CyberWire Daily - Signals, scams, and a Salesforce snatch.

Episode Date: March 10, 2026

Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target S...alesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AWS credentials are phished. And CISA warns of an exploited Ivanti flaw. Our guest is Brian Baskin, Threat Researcher at Sublime Security, discussing tax season employee impersonation scams. Who fact-checks the fact-checkers?  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Brian Baskin, Threat Researcher at Sublime Security, discussing how tax season employee impersonation scams are conducted and what to look out for as we prepare our returns. Selected Reading Russia targets Signal and WhatsApp accounts in cyber campaign (AIVD) FBI warns of phishing attacks impersonating US city, county officials (Bleeping Computer) Anthropic sues Trump administration over Pentagon blacklist (CNBC) White House floats Victims Restoration Program for millions affected by cyber fraud (The Record) CybercrimeHundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign (SecurityWeek) Ericsson US discloses data breach after service provider hack (Bleeping Computer) Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS (Hackread) Behind the console: Active phishing campaign targeting AWS console credentials (Datadog Security Labs) CISA: Recently patched Ivanti EPM flaw now actively exploited (Bleeping Computer) AI fake-news detectors may look accurate but fail in real use, study finds (Tech Xplore) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. When cyber threats strike, minutes matter. Booz Allen brings the same battle-tested expertise trusted to protect national security to defend today's leading global organizations. They safeguard their data, strengthen enterprise resilience, and mobilize in minutes across energy, health care, financial services, and manufacturing. Their teams don't just respond. They anticipate, outthink, and.
Starting point is 00:00:36 stay ahead of evolving threats. This is powerful protection for commercial leaders only from Booz Allen. See how your organization can prepare today at Boozalan.com slash commercial. Russian hackers target signal and WhatsApp. Permit scammers impersonate local officials, anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. Shiny hunters target Salesforce data.
Starting point is 00:01:19 Erickson reports a breach. MacOS users face click-fix malware. AWS credentials are fished. Cicill warns of an exploited of antiflo. Our guest is Brian Baskin, threat researcher at Sublime Security, discussing tax season employee impersonation scams. And who fact-checks the fact-checkers?
Starting point is 00:01:40 It's Tuesday, March 10th, 2026. I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great as always to have you with us. Russian state hackers are conducting a global cyber campaign aimed at gaining access to signal and WhatsApp accounts belonging to government officials, military personnel, and other individuals of interest. Dutch intelligence services MIVD and AIVD
Starting point is 00:02:35 confirmed that Dutch government employees are among the targets and journalists may also be at risk. The attackers rely on social engineering rather than technical vulnerability. They often impersonate a signal support chatbot to trick victims into revealing verification or pin codes, which allow the attackers to take over accounts. In other cases, they exploit the app's legitimate linked devices feature to connect attacker-controlled devices to a victim's account. Once compromised, attackers can read messages, including group chats and potentially access sensitive information. Dutch authorities stress that the messaging platforms,
Starting point is 00:03:16 themselves remain secure, but individual accounts are vulnerable. They advise users to remain vigilant, watch for suspicious group members or duplicate accounts, and to report suspected compromises to their organization's security team. The FBI is warning about a fishing campaign in which criminals impersonate U.S. city and county planning or zoning officials to target people and businesses applying for land use permits. Attackers use publicly available information about permit applications, such as zoning numbers or property addresses, to make fraudulent emails appear legitimate.
Starting point is 00:03:57 Victims receive unsolicited messages referencing their permit details and are asked to pay related fees through wire transfers, peer-to-peer payment apps, or cryptocurrency. The FBI says warning signals include emails sent from non-greensers, government domains, attachments that prompt recipients to request further details, and pressure to pay quickly to avoid permit delays. The Bureau advises recipients to verify messages by checking email domains and contacting local government offices directly. Suspected victims should report incidents to the FBI's Internet Crime Complaint Center. Anthropic has filed a lawsuit
Starting point is 00:04:40 against the Trump administration after the Pentagon designated the AI company a supply chain risk, a move that effectively blocks its technology from defense-related work. The complaint filed in U.S. District Court in California argues the designation is unlawful and causing significant financial and reputational harm. Under the Pentagon's decision, defense contractors must certify that they are not using Anthropics AI models, known as Claude, in work tied to the Department of Defense. The company says federal contracts are already being canceled,
Starting point is 00:05:17 and private sector deals are now uncertain. Anthropic estimates the decision could jeopardize hundreds of millions of dollars in the near term and potentially reduce its 2026 revenue by billions. Anthropic is asking the court to overturn the designation and pause the policy while the case proceeds. The company has also requested a formal review in a fair. federal appeals court. The Trump administration issued an executive order directing federal agencies to strengthen the U.S. response to cybercrime and the growing financial losses Americans face from online scams.
