Other Services (Windows Report) Hackers claim Discord breach exposed data of 5.5 million users (Bleeping Computer) The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerous (FortiGuard Labs) The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors (Huntress) Court Pauses FCC Data Breach Rules as Agency Takes New Look | Regulation (Cablefax) Arrests Underscore Fears of Teen Cyberespionage Recruitment (Data Breach Today) Ukraine's parliament backs creation of cyber forces in first reading (The Kyiv Independent) Troy Hunt: Court Injunctions are the Thoughts and Prayers of Data Breach Response (Troy Hunt) Spy Dog: Children's books pulled over explicit weblink (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
And now a word from our sponsor.
The Johns Hopkins University Information Security Institute is seeking qualified applicants
for its innovative Master of Science in Security Informatics degree program.
Study alongside world-class interdisciplinary experts
and gain unparalleled educational research and professional experience in information security and assurance.
Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program,
which covers tuition, textbooks, and a laptop, as well as providing a $34,000 additional annual stipend.
Apply for the fall 2026th semester and for this scholarship by February 28th.
Learn more at CS.com.
JhU.edu slash MSSI.
Discord refuses ransom after a third-party support system breach.
Researchers examine chaos, ransomware, and creative log-poisoning web intrusions.
The FCC reconsider its telecom data breach disclosure rule.
Experts warn of teen recruitment in pro-Russian hacking operations.
Ukraine's parliament approves the establishment of cyber forces.
Troy Hunt criticizes data breach injunctions as empty gestures.
Our guest today is Sarah Graham from the Atlantic
Council's Cyber Statecraft Initiative discussing their report,
Mythical Beasts, diving into the depths of the global spyware market.
And SpyDog's secret site goes off leash.
Today is Thursday, October 9, 2025.
I'm Maria Varmazis, and this is your
Cyberwire Intel Briefing.
Hi, everyone.
Thank you for joining me today.
I'm standing in for Dave Bittner.
He'll be back tomorrow.
Let's get into it.
The Department of Homeland Security has reassigned hundreds of national security employees,
including cybersecurity specialists from the Cybersecurity and Infrastructure Security Agency,
better known as SISA, to support President Trump's deportation initiatives.
Current and former employees say that the reassignments, which are described as mandatory,
come with threats of dismissal for refusal and often involve sudden relocations.
Many of those moved had focused on protecting federal systems from nation-state cyber attacks.
Their transfers to agencies such as Immigration and Customs Enforcement and Customs and Border Protection
have disrupted SISA's core mission, particularly within its capacity building and international
engagement divisions. Staff morale has reportedly plummeted amid a climate of fear and censorship.
Critics warn that the shift leaves the United States more vulnerable to cyber threats as major
hacks continue to target government networks. DHS officials defend the moves as routine
personnel alignment to meet agency priorities.
Earlier this week, a massive DDoS attack disrupted several major gaming platforms,
including Steam, Xbox, PlayStation, Riot Games, and Epic Games.
The coordinated assault, reportedly powered by the Air Suru Botnet,
reached record levels of 29.69 terabits per second,
overwhelming servers, and causing widespread outages across the industry.
Riot Games confirmed that while its internal systems remain secure,
the flood of network traffic severely affected gameplay for League of Legends and Valorant users.
Services have since been restored,
but experts warned that the scale and simultaneity of this event
reveal growing vulnerabilities in global gaming infrastructure.
Discord says it will not pay a ransom to threat actors
that are claiming to have stolen data on 5.5 million users
through its Zendesk support system,
according to a report from bleeping a computer.
Discord disputes the hackers figures, stating that only about 70,000 users had government ID photos exposed
and emphasized that Discord itself was not breached.
The attackers, on the other hand, alleged that they accessed a compromised support agent account
with an outsourced provider, stealing 1.6 terabytes of data, including user IDs, emails, and partial payment details.
For its part, Discord dismissed those claims as part of an extortion attempt
and reaffirmed that no internal systems were compromised.
The hackers reportedly demanded up to $5 million and threatened to leak the data after failed negotiations.
Bleeping computer could not verify the authenticity of the stolen data samples.
