CyberWire Daily - Stabilized but smaller.

Episode Date: January 22, 2026

CISA’s acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue acco...unts. A global spam campaign leverages unsecured Zendesk support systems. LastPass warns of attempted account takeovers. Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pwn2Own Automotive proves profitable. Our guest is Kaushik Devireddy, AI data scientist at Fable Security, with insights on a fake ChatGPT installer. New password, same as the old password.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Kaushik Devireddy, AI data scientist at Fable Security, discussing their work on "How a fake ChatGPT installer tried to steal my password". Selected Reading CISA Is 'Trying to Get Back on Its Mission' After Trump Cuts (CISA) Google Patches High-Severity V8 Race Condition in Chrome 144 published: today (Beyond Machines) Cisco Patches Actively Exploited Flaw in Unified Communications Products (Beyond Machines) Hackers breach Fortinet FortiGate devices, steal firewall configs (Bleeping Computer) Zendesk ticket systems hijacked in massive global spam wave (Bleeping Computer) LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords (Infosecurity Magazine) Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation (TechNadu) Execs at Davos say AI's biggest problem isn't hype — it's security (Business Insider) Hackers exploit 29 zero-days on second day of Pwn2Own Automotive (Bleeping Computer) Analysis of 6 Billion Passwords Shows Stagnant User Behavior (SecurityWeek) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Most security conferences talk about Zero Trust. Zero Trust World puts you inside. This is a hands-on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert-led sessions, practical case studies, and technical deep dives focused on real-world implementation. Whether your blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful.
Starting point is 00:00:55 You'll earn CPE credits, connect with peers across the industry, and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now at ZTW.com and take your zero-trust strategy from theory to execution. SISA's acting director assures Congress the agency has stabilized. Google and Cisco patch critical vulnerabilities. Fortinette firewalls are being hit by automated attacks. A global spam campaign leverages unsecured Zendesk support systems. Last Pass warns of attempted account takeovers.
Starting point is 00:01:49 Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pone to own automotive proves profitable. Our guest is Kashik Deverelli, AI data scientist at Fable Security, with insights on a fake chat GPT installer. And new password, same as the old password. It's Thursday, January 22nd, 2026. I'm Dave Bittner, and this is a new password.
Starting point is 00:02:32 your Cyberwire Intel briefing. Thanks for joining us here today. It's great to have you with us. The U.S. Cybersecurity and Infrastructure Security Agency is working to refocus on its core mission after a turbulent year marked by staffing losses, funding disruptions, and internal restructuring. Acting director Madhu Gadamukala
Starting point is 00:03:08 told the House Homeland Security Committee that the agency has stabilized and does not expect further organizational changes in fiscal year 2026. Sisa now employs more than 2,400 staff, roughly 1,000 fewer than at the start of the Trump administration. Gada Mukala said the reductions were part of a broader White House effort to shrink the federal workforce and right-size the agency. He argued Sisa now has the workforce it needs and plans targeted initiatives in 2026 to address the most critical cyber risk gaps.
Starting point is 00:03:45 Republicans praised a narrower operational focus, while Democrats warned proposed budget cuts could weaken civilian cyber defenses as foreign threats persist. Funding debates for the Department of Homeland Security, including SISA, are expected to intensify ahead of a looming shutdown deadline. Google has released an urgent update, update for Chrome and other Chromium-based browsers to fix a high-severity flaw in the V8 JavaScript engine. The vulnerability is a race condition that allows memory corruption and could
Starting point is 00:04:20 enable attackers to escape the browser sandbox and run code on a user's system by luring them to a malicious site. The update, released January 20th, applies to Windows, MacOS, and Linux. Users should update Chrome and chromium-based browsers. immediately, according to Google. Elsewhere, Cisco has issued emergency patches for a critical vulnerability affecting its enterprise communications platforms, warning of active exploitation attempts. The flaw is an unauthenticated code injection issue in web-based management interfaces that can allow attackers to execute commands and potentially gain full system control.
Starting point is 00:05:04 Impacted products include unified communications manager, Unity Connection, and WebEx calling dedicated instance. Cisco says there are no workarounds and urges immediate patching. Researchers warn that Fortinette Fortigate firewalls are being hit by automated attacks that create rogue accounts and rapidly export firewall configurations. According to Arctic Wolf, the campaign began January 15th and appears to exploit an unknown weakness in Fortigate's single sign-on feature, closely resembling attacks seen in December of last year.
