CyberWire Daily - The exploit that writes its own story.

Episode Date: May 6, 2026

CISA warns CopyFail is under active exploitation. Attackers compromise installers for a widely used disk imaging utility. MuddyWater masks cyberespionage as ransomware. Attackers spread malware throug...h a fake OpenClaw plugin. Researchers ID a new Linux RAT. Vimeo blames a third party provider for a recent breach. Palo Alto’s Captive Portal is under attack. The FTC settles with a data broker over location sharing. A former Conti gang member gets jail time. Our guest is Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI. Geotargeting turns creepy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI. Selected Reading Attackers are cashing in on fresh 'CopyFail' Linux flaw (The Register) Hackers compromise Daemon Tools in global supply-chain attack, researchers say (The Record) Iranian APT Intrusion Masquerades as Chaos Ransomware Attack (SecurityWeek) Malicious OpenClaw Skill Targets DeepSeek Agentic AI Workflows (Cyber Press) Sophisticated Quasar Linux RAT Targets Software Developers (SecurityWeek) ShinyHunters claims dump puts 119K Vimeo emails in the wild (The Register) Palo Alto Networks warns of firewall RCE zero-day exploited in attacks (Bleeping Computer) FTC bans data broker Kochava from selling sensitive location info (The Record) Conti, Akira Affiliate Sentenced to 102 Months in Prison for Ransomware and Extortion Operations Targeting over 50 Organizations (TechNadu) A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory (CyberScoop) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. No, it's not your imagination. Risk and regulation are ramping up, and customers expect proof of security just to do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform.
Starting point is 00:00:31 Whether you're preparing for a SOC 2 or managing an enterprise GRC program, Vanta helps keep you secure and your deals moving. Companies like Ramp and Writer reports spending 82% less time on audits. That's not just faster compliance, that's more time to focus on growth. When I look around the industry, I see over 10,000 companies from startups to big enterprises trusting Vanta. Get started at vanta.com slash cyber. Sisa warns copy fail is under active exploitation.
Starting point is 00:01:25 Attackers compromise installers for a widely used disk imaging utility. Muddy water masks cyber espionage as ransomware. Attackers spread malware through a fake open claw plug-in. Researchers ID a new Linux rat. Vimeo blames a third-party provider for a recent breach. Palo Alto's captive portal is under attack. The FTC settles with a data broker over locations sharing. A former Conti gang member gets jail time.
Starting point is 00:01:53 Our guest is Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI. And geo-targeting turns creepy. It's Wednesday, May 6, 2026. I'm Dave Bittner, and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. SISA is warning that a newly disclosed Linux kernel flaw called copyfail is already being exploited, days after researchers released a working route-level exploit.
Starting point is 00:02:56 The bug allows low-privileged users to gain full route access on vulnerable Linux systems. Cybersecurity Consultancy Fiore says its AI-powered testing platform, Exint, discovered the flaw and reported it in March. The company later released a proof-of-concept exploit that works against Ubuntu, Amazon Linux, Red Hat Enterprise Linux, and Sousay systems. Researchers warned most mainstream Linux kernels released since 2017 may be vulnerable. The attack requires minimal access and no user interaction, making it useful for attackers who already have an initial foothold.
Starting point is 00:03:37 Sisa has added the flaw to its known-exploited vulnerabilities catalog and ordered federal agencies to patch by May 15th. Microsoft says it is already observing early exploitation activity following the exploits release. Researchers at Kaspersky say attackers compromised installers for demon tools, a widely used disk imaging utility, and distributed malware through the software's official website in a global supply chain attack. The malicious installers affected multiple versions and were first observed in early April. Kasperski says thousands of infection attempts have been recorded across more than 100 countries. Most victims received a basic information-stealing payload,
Starting point is 00:04:23 while a smaller number of targets in government, science, manufacturing, and retail sectors received more advanced malware, including a back door linked to QuickRat. Trusted software distribution channels remain a high-value target for attackers. supply chain compromises can bypass traditional trust controls and quickly scale across organizations using legitimate software updates. Disk Soft, the Latvia-based developer behind Demon Tools, says it is investigating. Researchers at Rapid Seven say the Iran-linked threat group Muddy Water conducted an intrusion that appeared to be ransomware but operated more like a cyber espionage campaign.
