CyberWire Daily - “The hackers made me do it,” or did they?

Episode Date: January 27, 2026

Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul pol...icing for the cyber age. Romania investigates a hitman-for-hire site. A UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. CISA maps post-quantum crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women. Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. A Best Buy guy tries a creative alibi.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. Selected Reading Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (Beyond Machines) Catalonia travel chaos: thousands stranded as suspected cyber attack disrupts rail network (The Olive Press)  FBI is investigating Minnesota Signal groups tracking ICE, Patel says (NBC News) UK plans sweeping overhaul of policing amid surge in online crimes (The Record) Romania probes two suspects over alleged hitman-for-hire website (The Record) Judge awards British critic of Saudis $4.1 million, finds the regime hacked his devices (The Record) Google to pay $68 million over allegations its voice assistant eavesdropped on users (CBS News) CISA releases technology readiness list for post-quantum cryptography (CSO Online) Illinois man charged with hacking Snapchat accounts to steal nude photos (Bleeping Computer) Savannah BSavannah Best Buy employee says 'hacker group' blackmailed him into theft ring scheme (WJCL 22) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. If securing your network feels harder than it should be, you're not imagining it. Modern businesses need strong protection, but they don't always have the time, staff, or patients for complex setups. That's where Nordlayer comes in. Nordlayer is a toggle-ready network security platform built for businesses. It brings VPN, access control, and threat protection together in one place. No hardware, no complicated configuration, you can deploy it in minutes and be up and running in less than 10. It's built on zero-trust principles, so only the right people can get access to the right resources.
Starting point is 00:00:50 It works across all major platforms, scales easily as your teams grow, and integrates with what you already use. And now, Nordlayer goes even further through its partnership with CrowdStrike, combining Nordlayer's network security with Falcon endpoint protection for small, and mid-sized businesses. Enterprise-grade security made manageable. Try NordLayer risk-free and get up to 22% off yearly plans, plus an extra 10% with the code CyberWire 10. Visit Nordlayer.com slash CyberWire Daily to learn more. Microsoft rushes an emergency fix for an actively exploited Office Zero Day,
Starting point is 00:01:46 a suspected cyber attack halts rail service in Spain. The FBI probes signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman for hire site. The UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. Sysa maps post-quant crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women.
Starting point is 00:02:16 Our guest today is Cynthia Kaiser, Senior Vice President of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. And a Best Buy guy tries a creative alibi. It's Tuesday, January 27, 26. I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great to have you with us.
Starting point is 00:03:07 Microsoft has issued emergency out-of-band. and security updates for an actively exploited zero-day vulnerability in Microsoft Office, with a CVSS score of 7.8. The flaw allows attackers to bypass object linking and embedding, or OLE, security protections, by abusing how office handles untrusted inputs in malicious documents. Exploitation requires a user to open a specially crafted office file, although the preview pane remains safe. The issue affects multiple office versions as well as Microsoft 365 apps for Enterprise. For Microsoft 365 and Office 2021 and later, a service side fix is already live and takes effect after restarting the applications. Older versions remain at risk until formal patches are released and users are advised to apply registry-based mitigations in the meantime.
Starting point is 00:04:06 According to Microsoft, technical details about... the attacks remain limited. Catalonia, Spain, faced widespread travel disruption on Monday after a suspected cyber attack shut down regional rail services during the morning rush hour. Commuter and regional trains were abruptly suspended around 6.45 a.m. following system failures at Adif, Spain's rail infrastructure manager. Thousands of passengers were stranded,
Starting point is 00:04:36 prompting the Catalan government to urge remote work and universities to reschedule exams. Spain's transport minister Oscar Puente said a cyber attack was one possible cause, though this remains unconfirmed. Services later resumed intermittently, according to state rail operators, who cited a major computer malfunction. The incident compounded an already turbulent week for Spanish rail, following multiple fatal injuries and injurious accidents nationwide. Barcelona Mayor Huame Colboni called the disruption unacceptable,
Starting point is 00:05:15 while opposition figures blamed long-term underinvestment and demanded accountability. FBI director Cash Patel said Monday that the Bureau has opened an investigation into signal group chats used by Minnesota residents to share information about federal immigration agents, citing concerns that such activity could put agents in danger. Speaking on a conservative podcast, Patel said the probe was prompted by claims that users shared agents' locations and license plate numbers, though he did not specify which laws may have been violated. Free speech advocates quickly raised First Amendment concerns,
Starting point is 00:05:55 arguing that sharing lawfully obtained information about law enforcement activity is constitutionally protected. Civil liberties groups warned the investigation could chill legitimate speech and public oversight of government actions. The chats hosted on the encrypted app signal have been used by activists and community members to warn neighbors about immigration and customs enforcement activity. Patel acknowledged the free speech implications, but said the FBI, would balance constitutional rights with potential violations of federal law. The U.K. government has unveiled plans for a sweeping overhaul of policing, aimed at tackling the surge in cybercrime, online fraud, and other internet-enabled offenses. Proposals from the
Starting point is 00:06:44 Home Office call for creating a new national police service described as Britain's equivalent of the FBI to handle serious and cross-border crimes increasingly beyond local law. forces reach. Officials say roughly 90% of crime now involves a digital element, with fraud accounting for about 44% of recorded offenses. Home Secretary Shabana Mahmood said the reforms reflect how crime has evolved in scale and sophistication, calling them the most significant changes in nearly 200 years. Under the plan, the National Crime Agency would be absorbed into the new service, while local forces remain focused on neighborhood policing. The government also plans major investments in digital tools,
Starting point is 00:07:31 artificial intelligence, and national coordination alongside new oversight for technologies such as facial recognition. Romanian authorities are investigating two nationals suspected of running a hitman-for-hire website that allegedly allowed users to contract assassins online. Police conducted searches at the request of UK authorities, seizing electronic devices, cryptocurrency worth about $650,000, and large sums of cash. Prosecutors say the platform used cryptocurrency and escrow-style payments to conceal identities and transactions.
