CyberWire Daily - Hackers ignore the ceasefire.

Episode Date: April 9, 2026

Iran-linked hackers signal cyberattacks will continue despite the cease-fire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right-to-repair fight. A... suspected Adobe Reader zero-day surfaces. Palo Alto Networks and SonicWall patch high-severity flaws. New macOS malware targets crypto wallets. A threat cluster abuses live chat to bypass MFA. CISA orders urgent Ivanti patching. Researchers track a stealthy DDoS-for-hire botnet. Our guest is Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. macOS has a 49 day time limit.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today’s Industry Voices, we are joined by Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. If you enjoyed this conversation, check out the full interview here. Selected Reading Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long (SecurityWeek) Microsoft suspends dev accounts for high-profile open source projects (Bleeping Computer) John Deere to Pay $99 Million in Monumental Right-to-Repair Settlement (The Drive) Adobe Reader Zero-Day Exploited for Months: Researcher (SecurityWeek) Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities (SecurityWeek) New macOS Malware notnullOSX Targets Crypto Wallets Over $10K (Hackread) Google Warns of New Threat Group Targeting BPOs and Helpdesks (Infosecurity Magazine) Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion (Trellix) CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday (Bleeping Computer) We Found a Ticking Time Bomb in macOS TCP Networking - It Detonates After Exactly 49 Days (Photon Blog) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. No, it's not your imagination. Risk and regulation really are ramping up, and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're getting ready for a SOC2 or managing an end-toe, enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals
Starting point is 00:00:44 moving. Companies like Ramp and Writers spend 82% less time on audits with Vanta. That means less time chasing paperwork and more time focused on growth. For me, it comes down to this. Over 10,000 companies from startups to large enterprises trust Vanta to help prove their security. Get started at vanta.com slash cyber. Iran-linked hackers signal cyber attacks will continue despite the ceasefire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right to repair fight, a suspected Adobe reader zero-day surfaces, Palo Alto networks and Sonic Wall patch high-severity flaws, new MacOS malware targets
Starting point is 00:01:44 crypto wallets. A threat cluster abuses live chat to bypass MFA. Sisa orders urgent Avanti patching. Researchers track a stealthy DDoS for hire botnet. Our guest is Edgar Captivielli, CEO of Nozomi Networks, sharing insights on threats posed by nation states and AI on OT security. And MacOS has a 49-day time limit. It's Thursday, April 9, 26.
Starting point is 00:02:22 I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great as always to have you with us. Pro-Iranian hacker groups say a fragile ceasefire involving Iran, the United States, and Israel will not stop their cyber operations, warning that digital retaliation will continue despite reduced military tensions. One group, Handala, said its pausing attacks on U.S. targets for now, but will keep targeting Israel and may resume operations against America later. U.S. authorities also warned that Iran-linked hackers have already infiltrated programmable logic controllers used in critical infrastructure such as ports, power plants, and water systems.
Starting point is 00:03:24 Security agencies urged organizations to strengthen defenses immediately. Experts caution that cyberactivity may actually increase during a ceasefire, as threat actors shift attention toward U.S. companies connected to the war effort, including data centers and defense contractors. So far, many attacks appear more symbolic than destructive, but analysts warn they still highlight persistent vulnerabilities and the growing role of cyber operations as a lasting feature of modern conflict. Microsoft suspended developer accounts used to maintain several widely used open-source Windows projects, temporarily preventing them from publishing updates and security patches.
Starting point is 00:04:11 Affected software included WireGuard, Veracript, MemTest 86, and WindScribe. Developers said they received no warning or clear explanation and were unable to reach human support, raising concerns about delayed responses to potential security vulnerabilities affecting Windows users. After public reporting, Microsoft said the suspect, Suspensions resulted from missed mandatory account verification requirements in the Windows Hardware Program, which partners had been notified about since October of last year. Accounts that failed verification within 30 days were automatically suspended. Microsoft executives later acknowledged communication gaps and said the company is reviewing its notification process.
