CyberWire Daily - Everything old is new again.

Episode Date: December 22, 2025

NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy... shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today on our Industry Voices, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation here. Selected Reading Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space (AP News) Project West Ford (Wikipedia) Acting CISA director failed a polygraph. Career staff are now under investigation (POLITICO) Dismantling Defenses: Trump 2.0 Cyber Year in Review (Krebs on Security) MacSync macOS Malware Distributed via Signed Swift Application (SecurityWeek) From ClickFix to code signed: the quiet shift of MacSync Stealer malware (Jamf)  Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan (Hackread) Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech (Check Point) Scripted Sparrow Sends Millions of BEC Emails Each Month (Infosecurity Magazine) FBI Seizes Fake ID Template Domains Operating from Bangladesh (Hackread) Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures. (N2K Pro) NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Most environments trust far more than they should, and attackers know it. Threat Locker solves that by enforcing default deny at the point of execution. With Threat Locker Allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave, and with Threat Locker, DAC, defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. Threat Locker is the simplest way to enforce zero-trust principles without the operational pain.
Starting point is 00:00:46 It's powerful protection that gives CISO's real visibility, real control, and real peace of mind. Threat Locker makes zero-trust attainable, even for small security teams. See why thousands of organizations choose Threat Locker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo at Threatlocker.com slash N2K today. Suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at Sissa. A look back at Trump's cyber policy shifts.
Starting point is 00:01:41 Max Sink Steeler adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cybercriminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of B.E. EEC emails every month. Federal prosecutors take down a global fake ID marketplace. We've got our Monday business brief. Our guest is Eric Woodruff, chief identity architect at Sempris, discussing no-off-abuse alert, full-account takeover.
Starting point is 00:02:13 And atomic precision meets Colorado weather. It's Monday, December 22nd, 2025. I'm Dave Bittner, and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Two NATO intelligence services suspect Russia is developing a new anti-satellite weapon designed to disrupt Elon Musk's Starlink network by releasing clouds of high-density pellets into orbit. According to intelligence findings seen by the associated press,
Starting point is 00:03:10 the so-called zone effect weapon could disable many satellites at once, potentially undermining Western space advantages that have supported Ukraine. Analysts not briefed on the findings question whether such a system could be used without causing uncontrollable debris. and widespread damage, including to Russia's own satellites. Some experts argue the concept may be experimental, exaggerated, or intended as a deterrent rather than a deployable weapon. While Russia denies plans to weaponize space, officials have warned that commercial satellites aiding Ukraine could be legitimate targets, keeping concerns about escalation and orbital chaos alive.
Starting point is 00:03:54 Our history repeats itself desk sent us a link to the Wikipedia page on Project Westford, a U.S. experiment from the 70s, which involved putting needles in orbit. We'll have a link in the show notes. Acting Cybersecurity and Infrastructure Security Agency Director Madhu Gadamukala failed a polygraph exam in July after seeking access to a highly sensitive intelligence program, according to multiple current and former officials. That access required a counterintelligence polygraph, which senior career staff had questioned,
Starting point is 00:04:34 arguing Gada Mukala lacked a clear need to know and could rely on less classified material. He, nevertheless, pushed forward and took the test. After the failed exam, the Department of Homeland Security launched an investigation, alleging that career staff misledged Gada Mukhael. into taking an unsanctioned polygraph. At least six employees were placed on paid administrative leave,
Starting point is 00:05:01 a move that angered staff and raised concerns about leadership accountability. DHS disputes that Gautomukala failed an authorized test, while career officials contest that characterization. The episode has intensified instability at SISA, which is already grappling with staffing losses, budget cuts, and the absence of a Senate-confirmed director. A sweeping report by Krebs on Security details how the Trump administration has pursued rapid policy shifts that critics say are undermining U.S. capacity
