CyberWire Daily - Reflections in a broken vault.
Episode Date: August 8, 2025Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover maliciou...s NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrate AI license plate readers into their parking lots. The U.S. federal judiciary announces new cybersecurity measures after cyberattacks compromised its case management system. CISA officials reaffirm their commitment to the CVE Program. Our guest is David Wiseman, Vice President of Secure Communications at BlackBerry, discussing the challenges of secure communications. AI watermarking breaks under spectral pressure. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by David Wiseman, Vice President of Secure Communications at BlackBerry, who is discussing the challenges and misconceptions around secure communications. Selected Reading HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks (GB Hackers) Yamcs v5.8.6 Vulnerability Assessment (VisionSpace) Columbia University says hacker stole SSNs and other data of nearly 900,000 (The Record) Fake WhatsApp developer libraries hide destructive data-wiping code (Bleeping Computer) New EDR killer tool used by eight different ransomware groups (Bleeping Computer) Home Depot and Lowe's Share Data From Hundreds of AI Cameras With Cops (404 Media) US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks (Infosecurity Magazine) CISA pledges to continue backing CVE Program after April funding fiasco (The Record) CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits (GB Hackers) AI Watermark Remover Defeats Top Techniques (IEEE Spectrum) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
And now a word from our sponsor, Threat Locker,
the powerful zero-trust enterprise solution that stops ransomware in its tracks.
Allow listing is a deny-by-default software that makes application control simple and fast.
Ring fencing is an application containment strategy,
Ensuring apps can only access the files, registry keys, network resources, and other applications they truly need to function.
Shut out cybercriminals with world-class endpoint protection from threat locker.
Researchers uncover multiple vulnerabilities in a popular open source secret.
manager. Software bugs threaten satellite safety. Columbia University confirms a cyber attack.
Researchers uncover malicious NPM packages posing as WhatsApp development tools. A new EDR killer
tool is being used by multiple ransomware gangs. Home improvement stores integrate AI license plate
readers into their parking lots. The U.S. Federal Judiciary announces new cybersecurity measures
after cyber attacks compromised its case management system.
SISA officials reaffirmed their commitment to the CVEE program.
Our guest is David Weissman from Blackberry discussing the challenges of secure communications
and AI watermarking breaks under spectral pressure.
It's Friday, August 8, 2025.
I'm Dave Bittner, and this is your Cyberwire Intel briefing.
Thanks for joining us here today.
It is great to have you with us.
Researchers at Sciata uncovered nine vulnerabilities in Hashikorp Vault, a popular open-source secrets manager.
These flaws, eight of which are now patched, allowed to
attackers to bypass authentication, escalate privileges, and even execute remote code.
The bugs stem from logic errors in vault's core components, including authentication, MFA,
and plugin handling. Some exploits like case variations in usernames, bypass lockouts or MFA.
Others abuse policy normalization to gain route access or trick Valt's trust model using forged
certificates. The most severe enables RCE by uploading malicious plug-ins via the audit log
system, a flaw hiding in plain sight for nearly a decade.
Affecting both open-source and enterprise editions, the report highlights the importance
of patching, tight configuration, and strong identity enforcement to prevent full infrastructure
compromise.
Anti-satellite missiles may be flashy, but hacking is the new space warfeworthy.
fair, while four nations have tested kinetic anti-satellite weapons, it turns out knocking a
satellite offline could be as simple as exploiting bad code. At this year's Black Hat conference,
researchers from vision space technologies demonstrated just how easy it is to hijack a satellite
or its ground station using known software vulnerabilities. To break down what they found and what
it means for satellite security and the growing space economy, here's our own Maria Vermazer.
Our top story comes from the world of space cybersecurity,
because right now it is a very special time in Las Vegas for cybersecurity professionals.
It's affectionately known as Hacker Summer Camp,
a mega week of professional conferences in Las Vegas,
including major events like Black Hat and DefCon,
where researchers often share key findings from their work.
This year's Black Hat Conference included a major finding in the realm of space cybersecurity
from researchers at Vision Space Technologies,
according to a new piece from the register.
The researchers found a number of vulnerabilities,
some rated critical,
and a number of software that is heavily used in the space industry
on board satellites as well as in ground stations.