Starting point is 00:05:56 The order instructs multiple agencies to develop a coordinated action plan within 120 days to prevent, investigate, and dismantle transnational criminal organizations that operate scam centers and cyber fraud schemes. The order also requires the creation of a victim restoration program within 90 days, designed to return funds seized from criminal networks to victims of cyber-enabled fraud. A new operational unit within the National Coordination Center will coordinate efforts among agencies, including the Department of State, Treasury, Defense, Homeland Security, and Justice. officials say the effort will combine government intelligence, law enforcement operations, and private sector cybersecurity expertise to track and disrupt criminal infrastructure. The administration also signaled potential sanctions and diplomatic pressure against companies that allow cybercrime groups to operate within their borders.
Starting point is 00:06:58 Salesforce is warning customers about an ongoing cyber campaign linked to the Shiny Hunter's group involving data. theft and extortion. Since mid-20205, the attackers have targeted organizations' Salesforce environments using social engineering, fishing, and misconfigured settings rather than platform vulnerabilities. The latest campaign exploits overly permissive experience cloud guest user configurations, which can allow attackers to access more data than intended. Threat actors are reportedly using a modified version of the open-source Aura-Inspensual. specter tool to extract exposed data. Shiny Hunter's claims the operation has targeted hundreds of companies and has threatened to leak stolen data if victims refuse extortion demands.
Starting point is 00:07:49 Erickson incorporated the U.S. subsidiary of Swedish telecom Erickson, says a breach at a third-party service provider exposed personal data belonging to over 15,000 employees and customers. The provider detected the intrusion on April 28th of last year and determined that unauthorized access to a limited set of files likely occurred between April 17th and April 22nd. Exposed information may include names, addresses, social security numbers, driver's license, or government ID numbers, financial details, medical information, and dates of birth. Erickson says there's currently no evidence the stolen data has been misused. The company is offering affected individuals, free identity protection, and credit monitoring services,
Starting point is 00:08:39 while the incident remains under investigation. Researchers have identified a campaign targeting macOS users with a fake website impersonating the popular Clean My Mac utility. The site tricks visitors into installing S-Hub Stealer malware through a social engineering technique known as the ClickFix attack. Victims are instructed to run a terminal control. command that appears to install legitimate software, but instead downloads and executes a malicious script, bypassing macOS security protections because the user runs the command themselves.
Starting point is 00:09:16 Once installed, the malware collects system information and attempts to steal credentials by displaying a fake macOS authentication prompt. If the password is entered, attackers can access the macOS keychain to harvest stored credentials and sensitive data. S.H. Hub Steeler also targets cryptocurrency wallets, displaying fake prompts that capture recovery seed phrases and enable attackers to steal funds. Researchers say the malware maintains persistence
Starting point is 00:09:47 through a hidden background task disguised as a legitimate system updater. Researchers at Data Dog have identified an active adversary in the middle fishing campaign targeting AWS management console credentials. The operation uses typo-squatted domains that mimic AWS infrastructure and hosts a high-fidelity clone of the AWS sign-in page. The Fishing Kit proxies authentication requests to the real-AWS login service in real time, allowing attackers to capture validated credentials and likely intercept one-time password codes. The campaign uses multi-stage redirects, and spoofed security alerts to lure victims.
Starting point is 00:10:35 Once credentials are submitted, attackers can quickly access compromised accounts. In one observed case, unauthorized console access occurred within 20 minutes from a Mulvad VPN IP address. Researchers emphasize the campaign does not exploit AWS vulnerabilities, but relies on credential theft through fishing. AWS has been notified and is working on disruption efforts, while defenders are urged to monitor authentication activity for suspicious logins. SISA has added a high-severity Avanti endpoint manager vulnerability to its known exploited vulnerabilities catalog and ordered federal agencies to patch within three weeks.