Starting point is 00:05:43 Arctic Wolf says it remains unclear whether current attacks are fully addressed by existing patches, and customer reports suggest a possible patch bypass. Fortinette is expected to release additional FortaOS updates to resolve the issue. Until then, defenders are advised to disable Forta Cloud SSO. SISA has already flagged the... earlier vulnerability as actively exploited, while Shadow Server reports nearly 11,000 exposed devices online. A global spam campaign has flooded inboxes with hundreds of confusing emails generated through
Starting point is 00:06:22 unsecured Zendesk support systems. The wave began January 18th and abuses Zendesk's default settings that allows unverified users to submit support tickets, which then trigger automated confirmation emails to whatever address is entered. Attackers iterated through large email lists, effectively turning legitimate customer support platforms into mass spam engines. The emails feature bizarre or alarming subject lines, including fake legal notices and promotional offers, often written with decorative unicode text.
Starting point is 00:06:59 While the messages do not contain malicious links, they bypass spam filters because they originate, from trusted companies, making them particularly disruptive. Effected organizations include Discord, Dropbox, Riot Games, and government agencies. Zendesk says it's rolled out new safeguards to detect and limit this relay spam and advises customers to restrict ticket submissions to verified users. Last Pass is warning users about an active fishing campaign designed to steal master passwords and take over accounts.
Starting point is 00:07:36 According to the company's threat intelligence, mitigation, and escalation team, the campaign began January 19th and is circulating widely. The phishing emails impersonate LastPass and claim users must urgently back up their password vaults within 24 hours ahead of supposed maintenance. Links in the messages lead to a fake LastPass login page that captures credentials if entered. because LastPass stores passwords for other services, a compromised master password could expose many additional accounts. LastPass says it will never ask for a master password or demand immediate action
Starting point is 00:08:17 and is working with partners to take down the malicious domains. The company urges users to remain cautious, noting that false urgency is a common fishing tactic. Greek authorities have arrested two foreign national, National's accused of running a sophisticated fake cell tower scam in the Athens area. According to Hellenic police, officers discovered a mobile computing system hidden in a car trunk that acted as a rogue cellular base station, often called an SMS blaster. The setup linked to a concealed roof antenna, impersonated legitimate telecom infrastructure,
Starting point is 00:08:56 and intercepted nearby mobile connections. Police say the suspects exploited known weakness. in mobile network protocols, forcing phones to downgrade from 4G to less secure 2G connections. This allowed them to collect device identifiers and phone numbers, which were then used in smishing campaigns posing as banks or courier services. Authorities have tied the operation to several confirmed fraud cases in and around Athens with investigations ongoing. Executives from EY and KPMG warned at the World Economic Forum in Davos that AI security is emerging as a major enterprise risk. EY's Raj Sharma told Business Insider that organizations are not adequately addressing the security and lifecycle management of AI agents,
Starting point is 00:09:50 which can access sensitive data but lack clear identity and controls. He argued that industrial-grade security frameworks for AI agents are still immature. KPMG U.S. CEO Tim Walsh echoed those concerns, saying AI-related cyber risk is now a top issue for CEOs and is slowing some AI deployments as firms reassessed data protection. Walsh also flagged quantum computing as a future security threat, warning that it could break current encryption and force widespread re-endend. engineering of security systems. Day two of Pone to Own Automotive 2026 proved that hacking cars and chargers can be very
Starting point is 00:10:36 profitable. Security researchers walked away with over $439,000 in prize money after popping 29 fresh zero-day bugs at the event in Tokyo held during the Automotive World Show. After two days, total winnings hit over 955,000. $2,000 across 66-0 days. Fuzzware I.O. led the pack with $213,000, thanks to successful hacks against multiple EV chargers. Other teams rooted infotainment systems, car operating systems like automotive-grade Linux, and more charging hardware. Even Tesla Tech made an appearance earlier in the contest. The fun continues on day three with more chargers and systems.
Starting point is 00:11:25 lined up for attack. Benders now have 90 days to patch before details go public, so the clock is ticking. Coming up after the break, my conversation with Koshik Deveready from Fable Security. We're discussing insights on a fake chat GPT installer. And new password, same as the old password. Stick around. Ever wished you could rebuild your network from scratch to make it more secure, scalable, and simple? Meet. Meter, the company reimagining enterprise networking from the ground up. Meter builds full-stack zero-trust networks, including hardware, firmware, and software, all designed to work seamlessly together.