Researchers at Fortinette examined Chaos Ransomware, which resurfaced in 2025 with a new C++ variant,
its first version not written in dot net, marking a major evolution in the malware's capabilities,
dubbed chaos C++, the strain combines encryption with destructive behavior,
deleting large files entirely instead of encrypting them and then hijacking clipboard data
to steal cryptocurrency payments.
The malware disguises itself as a fake utility, silently execute its payload, and employs
multiple encryption methods, including AES, RSA, and XOR.
Its clipboard hijacking feature replaces Bitcoin wallet addresses with attacker-controlled ones,
redirecting potential payments.
This chaos variant reflects a broader shift from traditional ransomware to hybrid extortion and
destruction, signaling chaos developers' growing focus on financial theft and operational impact
over simple data encryption.
And in other new research findings elsewhere, an investigation by Huntress details a hands-on
compromise that began in August 2025 with log poisoning, also called log injection,
on a public Ph.P. My Admin panel.
The actor planted a one-liner PHP web shell, reminiscent of China Chopper,
controlled it with Ant Sword, and then installed Neza,
which is a monitoring tool used peer-to-run commands.
The sequence ended with Ghost Remote Access Trojan or Ghost RAT.
Huntress reports likely more than 100 victims,
most frequently in Taiwan, Japan, South Korea, and Hong Kong.
The access path involved weak defaults and exposed aspects.
admin interfaces, highlighting real-world risk from test stacks and outdated packages.
Huntress suggests that defenders harden public apps, enforce authentication, monitor for
web shells, and detect suspicious service creation and execution paths.
The Federal Communications Commission, better known as the FCC, will revisit its 2024
data breach disclosure rule that requires telecom providers to notify customers within 30 days.
A Sixth Circuit panel had upheld this rule, rejecting claims from the industry groups that it exceeded FCC authority and violated the Congressional Review Act.
After those groups sought a rehearing, the FCC asked to suspend the case while it re-examines the order.
A court then granted advance, requiring progress reports every 60 days.
The arrest of two 17-year-olds in the Netherlands has raised alarms about nation-state hackers recruiting teenagers,
for espionage. The teens were detained for collecting Wi-Fi data near Europol and other sensitive
sites and were reportedly approached on telegram by pro-Russian operatives. Dutch intelligence
tipped police to the activity, which officials link to Russia's hybrid tactics. Security analysts
say that this case underscores a growing pattern, and that is that threat actors are grooming
teens on telegram, discord, and gaming platforms to perform low-skill digital tech.
tasks, from network scanning to credential theft.
Experts warn that young recruits who are often unaware of the consequences here
are being manipulated into aiding cyber operations.
Dutch Prime Minister Dick Schofe called the trend extremely worrying,
urging vigilance from parents and educators.
Ukraine's parliament has approved in the first reading
a bill to establish cyber forces within its military,
reflecting the growing role of cyber warfare in its conflict,
with Russia. Backed by 255 lawmakers, then you command will defend Ukraine's digital infrastructure
and report directly to the commander-in-chief and president. The cyber forces will recruit
reservists, conduct training, and operate under the general staff's Cyber Directorate,
aligning operations with NATO standards. Final approval awaits a second reading and presidential
signature. Security researcher Troy Hunt argues that court injunctions following major data breaches,
like those granted to H.W.L. Ebsworth and Qantas are the legal equivalent of offering thoughts and prayers.
In his analysis, Hunt notes that such orders don't detect hackers or prevent leaks.
After H.W.L. Ebsworth's injunction against Russia's Alpha V group, the attackers ignored it and dumped the data anyway.
Hunt says that these injunctions mainly restrict journalists, researchers, and services like, have I been poned, rather than the criminals themselves.
While companies use them to appear proactive and protect shareholder interests,
they offer little real defense for victims or transparency about compromised information.
Stick around after the break where Dave Bittner sits down with Sarah Graham,
discussing their work and findings on mythical beasts,
diving into the depths of the global spyware market.
And Spy Dog's secret site goes off leash.
At Talas, they know cybersecurity can be tough and you can't protect everything.
But with Talas, you can secure what matters most.
