CyberWire Daily - New command amid mounting cyber risks.

Episode Date: March 11, 2026

Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a f...ake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic’s lawsuit against the Pentagon. AI eyewear leads to awkward exposures. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies and Caveat cohost talking about Anthropic suing the Pentagon. You can read more on the topic here.  Selected Reading Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA (POLITICO) Whistleblower claims ex-DOGE member says he took Social Security data to new job (Washington Post) Microsoft Patches 83 Vulnerabilities (SecurityWeek) Adobe Patches 80 Vulnerabilities Across Eight Products (SecurityWeek) Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric (SecurityWeek) Iran war will bring wave of 'low-level cyber activity,' says intelligence group (StateScoop) New BeatBanker Android malware poses as Starlink app to hijack devices (Bleeping Computer) Fake Claude Code install guides push infostealers in InstallFix attacks (Bleeping Computer) New 'Zombie ZIP' technique lets malware slip past security tools (Bleeping Computer) DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders (WIRED) Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. When cyber threats strike, minutes matter. Booz Allen brings the same battle-tested expertise trusted to protect national security to defend today's leading global organizations. They safeguard their data, strengthen enterprise resilience, and mobilize in minutes across energy, health care, financial services, and manufacturing. Their teams don't just respond. They anticipate, outthink, and think.
Starting point is 00:00:36 stay ahead of evolving threats. This is powerful protection for commercial leaders only from Booz Allen. See how your organization can prepare today at Boozalan.com slash commercial. Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Government's brace for cyber fallout from Iran. Beat bankers spreads via FICS Starlink apps.
Starting point is 00:01:19 Install fix targets developers, zombie zip hides malware in archives. DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yellen unpacks Anthropics lawsuit against the Pentagon, and AI Eyewear leads to awkward exposures. It's Wednesday, March 11, 26. I'm Dave Bittner, and this is your Cyberwire Intel Briefing. Thanks for joining you. is here today. It's great to have you with us. The Senate has confirmed General Joshua Rudd to lead
Starting point is 00:02:20 both the National Security Agency and U.S. Cyber Command, filling a critical national security role vacant since April. Lawmakers approved Rudd in a 71 to 29 vote yesterday. He becomes the first Senate-confirmed leader since President Donald Trump fired General Timothy Hogg last April. Lieutenant General William Hartman has served as acting chief since then and plans to retire after Rudd is sworn in. Trump nominated Rudd in December. Rudd previously served as deputy director of U.S. Indo-Pacific Command. He has decades of military experience, though none in cybersecurity leadership roles.
Starting point is 00:03:04 The confirmation drew criticism from Senator Ron Wyden, who cited concerns about Rudd's cyber experience and, his understanding of National Security Agency surveillance authorities. Rudd told lawmakers he will continue evaluating the long-debated dual-hat structure and defended Section 702 of the Foreign Intelligence Surveillance Act, which expires in April. The Social Security Administration's Inspector General is investigating a whistleblower complaint, alleging a former U.S. Doge service engineer claimed access to highly sensitive citizen databases and intended to share the data with a private employer.
Starting point is 00:03:46 According to the complaint, the former employee allegedly told colleagues he possessed copies of two restricted social security databases, numidant and the master death file, which together contain records on more than 500 million living and deceased Americans. The records include social security numbers and other identifying information. The complaint alleges he stored at least one data set on a thumb drive and sought help transferring it to a personal computer to sanitize before use at a contractor. The allegations do not claim the data was successfully transferred. The Inspector General has notified Congress and shared the disclosure with the Government Accountability Office. The claims raise concerns about potential mishandling of
Starting point is 00:04:36 highly sensitive federal data. Agency officials and the former employee deny wrong. wrongdoing, and investigations are ongoing. Yesterday was patch Tuesday, and Microsoft has released security updates addressing 83 vulnerabilities across its products. None of the flaws are currently known to be exploited in the wild, though two vulnerabilities were publicly disclosed before patches were released. The update includes one critical bug, a remote code execution issue in the devices pricing program that Microsoft says has already been mitigated. Other notable issues include privilege escalation flaws in Windows components and an Azure MCP server tools vulnerability that could allow attackers to capture a
Starting point is 00:05:23 managed identity token by submitting crafted input. Additional Azure flaws affect Linux virtual machines and Azure IOT Explorer. Privilege escalation bugs are often used after attackers gain initial access, making timely patching important, even in quieter update cycles. Adobe has released security updates addressing 80 vulnerabilities across eight products, including Adobe Commerce, Illustrator, Acrobat Reader, and Premier Pro. The largest set of fixes targets 19 flaws in Adobe Commerce and Magento Open Source, including several high-severity privilege escalation bugs and a security feature bypass. Adobe urged users to apply these patches within 30 days