And those include CryptoLiv, YAMS, OpenC3 Cosmos,
and NASA's core flight system Aquila.
During their Black Hat presentation,
the Vision Space researchers simulated being able to send an unauthorized command
to fire a satellite's thrusters and immediately change its course.
Another vulnerability that they found, when exploited using an unauthenticated telephone,
could completely crash a satellite's onboard software, forcing it to reboot and in some cases fully reset.
Vision space showed that other flaws that they discovered in spaceflight system software allowed for remote code executions,
denial of service attacks, credential leakage, cross-site scripting attacks, or even granted full code execution permissions.
It is crucial to note here that the researchers' response.
responsibly disclosed these vulnerabilities with the software owners, and the vulnerabilities have
subsequently been remediated prior to the Black Hat presentation. In plain language, there are
fixes for all of these problems. And we will have links to the full research posts from Vision
Space in the show notes for you, which includes more detail on their research, along with the specific
CVEs for these vulnerabilities, if that is information that you need.
That's Maria Vermazze's host of the T-Minis Daily Space Podcast.
Columbia University has confirmed a cyber attack that exposed personal data of nearly 870,000 individuals.
The breach, discovered in late June, affected social security numbers, contact details, academic records,
financial aid, and health insurance information.
The hackers accessed systems in mid-May and stole data to allegedly support a political agenda
opposing affirmative action.
While patient data at Columbia's Medical Center was untouched,
the attack disrupted IT systems campus-wide.
The university is offering two years of free credit monitoring to those impacted.
Researchers at Socket have uncovered two malicious NPM packages
posing as WhatsApp development tools that contain destructive data wiping code.
These packages, still live on NPM,
have been downloaded over 1,100 times and mimic legitimate WhatsApp bot libraries.
A hidden function fetches a JSON-KillSwitch list from GitHub, sparing specific Indonesian phone
numbers. If not on the list, a package executes and recursively deletes local files.
Though currently inactive, the code includes a commented-out data ex-filtration feature.
Additional packages by the same publisher could turn malicious with future updates.
Meanwhile, Socket also identified 11 malicious Go packages using obfuscated code to run remote payloads in memory.
Most are still active, primarily targeting CI servers and Windows machines.
Developers are urged to double-check dependencies for hidden threats.
A new EDR killer tool, seen as the successor to EDR Kill Shifter, is being used by eight ransomware gangs.
including Ransom Hub, Medusa, and Kielin.
The tool disables antivirus and security tools on compromised systems,
helping attackers move laterally and deploy ransomware undetected.
It uses obfuscated code and loads a malicious driver via a bring-your-own-vulnerable driver method.
Sophos researchers believe the tool was developed collaboratively
with each gang using a unique build,
reflecting a growing trend of shared tooling in ransomware operations.
Public records reveal that Lowe's and Home Depot have quietly integrated
AI-powered flock license plate readers into their parking lots
and shared access to this surveillance data with law enforcement.
According to an investigation by 404 media,
the Johnson County Texas Sheriff's Office has access to 173 Lowe's locations
nationwide and multiple Home Depot sites within Texas, as well as gunshot detection tools at
some stores.
Flock says private businesses choose whom to share data with, but the records suggest extensive
law enforcement partnerships.
While Home Depot confirmed law enforcement collaborations, neither company addressed specifics.
Critics, like the EFF, warn of risks to customer privacy, especially when surveillance
tech can be used without warrants or accountability. The report highlights a growing trend,
private businesses feeding real-time surveillance data into public law enforcement networks,
often without customers' knowledge. The U.S. Federal Judiciary has announced new cybersecurity
measures after recent sophisticated cyber attacks compromised its case management system.
