CyberWire Daily - Prosper’s not so prosperous week.

Episode Date: October 17, 2025

Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. E...uropol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined by Danny Jenkins who is talking about defending against AI. And who let the bots out? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Danny Jenkins, CEO and Co-Founder of ThreatLocker, talking about defending against AI. You can tune into Danny’s full conversation here. Selected Reading Have I Been Pwned: Prosper data breach impacts 17.6 million accounts (BleepingComputer) Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign (SecurityWeek) Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits (Trend Micro) Critical ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates  (Cybersecurity News) European police bust network selling thousands of phone numbers to scammers (The Record) North Korean operatives spotted using evasive techniques to steal data and cryptocurrency (CyberScoop) New Singapore law empowers commission to block harmful online content (Reuters)  Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide (WIRED) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed. When it comes to hiring, Indeed is all you need. Stop struggling to get your job post.
Starting point is 00:00:30 noticed. Indeed's sponsored jobs helps you stand out and hire fast. Your post jumps to the top of search results, so the right candidates see it first. And it works. Sponsored jobs on Indeed get 45% more applications than non-sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K Cyberwire. Many of my colleagues here came to us through Indeed. Plus, with sponsored jobs, there are no subscriptions, no long-term contracts. You only pay for results. How fast is Indeed?
Starting point is 00:01:08 Oh, in the minute or so that I've been talking to you, 23 hires were made on Indeed, according to Indeed data worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed. And listeners to this show will get a $75-sponsored job credit to get your job. more visibility at indeed.com slash cyberwire. Just go to indeed.com slash cyberwire right now and support our show by saying you heard about Indeed on this podcast.
Starting point is 00:01:39 Indeed.com slash cyberwire. Terms and conditions apply. Hiring? Indeed is all you need. Prosper Data Breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Ryside a ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime as a service operation. Fevertail and Otter Cookie merge and display new functionality.
Starting point is 00:02:22 Singapore cracks down on social media. On our industry voices segment today, we are joined by Danny Jenkins, who is talking about defending against AI. And who let the bots out? Today is Friday, October 17, 2025. I'm Maria Varmazis, host of T-minus space-te. Daily, taking the mic for Dave Bittner. And this is your CyberWire until briefing. Thank you for joining me on this Friday. Let's get into it. A data breach disclosed last month by Financial Services Company Prosper affected more than 17 million accounts, according to bleeping
Starting point is 00:03:18 computer. Prosper disclosed that the attackers stole Social Security numbers belonging to Prosper customers and loan applicants, but didn't share how many users were impacted. Have I Been Poned disclosed the alleged scope of the breach yesterday, saying that the breach affected 17.6 million unique email addresses, as well as names, dates of birth, government-issued IDs, employment status, credit status, income levels, physical addresses, IP addresses, and browser user agent details. Prosper spokesperson told Bleeping Computer that the company, quote, is not able to validate have I been Pohn's report, adding the investigation to determine what data was affected and to whom it belongs remains ongoing. Microsoft disrupted a Rysider ransomware operation
Starting point is 00:04:06 by revoking more than 200 certificates that were being used to sign malicious teams installers according to Security Week. The company attributes the activity to the financially motivated threat actor called Vanilla Tempest. Microsoft stated, running the fake Microsoft Teams setup delivered a loader, which in turn delivered a fraudulently signed Oyster backdoor. Vanilla Tempest has incorporated Oyster into their attacks as early as June 2025, but they started fraudulently signing these backdoors in early September 2025. To fraudulently sign the fake installers and post-compromise tools, Vanilla Tempest was observed using trusted signing, as well as SSL.com,
Starting point is 00:04:46 DigiCert, and Global Sign Code Signing services. Trend Micro has published a report on the exploitation of a Cisco SNMP vulnerability to deploy rootkits on older Linux systems. The researchers have dubbed the operation Zero Disco after the universal password used by the malware. The report notes Trend Micro Telemetry has, as of writing, detected that Cisco 9400 series and 9300 series are affected by this operation. The operation also affected Cisco 3750G devices with no guest shell available, but this type of device has already been phased out. And Tread Micro added this.