Starting point is 00:06:12 because the platforms are frequent targets for attackers. Additional updates address vulnerabilities that could lead to arbitrary code execution in Illustrator, Acrobat Reader, Premier Pro, and other tools. Adobe says none of the flaws are currently known to be exploited. Fortinette, Evanti, and Intel have released security updates addressing dozens of vulnerabilities across enterprise and firmware products. Fortinette patch 22 flaws affecting products including forda web, Forda switch
Starting point is 00:06:44 AX fixed, Forda Manager, and Forda Client Linux. Several high severity issues could allow remote attackers to bypass authentication limits or execute unauthorized commands, while a Forta client Linux flaw could enable local privilege escalation to root. Evante fixed a high severity privilege escalation bug in desktop and server management. Intel also disclosed nine vulnerabilities in the UAFI firmware for certain reference platforms and issued updates affecting more than 45 processor models. Major industrial technology vendors including Siemens, Schneider Electric, Mitsubishi Electric, and Moxa have released Patch Tuesday advisories addressing newly discovered vulnerabilities in industrial control system products. Schneider Electric disclosed six issues, including high severity flaws affecting
Starting point is 00:07:40 ecostructure platforms that could enable command execution, arbitrary code execution, or system compromise. Siemens also published six advisories, including a critical stored cross-site scripting vulnerability in somatic S7,500 devices. Mitsubishi Electric reported a remotely exploitable denial of service flaw in several numerical control systems, Maksa issued four advisories, largely tied to vulnerabilities in Intel components. State and local government officials are being urged to prepare for potential cyber and physical threats following U.S. and Israeli military strikes on Iran. During a briefing hosted by the Center for Internet Security's Multistate Information Sharing and Analysis Center, officials warned
Starting point is 00:08:31 that governments could face increased low-level cyber activity, including DDoS attacks and website defacements. Threat intelligence leaders said politically motivated hacktivist groups aligned with Iran or Russia are forming coalitions that could expand targeting capabilities. Officials also warned that damage to regional infrastructure, including cloud data centers and shipping routes, could disrupt global technology supply chains and online services. Researchers have identified a new Android malware strain called Beat Banker that spreads through fake websites impersonating the Google Play Store and posing as a Starlink app. According to Kaspersky, the malware combines banking Trojan capabilities with cryptocurrency mining. It can steal credentials, manipulate cryptocurrency transactions, and mine Manero on infected devices.
Starting point is 00:09:29 Recent variants also deploy the bit-mine. remote access Trojan, giving attackers full control of the device, including key logging, screen recording, camera access, and GPS tracking. Beat Banker uses several evasion techniques, including delayed execution and a persistence method that continuously plays a near-silent audio file to keep the malware running. Researchers are warning about a new social engineering tactic called install fix that tricks users into installing malware by posing as legitimate command-line tool installers. According to push security, attackers create cloned installation pages for popular developer tools
Starting point is 00:10:13 and replace legitimate setup commands with malicious ones. The technique targets users who copy and run curl-to-bash commands commonly used to install commandline interfaces. One observed command cloned the installation page for anthropic. Claude Code tool and promoted it through Google search ads. The malicious commands delivered Amatera Steeler Malware, designed to steal credentials, browser data, and cryptocurrency wallet information. The attack exploits common developer workflows and trusted installation practices, making malicious commands harder for users to detect.
Starting point is 00:10:53 Researchers have disclosed a new evasion technique called Zombie Zip that can conceal malicious payloads inside compressed archives while bypassing many security scanners. The method manipulates zip file headers so security tools treat compressed data as uncompressed. According to Bombadil Systems researcher Chris Aziz, many antivirus engines trust the zip headers compression method field and scan the archive incorrectly, seeing only compressed noise rather than the actual payload. Standard extraction tools such as WynRRR and 7ZIP typically fail to unpack the files, showing errors or corrupted data. A custom loader that ignores the header, however, can correctly decompress the hidden payload.
Starting point is 00:11:44 CERT Coordination Center has issued a warning and assigned the issue a CVE. The Department of Homeland Security reassigned several career customs and border protection officials after they objected to orders to restrict the release of surveillance records under the Freedom of Information Act. According to reporting, reviewed by Wired, DHS directed staff to label privacy threshold analyses, compliance forms describing how government technologies collect personal data as drafts and legally privileged documents. Sources say the move followed the public release of a redacted assessment describing Mobile Fortify, a facial recognition application used by CBP. The reassigned officials include the agency's top privacy officer, a privacy branch chief, and the director of the FOIA office.