The breach, first reported by Politico, may have exposed confidential court-dourts.
documents and identities of informants in multiple federal courts. The Administrative Office of
the U.S. courts is now working with courts to secure sensitive data and restrict access to sealed
filings. While most documents are public by design, some contain protected or classified
information, making them prime targets for nation-state hackers and cybercriminals. The judiciary
had previously pledged to isolate sensitive documents after a 2020 brief.
officials warn that the threat landscape is growing with adversaries seeking to exploit legal
systems for espionage disruption or extortion the judiciary aims to restore trust through tighter
digital safeguards this week at black hat sissa officials reaffirmed their commitment to the
CVE program after an april contract dispute raised fears about its future the CVE system vital for
tracking cybersecurity vulnerabilities faced a brief funding scare that SISA now says was a contract
issue, not a budget problem. Despite calls to shift CVE oversight to a nonprofit with global governance,
SISA plans to continue managing and improving the program. Officials emphasized its foundational
role in cybersecurity and pledged enhancements like richer vulnerability data and expanded collaboration
with international partners.
SISA also discussed broader efforts,
including AI threat response,
cyber hygiene tools,
and reducing exposed industrial systems online.
So far, the agency has contacted 3,000 entities
to secure internet-exposed systems,
achieving an 80% success rate and reducing risks.
Yesterday, SISA issued 10 advisories
warning of critical vulnerabilities
in various industrial control systems, affecting sectors like energy, manufacturing, and
transportation. The flaws include unauthenticated access, buffer overflows, path traversal,
and improper certificate validation across platforms from Delta Electronics, Rockwell Automation, Mitsubishi
Electric, and others. Some vulnerabilities score as high as 9.8 on CVSS. These advisories
emphasize the urgency for ICS operators to patch systems and reinforce security.
Coming up after the break, my conversation with David Weissman from Blackberry
discussing the challenges of secure communications and AI watermarking breaks under spectral
pressure. Stay with us.
New adversary tactics and emerging tech
to meet these threats is developing all the time.
On threat vector, we keep you a step ahead.
We dig deep into the threats that matter and the strategies that work.
How do they help that customer know that what they just created is safe?
The future is now and our expectations are wrong.
Join me, David Moulton,
Senior Director of Thought Leadership for Unit 42 at Palo Alto Networks,
and our guests who live this work every day.
We're not just talking about some encryption and paying multimillion dollar ransom.
We're talking about fundamentally being unable to operate.
Automated eradication and containment.
So being able to very rapidly ID what's going on in an environment
and contain that immediately.
They're hiding in plain sight.
So if you're looking to sharpen your strategy and stay ahead of what's next,
tune in and listen to Threat Vector, your frontline for security insights.
CISOs and CIOs know machine identities now outnumber humans by more than 80 to 1,
and without securing them, trust, uptime, outages, and compliance are at risk.
CyberArc is leading the way with the only unit.
platform purpose-built to secure every machine identity, certificates, secrets, and workloads
across all environments, all clouds, and all AI agents.
Designed for scale, automation, and quantum readiness, CyberArc helps modern enterprises
secure their machine future.
Visit cyberarc.com slash machines to see how.
Compliance regulations, third-party risk, and customer security demands are all growing and changing fast.
Is your manual GRC program actually slowing you down?
If you're thinking there has to be something more efficient than spreadsheets, screenshots, and all those manual processes, you're right.
GRC can be so much easier.
And it can strengthen your security posture while actually driving revenue.
for your business. You know, one of the things I really like about Vanta is how it takes the
heavy lifting out of your GRC program. Their trust management platform automates those
key areas, compliance, internal and third-party risk, and even customer trust, so you're not
buried under spreadsheets and endless manual tasks. Vanta really streamlines the way you gather and
manage information across your entire business. And this isn't just theoretical. A recent IDC
analysis found that compliance teams using Vanta are 129% more productive. It's a pretty impressive
number. So what does it mean for you? It means you get back more time and energy to focus on what
actually matters, like strengthening your security posture and scaling your business.
Vanta, GRC, just imagine how much easier trust can be. Visit Vanta.com slash cyber to sign up today for a
free demo. That's V-A-N-T-A-com slash cyber.
David Weissman is Vice President of Secure Communications at Blackberry. I recently caught up with
him for a discussion about the challenges and misconceptions about secure communications.
Where we find ourselves today is that the number of risk that people are facing in real life to their communication security is higher than ever, and the pace of those risks in the sophistication is accelerating.
And that's really driven by two things. One, the focused attacks on the telecommunication networks around the world by third parties, including governments, coupled with the,
the rise of AI for generating deep fakes and for targeting when to do identity and spoofing
attacks. Well, let's dig into both of those. I mean, when you talk about the threats to the
telecoms themselves, how does that trickle down to the users, the business users and us as individuals?