Starting point is 00:05:27 Currently, there is no universal automated tool that can reliably determine whether a Cisco switch has been successfully compromised by the Zero Disco operation. So if you suspect a switch is affected, we recommend contacting Cisco TAC immediately and asking the vendor to assist with a low-level investigation. investigation of firmware, ROM, and boot regions. Security researchers have disclosed critical vulnerabilities in ConnectWise, a widely used remote monitoring and management platform. Attackers could exploit these flaws to gain unauthorized access, execute arbitrary commands, or escalate privileges across managed networks. Some of the issues stem from inadequate input validation and weak authentication checks
Starting point is 00:06:10 in key modules, including web interfaces and API endpoints. Because remote monitoring and management tools inherently have deep privileged access, exploiting them can grant attackers broad control over client environments. So users are strongly urged to apply vendor patches immediately, audit all privileges and sessions, and monitor logs for suspicious behavior. The situation does underscore how remote monitoring and management and managed service provider software do remain prime targets, as when compromised, they act as, force multipliers for attackers.
Starting point is 00:06:47 A Europol-coordinated operation resulted in the arrest of five Latvians accused of operating a service that sold phone numbers to scammers, according to the record. Police seized 1,200 SIM box devices and 40,000 active SIM cards. Europol stated, the online service created by the Criminal Network offered phone numbers registered to people from over 80 countries for use in criminal activities. It allowed perpetrators to set up fake accounts for social. social media and communication platforms, which were subsequently used in cybercrimes while obscuring the perpetrator's true identity and location.
Starting point is 00:07:23 North Korea-linked operators are using stealthy, modular malware, and social engineering to steal credentials and cryptocurrency. Cisco Talos and Google's Threat Intelligence Group observed campaigns linked to famous Cholima that involved the use of beavertail and otter cookie, which are separate but complementary malware strains, frequently used by the North Korea-aligned threat group. Researchers said that their analysis determined the extent to which Beavertail and Otter Cookie have merged and displayed new functionality in recent campaigns. Those recent campaigns trick job seekers into installing loaders that deploy info-stealers,
Starting point is 00:07:59 backdoors and ransomware, often rotating tool sets and infrastructure to evade detection. Attackers favor low-noise tactics like rust-based binaries, transacted hollowing, and impersonation of legitimate services to blend malicious traffic and reduce forensic footprints. Compromised endpoints are leveraged for targeted crypto theft, data exfiltration, and follow-on ransomware,
Starting point is 00:08:21 while operators rapidly switch payloads and C2 servers to frustrate defenders. Singapore's parliament passed a sweeping new law, granting authorities broad powers to block harmful online content, target platforms with fines up to $1 million Singaporean dollars, or the equivalent of $740,000 U.S. dollars, and require removal of content at, quote, short notice. The legislation
Starting point is 00:08:45 empowers the Infocom Media Development Authority to issue takedown orders without court approval and mandate platforms to use proactive monitoring tools. Platforms that fail to comply may be blocked in Singapore, and foreign services face stricter obligations if they reach large audiences in the country. While dubbed a move to protect society from disinformation and cyber harm, critics warn that it risks censorship and overreach, especially given its vague definition of what harmful speech means. Civil Liberties groups say that the law could chill online discourse and give the state sweeping control over public narratives. After the break, we have our industry voices segment with Danny Jenkins, CEO and co-founder of
Starting point is 00:09:36 Threat Locker, talking about defense. vending against AI. And who let the boss out? What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these?
Starting point is 00:10:08 old tools and manual processes. That's where Vanta comes in. Vanta automates the manual works so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems,
Starting point is 00:10:24 centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready. All the time. With Vanta, you get everything you need to move faster, scale confidently, and finally
Starting point is 00:10:44 get back to sleep. Get started at Vanta.com slash cyber. That's V-A-N-T-A-com slash cyber. And now, a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks. Allow listing is a deny-by-default software that makes application control simple and fast. Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, network resources, and other applications they truly need to function.
Starting point is 00:11:26 Shut out cybercriminals with world-class endpoint protection from threat locker. On our industry voices segment, Dave Bittner recently sat down with Danny Jenkins, CEO and co-founder of Threat Locker, to talk about defending against AI. Here's their conversation. All right. So today we are talking about zero trust in this era of intelligent malware and dealing with AI. Before we dig into the AI part of this story, I would love to hear from you how you define zero trust?