Starting point is 00:12:41 Critics argue the policy could allow the departments to withhold records detailing surveillance tools and privacy impacts. Restricting access to these documents could limit public oversight of government surveillance technologies. coming up after the break, Ben Yellen unpacks Anthropics lawsuit against the Pentagon, and AI Eyewear leads to awkward exposures. Stay with us. AI is changing how enterprises operate and how they stay protected. It's time to eliminate risk and protect innovation. From March 23rd through the 26th, join Trend AI for actionable AI security insights. Catch impactful sessions at RSAC,
Starting point is 00:13:46 Then unwind and grab a bite at their lounge in Trapasueño. Experience industry-leading AI security in person, engage with the experts, and get your chance to win $500,000. San Francisco lets AI fearlessly. Learn more at trendmicro.com slash RSA. If you're defending a network today, there's a simple question worth asking.
Starting point is 00:14:17 What does the attackers see when they look at your organization? Nordsteller helps us. helps answer that. Nordsteller is a threat exposure management platform that gives security teams visibility into external risks, including leaked credentials, active session tokens, impersonation attempts, and exposed assets across the surface web and the dark web. It's built to help organizations detect the consequences of breaches early before attackers turn access into action, from monitoring for info-stealer malware logs to identifying cyber-squadding and brand abuse, Nord Stellar helps teams focus on the threats that actually matter.
Starting point is 00:14:57 Executives get clear, actionable insights tied to business risk. Security teams get real-time alerts and one of the largest deep and dark web intelligence pools in the industry. Cybercriminals may already be looking for your weak spots. Don't make it easy for them. Be the one that's prepared. Defend your business with Nord Stellar. Use the code CyberWire 10 to unlock your exclusive discount.
Starting point is 00:15:21 Go to Nordstellar.com slash Cyberwire Daily and learn more. And joining me once again is Ben Yellen. He is from the University of Maryland Center for Cyber Health and Hazard Strategies. But more important than that, he is my co-host on the caveat podcast where we discuss privacy, surveillance, law, and policy. Ben, welcome back. Good to be with you again, Dave. So let's jump in here with the latest on this kerfuffle between Anthropic and the Pentagon.
Starting point is 00:16:00 Can you bring us up to date here, Ben? Sure. So just to catch everybody up, Anthropic had a deal with the Pentagon. They were going to be involved in a bunch of different Department of War, I guess I should call it, activities. But they tried to put up some guardrails saying that they weren't going to be fully compliant when it came to fully autonomous weapons systems and mass domestic surveillance. And that disagreement came out into public view at the end of February. and then the Pentagon not only decided to terminate the contract with Anthropic,
Starting point is 00:16:35 but the administration issued this executive order saying that because Anthropic now represents a risk to the supply chain, any federal agency and any federal contractor is prohibited from doing business with Anthropic. And the particular contract with the Pentagon was replaced with a contract with OpenAI, so a different company. Anthropic is filing a law.
Starting point is 00:16:59 lawsuit in federal court in the Northern District of California challenging this executive order. I think they are mildly upset about the fact they lost this Pentagon contract, but they are far more upset, and I think reasonably so with this designation of them as a supply chain risk. They think that this designation is pretextual, that it is punishing them for their position on AI ethics and the use of their AI tools. for such serious things as autonomous weapons systems and mass surveillance. So their lawsuit is on a couple of grounds, first, that this is arbitrary and capricious under the Administrative Procedure Act.
Starting point is 00:17:42 The argument here is that this is an administrative action that's so far a field of the administration's authority and is arbitrary in a sense that it doesn't actually further any meaningful government interests in a compelling way. So that's one part of their argument. The other part, which I think is more interesting for our purposes, is that this is a violation of the First Amendment right to free speech and free association. What they are alleging in the suit is that they're being punished for their speech.
Starting point is 00:18:14 And by speech, it's public pronouncements by the CEO about the risks of unregulated AI. And it's their very public refusal to give the Pentagon carte blanche when it comes to these particular issues. the Constitution obviously protects First Amendment rights, and the way the Supreme Court has interpreted that is if the government is trying to take away constitutional rights as it relates to the content of speech, the government has to have a very good reason to do so,
Starting point is 00:18:43 and that's called strict scrutiny. And under strict scrutiny, the government has to have a compelling interest, and I think you could make an argument, and the government will make the argument, that national security is a compelling interest. But the means of achieving that interest have to be, narrowly tailored. And I think that's where the government is going to run into problems. If the government actually thought that Anthropic represented some type of national security
Starting point is 00:19:07 threat, then I think it would have been appropriate for them to terminate the Pentagon contract, but not to prohibit any other federal agency or contractor from coming up with an agreement with Anthropic for the use of their AI tools for even banal occurrences. Right. Like summarizing data in the Department of Treasury for the Bureau of Labor Statistics. We mentioned on caveat, you know, coming up with nutritional menus for kids in schools or something, you know, something having nothing to do with national security. Right. So it goes so far a field of what the government's purported interest is here, compelling interest for the purposes of strict scrutiny, that I think there's a very good chance that the federal court in the Northern District of California issues.