With Talas's industry-leading platforms, you can protect critical.
applications, data and identities, anywhere and at scale with the highest ROI.
That's why the most trusted brands and largest banks, retailers, and healthcare companies in the
world rely on TALIS to protect what matters most.
Applications, data, and identity.
That's TALIS.
T-H-A-L-E-S.
Learn more at TALIS Group.com slash cyber.
What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual works so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trustments. They're trust.
management platform continuously monitors your systems, centralizes your data, and simplifies your
security at scale. And it fits right into your workflows, using AI to streamline evidence
collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything
you need to move faster, scale confidently, and finally get back to sleep. Get started at Vanta.com
slash cyber. That's V-A-N-T-A-com slash cyber.
Sarah Graham is from the Atlantic Council's CyberState Craft Initiative, or CSI,
and she is discussing their work and findings on mythical beasts diving to the depths of the
global spyware market with Dave Bittner. Here's their conversation.
So spyware can be defined in a few different ways, but in our report and this second published report we have here, we take a relatively narrow scope to how we're defining spyware as a type of malicious software that enables the unauthorized remote access of a target device for the purposes of intrusion and surveillance.
And so oftentimes folks will ask us, why isn't the scope broader or did you include something like stockerware or ad tech?
we really keep a relatively narrow definition here focused on that unauthorized remote access
specifically for the purposes of surveillance.
Well, can you paint a picture of this market for us here?
I mean, who are the key players and how do they tend to operate?
Sure.
So in terms of the marketplace, in recent years, there's been a lot of great reporting by
different organizations, including Citizen Lab and Amnesty Tech, about the,
harms coming out of the spyware industry. But in contrast, there's been a relative lack of transparency
about what's happening within the marketplace. We oftentimes see headlines about big players
such as the NSO group, but there's a lot of other players, small, medium size, and more than just
vendors. So our report is really trying to turn to look at the marketplace as a whole
and understand the supply chain of different vendors,
holding companies, investors, and the like across the marketplace at a global scale.
Well, who are some of the key players here?
Yeah. So in our report, we really take a look at the global scale of the spyware market,
but hone in on a few particular areas of interest.
On first turn, one of our major trends that we identified in the original report,
and see holding consistent with data from this past year
are that the majority of identified entities
are domiciled in Israel, India, and Italy.
But something I really want to point out
and we see as a trend emerging
in this updated data set
is that there has been a significant increase
within our sample of U.S.-based investors
that continue to disproportionately fund capabilities
and really we want to highlight this
because it really undermines the important U.S.
government action that we've seen in the past 18 months to two years on spyware in contrast with
the investors from the U.S. who continue to invest in these types of technologies.
Yeah, can we dig into that a little bit? What insights can you provide as to what's driving
that market investment from the U.S.? So to start with a bit of data, we see with the data from
this past year, a total of 31 total U.S. investors that we were able to identify. And this,
we find is particularly remarkable given that some of the entities that U.S. investors are
investing in are actually listed on the U.S. entity list. So, for example, Kandiru listed on the
entity list, has investment from U.S. firms, including integrity partners, as well as a few other venture
capital firms and pension funds coming out of different states.
So we're seeing that there's investment from a wide range of investors into a wide range
of different spyware vendors, not only including Kandiru, but Cognit and a few others as well.
And to your question of what's really driving this, our data doesn't necessarily answer that
question, but something that my fantastic co-author, Jen Roberts, continues to point
Now, as we've dug into this data, is there has to be a reason.
Investors invest when they see the potential for profit, despite U.S. policy action, such
as the entity list, there obviously must be some expectation that there is a future profit
to be had here.
Yeah.
Well, help us understand how these commercial spyware vendors differ from traditional state
intelligence operations.
One thing that we get asked about quite a bit is how.
How do these spywheres differ and how are they useful to governments for national security?
And there's a strong sense that there's some political will to put controls on these technologies,
despite the fact that they are used for permissioned uses in state national security operations.
But there is interest to preserve that limited use.
And the ability to do so really hinges on these sorts of transatlanticism.
transparency efforts with data sets like the ones that we've created here to ensure and
maintain the integrity of those capabilities for those narrowly defined and permissioned use
cases.