Starting point is 00:04:59 Some accounts began moving toward reinstatement after media attention prompted direct out. outreach from Microsoft leadership. Farmers reached a landmark settlement with John Deere in a long-running right-to-repair dispute, securing $99 million for plaintiffs who paid authorized dealers for major equipment repairs since 2018. Court documents indicate participants may recover 26 to 53 percent of alleged overcharged damages well above typical class action recoveries. The agreement also requires Deer to provide digital tools needed for maintenance, diagnostics, and repairs on tractors and combines for 10 years, addressing long-standing restrictions that previously forced some farmers to modify equipment software themselves.
Starting point is 00:05:52 The settlement still requires judicial approval. Deer also continues to face a separate lawsuit from the Federal Trade Commission, which alleges the company unlawfully restricted repair access, a case that could influence broader right-to-repair efforts across multiple industries. Researcher Hafei Lee reports a likely actively exploited Zero Day in Adobe Reader after detecting a malicious PDF through his Ex-Mond sandbox system. The file can collect system data and may enable remote code execution and sandbox escape, though the full attack chain remains unconfirmed.
Starting point is 00:06:33 Evidence suggests exploitation may have been ongoing for at least four months, with some samples using Russian-language lures tied to oil and gas topics. Adobe is reviewing the findings after receiving disclosure details in early April. Hall networks and Sonic Wall released patches for multiple vulnerabilities, including two high-severity flaws affecting enterprise security platforms. Haloato networks fixed a vulnerability in Cortex-XOR and X-Sim integrations with Microsoft Teams, which could allow attackers to tamper with protected resources, along with additional Windows agent and chromium-related issues.
Starting point is 00:07:16 Sonic Wall addressed an issue in SMA-1000 firewalls, which could enable privilege escalation, plus flaws exposing VPN credentials or bypassing authentication. Neither company reports active. exploitation but urges prompt updates. Researchers at Moonlock Lab identified not-null OSX, a new macOS malware strain designed to steal cryptocurrency from high-value victims with balances above $10,000. First detected on March 30th, activity has been observed in Vietnam, Taiwan, and Spain.
Starting point is 00:07:56 The malware uses social engineering, including Facebook. Google Docs errors and a trojanized Wallspace app to trick users into running malicious terminal commands and granting full disk access it can read sensitive data and maintain persistent remote control a feature called replace app swaps legitimate wallet tools such as Ledger Live and Trezer with malicious versions to capture seed phrases researchers attribute the platform to a developer known as OXFFFF and and warn its modular design could support broader future targeting.
Starting point is 00:08:34 Google Threat Intelligence Group researchers warn that a financially motivated threat cluster tracked as UNC 6783 is targeting business process outsourcers and large enterprises through help desk and live chat social engineering to enable data theft and extortion. Principal analyst Austin Larson said attackers direct employees to spoofed Octa login pages using deceptive Zendesk-style domains that capture credentials and clipboard-based multi-factor authentication data, allowing persistent access. The group also distributes fake security updates that install remote access malware and later sends ransom notes via proton mail after
Starting point is 00:09:19 exfiltration. Researchers say the tactics resemble earlier help desk-focused extortion campaigns and urge organizations to deploy fishing-resistant authentication to monitor chat channels and audit newly enrolled MFA devices. Researchers at Trellix report that the Majesu Botnet has operated continuously since 2023 as a stealth-focused DDoS-for-hire platform targeting routers, gateways, and other IoT devices across multiple processor architectures, marketed primarily through telegram, the service supports large-scale TCP, UDP, and HTT
Starting point is 00:10:02 and claims attack volumes reaching hundreds of gigabytes per second. The malware spreads by scanning for known vulnerabilities and devices from vendors such as D-Link, G-PON, and Netgear, while using XOR-based obfuscation, cron persistence, and process spoofing to evade detection. It also avoids block-listed government IP ranges to reduce scrutiny. Updated samples show expanded command and control redundancy and broader device targeting, underscoring the botnet's evolution into a resilient, commercially operated extortion and disruption platform. SISA has ordered federal agencies to patch a critical vulnerability in Avanti Endpoint Manager Mobile within four days,
Starting point is 00:10:51 after confirming active exploitation since January. The flaw allows unauthenticated remote code execution on exposed systems. Avanti previously warned only a limited number of customers were affected, but nearly 950 internet-facing instances remain visible. Sisa added the issue to its known exploited vulnerabilities catalog and urged all organizations to prioritize patching immediately due to ongoing risk. Coming up after the break, my conversation with Edgar Captivielli, CEO of Nazomi Networks. We're talking about threats posed by nation states and AI on OT security.