Yeah, what was found out last year in the U.S., there was an attack called Salt Typhoon that
was reportedly launched by the Chinese government, and what they did is they embedded malware
into all of the U.S. telephone networks. And with that, they were able to have real-time visibility
into who's calling whom, who's messaging whom, and even listening in to phone calls and reading
text messages. And since then, it turns out those types of attacks are happening around
the world. So, you know, at this point, you have to assume that, you know, all of the telephone networks
are compromised.
And as a result, people are saying,
I need to start protecting my communications
by using things that are end-to-end encrypted.
So we've seen a massive rise
and consumer apps such as WhatsApp,
such as Signal, these types of applications.
And while that does mitigate some of the risk,
at least from this particular salt typhoon type of attack,
it opens up a whole other set of risk,
particularly for regulated industries and for governments.
Well, I mean, let's go there.
What are some of the risks that people need to be concerned with
with some of these secure apps?
Yeah, the first risk is around identity
and having confidence who you're communicating with.
You know, there's been a lot of also in the U.S. press recently
around the wrong persons added into a chat group, right?
Sort of famously, yes.
Yes, yes.
So what drives that is these, at the end of the day,
they're open registration systems.
Anyone can sign up
and anyone can basically fake an identity.
Since it's open, you have no true confidence
in who you're communicating with.
And sometimes it may just be mistakes.
Other times, it could be specific malicious activity.
Either one are possible because of the open registration,
public registration nature of most of these consumer applications.
The other thing that happens is since you can spoof identities, you can use AI deepfakes to start delivering very convincing messages.
So it's been in the press recently that senior government officials on these type of applications got voice messages from the Secretary of State.
It sounded 100% like the Secretary of State.
Now, fortunately, they called back and said, hey, did you really leave me this message?
That just kind of shows how easy it is to, once you have access to a system, how easy it is to introduce fake information, do spoofing of attacks.
And then it's even been identified that with these types of systems, the Russian intelligence has found a way to insert themselves into the middle silently as a secondary device and see all of the communications and listen in and no one even knows they're there.
so while the first set of attacks was the public phone network itself this next one round of attacks has been okay now that we've got everybody on these platforms let's take advantage of that what about the encryption itself i mean if we say we're using an app like signal for example just you know hypothetically um how much confidence should we have in that part of the chain i think the encryption itself there's not a
problem with it. It's very high-quality encryption. At the end of the day, all of these systems,
whether they're ones from Blackberry, whether they're ones from Signal, or, and by the way,
WhatsApp uses the signal encryption protocols as an example, they're all built on the same
foundational algorithms. So the difference is, you know, have they been specifically certified?
Do we know who's running the systems versus something a customer or a government controls? But that's
operational it's it's not the security of the actual encryption algorithms it's really the environment
they're used in and then the whole identity topic is the real risk driver there what about the
metadata do do folks get a false sense of security that the communications are secure but then
perhaps the metadata itself is accessible yeah absolutely and there's two aspects
to that. One is visibility
of metadata.
So there have been numerous
reports. One of the most recent was last
summer, AT&T said they'd lost
a year's worth of call
records for all of their users around
the world.
So that's a case where
retrospectively, they'd
had the data somewhere, someone stole
it. What happened with the
Salt Typhoon is instead of that
being retrospective, it
became real-time.
And so you didn't need to steal and then analyze it.
You could get it as it happened, which means the efficacy of attacks can be much more effective.
When you start to think about the messaging applications themselves, you know, often that metadata is inside the encryption tunnels.
So just a casual observer on the network doesn't have access to it.
But the provider of the service has access to it.
So if you read the meta terms and conditions, they explicitly say,
hey, we're not going to listen to your call,
but we're going to mine all that metadata for business purposes.
That means for selling ads.
And that's why you get weird things like you're chatting with someone about some topic
and all of a sudden you get an Instagram ad.
And they didn't need to know what you were chatting about,
but they knew who you were talking to.
They knew what that person's interested in.
You might be interested also.
And I suppose there's the potential for sharing with law enforcement as well, right?