Well, one of the things you uncover in the report here digs into the government's role, both
as buyers and regulators of this.
Sure.
So the government, the state plays a different role in different jurisdictions.
jurisdictions here. And so I can give you a few examples. As I mentioned at the start, what we do
observe and see consistent is that three jurisdictions, in particular, India, Italy, and Israel
have a lot of activity within their boundaries. And what is something that we see is consistent
amongst these three is that it's a relatively permissive environment with some sort of state
involvement. This varies. We see in the Indian cluster that this is most common in
the sort of hack for hire market in Italy, there's a much older history of spyware with
quite a bit of overlap with state entities, whether that's as buyers, but also as regulators,
which as you can imagine can oftentimes create some either implicit or explicit conflicts of
interest and can really make transparency efforts and ultimately any meaningful regulation
and quite challenging.
Why is it so difficult to hold these spyware companies accountable?
I mean, is it as simple as the fact that they're offshore from our own local regulators?
It's a million-dollar question.
I think a lot of people would like to know the answer to this.
One, I can point out to a few things.
One trend that we see in all of our reporting has been this feature of shifting vendor identities.
So that might be really subtle name changes or total rebrands of different entities that make it really difficult to track consistency in their activity.
These entities have a lot of smart folks involved.
And so strategic jurisdictional hopping is something that they certainly partake in.
And we see this in a few different examples.
For example, we know from a court case that Quadream established a presence in Cyprus to avoid
European export controls. And so, as you can imagine, this sort of limited ability to
consistently track is a huge barrier. And that actually highlights one of our second key trends in
this report around the role of resellers and brokers, which I'd be happy to talk about it
more, too. Well, yeah, let's dig into it. What can you share about that? Yeah, what we find
with our updated data sample is a large number of what we're calling resellers and brokers.
These are sort of partners within the marketplace that can be unrelated to the development of
spyware, but they contribute some sort of technical or business need for the vendor.
So this could be something like marketing services, the provision of telecommunications,
intercept devices, or creating access to some sort of regional market that, in a
original vendor might not have otherwise been able to easily enter and, you know, sell to
interested buyers. And so through access to public data sources, we've been able to identify a larger
share of these entities and have come to identify more and more that in this expanded and opaque
marketplace, these types of intermediary entities are playing a pretty crucial role to limiting
transparency.
Yeah, can we talk about that?
I mean, one of the things that it strikes me is that these spyware companies give a lot
of nation states plausible deniability, right?
I mean, to what degree is that an element here?
Certainly.
There's plausible deniability sort of up and down the supply chain.
You could imagine all the way through at the end use of surveillance, plausible
deniability in terms of how particular information is gained. But there's also plausible
deniability upwards on the supply chain. And I think these brokers and resellers play a really
crucial role to that, whether it's mere overlap only of business officers, or whether that's
some sort of larger overlap between, for example, the original vendor and setting up some
sort of satellite office in another state to gain access to that market. Some examples that we
really dug into in the report are around the Mexican spyware ecosystem and with some recent
transparency reporting. We've been able to see how there were layers and layers of plausible
deniability through the creation of contracts that only very subtly indicate perhaps that these
technologies were being sold to different state agencies.
Where do we stand with policymakers here in the U.S.?
Is there any broad agreement on the place that spyware is intended to play?
With the new administration, it's actually still relatively early within the tenure of four years,
and we haven't seen any public indications of change to the current status quo of the U.S. policy perspective on these.
issues. But I think something to point out is that the absence of any change suggests at least
that at minimum, the current trajectory, which has in the past included this effort through
listing vendors on the entity list, issuing sanctions and visa restrictions. Just given that
these things have not necessarily been pulled back is some sort of signal that this might
continue, this sort of policy action might continue.
So to what degree should regular people be concerned about this, you know, for our listeners,
is this, you know, high-level espionage kind of thing, or does it affect people in their day-to-day lives?
In terms of targeting with spyware, our report doesn't go into this in great detail.
