CyberWire Daily - Escape from GPU island.
Episode Date: September 30, 2024A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware. The Pentagon shoots down the noti...on of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 127,000 individuals. The DOJ charges a British national with hacking U.S. companies. California’s Governor vetoes an AI safety bill. CISOs deserve a seat at the table. Tim Starks from CyberScoop describes the House Homeland Security chair’s proposed cyber workforce bill. Password laziness leaves routers vulnerable. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks from CyberScoop talking about the House Homeland Security chair releasing and pushing forth a cyber workforce bill. Read more in Tim’s article. Selected Reading Critical flaw in NVIDIA Container Toolkit allows full host takeover (Bleeping Computer) Here's what to expect from the Counter Ransomware Initiative meeting this week (The Record) Pentagon asks lawmakers to kill third-party look at an independent cyber force (Breaking Defense) Facial DNA provider leaks biometric data via WordPress folder (Hackread) Accounting Firm WMDDH Discloses Data Breach Impacting 127,000 (SecurityWeek) British National Arrested, Charged for Hacking US Companies (SecurityWeek) California Gov. Newsom Vetoes Hotly Debated AI Safety Bill (BankInfo Security) PwC Urges Boards to Give CISOs a Seat at the Table (Infosecurity Magazine) New Critical Password Warning—86% Of All Router Users Need To Act Now (Forbes) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyber Wire Network, powered by N2K.
Air Transat presents two friends traveling in Europe for the first time and feeling some pretty big emotions.
This coffee is so good. How do they make it so rich and tasty?
Those paintings we saw today weren't prints. They were the actual paintings.
I have never seen tomatoes like this.
How are they so red?
With flight deals starting at just $589,
it's time for you to see what Europe has to offer.
Don't worry.
You can handle it.
Visit airtransat.com for details.
Conditions apply.
AirTransat.
Travel moves us.
Hey, everybody.
Dave here.
Have you ever wondered where your personal information is lurking online?
Like many of you, I was concerned about my data being sold by data brokers.
So I decided to try Delete.me.
I have to say, Delete.me is a game changer.
Within days of signing up, they started removing my personal information from hundreds of data brokers.
I finally have peace of mind knowing my data privacy is protected.
Delete.me's team does all the work for you with detailed reports so you know exactly what's been done.
Take control of your data and keep your private life private by signing up for Delete.me.
Now at a special discount for our listeners.
private by signing up for Delete Me. Now at a special discount for our listeners,
today get 20% off your Delete Me plan when you go to joindeleteme.com slash n2k and use promo code n2k at checkout. The only way to get 20% off is to go to joindeleteme.com slash n2k and enter code
n2k at checkout. That's joindeleteme.com slash N2K, code N2K.
A critical vulnerability has been discovered in the NVIDIA container toolkit.
Representatives from around the world are meeting in Washington to address ransomware.
The Pentagon shoots down the notion of a separate cyber service.
A genetic testing company leaves sensitive information in an unsecured folder.
A public accounting firm breach affects 127,000 individuals.
The DOJ charges a British national with hacking U.S. companies.
California's governor vetoes an AI safety bill.
CISOs deserve a seat at the table.
Tim Starks from CyberScoop describes the House Homeland Security Chair's proposed cyber workforce bill.
And password laziness leaves routers vulnerable.
It's Monday, September 30th, 2024.
I'm Dave Bittner, and thank you for joining us here today.
A critical vulnerability has been discovered in NVIDIA Container Toolkit, posing a major
risk to AI applications that rely on it for GPU access.
This flaw affects both cloud and on-premise environments and allows attackers to perform
container escape attacks, gaining full control over the host system. Once inside, they could
execute arbitrary commands or steal sensitive data.
NVIDIA Container Toolkit is widely used across AI platforms and comes pre-installed in many virtual machine images,
making the issue especially concerning.
According to Wizz Research,
more than 35% of cloud environments are vulnerable to this exploit.
The vulnerability stems from a
failure to properly isolate containerized GPUs from the host, allowing containers to mount parts
of the host file system or access runtime resources like Unix sockets. Rated with a
critical severity score of 9.0, attackers could exploit this issue by using specially crafted container
images, allowing them to interact with the host system. Wizz Research reported the vulnerability
to NVIDIA in early September 2023, and a fix was released on September 26th. Users are strongly
advised to upgrade. For now, detailed technical information on the exploit remains private to allow organizations time to apply the fix.
This week, representatives from the 68 members of the International Counter-Ransomware Initiative are gathering in Washington, D.C. to address the ongoing threat of ransomware.
gathering in Washington, D.C. to address the ongoing threat of ransomware.