Starting point is 00:08:12 The suspects face potential charges, including organized crime, incitement to murder, and money laundering. Officials note, such sites often. and prove fraudulent, though investigations are ongoing. A UK court has awarded more than $4.1 million to London-based Saudi critic Ghanem al-Masarir, ruling that his phones were hacked by spyware linked to the Saudi state. Judge Pushpindersani found a compelling basis that Al-Masarir's phones were infected with Pegasus's spyware and that the operation was directed or authorized by Saudi Arabia. The court said the hacking enabled extensive surveillance and caused severe psychological harm,
Starting point is 00:09:00 forcing Al Masarir to stop producing his popular YouTube content. Evidence from digital forensics researcher Bill Mardzak of the Citizen Lab supported the findings. Saudi Arabia did not contest the case, leading the judge to enter summary judgment, calling the intrusion's exceptionally grave invasions of privacy. Google has agreed to pay $68 million to settle a class action lawsuit, alleging its voice assistant recorded users' conversations without consent and shared them with advertisers. The proposed settlement filed in federal court in California
Starting point is 00:09:38 awaits approval from U.S. District Judge Beth Labson Freeman. Plaintiffs claimed Google devices recorded private discussions even without the activation phrase. If approved, the fund will cover consumer claims and legal fees, with payouts varying by the number of valid claims. Google did not comment. SISA has released new guidance mapping post-quantum cryptography or PQC standards to common enterprise hardware and software categories.
Starting point is 00:10:11 Issued in response to a June 2025 executive order, the advisory is meant to help CIOs and security teams assess quantum safe readiness and plan long-term migration. SISA identifies product classes already using or transitioning toward NIST PQC algorithms, including cloud services, collaboration tools, browsers, and some endpoint security products. However, the agency stresses that none are fully quantum resistant yet. Most implementations focus on key establishment, not digital signatures or authentication. The guidance signals that PQC is becoming a practical procurement consideration, while highlighting significant gaps enterprises must address as quantum safe standards mature.
Starting point is 00:11:03 U.S. prosecutors have charged Illinois man Kyle Svara with running a fishing scheme that allegedly compromised nearly 600 women's Snapchat accounts between 2020 and 2021. Authorities say he impersonated SNAP employees to steal access codes, download private images, and sell or trade the material online, including via Reddit. One client was former Northeastern University coach Steve Wey, later convicted of sextortion. Svara now faces federal fraud and identity theft charges. and is scheduled to appear in court in Boston. Coming up after the break, my conversation with Cynthia Kaiser from Halcyon.
Starting point is 00:11:57 We're talking about AI and quantum threats to cybersecurity, and a best-by guy tries a creative alibi. Stay with us. What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes?
Starting point is 00:12:32 That's where Vanta comes in. Vanta automates the manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time.
Starting point is 00:13:01 With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep. Get started at Vanta.com slash cyber. That's V-A-N-T-A dot com slash cyber. When it comes to mobile application security, good enough is a risk. A recent survey shows that 72% of organizations reported at least one mobile application security incident last year, and 92% of responders reported threat levels have increased in the past two years. Guard Square delivers the highest level of security for your mobile apps without compromising performance, time to market, or user experience. Discover how Guard Square provides industry-leading security
Starting point is 00:13:51 for your Android and iOS apps at www.gardesquare.com. Cynthia Kaiser is Senior Vice President of the Ransomware Revenue. Research Center at Halcyon. I recently sat down with her to discuss AI and quantum threats to cybersecurity and the national cyber strategy. So, Cynthia, it's always great to have you back. You know, I want to key off of the fact that not too long ago, we saw some congressional hearings when it came to AI and quantum threats for cybersecurity. And I wanted to check in with you on that, to, for your reaction to kind of what this indicates. the attention that Congress is taking when it comes to these issues.