And I would really encourage listeners to go and check out some of the, some organizations that really give a lot of context and
color to these sorts of targeted surveillance intrusions coming from organizations like I mentioned
of Citizen Lab or Amnesty Tech. But that doesn't deny the fact that we all can take some personal
steps in our personal digital footprint and securing that. What I think does matter, though,
for most Americans is what I talked about with U.S. investments. When we dig into this a bit more
in detail, we actually found that a few different pension funds, for example, are invested
in spyware companies. If I'm recalling correctly, I believe a pension fund out of New Jersey
and Washington State are included in this. And while that might not be something that an everyday
person is aware of, being able to have some context over where your finances are being invested
into is certainly a first step in understanding what's going on and how entangled these
sorts of ecosystems actually are.
That was Dave Bittner, sitting down with Sarah Graham, on the Atlantic Council's
CyberStatecraft Initiative, discussing their work and findings on mythical beasts, diving into
the depths of the global spyware market.
With MX Platinum, access to exclusive MX pre-sale tickets,
score you a spot track side.
So being a fan for life
turns into the trip of a lifetime.
That's the powerful backing of Amex.
Pre-sale tickets for future events
subject to availability and varied by race.
Turns and conditions apply.
Learn more at amex.ca.
slash Yannex.
At Desjardin, we speak business.
We speak startup funding and comprehensive game plans.
We've mastered made-to-measure growth
and expansion advice,
and we can talk your ear-off
about transferring your business
when the time comes.
Because at Desjardin business,
We speak the same language you do.
Business.
So join the more than 400,000 Canadian entrepreneurs who already count on us.
And contact Desjardin today.
We'd love to talk.
Business.
In Derbyshire, the spy dog, spy pups, and spy cat books,
which are all wholesome tales of gadget-wielding pets, solving crimes.
Well, they've been abruptly recalled after a web address printed in the back of the books
started leading somewhere far less child-friendly.
And the site for these books, which was once home to bonus content, was taken over by
a third party who replaced puppies and paw prints with explicit material.
Yikes.
Yeah, publisher Puffin and author Andrew Cope expressed horror, urging everyone not to visit the link
and vowing swift action through, quote, appropriate channels.
Schools, meanwhile, are treating the incident like a national security emergency,
emailing parents, removing books, and issuing return immediately orders.
For now, it seems, Spy Dog's latest mission is an undercover operation in digital damage control.
And that's The CyberWire.
For links to all of today's stories, check out our daily briefing at thecyberwire.com.
Hey, CyberWire listeners, as we near the end of the year, and yeah, can you believe we're almost there already,
it is the perfect time to reflect on your company's achievements and set new goals to boost your brand across the industry next year.
And we'd love to help you achieve those goals.
We've got some unique end-of-year opportunities,
complete with special incentives to launch 2026.
So tell your marketing team to reach on out to us.
Send us a message to sales at thecyberwire.com
or visit our website so we can connect
about building a program to meet your goals.
We'd love to know what you think of our podcast.
Your feedback ensures we deliver the insights
that keep you a step ahead in the rapidly changing world
of Cybersecurity. If you like our show, please share a rating and review in your podcast app.
Please also fill out the survey in the show notes or send an email to Cyberwire at
N2K.com. N2K senior producer is Alice Caruth. Our producer is Liz Stokes. We're mixed by
Elliot Peltzman and Trey Hester with original music by Elliot Peltzman. Our executive producer is
Jennifer Ivan. Peter Kilpie is our publisher. And I'm your host, Maria Vermazas, in for Dave Bittner.
Thanks for listening. We'll see you tomorrow.
Cyber Innovation Day is the premier event for cyber startups, researchers, and top VC firms
building trust into tomorrow's digital world.
Kick off the day with unfiltered insights and panels on securing tomorrow's technology.
In the afternoon, the eighth annual Data Tribe Challenge takes center stage as elite startups
pitch for exposure, acceleration, and funding.
The Innovation Expo runs all day, connecting founders.
investors, investors, and researchers around breakthroughs in cyber security.
It all happens November 4th in Washington, D.C.
Discover the startups building the future of cyber.
Learn more at cid.d. datatribe.com.