Starting point is 00:11:41 And MacOS has a 49-day time limit. Stay with us. Maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Doppel is the AI-Native social engineering defense platform, fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Dopple uses it to fight back, from automatically dismantling cross-channel attacks
Starting point is 00:12:22 to building team resilience and more. Dopple, outpacing what's next in social engineering. Learn more at Dopple.com. That's doppel.com. This episode is brought to you by Tell Us Online Security. Oh, tax season is the worst. You mean hack season? Sorry, what?
Starting point is 00:12:48 Yeah, cybercriminals love tax forms. But I've got TELUS online security. It helps protect against identity theft and financial fraud so I can stress less during tax season or any season. Plan started just $12 a month. Learn more at tellus.com slash online security. No one can prevent all cybercrime or identity theft. Conditions apply.
Starting point is 00:13:15 Edgar Cap de Vile is CEO of Nazomi Networks. I recently sat down with him at the RSAC 2026 conference for this sponsored industry insights conversation about threats posed by nation states and AI on OT security. Now, it's not like IT, which, you know, I decide the brand of the laptop of the CEO, as well as the brand of the laptop of the plan manager. It's more in partnership,
Starting point is 00:13:42 because it is still the plan manager or the operations people or the production people that decide, you know, what kind of, whether it's Rockwell or Siemens or Schneider or GE or Mitsubishi, what combination of vendors they're going to have. Sometimes it's not a decision. Sometimes they come via an acquisition. And as we discussed, the life of this assets is longer. So you can't just say, okay, I bought this plant.
Starting point is 00:14:04 And I decided that I don't like the vendor that they use. I'm just going to go change it. That is not in the cost structure of the plant. And we are here at RSAC 2026 right on the show floor. and joining me is Edgar Katteviel. He is the CEO of Nazomi Networks. Edgar, thank you so much for joining us. Thanks for having me.
Starting point is 00:14:26 We find ourselves in a very interesting moment in history with the activities going on in Iran, the conflict there. What does that mean for the world of industrial control, critical infrastructure, all those things? As you might expect, Iran and that region relies heavily on critical infrastructure. both on the defensive and the offensive side. Iran has been a long-time active threat actor in terms of various APTs
Starting point is 00:14:58 and in particular addressing critical infrastructure and industrial control networks. Now that the conflict is, you know, very, very active and very, very kinetic, the threat landscape has been, you know, Heightland really very much. We have a ton of customers in the region, and we have been able to get a lot of threat intelligence around what Iran is doing.
Starting point is 00:15:27 And there's been very significant activity, both in transportation, manufacturing, and energy. Can you give us some insights of the types of things that you're tracking? What sort of activity are we talking about? We're tracking various groups that have been known for a long time. Yeah. APT 33, 34, in the full.