Starting point is 00:05:08 The attackers reportedly used Microsoft Teams social engineering to gain access through screen sharing sessions, then harvested credentials, manipulated multi-factor authentication protections, and deployed remote access tools, including any desk, and DW agent. Rapid 7 says the group conducted reconnaissance moved laterally and exfiltrated data, but never deployed file-encrypting ransomware. Instead, the attackers used chaos ransomware branding and extortion emails as apparent false flags while maintaining persistence in the victim environment. The operation blurred the line between espionage and financially motivated cybercrime,
Starting point is 00:05:55 potentially delaying incident response and attribution efforts. Rapid 7 linked the activity to muddy water with moderate confidence based on influence, based on infrastructure, malware, and operational patterns associated with previous campaigns tied to Iran's Ministry of Intelligence and Security. Researchers at Z-scaler Threat Labs say attackers are abusing the OpenClaw AI Automation Framework to distribute malware through a fake plugin called DeepSeek Claw. The campaign targeted developers and autonomous AI agents by embedding malicious instructions into plug-in files downloaded from public repositories. On Windows systems, the malware chain
Starting point is 00:06:42 deployed the Remcos Remote Access Trojan using DLL side-loading with a legitimate go-to-meeting executable. On MacOS and Linux, attackers used obfuscated Node.js scripts and fake password prompts to steal credentials, SSH keys, cryptocurrency wallets, and cloud API tokens. Z-scaler says the campaign also delivered the ghostloader information stealer. The operation highlights growing risks tied to high-privileged AI tools and third-party AI plugins. Researchers warn that autonomous AI agents introduce new attack services with broad system access, making supply chain vetting and behavioral monitoring increasingly important for enterprise defenders.
Starting point is 00:07:31 Researchers at Trend Micro have identified a Linux remote access. Trojan called QLNX that appears designed to steal developer credentials and compromise software supply chains. The malware targets Amazon Web Services credentials, Kubernetes tokens, Docker Hub logins, Git Access tokens, NPM authentication tokens, and Pi Pi API keys. Trend Micro says attackers could use the stolen credentials to publish malicious software updates or pivot into cloud environments. QLNX includes multiple stealth features, including memory-only execution, root-kit functionality, log-clearing, and six separate persistence mechanisms. The malware also deploys plug-able authentication module backdoors to harvest credentials
Starting point is 00:08:24 and supports dozens of commands for remote control, file manipulation, and data theft. Researchers warn the malware's danger comes from how its capabilities work together to establish long-term stealth and persistent access inside developer environments. A successful compromise of a software maintainer could expose downstream users through poisoned packages and altered build pipelines. Vimeo says a breach affecting more than 119,000 users originated through third-party analytics provider Anadot, not Vimeo's own systems. According to Have I Been Poned, attackers accessed customer email addresses and some associated names.
Starting point is 00:09:11 Vimeo says the stolen data also included video titles and metadata, but not video content, login credentials, or payment card information. The company linked the incident to compromised Anadot integrations and says it has since disabled the connection, revoked credentials, and launched an investigation with outside security support. Researchers and breach analysts warn that exposed email lists tied to contextual account data can fuel targeted fishing campaigns for years after a breach. Palo Alto Networks is warning customers that attackers are exploiting a critical zero-day flaw in the PanOS user ID authentication portal, also known as the captive portal. The buffer overflow vulnerability allows unauthenticated attackers to execute arbitrary code with root privileges, on exposed PA series and VM series firewalls.
Starting point is 00:10:09 Hallo Alto says limited exploitation has already been observed against internet-facing systems. The company has not yet released a patch and is urging customers to restrict portal access to trusted internal networks or disable the feature entirely. Shadow Server says more than 5,800 vulnerable VM series firewalls remain exposed online.
Starting point is 00:10:32 The Federal Trade Commission and data broker Kachava have reached a proposed settlement that would bar the company from selling or sharing sensitive location data without explicit consumer consent. The FTC accused Kachava in a 2023 complaint of collecting and selling detailed geolocation data, mobile device identifiers, app usage information, and income data. Regulators said the company's data could reveal visits to. places like health clinics and houses of worship without users' knowledge. Under the agreement, Kocchava must implement programs to track sensitive locations, verify consent from data suppliers, limit data retention, and allow consumers to withdraw consent or request information about data sales. The case highlights growing regulatory pressure on the location data industry and the risks tied to large-scale collection of precise consumer movement data.
