CyberWire Daily - When the breachers get breached.

Episode Date: October 10, 2025

International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabi...lities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by ⁠Jason Manar⁠, CISO of ⁠Kaseya⁠, sharing his insight into how the private and public sectors can/must work together for national security. Selected Reading FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer) Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek) Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq)   Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED) Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine) In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly) Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai) RondoDox Botnet Takes ‘Exploit Shotgun’ Approach (SecurityWeek) ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek) Pro-Russian hackers caught bragging about attack on fake water utility (The Record) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world-class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks, and a laptop, as well as providing a $34,000 additional annual stipend.
Starting point is 00:00:51 Apply for the fall 2026th semester and for this scholarship by February 28th. Learn more at CS.com. JhU.edu slash MSSI. Alto and Fortinette. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms.
Starting point is 00:01:47 The new Rondo Docs Botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Avanti endpoint manager flaws. Our guest is Jason Minar, Sissau of Kasea. sharing his insights into how the private and public sectors can work together for national security. And hackers mistake, a decoy for glory. It's Friday, October 10, 2024. I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today.
Starting point is 00:02:39 Happy Friday. It's great to have you with us. The FBI and French police seized breach forums domains, shutting down shiny hunters' platform used to leak corporate data. The seizure occurred October 9th, with bleeping computer confirming FBI name servers now control the sites. Shiny hunters acknowledge the loss in a PGP-Signed telegram post, saying backup since 2003, escrow databases and backup servers are now compromised.
Starting point is 00:03:11 They added the forum will not be rebuilt, warning that such platforms have become law enforcement honeypots. Despite the seizure, their dark web leak site remains online, with a Salesforce data dump still scheduled. The takedown exposes historic forum data and, signals closer global cooperation. Still, organizations face looming risk as shiny hunters claims to hold over a billion stolen Salesforce records. Gray Noise has linked three exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinette devices to IPs on the same subnets, suggesting shared threat actors. The firm first observed scanning of Cisco ASA firewalls weeks before Cisco,
Starting point is 00:03:59 disclosed two zero-day flaws exploited in China-linked arcane door espionage attacks. More recently, Gray Noise detected a 500% spike in scanning of Palo Alto Global Protect portals with over 1.3 million login attempts from thousands of unique IPs. These same subnets are now tied to brute force attacks against Fortinette VPNs. Gray Noise warns that 80% of such spikes precede new firewall or VPNs, vulnerabilities by about six weeks, advising organizations to harden defenses and block brute-forcing IPs. Juniper Networks has patched over 200 vulnerabilities in its Juno's space and security director
Starting point is 00:04:45 platforms, including nine rated critical. Flaws range from cross-site scripting and privilege escalation to remote command execution and backdoor creation. One critical bug allows admin-level command execution. No active exploitation is reported, but Juniper urges immediate patching. The issues pose serious risks to enterprise and telecom networks, especially in Europe, where large Juniper deployments heighten potential impact. Apple has doubled its top bug bounty payout to $2 million for exploit chains enabling spyware attacks,
Starting point is 00:05:23 with total rewards reaching $5 million for findings that also bypass lockdown mode, or are discovered in beta software. Announced by Apple Security Chief Ivan Kirstick at Hexicon, the expansion underscores the company's push to incentivize high-impact vulnerability research. Since opening its bounty to the public in 2020, Apple has paid over $35 million to more than 800 researchers. The program now covers one-click web kit and wireless proximity exploits
Starting point is 00:05:56 and adds a target flag's testing feature. alongside this, Apple introduced memory integrity enforcement in iPhone 17 devices and pledged 1,000 phones to rights groups supporting at-risk users. Google has launched a new AI vulnerability reward program, offering up to $30,000 for verified bugs in its AI products, including search, Gemini, and workspace. The program streamlines reporting by consolidating AI-related issues previously handled under the abuse VRP. Eligible vulnerabilities include data leaks, model theft, and fishing enablement involving AI interactions.