Starting point is 00:05:38 to manage cybersecurity, corruption, privacy, disinformation, and press freedom. The changes span nearly every corner of government and emphasize reduced enforcement, dismantled oversight, and tighter political control. According to the report, the administration expanded ideological screening and surveillance through new executive orders affecting speech, immigration, and travel. At the same time, it scaled back anti-corruption efforts
Starting point is 00:06:07 by halting enforcement of bribery laws, dissolving kleptocracy and foreign-influenced task forces, retreating from crypto-regulation and issuing controversial pardons. Federal cybersecurity suffered acute damage. Leadership was purged, advisory boards disbanded, budgets slashed, and staff reassigned, leaving agencies like SISA severely weakened. The report also describes intensified pressures on the press, erosion of consumer and privacy protections,
Starting point is 00:06:41 and unprecedented data access under the, now-defunct Doge initiative, raising long-term national security concerns. Researchers at JAMPF report that the MacOS malware MacSync Steeler has adopted a new delivery method that no longer requires users to run commands in the terminal. Originally, a rebrand of the low-cost MacC Info-Stealer, MacSink Steeler, now uses a code-signed, notarized Swift app disguised as a legitimate installer. The dropper quietly fetches and executes malicious scripts, adding stealth, persistence, and gatekeeper evasion. Jampf says the shift reflects a broader trend toward abusing trusted macOS app mechanisms. Researchers at Antinue warn that
Starting point is 00:07:34 Nesja, a legitimate open source server monitoring tool, is being abused by attackers as a remote access Trojan. Because Nezha is widely trusted and rarely flagged by security tools, hackers can use it to gain persistent system-level access across Windows, Linux, MacOS, and even routers. Its normal-looking network traffic helps it blend in. Experts say the abuse reflects a growing trend of attackers weaponizing legitimate software, forcing defenders to focus on behavior and context rather than labels alone. Researchers at Checkpoint say cybercriminals are increasingly bypassing technical defenses by recruiting insiders to provide access to corporate networks, devices, and cloud environments.
Starting point is 00:08:23 On darknet forums, employees are solicited or sometimes volunteer to sell credentials, disable security controls, or share sensitive data in exchange for cash, often paid in cryptocurrency. These insider actions create major blind spots. for security teams and make attacks far harder to prevent. Financial services, cryptocurrency platforms, banks, technology firms, telecoms, and logistic companies are frequent targets, with payouts ranging from a few thousand dollars to six figures for high-value access or data sets.
Starting point is 00:09:00 Ransomware groups have also expanded recruitment through encrypted platforms, offering profit-sharing schemes. The trend highlights a growing insider threat. that combines financial incentives with anonymity. Defending against it requires employee education, strict access controls, behavioral monitoring, and proactive surveillance of dark net activity alongside traditional cybersecurity tools.
Starting point is 00:09:28 Researchers at Fortra have identified a prolific business email compromise group dubbed scripted sparrow, which sends an estimated 4 to 6 million targeted emails each month. Active since mid-20204, the group poses as executive coaching firms and targets accounts payable teams with fake invoices and W-9 forms. Fortress says the loose collective operates across multiple continents, uses hundreds of domains and bank accounts, and relies on spoofed reply chains to boost credibility.
Starting point is 00:10:03 U.S. prosecutors have charged Zahid Hassan, a 29-year-old resident of Bangladesh, with running a global fake ID marketplace that fueled identity theft worldwide. According to the U.S. Department of Justice, Hassan sold digital templates for forged passports, driver's licenses, and social security cards through multiple websites from 2021 to 2025. Investigators say the scheme generated more than $2.5 million from over 1,400 customers. The operation was dismantled by the FBI with each. international partners, and Hassan now faces multiple federal fraud charges. Turning to our Monday business brief, a wave of global cybersecurity funding and deal-making
Starting point is 00:10:53 highlights sustained investor interest across fraud prevention, AI security, identity, and infrastructure protection. New York-based adaptive security led the week with an $81 million Series B, bringing its total funding to $146.5 million since launching in early 2025. Other notable raises include Echo at $35 million, Cassada at $20 million, resemble AI at $13 million, and EverTrust at $10 million. Early stage funding went to startups including Ducks, Verasol, Siflens, Soverely, and Realm security. Mergers were equally active with acquisitions by Outpost 24, silent push, meta-compliance, Arteris, Spy, and Sidaris, underscoring continued consolidation across the security market.