Starting point is 00:11:20 The flaw allows remote attackers to bypass authentication and steal credentials through a low-complexed. cross-site scripting attack requiring no user interaction. Avanti patched the issue last month. While Avanti says it has not seen confirmed exploitation before disclosure, Cicill warns the bug is actively exploited and poses significant risks to federal networks. Coming up after the break, my conversation with Brian Baskin from Sublime Security. We're discussing tax season employee impersonations. And who fact-checked's the fact checkers. Stick around. AI is changing how enterprises
Starting point is 00:12:21 operate and how they stay protected. It's time to eliminate risk and protect innovation. From March 23rd through the 26th, join Trend AI for actionable AI security insights. Catch impactful sessions at RSC, then unwind
Starting point is 00:12:37 and grab a bite at their lounge in Trapasue. Experience industry-leading AI security in person, engage with the experts and get your chance to win $500,000. San Francisco, let's AI fearlessly. Learn more at trendmicro.com slash RSA. If you're defending a network today, there's a simple question worth asking.
Starting point is 00:13:07 What does the attackers see when they look at your organization? Nordsteller helps answer that. Nord Stellar is a threat exposure management platform that gives security teams visibility into external risks, including leaked credentials, active session tokens, impersonation attempts, and exposed assets across the surface web and the dark web. It's built to help organizations detect the consequences of breaches early before attackers turn access into action. From monitoring for info-stealer malware logs to identifying cyber squatting and brand abuse,
Starting point is 00:13:43 Nordsteller helps teams focus on the threats that actually matter. Executives get clear, actionable insights, tied to business risk. Security teams get real-time alerts and one of the largest deep and dark web intelligence pools in the industry. Cybercriminals may already be looking for your weak spots. Don't make it easy for them. Be the one that's prepared. Defend your business with Nord Stellar. Use the code CyberWire 10 to unlock your exclusive discount. Go to Nordstellar.com slash Cyberwire Daily and learn more. Brian Baskin is a threat research. at Sublime Security.
Starting point is 00:14:31 I recently caught up with him to discuss tax season employee impersonation scams. Yeah, tech season and the beginning of the year where benefits, HR enrollments, all these major tech activities occur. It's a great time for actors to come in, target people with some very targeted, unique attacks related to tax forms,
Starting point is 00:14:53 tax procedures, and really put a sense of urgency that you need to perform an action now and involves your money, and it involves your career, and involve some very important things about your life in order to actually continue. So it really preys upon people's fears and urgency.
Starting point is 00:15:11 Yeah, I mean, I guess that's a really solid point there that most of us, when we get some kind of notice from the IRS, here in the States anyway, it gets our attention. And it's, honestly, the tax season is a great thing to adversaries. They don't need to an event a reason for, urgency, it's given to them for free. The IRS has really put the fear out there to general people that you have very important deadlines. You must get things done by this date. And generally, a lot of people fear that if they don't, big, horrible things were going to happen, that the IRS would
Starting point is 00:15:50 tell them immediately, you made a mistake, you need to correct your mistake. And also, what most people don't realize is IRS doesn't actually happen that fast. They will let you know by actual physical mail six months later that you made a mistake. Right. You won't know right then. Well, let's walk through some of the things that you and your colleagues at Sublime Security are tracking here. I mean, what are some of the more common scams you'll see this time of year? We get a lot of attacks impersonating the IRS, asking for personal information about the victim,
Starting point is 00:16:23 asking them to fill out a new form to log into the IRS website, asking for updated W-2s, the general tax forms and sessions that they would expect. And realistically, they are hoping that the user open an attachment, look at a PDF, run some sort of malicious payload inside the PDF, or go to a fake website and type in the credentials to let the actor log in as them on the actual websites. Is it fair to say that there are a couple of different groups here?
Starting point is 00:16:56 I mean, there's the folks who are after our credentials, but then is there a separate group who are chasing after our potential refunds? There is, and I think that's a very specific target audience they also go after. So, yes, there's actually two different audiences that we see for fishing attacks. One is going to be your more consumer-level person who is looking for their quick refunds. it's typically smaller amounts of money, you know, in a few thousand dollars. They just want to get really quick access to that.
Starting point is 00:17:27 Versus your more enterprise level person who is typically in charge of accounts, your HR, your financial workers who are in charge of tens of thousands of dollars, that typically get the very much more complicated and sophisticated attacks against them. And so if my responsibility is to help protect my organization here, What sort of things should I be on the lookout for and what kind of defenses should I put in place? So we'd like to say that AI has changed the field and it actually has in the tax season. So AI has definitely changed what we look for inside of the emails that we receive. Typically, we would tell people to look for bad grammar, look for bad spelling.