Starting point is 00:06:38 Since 2018, researchers have earned over $430,000 from AI-related reports. Google says the AI VRP aims to reward high-impact findings while excluding content-based issues like prompt injections. A new survey from Fastly finds that 90% of security leaders are using or evaluating AI in their application security programs, citing faster vulnerability detection and reduced manual effort. Yet, nearly a third act on AI findings without human review, raising concerns over false positives and misplaced trust. Half of the respondents report frequent or occasional inaccuracies, while
Starting point is 00:07:23 only 22% rate AI's accuracy as excellent. Key challenges include integration complexity, skills gaps, and compliance worries. Despite mixed confidence, 80% plan to expand AI use, emphasizing automation, real-time detection, and explainability. Fastly, Sissau Marshall Irwin, cautions that success will depend on reducing false positives and integrating AI effectively to avoid AI shelfware. A new report from Akamai finds that organizations adopting micro-segmentation can contain ransomware much faster and receive better cyber insurance terms.
Starting point is 00:08:08 Surveying 1,200 security leaders, Akamai notes that while 90% use some form of segmentation, only 35% employ micro-segmentation across their networks. Among enterprises already using micro-segmentation, ransomware containment times dropped by about 33%. 75% of organizations say insurers now assess segmentation posture during underwriting and 60% report receiving lower premiums tied to their segmentation maturity. The report also flags deployment challenges including network complexity, visibility gaps, and organizational resistance as common barriers to adoption.
Starting point is 00:08:50 trend micro has identified a new botnet Rondo docs that exploits over 50 vulnerabilities across routers, servers, cameras, and other devices for more than 30 vendors. Active since mid-2020 5, Rondo docs initially targeted a TP-link router flaw, but has since expanded to include DVRs, CCTV systems, and web servers. The botnet leverages both known and unlisted command injection vulnerabilities, 18 without CVEs, several on SISA's known exploited vulnerabilities list. CloudSec reports a 230 percent surge in Rondo Docs activity since mid-2020, with compromised devices used for cryptocurrency mining, DDoS attacks, and enterprise intrusions. The malware now spreads via a loader-as-a-service model alongside Marai and Morta payloads, masking activity by mimicking
Starting point is 00:09:50 gaming platforms and VPNs. Trend Micro's Zero Day initiative disclosed 13 unpatched Evanti endpoint manager flaws, one local privilege escalation reported in November 2024, and 12 remote code execution issues reported in June of this year. ZDI labels them zero day upon disclosure, though they're not actively exploited zero days. No CVEs exist yet. All of our high severity with one scoring 8.8. The local privilege escalation affects agent portal via unsafe deserialization to system. The RCEs stem from inadequate input validation across multiple reporting and query classes, mostly leading to authenticated SQL-driven code execution.
Starting point is 00:10:42 The highest severity RCE involves unsafe path use and can be triggered with admin credentials or user interaction. Trend Micro says patches slipped from September and November to March of next year. Coming up after the break, my conversation with Jason Minar from Kasea, sharing his insights on public-private cooperation
Starting point is 00:11:13 for national security, and hackers mistake a decoy for glory. Stay with us. At TALIS, they know cybersecurity can be tough and you can't protect everything, but with TALIS you can secure what matters most. With TALIS's industry-leading platforms, you can protect critical applications, data and identities, anywhere and at scale with the highest ROI. That's why the most trusted brands and largest banks, retailers, and health care
Starting point is 00:11:54 companies in the world rely on TALIS to protect what matters most. Applications, data, and identity. That's TALIS. T-H-A-L-E-S. Learn more at talusgroup.com slash cyber. What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster,
Starting point is 00:13:04 scale confidently, and finally get back to sleep. Get started at Vanta.com slash cyber. That's V-A-N-T-A-com slash cyber. Jason Minar is CISO at Kasea. We recently caught up to discuss his insights on how the private and public sectors can work together for national security. So I would give a generalized statement first, that when I think about cybersecurity and when I think about politics in general, I think about Congress's ability or inability. to pass meaningful legislation that keeps up with cybersecurity, if you will, cybersecurity technology and cybersecurity issues and problems.