Starting point is 00:14:44 Thank you for having me back and we're talking about a topic I find really important, which is kind of thinking about how our adversaries are integrating AI. And I'm really glad to see Congress taking up this mantle. I think I saw Representative Olis during the hearing say, if we don't get this right, we're screwed. And I mean, that was my big. takeaway is like that's true, right? We have to really be thinking about this and understanding it. And by understanding it, though, I mean knowing what's accurate, what might be hyperbolic,
Starting point is 00:15:21 but then what we can actually do to counter it, because it's not a runaway train. We can do things that really help put us in a better security position. Well, you use the word hyperbolic, and I'd love to start there, because I see folks talking about the importance of AI dominance. and I have to say I'm not certain what that means. What does it mean to you? It means that the U.S. stays ahead and is the leader of the kind of frontier models, the type of AI development that's at that cutting edge.
Starting point is 00:15:57 Because when we keep our market dominance, keep our AI dominance, to me that means we're the market leaders, we are able to ensure that the AI that goes out there conforms, to the free speech and all other ethics that we hold dear as a country and that we know that we're how it can be exploited, how it can be used for safety and how to combine that and things aren't coming at us as a surprise. And where do you suppose we stand today in terms of maintaining our leadership? Yeah, I think that we're easily four to six months ahead of a lot of other groups, countries, especially China that's developing it. What you've seen China do a lot
Starting point is 00:16:46 is going to rapidly develop after we develop certain types of functions or advances in their own models. And whether that's from the kind of typical Chinese model of figuring out things, stealing things along the way, or just when you know something's possible, sometimes it's easier to get to that point. Either way, the U.S. is still ahead. And it's really important to keep us ahead as we look at what we might be facing coming down the road. Well, speaking of what we might be facing, you head up the Ransomware Research Center with your colleagues at Housian. What are you anticipating this coming year when it comes to ransomware?
Starting point is 00:17:27 So I think right now we would say that AI hasn't fundamentally changed ransomware tactics, but it's changed kind of the economics of ransomware, right? it's lowered the barriers and it's accelerated some discrete tasks, some workflows. I think that's where you're going to see some of this improvement and some more of these discrete tasks. So in the hearing, Google talked about the use of AI in certain points of the attack chain that really did enable certain components to be a little more autonomous, to act a little more autonomously and do that kind of in real time to also thinking about the discrete tasks that are
Starting point is 00:18:14 available with initial access. If you like, that's where we've seen a lot of the technology go where you can kind of imagine how it is really beneficial to adversaries. I think making a lot more believable fishing emails, deep fakes. So I think in the next year, what we'll likely see is deep fake social engineering really start to overtake, just the traditional identity attack at traditional social engineering. And we're also going to see actors then start to experiment with some of these more niche things that were talked about in the hearing. I call them niche.
Starting point is 00:18:51 I call them experimentation because that's what they are. There's a high failure rate for this kind of stuff that's going on right now. It's really kind of starting to piece together and automate things that are already known. So yeah, we'll probably detect it along the way. So it's easy to say, kind of dismiss it. now. But the reason you experiment, the reason you do lots of failures is so you can get to success. And I think that's what we're going to see over the next year is those reps that attempts to really start to get better and figure out how you can change the sophistication, make things actually
Starting point is 00:19:22 more advanced using AI. Yeah, it's a really interesting point. I mean, I guess from your point of view, where are we when it comes to the maturity of the ransomware marketplace? I mean, Is there still room for innovation or are we at a state of refinement? Well, I think refinement was probably more where we're at over the last year. And you and I've talked about this before. Over the last year, ransomers gotten so fast. And that's where we've seen a lot of the innovation. And that primarily wasn't because AI was there.
Starting point is 00:19:55 It's because there's more virtualization. The ransom actors just have more experience. So they're able to get faster. There's a lot of different things there. and that the quickness of ransomware attacks now already necessitates a change in security posture. So believing that you used to have days or weeks of dwell time of an actor. So they're on your system.
Starting point is 00:20:17 You can get an alert. You could look at that alert in the morning, try to kick them out. That's not possible now. Now, really, all these things are happening in 24 hours to hours. And that means that you really have to automate a lot of your security tasks. the way in which you defend against AI enhanced threats is much the same. Like you really need automated defense. You need defense in depth to be able to identify these attacks in real time.