Despite the initiative doubling in size since 2021,
ransomware attacks have also nearly doubled in the same period, according to U.S. intelligence.
The fourth annual summit will focus on disruption operations and launching a fund to help countries hit by cyberattacks.
There will also be discussions on the intersection of artificial intelligence and cybersecurity.
U.S. officials, including Deputy National Security Advisor Ann Neuberger,
emphasize that ransomware remains a significant problem,
with Russia serving as a key haven for many attackers.
Although the decentralized nature of ransomware groups poses challenges, it also
prevents any single group from dominating. The summit aims to bolster efforts to dismantle
infrastructure supporting ransomware and disrupt the cryptocurrency flows that fuel these operations.
However, officials acknowledge that the incentives for attackers remain strong,
acknowledge that the incentives for attackers remain strong as many victims continue to pay ransoms. The Pentagon has requested that lawmakers reject a proposal mandating an independent
assessment for creating a separate cyber service, according to sources cited by Breaking Defense.
This appeal was submitted to the House and Senate Armed Services Committees, arguing that a similar assessment was already required in the 2023 National Defense Authorization Act.
The idea of establishing a separate cyber service has been debated within the Department of Defense, with some officials warning it could create confusion and overlap with existing military cyber efforts.
While proponents argue it could streamline operations, others caution that separating
cyber functions from broader warfighting missions might hinder effectiveness. Lawmakers will revisit
the issue when crafting the final version of the 2025 NDAA after the November presidential election.
CHICE DNA, an Indiana-based genetic testing and facial recognition service, exposed sensitive
data, including biometric images, personal details, and facial DNA records, due to an
unsecured WordPress folder.
The breach, discovered by cybersecurity researcher Jeremiah Fowler,
involved around 8,000 records accessible without any security protections.
These records contained names, phone numbers, emails, racial identities, and personal notes,
even including data on vulnerable individuals like newborns.
The incident didn't involve a misconfigured
database or cloud server, but rather an unsecured folder titled Facial Recognition Uploads.
Fowler promptly notified the company and the folder was secured,
but the exposure raised serious privacy concerns. Experts warn that such sensitive information could be exploited for phishing,
blackmail, or identity manipulation, emphasizing the need for companies to implement stronger
data protection measures, including proper configuration and security for online storage
systems. Public accounting firm Wright, Moore, DeHart, Dupuis, and Hutchinson, WMDDH,
is notifying over 127,000 individuals of a data breach that occurred in July 2023.
The breach exposed sensitive personal information, including names, social security numbers,
driver's license and passport numbers, financial details, and medical data. While the breach was detected in July,
it took WMDDH nearly 10 months to identify the affected individuals.
The firm is offering one year of free credit monitoring
and identity theft protection services to those impacted.
The Department of Justice and SEC have charged Robert Westbrook, a 39-year-old British national, with hacking five U.S. companies.
Between January 2019 and May 2020, Westbrook allegedly accessed corporate executives' email accounts to obtain non-public information about earnings announcements.
He then used this information to trade securities,
profiting $3.75 million. Westbrook was arrested in the UK and is awaiting extradition and faces
charges of computer securities and wire fraud. The SEC seeks civil penalties, restitution,
and an injunction to prevent future violations.
California Governor Gavin Newsom vetoed a proposed AI safety bill that would have required developers of costly AI models to implement measures to prevent critical harms.
Authored by Senator Scott Weiner, the bill aimed to regulate AI systems costing over $100 million
by requiring safety testing before release
and allowing legal action for damages caused by these systems.
Newsom acknowledged the bill's good intentions,
but criticized it for imposing broad standards on even basic AI functions
without considering context or risk level.
Wiener expressed disappointment,
calling the veto a setback for AI oversight. The bill had drawn opposition from major tech
companies like Google and Meta, despite modifications made to address their concerns.
Cyber resilience efforts are lagging globally, partly because organizations are not involving chief information security officers
in strategic technology investments.
That's according to PwC's Global Digital Trust Insights report.
Polling over 4,000 executives,
PwC found that only 2% of organizations have implemented cyber resilience across all areas.
2% of organizations have implemented cyber resilience across all areas. Less than 50% of CISOs are involved in strategic planning for cyber investments, limiting their influence.
The report urges organizations to give CISOs a seat at the table to align cybersecurity with
overall business risk. A disconnect between tech and business leaders is evident, with 66% of tech executives ranking cyber as a top risk compared to 48% of business executives.