Starting point is 00:11:53 Be sure to check out our weekly business brief on our website. That's part of Cyberwire Pro. Coming up after the break, my conversation with Eric Woodruff from Sempris. We're discussing no-off abuse alert, full account takeover. And atomic precision meets Colorado weather. Stay with us. Eric Woodrow. is chief identity architect at Sempris. In today's sponsored industry voices segment,
Starting point is 00:12:42 we discuss their report, No-Oth Abuse Alert, full account takeover. If an application is vulnerable to no-off, like a SaaS application, if you know the victim or targets email address, you can essentially sign in to the vulnerable SaaS application as that person. And you don't have to fish them
Starting point is 00:13:04 or have any interaction. you just need to know what their email address is. And you found that a sizable percentage of applications are vulnerable to this? Yeah, I mean, the testing of it is, I'd say, it's tough, right? So when we're going through applications, you really have to sort of understand the context of the application, right, to determine if it's vulnerable. But yes, out of, you know, the initial round we had was, you know, I think 1,17 apps that we were looking at and we found like we could test 104 of them. And there was nine that were vulnerable, right? And that comes out to, you know, roughly nine percent-ish that were vulnerable.
Starting point is 00:13:51 But we also have done more research since we first published that that is going to be coming out soon, where we tested another 38 applications and again found. two that were vulnerable there, right? So that's roughly 5%. So, you know, 5% might not seem like a lot, but if you think of the number of applications out there, right, the number would certainly grow. Yeah. I guess at the core of this is the notion that
Starting point is 00:14:17 using an email address is a unique identifier has a certain amount of risk associated with it. Yeah, I mean, so with no-off, I mean, at the core of it, it's developers, no offense to developers, but not following the spec for Open ID Connect. And so, again, without getting too nerdy, with an Open ID Connect,
Starting point is 00:14:37 there's certain attributes like about a user account that in Microsoft's implementation are immutable, right? So it guarantees that nobody could forge this or mimic this attribute that identifies, you know, you or me in the app. But developers might take a shortcut or they might not understand Open ID Connect or understand the consequences around it
Starting point is 00:14:59 and they'll say, oh, well, we're just going to key off of email, right? So if I see, you know, Dave Bittner, Eric Woodruff come in with our email addresses, then, yep, like, that's got to be this person. But the problem is, in the intro world, email is not a immutable attribute. There's valid reasons why someone might have an email address that is different than their actual username. Well, walk me through this, then. I'm an attacker and I have access to an entrant tenant and I've got the target's email address.
Starting point is 00:15:36 What happens next? Yeah, so, right? So you've found an application that's vulnerable to this. And so as an attacker, you go stand up an entrant tenant. You create, you know, some dummy user. It doesn't really matter what the user is. And then you just set the email address to whoever your target is, right? So in our research before we found there was an HR platform that was vulnerable, right?
Starting point is 00:16:01 So, you know, if I'm putting my hacker hat on, you know, the platform's vulnerable. These days it's easy to go on LinkedIn and try to find, you know, whose customers of this platform. And then I find their customers. And then it's easy to figure out probably who their HR admin is, right? So knowing an HR admin is going to have access to a lot of, you know, juicy data in this system. I'll put their email address in. And then essentially, I just browse to the application and sign in. But again, because the application is just comparing email addresses,
Starting point is 00:16:36 it's going to think, you know, I'm that HR administrator and give me access to whatever they have access to. Help me understand the cross-tenant angle here, exactly what's going on. If you think of it in the sense that the application is just looking at a token that comes from Entra, right? And so, again, in these scenarios, it's just looking at the token. It's looking for an email address attribute in it, right? So when we're talking cross-tenant,
Starting point is 00:17:06 it's an abuse that can happen outside of, like, the legitimate customer's tenant because, right, it's the application that's sort of like the problem here, right? So whether it's coming from a legitimate tenant or the attacker tenant, right, this token, which is just sort of encoded, you know, data that will have, you know, like your first name. your last name, email address. It's just looking for email, right?