Starting point is 00:18:10 We would look for things that just look out of the norm. However, now emails are coming in very professional, very correct. There would be exactly what you would expect from the agency. So the idea is that modern fishing is actually operationally mature. We moved away from the sloppy attacks. They're using legitimate services. They're using legitimate emails. So the real protection comes from the basics of knowing where that email is leading you to.
Starting point is 00:18:43 is it trying to get you to scan a malicious QR code? Is it trying to take you to a site that's not legitimate? Is it trying to take you to a fake IRS site? Is it actually trying to make you call back a number that's not actually related to the IRS? And a lot of that is just typical, this is a bad place to try to take you that's not official and really could be overcome by someone
Starting point is 00:19:03 just simply searching for that one item on the Internet, the phone number, the email address, the website, and seeing if that's legit or not. So it sounds like there's a real educational component here of making your employees aware of these things. Are there technical things folks can put in place as well to help tamp down on this? There are multiple ways that you can protect an organization from attacks like these. And some are on the actual email side. And that's looking for, you know, the emails that look malicious or have some malicious component to them.
Starting point is 00:19:39 There's also the idea that you would have multi-factor on some of these websites that an employee would be connecting to. And that's including your internal HR sites that collects forms, as well as the ultimate outcome of these emails. If they're here to try to steal money from your company, they're really targeting your internal procedures. So having actual strong procedures as far as if money is requested, what should you be doing to perform? that action. Who should you raise for authorization? Who should you be raising for approval? That's Brian Baskin from Sublime Security. No, it's not your imagination. Risk and regulation really are ramping up and customers expect proof of security before they'll sign that deal. That's where Vanta comes in. Vanta automates your compliance process and brings compliance,
Starting point is 00:20:47 risk and customer trust together on one AI powered platform. Whether you're preparing for SOC2 or managing an enterprise governance, risk, and compliance program, Banta helps keep you secure and keeps your deals moving. Companies like Ramp and writers spend 82% less time on audits with Vanta. That's not just faster compliance, that's more time for growth. Take it for me. If you're thinking about compliance, take the time to check out Vanta. Get started at vanta.com slash cyber.
Starting point is 00:21:22 One plus one equals more of the greatest stories. Hulu on Disney Plus. Stories about survivors. The most dangerous planet. Family, retribution. Murder. Prophecy. Beer and propane.
Starting point is 00:21:39 How are we doing it? Blake Pantha. The ultimate soldier. Chicago, all right? The best of the best stories now with even more from Hulu. Amazing. Have it all with three. on Disney Plus.
Starting point is 00:21:56 And finally, a suspicious link arrives from a friend. The headline is outrageous. The video looks slightly off. In the age of online misinformation, artificial intelligence promises to help sort truth from nonsense. Unfortunately, according to researcher Dorsoff Salami of the University of Montreal, those promises are doing a bit of exaggerating themselves. For her doctoral research, Salami examined AI systems designed to detect fake news and found they don't actually fact-check.
Starting point is 00:22:38 Instead, they calculate probabilities based on patterns in their training data. In other words, they behave less like journalists and more like mirrors, reflecting whatever biases and gaps were present in the data they learned from. That creates problems. The definition of misinformation is often disputed. The training labels are not always transparent, and the models can inherit biases, sometimes even flagging content differently depending on gender or geography. Salami proposes a more human-centered approach. She's even created a browser extension that helps users verify claims by showing sources,
Starting point is 00:23:20 explanations, and fact checks, leaving the final judgment where it arguably belongs. with the human reading the headline. And that's the Cyberwire, or links to all of today's stories. Check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review
Starting point is 00:24:00 in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K. dot com. N2K's lead producer is Liz Stokes. We're mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazis. Our executive producer is Jennifer Ibin. Peter Kilby is our publisher and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. If you only attend one cybersecurity conference this year, make it RASAC 2026. It's happening March 23rd through the 26th in San Francisco,
Starting point is 00:25:00 bringing together the global security community for four days of expert insights, hands-on learning, and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges and shaping what comes next. Register today at rsaacconference.com slash cyberwire 26. I'll see you in San Francisco.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.