Additionally, only 15% of organizations are significantly measuring the financial impact of cyber risks.
PwC highlights barriers such as unclear risk scopes, data issues, and compliance concerns.
The report calls for greater alignment between CISOs and boards to improve cyber resilience and better prioritize investments.
Coming up after the break, Tim Starks from CyberScoop describes the House Homeland Security Chair's proposed cyber workforce bill.
Stay with us.
Do you know the status of your compliance controls right now?
Like, right now.
We know that real-time visibility is critical for security, but when it comes to our GRC programs, we rely on point-in-time checks.
But get this.
programs, we rely on point-in-time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings
automation to evidence collection across 30 frameworks, like SOC 2 and ISO 27001.
They also centralize key workflows like policies, access reviews, and reporting,
and helps you get security questionnaires done five times faster with AI. Now that's a new way
to GRC. Get $1,000 off Vanta when you go to vanta.com slash cyber. That's vanta.com slash
cyber for $1,000 off.
And now a message from Black Cloak. Did you know the easiest way for cyber criminals to bypass your
company's defenses is by targeting your executives
and their families at home. Black Cloak's award-winning digital executive protection platform
secures their personal devices, home networks, and connected lives. Because when executives are
compromised at home, your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect
your executives and their families 24-7, 365, with Black Cloak. Learn more at blackcloak.io.
It is always my pleasure to welcome back to the show Tim Starks.
He is a senior reporter at CyberScoop.
Tim, it's great to have you back.
Hi, Dave.
So, CyberScoop, you're living up to your name over there
because you got a scoop with an exclusive
about the House Homeland Security Chair
releasing a cyber workforce bill.
What's going on here, Tim?
Yeah, whenever I'm talking to people,
I'm always telling them on the cyber scoop part of things.
I'm like, it's in the name.
Please give me a scoop because it's in the name.
Right.
So yes, there was a bill
that the chairman of the House Homeland Security Committee
released this week,
and the committee actually did approve it as well a couple days later after we wrote about it.
It is what Mark Green calls his top legislative priority, not just cyber priority, but his top legislative priority.
And in an election year where the House Homeland Security Committee has jurisdiction over border security, you can see that that means that's a pretty big deal. schools, aiming to get people with those skills-oriented abilities to, in exchange for
scholarship, come work for the federal government, state, local government, tribal, territorial
government for a couple of years and pay it back that way.
Well, as you mentioned, this comes from the House Homeland Security Chairman Mark Green,
who's a Republican from Tennessee.
Why do you suppose he's setting this as his top legislative priority?
This issue of the cyber workforce is really just so important.
It feels, as a journalist, one of the things I've struggled with over the years is trying to communicate to people how big a deal this is.
Because, you know, it's human resources, basically, right?
it's human resources, basically.
And nothing against human resources,
but I don't think people get geeked out about it the way they do about
Iranians hacking the
presidential campaigns.
But it's such a
huge deal to have the people you need
to do this.
And we don't. And we never have.
You and I
have been around long enough to know that the cyber
workforce gap has been half a million people in the United States for a very long time.
And so I think he recognizes that with the threats we face, the top thing we could do, the number one thing we could do to fight it is to have actually skilled, talented people working to fight it.
is to have actually skilled, talented people working to fight it.
And why come at it from this direction, to have this be styled after ROTC?
Well, in his case, he is a former military man, so he thinks about things that way.
But another thing that I think matters here is, you know,
you can keep trying to get people who are four-year college degree students. You can keep trying to get very, very highly specialized and educated people.
Or you can look to a different set of folk that we haven't taken advantage of as much who maybe for whatever reason, economic factors or whatever kind of factors,
that a four-year degree is not an easy or workable thing.
And another thing to point out is that with a lot of these things, you probably don't
need a four-year degree.
So you're looking at a talent pool that is very available, is very exploitable, who can
get very high-paying cyber jobs off a two-year degree.
And in theory, this could work.
This is one of the other reasons we – the other things we've seen talked about as ways to fill this gap are looking to recruit women more.
The workforce is very male. The cyber workforce is very male.
And women make up, what, 51% of the world?
Makes sense.
And you look at the workforce is very white.
And so if you look at the number of minorities who you can approach, I mean, there are sort of different angles to approach this problem and tackle this problem. And this is a theory that if we go to these people who we have not been turning to,
we've not been recruiting, we've not been training, this can really help with that problem.
One of the things that caught my eye in your story was how this bill directs CISA to
put people on the pathway to getting a security clearance and to do it quickly.
Yeah, that's another huge problem.
There are so many elements of this workforce problem
that are huge and difficult to overcome.