Starting point is 00:15:47 as well. And these groups are, like I said, very active. We are able to do a lot of visibility. I'm going to actually turn it back to maybe a different conflict. Yeah. When the Russian-Ukrainian conflict was starting, we saw also a lot of Russian activity, and we were able to see the peak and the low of those attacks
Starting point is 00:16:09 in the rise. You see kind of the early, minor activities, like these credentials, identity. in the beginnings, maybe, of lateral movement. And we're starting to see that now. We're, you know, in the early chapters of this Iranian. So we've seen a lot of early attacks, a lot of reconnaissance work, a lot of credentials acquisition, and even some lateral movement.
Starting point is 00:16:34 That's interesting. So you really see echoes of previously tracked trade craft. History does sort of repeat itself. Absolutely. In the world of IT, you're able to move much faster. In the world of OT and critical infrastructure, these attacks take longer. They're the discovery phase or the early phases of those APT attacks are longer. There's a lot more discovery required.
Starting point is 00:16:56 We've seen reports that Internet has basically been shut down in Iran. How does that affect everything? Does that get in the way of the threat actors themselves being able to do that? Some communications have been affected, but these are very organized groups that work in tandem with the government. their internet is not shut down. They're very, very active. I say, yes. What about the other threat actors around the world?
Starting point is 00:17:21 Are they taking advantage of this as a misdirection? Yeah, so they can do their own things. I think the level of attacks around the world is so far relatively unchanged. This Iranian set of activity has gone up significantly in volume. Can we take a step back and maybe looking down from a higher altitude, how would you describe the state of things globally when it comes to protecting critical infrastructure? Yeah, of course.
Starting point is 00:17:51 Critical infrastructure security has gone through a journey, right? Nozomi is now celebrating. It's going to be celebrating its 12 years, 11, 12 years in business. Congratulations. Thank you. Thank you. And we've seen all the different journeys. We went through the very nascent journey where only innovators adopted the technology.
Starting point is 00:18:11 then we went through the growth journey which is like people are aware of the threat but it's a new investment and therefore since budgets are not infinite you need to work through the trade-offs and how do you digest this new investment through the business model of the company
Starting point is 00:18:29 you can't just invest in something new very much like a household budget if you have all of a sudden a new kid you can't just all of a sudden say okay my salary should go up that doesn't happen right so so you need to to work this new item through the business model of the companies.
Starting point is 00:18:46 And now we have entered the mainstream part of the market where everybody is aware we have been investing in this technology for a while. So the budget that we're working on this year is slightly bigger than the budget that existed last year, but we're not working from zero, right? So most companies have budget allocated for industrial OT or IoT cybersecurity, and we're just getting better and better. with the adoption of AI,
Starting point is 00:19:13 the evildoers, the hackers, are always ahead of us. They're not burdened by regulation. They're not burdened by, you know, decision around technologies. They just adopted and used it right away. So one of the new effects is that a mediocre hacker with AI becomes a sophisticated hacker. And in the world of critical infrastructure,
Starting point is 00:19:37 you can have an IT hacker become an O.T. hacker fairly quickly. They have to learn the intricacies of industrial control systems or how each plant basically is a snowflake, right? Each plant is very unique, even though if you're copying them, the industrial controls, internals are very, very unique. So navigating through that uniqueness is something that people can do easier and easier with AI.
Starting point is 00:20:04 It strikes me that over the past, few years. Well, the past few years that I've been keeping track of the type of work that you and your colleagues do, it felt like we were, for a while, in kind of a reactive stage. You know, the conversations were about, particularly on the O.T. side, the update cycles of these pieces of equipment are measured in decades, not digital machine speed.
Starting point is 00:20:31 Do you feel as though we're in a place where we're more proactive now that there's more recognition that we have to get ahead of these things, the velocity is different than it was? So I think the proactiveness is not going to be measured by how the cycle of the equipment
Starting point is 00:20:49 changes, because the cycle of the equipment and the deployment of technology is not going to change. When you look at a substation, that substation is supposed to live for 20 to 30 years sometimes. Your laptop is only supposed to live three to five years.