Starting point is 00:12:08 So essentially the idea of zero trust is to allow what is needed and block everything else or deny everything else, essentially least privilege. So in the case of applications, it means if an application is required to do your job or function, it should be allowed to run. If it's not, it should be blocked, whether it's malware or whether it's a game or a remote access tool. In the case of what applications should do, we'd say if an application needs to talk to the internet or needs to see your files, it should be able to see your files. If it doesn't, it
Starting point is 00:12:36 shouldn't. How has the state of the art of zero trusts changed over the past few years? So I think the biggest change is really the usability of it. And that's where we've really focused is how do we make this so it's hours and days at worst to deploy, not months and years to deploy. And traditionally, zero trust was very, very complicated if you weren't a brand new business because nobody knew what they needed and what they didn't. And I think what's changed is the technology is the ability to learn from the history of applications, know what applications need to do, so you can apply those policies without effort. Well, let's talk about AI. I mean, in this era we find ourselves in, certainly rapid change here. How has AI affected people's ability to rely on zero trust?
Starting point is 00:13:24 So I think it's made it more important because now we're in a situation where we're trying to determine things are good or bad that have never been seen. before. If we go back four years ago, you had to be a software engineer to write a piece of malware or you had to buy it. And antivirus companies, EDRs would add that malware into that database as soon as they saw it. And it was a few days behind, a few weeks behind, a few months behind sometimes, but they would eventually get it added into their database. Today, anyone with a computer, there's now five, six, seven billion people in the world that can create malware. That malware has never been seen before. It's very hard to determine if its intent is good or bad. Is it a piece of backup software that's copying your files to the internet or is a piece of
Starting point is 00:14:05 malware? And what that's meant is zero trust is so much more important because this unknown is going to be blocked by default. And what are you all seeing in terms of what the bad guys are doing embracing AI? So I think the two areas we see the most of is AI created malware, malware that's brand new, never seen before. And even something as simple as chat GPT, if you ask it to write you are a piece of backup software to find where you store your files and upload it into the internet. It will do that and it will give you the code and spit it right out. So we're seeing a lot of malware created like that that hasn't been seen, but also a lot more scamming. It's a lot easier for an attacker to send you a convincing email saying, hey, I need to update
Starting point is 00:14:48 your machine, can you click on this? Whereas previously these emails were badly written. They were poor English. It took a long time. Again, they were being reused and getting picked up by anti-spam. Now, every time you're going to AI, or you can go into any kind of AI LLM and say, write me an email as if I'm in the HR department telling people they should update their machines for security reasons. And it will write a really well-crafted email. They can then hit regenerate and it'll create functionally the same email, but very uniquely different email, so it's harder to be detected by spam. Even voice AI was seeing sometimes not as much, where attackers definitely when they're more targeted are simulating someone's voice to call
Starting point is 00:15:26 and saying, can you run this on your machine? Can we talk about some of the challenges that folks are facing when it comes to AI and cybersecurity? More generally, what are some of the things that you all are seeing here that people are challenged with? So I think there's two challenges. One is the risk of attack because of the increase in AI, so that malware, that spam email, that scamming email.
Starting point is 00:15:48 But the other challenge is companies and users using AI without necessarily the knowledge of the company and copying company data into LLMs, then maybe don't keep that confidential, we'll build that into their training model, IP, source code. And that's a big concern as well. And companies really don't know how to control what tools the users are using
Starting point is 00:16:10 and what to do about that. So that's probably the second biggest challenge. Well, are there any particular areas where Zero Trust has challenges when it comes up against the AI specter, if you will. So I think only to the point of where it's implemented. And we also have to classify AI.
Starting point is 00:16:34 If we think about AI in 2010, 2011, it was all the big word, big data, AI, machine learning. And AI in those times was we're going to build out and use data from the past to make decisions about the future image recognition, even when, if you think back to Tesla self-driving cars or at least partially self-driving cars in 2016, 2017. Then suddenly we've got the second wave of AI, which is really LLMs, the chat GPTs, open AI, the GROCs, those type of things. And what we've seen is a lot of people have reclassified what was previously considered as machine learning or intelligence based on previous data sets as AI, but then we also have the LLMs. And that's what's really new is this LLM, the ability to create content based on that. I think the only risk where it comes to a zero trust environment is the person that's implemented.