And the time-consuming factor,
the backlog of security clearances
is another pretty constant thing
that we have to deal with in this country.
This says, okay, we've got someone who is in this program.
So start the security clearance process for someone a year out.
We know they're coming.
So let's get the process started.
And it could take months and months and months for this to happen under normal circumstances.
So if you get the process started earlier, the thinking is, good, let's get them in the workforce right away instead of having them sit outside and wait for a job to materialize because they have to wait for the security things to happen.
What is your sense of the likelihood of this bill going anywhere?
So that was an interesting thing I thought about when I was writing
about this.
It's September 27th
as we talk. It's late
September.
It's an election year, and
Congress ain't going to be around very much more
this year. So I question
whether it can happen this year. It's possible.
I think one of the
things that we didn't discuss in the story that could be a problem for this bill is Senator Rand
Paul on the other side of the chamber has been holding up any bill that does anything that gives
CISA any power. He is one of the people who is skeptical of the agency. He has talked about this view that a number of people on the right have,
that it was somehow involved in a censoring right-wing speech.
There's been a court adjudicating on that that says essentially,
no, not really.
The Supreme Court has ruled on this.
I don't know if that will make Senator Paul ease up on his concerns about this,
but it's a problem in the near term that they're going to have to overcome.
I've not talked to the Senate side about this yet.
The Senate Homeland Security Committee did get its own workforce bill through just a couple months ago,
but taking a little different tact on this.
And that tact was to not have CISA do it.
It was the office of the National Cyber Department to do it. So that may have made things easier on
their side to get that bill through. So we'll see what happens. I think that it's not the kind of
bill that is overly partisan. I could see it getting through the House side relatively easily,
as long as you put it on the suspension calendar and say, let's just move this fast. I could see it getting through the House side relatively easily. As long as, you know, you put it on the suspension calendar and say, just let's just move this fast.
I could see that happening.
I think the question becomes what Senator Paul thinks of it.
Yeah. All right.
Interesting insights for sure.
Tim Starks is senior reporter at CyberScoop.
Tim, thanks so much for taking the time for us.
Thank you, Dave.
Cyber threats are evolving every second,
and staying ahead is more than just a challenge.
It's a necessity.
That's why we're thrilled to partner with ThreatLocker,
a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing
sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default deny approach
can keep your company safe and compliant.
And finally, not that any of our listeners would do this,
but a recent survey by Broadband Genie revealed that 86% of broadband users
have never changed their router's default admin password.
The survey showed that over half of users haven't even bothered to tweak their router settings at all.
Worse still, 89% of respondents have never updated their router's firmware,
leaving them potentially open to cyber attacks.
The fix is simple.
Change your router's admin password, update the firmware,
and maybe give your Wi-Fi a snazzy new name while you're at it.
It's not rocket science, but it could save you from a digital disaster.
As broadband genie expert Alex Toft warns, leaving defaults in place is like handing over the keys
to your house. Again, not that any of you would do something like that. But, you know, your friends maybe help spread the word.
And that's The Cyber Wire.
For links to all of today's stories,
check out our daily briefing at thecyberwire.com.
Don't forget to check out the Grumpy Old Geeks podcast,
where I contribute to a regular segment on Jason and Brian's show every week.
And find Grumpy Old Geeks
where all the fine
podcasts are listed. We'd love to know what you think of this podcast. Your feedback ensures we
deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity.
If you like our show, please share a rating and review in your favorite podcast app.
Please also fill out the survey in the show notes or send an email to cyberwire at n2k.com.
We're privileged that N2K Cyber Wire is part of the daily routine of the most influential leaders
and operators in the public and private sector, from the Fortune 500 to many of the world's
preeminent intelligence and law enforcement agencies. N2K makes it easy for companies to
optimize your biggest investment, your people.
We make you smarter about your teams while making your teams smarter.
Learn how at n2k.com.
This episode was produced by Liz Stokes.
Our mixer is Trey Hester with original music and sound design by Elliot Peltzman.
Our executive producer is Jennifer Iben.
Our executive editor is Brandon Karp.
Simone Petrella is our president.
Peter Kilby is our publisher.
And I'm Dave Bittner.
Thanks for listening.
We'll see you back here tomorrow. Thank you. you can channel AI and data into innovative uses that deliver measurable impact.
Secure AI agents connect, prepare, and automate your data workflows,
helping you gain insights, receive alerts,
and act with ease through guided apps tailored to your role.
Data is hard. Domo is easy. Learn more at ai.domo.com.
That's ai.domo.com.