Starting point is 00:11:34 data. Kachava says the settlement reflects its commitment to privacy and responsible data practices. A Latvian national accused of working with former members of the Conti Ransomware Group has been sentenced to 102 months in prison for conspiracy involving wire fraud and money laundering. U.S. authorities say Dennis Zola Tarjoff participated in ransomware operations between 2021 and 2003 that targeted more than 54 organizations using malware families, including Conti, Akira, Royal, and Karakert. Investigators say the attacks caused hundreds of millions of dollars in losses and involved the theft of sensitive personal and health information. Zola Tarjov was arrested in Georgia in 2003, extradited to the U.S. in 2024, and pleaded guilty last year. The case underscores continued
Starting point is 00:12:33 international cooperation against ransomware operators and highlights how former Conti affiliates continue to appear across multiple ransomware as a service operations years after the group's original disruption. Coming up after the break, my conversation with Dov Yaron, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI. And geo-targeting turns creepy. Stay with us. And now a word from our sponsor, the Center for Cyber Health and Hazard Strategies, also known as CHS.
Starting point is 00:13:29 Looking for a graduate degree that will give you an edge on your professional career? Earn a Master of Science in Law at University of Maryland Carey School of Law. This part-time two-year online graduate degree program is designed for experienced professionals to understand laws and policies that impact your industry. Learn from CHS faculty. who are experts in their field. No GRE required. Learn how you can master the law without a JD at law. U.Maraland.edu.
Starting point is 00:14:10 Dov Yoran is CEO of Command Zero. I recently got together with him to learn how cybersecurity teams are fighting AI with AI. So today we're talking about AI and how folks are kind of fighting fire with fire when it comes to AI. Can we start?
Starting point is 00:14:29 Start off with some high-level stuff. Can you give us a little bit of the history and background of what led us to this particular place where we find ourselves when it comes to AI and how people are using it in their socks? Yeah, it's been a gradual process. You know, always refining and helping this, you know, sock analysts move forward
Starting point is 00:14:54 and continue to increase their productivity given, you know, technology gains, cloud, SaaS and other things. And AI is really the next revolution in that series. So that's something that's been a gradual step-up, if you will. And now with the advent of AI, it's been an incredible catapult moving forward to really level the playing game amongst analysts of different experiences. levels and different size of organizations and so on and so forth. So where do we stand right now when it comes to the threat actors adopting these AI tools?
Starting point is 00:15:37 Attackers move pretty fast and they're unencumbered by, you know, procurements and the legal process, right? So the clearest examples are an automation and skill, right? You know, AI lets adversaries chain tools together autonomously, reconnaissance, you know, lateral movement, ex-filtration, right, with the speed and precision that wasn't really possible before. So they're effectively leveraging and operating with, you know, LLM speed. So while we're also seeing AIUs to craft, you know, more convincing, you know, fishing and social engineering attacks, you know, like volume at a at scale, you know, so we used to require skilled human now takes, yeah, just a few moments of generating. to generate and personalize at scale. That's obviously a big concern, right?
Starting point is 00:16:33 You know, AI is lowering that barrier of attack, you know, that sophistication, right? You don't need nation state teams and technologies and resources to run advanced, you know, operations anymore, right? That's asymmetrical, right? Defenders are still largely doing manual parts. and try to increase their SOC efficiencies. But that's a pretty core problem that we're trying to solve right now in the industry. And so on the defender's side, what sorts of tools are available to them
Starting point is 00:17:10 to help ward off these AI threats? Yeah, the most immediate impact is investigation speed, what we hope. But, you know, platforms such as Command Zero, right, you know, being able to, you know, to have a thorough alert investigation that used to consume an analyst's entire day, right, with AI agents, that same investigation can be completed in minutes. So you're pulling context from various platforms in the environment,
Starting point is 00:17:41 from your endpoints, from your identity, from your email, from your cloud, threat intel, so on and so forth, right? And you're delivering really a more comprehensive report with a verdicts. And speed is certainly a high mark, but that's really only part of it. The deeper value is the consistency and thoroughness, right? Not human analysts have good days and bad days.
Starting point is 00:18:05 But AI agents don't, right? And so every investigation follows similar methodologies, asks the same levels of questions, the same standard, the same consistencies, you know, that manual processes can really have a tough time delivering at scale. So at Command Zero, we're seeing AI compress that skills gap, but I mentioned earlier, between your junior or your lesser experience folks and your more experienced teams. And so those tasks that once required just senior analysts because they needed that experience,
Starting point is 00:18:39 that knowledge of different applications across different platforms can now be done in a much simpler way and in a much more consistent way across that entire team. That, we think, is that big sea change and structurally changing how SOX operate today, you know, leveraging AI as part of that solution. Can you share with us what the onboarding process is like? As people adjust to the new reality of these tools, is there a period of time where they're kind of gaining trust with them? They're getting used to them, you know, seeing how the changes. are going to be implemented in their world?