Starting point is 00:17:25 it could be convinced to implement something because they've got a voice call from somebody but it's less likely because they're the people that are trained on cybersecurity. These are the processes we follow. This is what we're going to do. In a non-zero trust world while we're trying to detect,
Starting point is 00:17:41 AI is incredibly bad at detecting malicious intent. And it can also be manipulated. Data can be injected in. So if you, for example, created a piece of malware, put it on the internet, wrote a blog post about it, this software does this, software and then you asked AI to research that because it doesn't exist anywhere else it's going
Starting point is 00:18:00 to go to the one source on the internet which is the attacker's source so AI is really bad at detecting but from a zero trust point of view because we're blocking by default it really doesn't matter too much well I know you and your colleagues at threat locker talk about zero trust being not just technology but a mindset why is that distinction important so technology is a tool So if you think about, if you say I'm going to implement zero trust and you think I'm going to buy a tool. So if you buy Threat Locker and you implement our allow listing and our network controls to block network ports and you implement our storage to block storage, you implement detect policies that automatically limit how much you can upload. That is a set of tools to help you do something.
Starting point is 00:18:43 But the starting point, and this is not just about technology, the starting point in anything is not to buy the tool, but what do I want to achieve? How do I achieve it? And it could also be granting a permission to a file. A lot of companies back in, well, even today, will set up a file server or a SharePoint, allow the whole company to access that SharePoint, even if they don't need to access it.
Starting point is 00:19:03 And they say, well, it's okay. It's only the marketing department. I don't think our marketing people are going to steal our source code. And well, in most cases, that's true. You do have it inside a threat. So when you think about zero trust, you're saying it's not just about stopping untrusted software. It's also about making sure your marketing team
Starting point is 00:19:19 don't have access to your source code, or this department developers don't have access to this source code. And when you think about that mindset, it really helps you everywhere. And I'll give you one example. I remember back in 2015, I think it was, I was dealing with a ransomware attack. The entire business was encrypted.
Starting point is 00:19:36 Someone had got in, Ranmauer encrypted all of the file shares that got on as a domain administrator, all of the file shares, all of the laptops, everything, except one share. And that was the payroll share. And the reason the payroll share wasn't encrypted was because someone, one at some point said, I don't want the IT guy seeing the payroll, so I'm going to remove
Starting point is 00:19:55 domain admin permissions from payroll. And the payroll wasn't encrypted. Now, if they had taken a zero-trust approach to even files at that point, they wouldn't have been able to encrypt the marketing and the accounts and the other things that were allowed open to the whole company. So it's not just about stopping untrusted software. That's probably one of the most important zero-trust approaches you can take, but it's also about stopping files being copied and uploaded where they shouldn't be and other things like that. Yeah, that's a fascinating story. I mean, in an attempt to protect some information
Starting point is 00:20:26 that they felt shouldn't have been accessible to a certain employee, they ended up making themselves less secure. Well, in that case, the payroll more secure, but they only protected the payroll. Everything else was allowed. So the domain admin could access everything except the payroll. And they took away the payroll, and that was the only thing that wasn't encrypted
Starting point is 00:20:47 because they didn't trust the IT guy with the payroll. I see. Where do you suppose we're headed with this? As you look towards the future and zero trust and the development of AI, what's in your crystal ball? So I think the future, well, I know the future of security has to adopt a least privilege approach and call it zero trust, call it least privilege,
Starting point is 00:21:10 but it has to. If we think about, look at the breaches, I mean, look at MGM. Do we think MGM, one of the most advanced companies, in the world when it comes to security. They have cameras and monitors all of their business. Do you think their cybersecurity didn't have a SOC and an EDR and some of the best detection tools in the world? And yet we saw them completely shut down from someone running a piece of malware or giving someone access. So I think as a world, we have to accept that the future of security is about blocking first, setting controls, making sure people don't have access to more
Starting point is 00:21:41 than they need to. And there's no choice of that. And I think we've proven that as a company, because today we've got nearly 70,000 companies that have implemented zero trust. 69,900 of them had never taken or even considered that approach before. And the future is nearly every business will have to adopt this. And that's going to change the paradigm of cybercrime, because it's going to be much harder for the criminals, and they're going to have to start doing something else. Do you find that people come to the table,
Starting point is 00:22:11 potential customers for you, feeling as though this is going to be a much heavy, lift than it actually is, the conversion to using zero trust? Absolutely. Nearly 99% of our customers think this is going to be a complete disaster. And we as a company have to educate, show them the reason. We do extended trials for that reason. We'll say, why don't you do a long trial? We'll deploy it.