Starting point is 00:17:28 And it's like, oh, this address matches this user. So, like, yep, you're allowed in as that user. That makes sense. Yeah, as you say, I mean, there's a lot of technical details here. But can we talk a little bit about the story of the testing that you did? You all looked at just over 100 apps. And as you mentioned, you found nine of them were vulnerable. Was there a particular methodology for selecting the apps?
Starting point is 00:17:55 And I guess question B is how do you go about testing this ethically? Yeah, no, those are a good question. So to the first point, so the initial round of testing, we basically went through the Microsoft Enter Gallery, which is just a listing of applications that vendors, software vendors can put their app in there to sort of make it more visible for use. So from that list
Starting point is 00:18:20 like we were basically looking for anything that had a trial, some sort of self-service sign up that didn't require credit cards or having to pay money or something and this system would let you trial it. So that kind of whittle it down to like the hundred. And then of the hundred, right, basically what we would do is so we have our attacker tenant
Starting point is 00:18:42 that we control and, you know, our quote, legitimate user tenant that we control. So we would sign up right with like a legitimate user that, you know, we control and just some lab tenant, you know, get the trial set up for whatever it is. And again, if the system would allow you to place some bit of data or do something right so that we could sort of like mark, so to speak, that like, you know, this is, we've done something in this, you know, demo. Because you can't always tell from just like looking at, you know, the user interface. Then we, you know, sort of go over to the attacker tenant. we'd go to sign into the same application again with the email address set to like our, you know, quote victim.
Starting point is 00:19:22 And if we get in, right, we would just sort of poke around at the interface. Again, if we had data in there, right, we could easily see, oh, right, like this is the same thing. Like in the HR scenario, when we sign in as the attacker, we saw like the dummy users that we added in. Other times, it wasn't as simple and maybe you'd have to poke around, you know, the interface a little bit for the application to determine if the accounts are, you know, sort of one and the same in the app. And I'll just say to your other question about testing it ethically, actually, maybe I've answered it in there, right?
Starting point is 00:19:52 So, you know, we have no intention, right, of trying to get in anything we're not supposed to have access to. So that's where we also wanted things that we could sign up for trials for, right? So that way we're making sure that, you know, we're only really attacking ourselves and we're not doing anything with, you know, real people or data. Yeah. Your research points out that this is particularly hard to speak. bot. Why is that? What makes it so hard? Well, I mean, I'll say like, when I've, when I've
Starting point is 00:20:23 spoken about this, conferences, like the customer is kind of stuck in the middle here, right? So because the attack is originating from a different tenant than theirs, right? All the conditional access, any security things that you might do in your Entry ID or your Microsoft 365, is essentially rendered useless because the authentication, right, is happening up in the attacker tenant that you have no control over. So you're not going to have any visibility in your intra. And then really, it's only on the app developer side of things, right, where they're going to have, you know, whatever logs they're keeping, right?
Starting point is 00:21:06 But again, applications aren't, you know, it's not the greatest strength, right, in having log data in there. And even then, but if an app developer, many times we were asked, like, well, what could the app developer do to, like, check for this? And we're like, well, they should just fix their application and not to get on a tangent, right? But the thing is, is like, an app developer isn't going to be looking for if they're vulnerable to this in the sense that if, like, they knew they were vulnerable to this. I mean, hopefully, right, they would go change their code. So it is something they can fix in the app. Sorry, forget about it.