Starting point is 00:19:23 Our experience is incredibly short, right? It's a matter of days, sometimes a week or two. It's understanding the environment is deploying. It's a cloud-only solution set. So having access to some of the data elements, enabling that takes minutes and auto-generated content, usually within a few hours. And the team honestly can rock and roll
Starting point is 00:19:50 They're looking at the events. They're being guided through and shown investigations. They're looking at conclusions and all the very underlying data that comprises of those conclusions and even subordinate conclusions that weren't finalized. All those things are really make for a rich experience. And it really up-levels all those analysts in our client base, right? The more experienced tier three folks, you know, have the ability to leverage and replicate their investigations
Starting point is 00:20:22 and to more junior folks and, you know, showing that ability, not only ability, but that comprehensive outlook on what was discovered and what remediation and conclusions are driven from that as opposed to, or in addition to the more junior team members now being able to ask questions and follow an auto-prompt
Starting point is 00:20:45 and auto-generate investigations on data sources that they wouldn't normally be able to master without more experience. How are we ensuring that appropriate guardrails are put on these systems to make sure that they don't stray beyond what we want them to do? Yeah, that's a great point. And that's, I think, a major concern enterprises should be mindful of. What we get to keep taps on that is we have very specific and very limited use of,
Starting point is 00:21:21 agents and how they're being deployed, the types of things that they have access to, the types of questions that they have in their arsenal and the types of information that they're collecting. From our standpoint, all of that is completely transparent, right? So you can see a full rap sheet on what was asked, how it was asked, the types of information that was drawn back. in my opinion that trust in AI is built on this transparency and the auditability and the reproducibility and the reproducibility of these investigations. So having these agents as part of a human investigation collaborating deeply with the human, right? All these things are reproducible and more deterministic. I think all of those are helpful in the checks and balances of keeping a problem.
Starting point is 00:22:14 proper governance model on your agents as opposed to, you know, letting them just run wild in the environment. What is your sense for where we're headed with these things? I mean, I think it's, it seems like certainly AI is our future here, but do you have any sense for where this might grow into? What are some of the things that people can look forward to? Yeah, I mean, listen, it is great. And even the short term, even now, right, the mundane tasks and the TDs tasks that are, you know, even prone to error and user error because they're so repetitive, a lot of those things can be automatically pulled out and addressed by agents.
Starting point is 00:23:00 So it is really up-leveling that human talent and trying, you know, enabling more creativity and more superhuman capabilities of leveraging better automation and agentic. workflows into their environment. Honestly, I see it expanding to beyond just the pure security operation center into other adjacencies, into cyber and into other domains of the, you know,
Starting point is 00:23:26 CISO's charter and domain of control, span of control. Similarly, how that reflects AI in general. How we're seeing that transform and broadments reach in and across society at large. So it
Starting point is 00:23:42 It's super exciting. That's Dov, you're on from Command Zero. One day, you're negotiating with suppliers. The next, you're installing a shelf in the back room. Running a business means moving in many directions all the time. TD's new small business banking accounts are built for how your business moves. It's how we're making banking more human. And finally, a 19-year-old University of Tennessee student
Starting point is 00:24:23 is suing the makers of the dating app Meet, that's M-E-E-T-E. Alleging the company turned a harmless TikTok graduation video into an ad suggesting she was looking for friends with benefits. Then, Gio-targeted the promotion to people near her dorm. College introductions can be awkward enough to begin with, but according to the lawsuit, she discovered it by people introducing themselves, saying, hey, I keep seeing your dating app ad on Snapchat. The complaint alleges Meat edited her video, added graphics, and a voiceover, and used location-based
Starting point is 00:25:04 targeting to serve the ads to nearby men without her consent. Her attorney says the campaign damaged her reputation and created real safety concerns by falsely implying she endorsed the app and was soliciting hookups. The case highlights how simple editing tools and ad-tartagnation. targeting systems can weaponize someone's likeness without sophisticated AI. Snap says it's investigating, while Meets listed publisher, which advertises safety and respect first, has not publicly responded. And that's The Cyberwire.
Starting point is 00:25:53 For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead. in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey
Starting point is 00:26:14 in the show notes or send an email to Cyberwire at N2K.com. N2K's lead producer is Liz Stokes. We're mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazas. Our executive producer is Jennifer Ibin.
Starting point is 00:26:32 Peter Kilty is our publisher and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.