Starting point is 00:12:27 The result? Fast, reliable, and secure connectivity without the constant patching, vendor-juggling, or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security, and VPN, Every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless. Transform complexity into simplicity and give your team time to focus on what really matters,
Starting point is 00:13:05 helping your business and customers thrive. Learn more and book your demo at meter.com. slash cyberwire. That's M-E-T-E-R dot com slash cyberwire. What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night, how do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems,
Starting point is 00:13:56 centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started at Vanta.com slash cyber. That's V-A-N-T-A-com slash cyber. Kaushik Deverelli is AI data scientist at Fable Security. We recently got together to discuss insights on a fake chat GPT installer. So it was right before the Thanksgiving holidays.
Starting point is 00:14:47 I think we work at a startup, but even around Thanksgiving, things are slowing down a little bit. I found myself with a little bit of free time to kind of do some research, explore online. And I was very interested in the concept of the AI browser, which many of you have probably heard of. And I wanted to try it out, give it a spin, and actually test them on their susceptibility to prompt injection. So these are browsers like ChatGBT-GBT-Atlas, Poreplexity Comet, Atlassians, Dia. When I searched for the first one, Chat-GPT Atlas, it had very recently released.
Starting point is 00:15:23 I curiously noticed on Google when you search that term, the first reason, was actually a sponsored result. And it looked, you know, the title and description looked identical to the second result, which was an official Google search result from chat GPT itself. And so I immediately picked up that it was a fake site given that it was served from a Google site's domain and decided to go down that rabbit hole instead to see, you know, what kind of attack this would present me with. When I clicked on that site, it was very interesting. because the website looked exactly identical to the normal chat GPT Atlas site.
Starting point is 00:16:04 I pulled them both side by side to compare. And so the malicious group had stealing exactly the HTML, the styling, everything from the links themselves. And there was really no way to tell that this was a malicious website other than the domain itself, not being chat GPTs. And so I decided to take it one step further and look through the entire key. chain. And so when I clicked the download button to get the AI browser downloaded, rather than it downloading some software to my laptop, I presented me with a new screen. This is where it differs from the official chat GPT website, asking me to run a command on my laptop. Now, most of the audience may recognize this is what's commonly known as a click-fix attack. But the really interesting
Starting point is 00:16:54 piece here is typically Click Fix attacks. The name, it's called Click Fix because it's typically prompting you to fix something on your computer. It may say, hey, Dave, your software is out of date. To continue accessing this website,
Starting point is 00:17:11 please run this command. Or, hey, please prove to us that you're a human. We think you're a bot. Run this command. This was very different because it was actually telling me, hey, we're going to give you this AI browser. You have this intent to download it. Here's exactly how to download it by running a command
Starting point is 00:17:30 kind of on your computer. And I thought this was very interesting because while click-fix attacks are well known, the deception strategy and the entry point was very different from a traditional click-fix attack. Now, are you on a Mac or a PC here? I'm on a Mac. Okay.
Starting point is 00:17:47 Yeah. And the website actually said a download, it gave me a download for Mac button. Huh. So what happens next? Totally. So if you run that command, which, if that website is still live, please do not run that command on your computer. But I actually pulled the script into a sandbox environment to see what it would actually do. And at first glance, the command looks almost benign.
Starting point is 00:18:12 It's running a, it's pulling a script from the internet and executing it. And it is encoded in base 64. So there's no way to see what the URL is that it's curling and pulling the script from. If you decode the base 64, you'll notice it's a very peculiar URL. It's a free file hosting site. And this is where the threat actor group was hosting some info stealer malware. So had you installed this, it would have downloaded the info stealer malware. Do you happen to know what flavor of info stealer it was trying to put on your system?
Starting point is 00:18:49 Totally. So the curious step before it was it would actually ask you for your system password. So it's clear that the InfoSteeler malware wouldn't be able to execute without pseudo permissions. And so if you didn't type in your password properly, it would keep prompting you over and over saying, hey, we can't install until you type your password. I ended up getting the Info Steeler malware and uploading it to Virus Total to see what matches I could find. At the time, there were no specific matches that it was able to determine. But I think the really interesting piece was I have running an EDR on my laptop and are in the sandbox. And the EDR did not pick up that it was a malicious file. As a Mac user, and I'm a Mac user myself, it's fair to say, don't you think that for someone to ask you to invoke the terminal and enter a command, that rarely happens.
Starting point is 00:19:49 Correct, correct. So that was a red flag for you. Yes, yes. I think you should never run an arbitrary shell command on your computer, unless, especially on a corporate device, which has very sensitive information, unless you're absolutely sure you know what it's doing. So there's multiple things at play here.