Starting point is 00:19:56 some type of preliminary injunction or temporary restraining order, preventing the federal government from enforcing this administration's action on the supply chain risk issue. And so suppose they rule in Anthropics favor, what does that mean? And they still don't get the Pentagon contract, but they don't have this poison pill for excluding them from the entire federal government. Exactly. So the remedy is a little bit complicated here, but I think most likely scenario is, yes, they would not renew that Pentagon contract that had previously
Starting point is 00:20:32 been in place. I think the new contract with OpenAI, which was agreed to on the same day, that Anthropic was put on this naughty list for supply chain purposes, that's going to stay in place, but I think they would now be at least temporarily able to contract with federal agencies and contractors for business purposes to sell the whatever clause. service is most valuable to a particular federal agency or contractor. There are questions about whether A, Anthropic would want to do that or given the chance of this being some type of injunction of being reversed on appeal at a federal appeals court, whether agencies or federal contractors are going to want to take that risk.
Starting point is 00:21:15 And I think there could be a chilling effect where even if there's a favorable court ruling that removes this supply chain risk designation from Anthropic, you get contractors and federal agencies saying, like, yeah, let's see what happens first. We don't want to be in a situation where we've developed the system. And then Anthropics, contracts with the federal government are summarily terminated once again
Starting point is 00:21:42 because of an appeals court holding. So certainly those are considerations. But I do think, and this is me prognosticating, is never, never safe if you look at my record of bets on Fanduel. You don't want to take my predictions at face value necessarily, but I do think that Anthropic has a very good case here. All right. Well, we will have a link to that story in the show notes. Ben Yellen is from the University of Maryland Center for Cyber Health and Hazard Strategies and also my co-host on the caveat podcast. Ben, thanks so much for joining us. Great to be with you, Dave.
Starting point is 00:22:20 No, it's not your imagination. Risk and regulation really are ramping up. And customers expect proof of security before they'll sign that deal. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform. Whether you're preparing for SOC2 or managing an enterprise governance, risk, and compliance program, Banta helps keep you secure and keeps your deals moving.
Starting point is 00:23:03 Companies like Ramp and writers spend 82% less time on audits with Vanta. That's not just faster compliance, that's more time for growth. Take it for me. If you're thinking about compliance, take the time to check out Vanta. Get started at vanta.com slash cyber. One plus one equals more of the greatest stories. Hulu on Disney Plus. Stories about our survivors.
Starting point is 00:23:33 The most dangerous planet. Family. Retribution. Murder. Prophecy. Beer and propane. Why are we doing? Blake Panther. The ultimate soldier. Chicago, all right.
Starting point is 00:23:48 The best of the best stories now with even more from Hulu. Amazing. Have it all with B on Disney Plus. And finally, Meta's AI smart glasses promised hands-free insight into the world around you. Some users now suspect the world. unfortunately, was looking back. A new class action lawsuit alleges
Starting point is 00:24:17 Meta misled customers about privacy protections after reporting found contractors at a Kenya-based subcontractor reviewing footage captured by the glasses. According to the complaint, that footage sometimes included extremely private moments, including nudity and other intimate situations. The plaintiffs argue Meta's marketing,
Starting point is 00:24:40 which described the glasses as built for your privacy and controlled by you, did not make it clear that shared content could be reviewed by human moderators. Meta says human review may occur when users choose to share media with meta AI, which the company says helps improve the service. The case underscores a growing reality of AI products. Sometimes smart devices still rely on very human eyes. And that's the For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity.
Starting point is 00:25:40 If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at n2K.com. N2K's lead producers, Liz Stokes. We're mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazas. Our executive producer is Jennifer Iben. Peter Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening.
Starting point is 00:26:08 We'll see you back here tomorrow. If you only attend one cybersecurity conference this year, make it R-SAC 2026. It's happening March 23rd through the 26th in San Francisco, bringing together the global security. community for four days of expert insights, hands-on learning, and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges and shaping what comes next. Register today at rsacconference.com slash cyberwire 26. I'll see you in San Francisco.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.