Well, absolutely, and that's the U.S. law, that these service providers, if they're asked, they have to share that data.
So that's the one aspect, and that sharing of that data, that's the second part, right, is, you know, particularly for regulated industries, for governments, they need to keep records of communications for legal purposes.
And if you're using the consumer type system, you don't actually have those records yourself.
So, you know, you've got to figure out how could I get them?
and if you're talking about message content,
what did you type, what documents that you share?
They're not going to be able to give you that.
So you need a system such as BlackBerry provides
that gives the government or the organization
the ability to have those records,
but have in a way that they have full control over it.
So if there is a government request,
if there is a subpoena, they have to come to you directly.
They can't get your data from a telco.
They can't get your data from meta or whoever
because they don't have it.
And that's kind of the second.
part of, you know, if the risk, if you do use those systems, then that data is discoverable
versus if it's the system you have, it's only discoverable with your own knowledge and your
own legal team authorizing release of the information. I see. So you're not worrying about
I guess they refer to them as canaries, right? Where to know whether, to even know whether
or not someone has requested the data, you want to have control over that.
So what are your recommendations then?
I mean, if I'm a security professional and I want to put the word out to my team members
as to what the best practices are, where should we begin?
Yeah, I think the first best practice is you need to segregate your personal and your
professional communications.
And most people have done that.
They have work emails.
They have personal emails.
but with messaging apps, a lot of times they just mix it all together.
And that can lead to mistakes.
I can leave the data leakages.
So the first advice is separate those two.
They maybe use one for personal, one for professional.
At least the data segregated.
But then really, for your organization, you need to look at what's the sensitivity of what we're doing,
how embarrassed are we going to be if this information's out on the Internet and public
or what are the legal ramifications from privacy and such?
And think about, does it make sense that we actually do our official communications
in a system that's more sovereign and we have total control over
versus a consumer-grade service?
So those are my core recommendations.
And then I guess making sure that you're fulfilling whatever regulatory obligations you have as well.
Well, yeah, and that's a part of understanding the risks that are involved.
So, you know, if you're a financial institution,
if you're a government agency, you need to keep records of all calls and messages.
Well, to keep prop records, you have to have copy of the data.
And that's another reason, by the way, why I say segregate your personal and your professional,
because since people need a copy of the data, well, that copy should be in the professional
business communications, not your personal communications with your family.
Right, right. Nobody needs to know what time you pick the kids up from camp.
Right.
That's David Weissman,
Vice President of Secure Communications
at Blackberry.
No frills, delivers.
Get groceries delivered to your door
from No Frills with PC Express.
Shop online and get $15 in PC optimum points
on your first five orders.
Shop now at no-frails.ca.
And finally, AI-generated images have become so indistinguishable from the real thing
that identifying them now rivals reading tea leaves only with less success.
A Microsoft study pegged human accuracy at 62%,
suggesting we may soon outsource image detection to darts and blindfold.
folds. In response, watermarking emerged as the industry's digital signature, a spectral seal,
cleverly tucked where human eyes can't wander, until unmarker, unveiled at the I-Triplee
Symposium, which doesn't so much seek the watermark as quietly dismantle the scaffolding
that holds it up. Developed by a Canadian Ph.D. student, it erases watermark signals across
frequency space, elegantly, precisely, and with unnerving consistency.
The very subtlety that makes spectral watermarking undetectable also makes it remarkably
predictable to machines. Watermarking promised authenticity, unmarker replies with a raised eyebrow.
And that's The CyberWire.
For links to all of today's stories,
check out our daily briefing at thecyberwire.com.
Be sure to check out this weekend's research Saturday
and my conversation with Nicolas Charaviglio,
chief scientist from Zimperium's Z-Labs.
The research we're discussing is titled Behind Random Words,
Double Trouble Mobile Banking Trojan, revealed.
That's research.
Saturday. Check it out. We'd love to hear from you. We're conducting our annual audience survey
to learn more about our listeners. We're collecting your insights through the end of this month.
There's a link in the show notes. Please take a moment and check it out. N2K's senior producer is Alice
Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Elliot Peltzman and Trey Hester
with original music by Elliot Peltzman. Our executive producer is Jennifer Ibin. Peter
Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here next week.
Thank you.