Starting point is 00:20:12 I mean, what are the take-home lessons for you in terms of advising, folks to best protect themselves here. Totally. I think, like, traditionally when we think about ClickFix attacks and the way these attacks come in, typically, you know, the attack vector is it lands in your email inbox. You know, there's a phishing email which will lead you to this URL and the URL, that website, will try and instruct users, hey, run this command. I think now we're starting to see, hey, there are other ways that people can land upon this click-fix attack,
Starting point is 00:20:48 and we need to spread awareness that these other attack factors exist. And I think at a very basic level, we should be educating people that they should not be running arbitrary commands on their computer. What if I'm in charge of administrating the computers? And let's stay on the Mac here for a while. If I had denied someone access to terminal or the ability to, you know, the ability to run as root. Would that have helped? Yeah, I think there's a certain class of users, right,
Starting point is 00:21:20 that you can lock down the device a bit more, especially if they're not developers. Removing route access to the terminal is a very positive step. Now, there's always going to be users who need that type of access, like software developers who are developing locally. And for them, a technical control may not be enough, and that's why we need the awareness piece for. That's Kaushik Deverelli from Fable Security.
Starting point is 00:21:48 When it comes to mobile application security, good enough is a risk. A recent survey shows that 72% of organizations reported at least one mobile application security incident last year, and 92% of responders reported threat levels have increased in the past two years. Guard Square delivers the highest level of security for your mobile apps without compromising performance, time to market, or user experience. Discover how Guard Square provides industry-leading security for your Android and iOS apps at www.gardsquare.com. Security works best in layers, and when those layers actually work together, that's when
Starting point is 00:22:49 things get interesting. NordLayer is a network security platform designed for modern teams. It secures connections, controls access, and helps stop threats all without hardware or long deployment cycles. Now, Nordlayer has partnered with CrowdStrike to bring Falcon endpoint protection into the mix, giving small and mid-sized businesses a multi-layered security approach that's practical to deploy and easy to manage. NordLayer handles secure access and zero-trust networking. CrowdStrike Falcon adds endpoint visibility and protection. Together, they cover more ground than either could alone without requiring a large IT staff.
Starting point is 00:23:30 business leaders, that means clearer control and easier compliance. For IT teams, it means granular access policies, faster onboarding and protection that scales. If you're looking for enterprise-grade security without enterprise-grade complexity, take a look at Nordlayer. Get up to 22% off yearly plans, plus an additional 10% with code Cyberwire-10. There's even a 14-day money-back guarantee. Check out Nordlayer.com slash Cyberwire Daily to learn more. And finally, after another year of security training, stern warnings and posters begging users to think before you type, passwords have once again refused to evolve.
Starting point is 00:24:29 An analysis of 6 billion leaked credentials by specop software using data from its parent firm Outpost 24 shows that 2025, most common passwords were the same familiar classics. 1234-5-6, password and admin, apparently still doing brisk business. The report suggests this is not nostalgia, but habit. Numeric strings dominate personal accounts,
Starting point is 00:24:58 while admin and password linger on enterprise gear from networking devices to industrial systems. That creates a predictable path for attackers who can reuse stolen, credentials to access VPN's, active directory, or cloud services. Even more complex passwords often just decorate old favorites with a few extra characters. The lesson is dry but clear. Attackers innovate, users reuse, and security teams clean up the mess. And that's the Cyberwire for links to all of today's stories. Check out our daily briefing at the Cyberwire.com. We'd love to know what you think of
Starting point is 00:25:55 this podcast, your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Heltsman. Our executive producer Jennifer Iben. Peter Kilby is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. If you only attend one cybersecurity conference this year, make it RSAC 2026. It's happening March 23rd through the 26th in San Francisco, bringing together the global security community for four days of expert insights, hands-on learning, and real innovation.
Starting point is 00:27:14 I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges and shaping what comes next. Register today at rsacconference.com slash Cyberwire 26. I'll see you in San Francisco. Attackers don't go through your tools. They go around them. In our interview with Jared Atkinson, CTO at SpectorOps, he reveals how attackers look to exploit our identities, steal tokens and quietly snowball their access across active directory, cloud apps, and GitHub. We talk through attack paths, why least privilege keeps failing, and how one misconfiguration
Starting point is 00:28:09 can hand over the keys to your organization. Want to see risk as attackers do? Then check out the full interview now on thecyberwire.com slash specterops.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.