Starting point is 00:22:33 We'll actually secure it. We'll do simulations to show you what will happen. But it's always starting with fear and then always being pleasantly surprised that with the right tool set, the implementation doesn't have to be. difficult. Well, before I let you go, just a tip of the hat, how much me and my crew enjoyed being at Zero Trust World last year in Florida and being able to do our Hacking Humans show live, it's quite an event you and your colleagues through down there. Okay, I appreciate that. Thank you. Yeah. Hopefully we see you again next year. We're looking forward to it. And that was Dave Bittner,
Starting point is 00:23:11 sitting down with Danny Jenkins, CEO and co-founder of Threat Locker. Talk about Defending Against AI. And if you enjoyed their conversation and want to hear the full interview, head over to our industry voices page where there's a link in the show notes. At Talas, they know cybersecurity can be tough and you can't protect everything. But with Talas, they know cybersecurity can be tough and you can't protect everything. But with Talas, you can secure what matters most. With Talis's industry-leading platforms, you can protect critical applications,
Starting point is 00:23:53 data and identities, anywhere and at scale with the highest ROI. That's why the most trusted brands and largest banks, retailers, and healthcare companies in the world rely on Talas to protect what matters most. Applications, data, and identity. That's Talas.
Starting point is 00:24:11 T-H-A-L-E-S. Learn more at Talisgroup.com. slash cyber with amex platinum access to exclusive amex pre-sale tickets can score you a spot track side so being a fan for life
Starting point is 00:24:30 turns into the trip of a lifetime that's the powerful backing of amex pre-sale tickets for future events subject to availability and varied by race terms and conditions apply learn more at mx.ca slash y annex And finally today, Niantic, the company that gave us ingress and Pokemon Go, is once again blending the digital world with the real one.
Starting point is 00:24:56 Their new AR pet game called Parodot now comes with a new twist. Your alien dog can talk. Through a partnership with Hume AI and Snap's latest spectacles, Niantic's dots, and those would be colorful dog-sized companions you can only see with augmented reality, can now act as your personal tour guide. Now, I want you to picture walking along the San Francisco waterfront when your virtual pipes up to share a fun historical fact about the pier. It's part navigation, part trivia night, and part fever dream.
Starting point is 00:25:29 Developers of this say that it is a glimpse of the future, one where AI companions can help guide us through the world around us. And for now, it's a chance to see what happens when man's best friend meets machine learning. Just remember, if you're alienate. and dog starts giving you directions, don't forget who's really holding the leash. And that's The Cyberwire. For links to all of today's stories, check out our daily briefing at the Cyberwire.com.
Starting point is 00:26:13 And be sure to tune in to an all-new research Saturday tomorrow where Dave Vittner is joined by Eclipseum researchers Jesse Michael and Mickey Chateauv to share their work on bad cam, now weaponizing Lytics webcams. That's Research Saturday. Check it out. It's the end of this stint for me sitting in for Dave. He will be back on the mic on Monday. And please check out our sister podcast, T-minus Space Daily, where yours truly is the host on your favorite podcast app. We'd love to know what you think of our podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like the show, please share a rating and review in your podcast app.
Starting point is 00:26:53 Please also fill up the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Caruth. Our producer is Liz Stokes. We are mixed by Elliot Peltzman and Trey Hester with original music by Elliot Peltzman. Our executive producer is Jennifer Ibin. Peter Kilphy is our publisher. and I'm Maria Vermazas, in for host, Dave Bittner. Thank you for listening.
Starting point is 00:27:17 Have a wonderful weekend. researchers and top VC firms building trust into tomorrow's digital world. Kick off the day with unfiltered insights and panels on securing tomorrow's technology. In the afternoon, the eighth annual Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration, and funding. The Innovation Expo runs all day, connecting founders, investors, and researchers around breakthroughs in cybersecurity. It all happens November 4th.
Starting point is 00:28:12 in Washington, D.C. Discover the startups building the future of cyber. Learn more at cid.dotribe.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.