Starting point is 00:21:05 And those two things are not going to change. What is going to change is the disposition of the different partnerships, the vendors, the users, the operators, in terms of how frequent and how flexible we're going to be in terms of patching equipment, incorporating security if it wasn't there in the first place. So I think the days of, number one, I believe the huge myth that my facilities are air-gapped.
Starting point is 00:21:30 That's no longer the case. That's a myth. That's a lie. Everybody knows that. the fact that you still have, you know, very outdated versions of software, Windows XP running the thing, which is an infestation, it's basically a honeypot, if you will. And the fact that you decide that, hey, I'm just going to spend a lot of time or I'm going to let a long time pass without patching. And I'm going to wait, maybe not this maintenance cycle or maybe the other one, but the other one.
Starting point is 00:21:58 That's also changing. So keeping up with the versions, keeping up with the patches, because security now is as important as consistency in when it comes to optimum availability. Do you feel like there's been a cultural maturation? We used to talk about, you know, the IT folks and the O.T. folks and they didn't always see eye to eye. Have we, is there been improvement there?
Starting point is 00:22:27 I think we have evolved quite a bit at the very, very beginning. The O.T folks were in charge of availability. and production and don't bother me, I need to keep up with my production schedule. Right. And the IT folks who were in charge of their kind of IT systems. And in the past, you know, if a vendor sold you the interconnect
Starting point is 00:22:46 of your industrial automation, that was part of that vendor's footprint, whether or not it was an Ethernet cable connecting everything together, right? Okay. Nowadays, it would be a fireable offense if a CISO were to believe that, and, you know, TCPIP connection
Starting point is 00:23:05 is not under his or her responsibility. Whether or not that's connecting a printer or connecting a PLC. I see. So now the CSO has centralized authority, centralized responsibility, and centralized budgeting. Now, it's not like IT, which,
Starting point is 00:23:20 you know, I decide the brand of the laptop of the CEO, as well as the brand of the laptop of the plan manager, it's more in partnership, because it is still the plan manager or the operations people or the production people that decide you know, what kind of, whether there's Rockwell or Siemens or Schneider or GE or Mitsubishi, what combination of vendors they're going to have.
Starting point is 00:23:42 Sometimes it's not a decision. Sometimes they come via an acquisition. And as we discussed, the life of this assets is longer. So you can't just say, okay, I bought this plant. And I decided that I don't like the vendor that they use. I'm just going to go change it. That is not in the cost structure of the plant. Well, Edgar Capdiviel is CEO of Nazomi Networks.
Starting point is 00:24:01 Thank you so much for joining us. Thank you for having me. There's a lot more to this conversation than we have time to share here, so please check out the full unedited interview. You can find a link to that in our show notes. And finally, once upon a time, classic pre-OS 10 Macs had a reputation for freezing if you merely looked at them wrong. Modern MacOS, by contrast, feels rock solid, right up until day 49.7 of continuous uptime. Researchers at Photon discovered that after exactly 49 days, 17 hours, 2 minutes, and 47 seconds, a 32-bit counter in the ex-new kernel quietly overflows and freezes the system's internal TCP clock.
Starting point is 00:25:10 When that happens, closed connections in the time-weight state never expire. Ephemeral ports accumulate, new TCP sessions fail, and services slowly lose the ability to talk to anything at all. PING still works, which deepens the mystery. The issue surfaced in long-running iMessage monitoring systems and was reproduced experimentally, then traced to a single comparison guarding the colonel's TCP timestamp counter. The result is a silent countdown timer built into macOS networking. The only reliable fix today is a reboot before the clock runs out. And that's the Cyberwire. For links to all of today's stories,
Starting point is 00:26:08 check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app.
Starting point is 00:26:25 Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's lead producers, Liz Stokes. We're mixed by Trey Hester with original music and sound designed by Elliot Peltzman. Our contributing host is Maria Vermazas. Our executive producer is Jennifer Iben. Peter Kilpe is our publisher.
Starting point is 00:26:46 I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.