Starting point is 00:20:46 Because right now and for the foreseeable future, what is more likely to happen is just more, right? More attacks from more actors who maybe wouldn't have been able to do it otherwise or advanced actors figuring out ways to all. automate parts of their processes, create agents that help them do their activity so that they can do more attacks or they can do those, you know, just a slight bit faster. But I think what we're at now is looking at not having, you know, an attack, you recover from an attack, you can set your security posture, you wait for the next one. But if you have more and more attacks, that's really problematic. And that's likely where we're going with some of these integrations of AI. Well, speaking of more and increased velocity, certainly an area of development is the quantum threat.
Starting point is 00:21:40 Do you suppose that is going to affect ransomware operator's ability to do what they do when these tools become more readily available? Yeah, I think we're a little bit of ways out from some of the quantum-assisted tools becoming available to the wider swaths of cyber criminal groups. When I think about the quantum threat, I certainly am thinking first and foremost about, China and some of the other nation states. But eventually, when you get to those points where I think I would really worry among the ransomware group overall is not just kind of, hey, it makes this technically a little bit easier or our ability to move is a lot faster. But even the information that's been stolen along the way, if it was encrypted or if the information they're stealing is encrypted, maybe isn't as useful, the ability to then go through data to identify high value data
Starting point is 00:22:32 we thought we were all protecting, that could come into play. But once again, I still feel that's a much farther out issue than what we're looking at in terms of the advancements fueled by AI. Well, looking at the big picture, again, you know, heading into, or well, well, into 2026 as we find ourselves already. What's your advice for the defenders out there when it comes to, approaching ransomware this coming year? Really, defenders should expect the shorter lead times, more convincing social engineering and faster iteration. And that, I think, just shows focusing on the basics,
Starting point is 00:23:14 but focusing on some of the basics, well, the rapid patching, strong identity controls, and resilient detection and response processes, that's still what is most important. And I think overall, when you're looking at this, this ensuring that you're creating and thinking about, like, how do I do this detection and defense in real time? So that's really what the advice I'd give to defenders overall. But I'd go a step further with now, if we're on the AI topic, which is a lot of organizations are thinking about or starting to develop their own in-house AI models or maybe have employees that are
Starting point is 00:23:54 pulling together valuable data into their own models on their networks. If more security is not placed around that, so take an in-house AI model or the kind of discrete ones that maybe employees are creating on their own, that is a huge target of opportunity for ransom reactors. And they get onto a system or any adversary, really. They get onto a system, maybe you used to have to go around and look for the valuable data or maybe it was in different places. But what we're all doing is consolidating that into very easily findable places. And so we really have to think about the security and extra security we're putting around the AI tools on our own systems to better protect our information. That's Cynthia Kaiser from Halcyon. And finally, a 20-year-old
Starting point is 00:25:00 Best Buy employee in Savannah, Georgia is learning that retail crime dramas rarely end with a plot twist in the defendant's favor. Police say Dorian Allen helped suspected shoplifters walk out of the Abercorn Street store with more than $40,000 in merchandise from snack foods to $700 PlayStation consoles. His explanation? Online blackmail. According to the Savannah Police Department, Allen claimed a mysterious hacker group emailed instructions on which customers to wave through, threatening to live through.
Starting point is 00:25:36 threatening to leak nude photos if he refused. Investigators say he could not identify the hackers, describe them, or produce the emails. Store video allegedly shows weeks of point-of-sale manipulation, totaling 143 items. Allen now faces theft charges, while the supposed hackers remain, for now, safely imaginary.
Starting point is 00:26:02 And that's the Cyberwire. For links to all of today's story, check at our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show,
Starting point is 00:26:35 please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at n2K.com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Peltzman.
Starting point is 00:26:54 Our executive producer is Jennifer Ibn, Peter Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. If you only attend one cybersecurity conference this year, make it RASAC 2026. It's happening March 23rd through the 26th in San Francisco,
Starting point is 00:27:34 bringing together the global security community for four days of expert insights, hands-on learning, and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges and shaping what comes next.
Starting point is 00:27:54 Register today at rsaconference.com slash cyberwire 26. I'll see you in San Francisco. Attackers don't go through your tools. They go around them. In our interview with Jared Atkinson, CTO at SpectorOps, he reveals how a attackers look to exploit our identities, steal tokens, and quietly snowball their access across active directory, cloud apps, and GitHub. We talk through attack paths, why least privilege keeps failing, and how one misconfiguration
Starting point is 00:28:36 can hand over the keys to your organization. Want to see risk as attackers do? Then check out the full interview now on thecyberwire.com slash specterops.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.