Starting point is 00:21:41 No, I mean, I think you're making a really good. good point here. I mean, it seems to me like there's a vendor accountability aspect here. Should customers be asking specific questions to their SaaS vendors? Yeah, I mean, right. It feels tough because part of me wants to say, absolutely, right? Like, if you go to buy a SaaS application or procure one, you should, you know, ask the vendor if they're vulnerable to this and right, linked to our work or D scopes, not to tell ourselves just because, right, we're the ones who sort of explain the problem, but
Starting point is 00:22:14 I mean, that could also get heavy, right, to sort of ask your SaaS app vendor if they are vulnerable to this, and then, you know, it could become a laundry list, right, of all these things. But yeah, I mean, it's tough because Microsoft basically says it's a developer
Starting point is 00:22:30 problem, and developers aren't going to know that they're vulnerable to it, right, if they don't know. So, yeah, I mean, it's a tough spot for customers because it's also not feasible for customers to write, like, go test every application that they procure for this because, you know,
Starting point is 00:22:49 it might be easy for researchers to sort of repeat this stuff, but I wouldn't expect your everyday IT pro to kind of go do this in something they're trying to procure. What about Microsoft? What part do they have to play in all
Starting point is 00:23:04 of this? Yeah, I mean, so Microsoft had, so when Descope had released their research, Microsoft had published an article, again in June 2023, basically explaining, you know, a path to mitigate this, right? So they're like, if you are vulnerable to this,
Starting point is 00:23:24 here's how to go, like, fix your SaaS app, so it's not vulnerable to this. And they also said at the time, you know, that they contacted some app owners that they believe are vulnerable, you know, and help them work that out. And that's all great. You know, the problem is they still sort of point the finger
Starting point is 00:23:40 back at developers, right? And I guess I'll say from Microsoft's perspective, just because you have the email address as a claim doesn't mean that the app itself is vulnerable, right? And I think that's sort of how they say, like, right, they don't even know or they can't really tell, right? If all these apps are vulnerable, and that's why they tend to push it back on the app devs. And, you know, I get it, but I think the problem is, right, it's one of those things like where if you don't know, you don't know, right? So all the devs that don't know their app is vulnerable probably isn't out there, you know, consuming this information from MSRC, you know, about mitigating it. Right.
Starting point is 00:24:21 It needs to be a detection tool. Yeah. How severe do you rate this? How serious should we consider it? So we rate it severe. So I'll say again, so recently we opened another case with Microsoft. because we have a bit of a new finding where one of the applications that we've tested this round had integrations with Office 365 or Microsoft 365.
Starting point is 00:24:48 And so in our testing, what we basically did is we went into the SaaS app, right, that was vulnerable as the attacker. And it allowed us to, you know, send email, read contacts, do other things as this user in Microsoft 365. And again, we sent emails out to other, you know, of our own test users, right? basically prove that you can almost pivot right from a vulnerable SaaS app back into Microsoft 365, again, relative to whatever permissions that app might have there. So we decided to open a case with MSRC, and they came back saying that they find this to be a moderate severity, and they gave us a blurb that, you know, they've notified sort of like downstream service owners. They don't specify, I'm assuming they're talking about, like, the exchange
Starting point is 00:25:37 and SharePoint online teams, right, and things like that. And, you know, they might put additional defense-in-depth things in place down the road, and then the case was closed. So Microsoft is saying it's moderate, but, you know, we still stand by it being severe, right? Because in the HR example, right, it's going to be PII, it's going to be a whole ton of sensitive data that nobody's going to want out there. In these examples, right, it's whatever the data is in the SaaS app, right? however critical that data is to you, effectively is, you know, how severe this vulnerability would be, right, if your application was vulnerable.
Starting point is 00:26:13 So that's Eric Woodruff from Sempris. And finally, a power outage near Boulder And finally, a power outage near Boulder, Colorado briefly put the USA's National Institute of Standards and Technology in the awkward position of having very precise clocks and slightly unreliable electricity. According to NIST physicist Jeffrey Sherman, who is cheerfully paid to watch the clocks all,
Starting point is 00:27:05 day. The outage disrupted the atomic time scale that underpins NIST's network time protocol services, a quiet but critical backbone of the internet. The problem was not just losing power. Backup generators kept systems running, meaning inaccurate time could still be broadcast. Sherman even considered disabling the generators, a sentence that probably does not appear often in federal incident reports. Severe storms prevented access to the site, adding weather to the list of adversaries of atomic precision. The good news is the clock drift stayed within a few microseconds,
Starting point is 00:27:46 an eternity for physicists, but negligible for most internet users. Services were fully restored within a day right on time, more or less. And that's the Cyberwire for links to all of today's stories. Check out our daily briefing at the Cyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating
Starting point is 00:28:31 and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Keltzman. Our executive producer is Jennifer Ibin.
Starting point is 00:28:53 Peter Kilty is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.