Starting point is 00:14:00 For example, I am a very data analytically driven human being. And as such, I am still amazed that we don't have certain mandatory reporting requirements or some type of standard that the government has deemed that must be. be in place with the exception of FedRamp for, you know, governmental utilization. So, but you're truly asking about what we see politically and what we see politically, unlike some of our adversaries, quite frankly, we oftentimes change. Every four years or potentially eight years, we change even ever so slightly, are initiatives. And one of the things that has been changed as of late is the mission of SISA,
Starting point is 00:14:56 right? And looking at that, there's been some impact. And looking at that, there's been some concern. Now, I see it from both sides. I see when SISA was started very early on, it was very hard for them to find their footing, right? And then they started. coming into their own and they started really filling in some voids within the community. We seem to be pulling away from that and pulling back from that now.
Starting point is 00:15:29 It's going to be very interesting to see what governmental or private resources that we have to step in and fill the void. My perspective has been that for many, many years, cybersecurity kind of enjoyed broad bipartisan
Starting point is 00:15:48 support. It stayed out of the fray of any particular side's interests. Everyone agreed this was important for our national security, for the security of our citizens. And my sense is that the past couple of years, that's kind of drifted away a little bit. Or perhaps we, would it be fair to say we lost a little of our innocence? Is that an acceptable way to frame it? Yeah, I would say we lost a little of are in a sense, but being in government, I would say that depending upon which part of government you're in, it's no different than certain businesses. There are different silos, and people understand the problem differently. So those that are closest to it, right, the line level agents within various organizations that are combating these adversaries and actors every day
Starting point is 00:16:41 have a very different understanding of what's going on, quite frankly, than some other parts of the government. And sometimes I think our attention is somewhat diverted. I pause and I hesitate to say because, and this is Jason Menard's take, right? What I continue to see is in certain ways Congress and our congressional delegates and representatives having a very difficult time providing legislation, whether it's on cybersecurity or other matters. And I think that affects cybersecurity in a meaningful way. And if you look back to when the last true legislation was passed, and I'm not talking about, you know, presidential, you know, some type of presidential directive, but actual, you know, congressional cybersecurity legislation, you know, it's truly
Starting point is 00:17:42 been at some time. And even the laws around cybersecurity, when you look at the laws around cybersecurity, many times they are using financial fraud laws. They're using RICO laws. They're using other laws that aren't necessarily specific because all that we have, you know, is one law that was passed back in, I think it was back in the 80s on the books, at least federally, for cybersecurity. Yeah. So do you think there's kind of a fundamental velocity mismatch here between the ever-accelerating rate at which things happen in the cyber domain and Congress's inability to squeeze anything through?
Starting point is 00:18:29 Well, I think it's that. But I also think, you know, I want to give Congress and I want to give our government the benefit of the doubt somewhat. You know, there are many, many issues to address at any given moment. But I think truly understanding, right, that where are technology, our data, our intellectual property, and a lot of things that make this a great, great country resides in the digital realm and digital space. And as such, I really believe that we need to give a lot more bandwidth to thinking about how we're protecting
Starting point is 00:19:12 and addressing that and how we're doing that, you know, across the board through public and private partnerships. I'm not just speaking to, you know, potential regulatory compliance or congressional mandates, but true public-private, you know, collaborations that move the needle in a meaningful way that protect America's interest while protecting, you know,
Starting point is 00:19:38 the interest of our businesses. What do you suppose something like that could look like? Wow. Isn't that the $50,000 question? Or maybe in this realm, you know, $50 trillion question. Yeah. Well, first, it has to always start with the dialogue.
Starting point is 00:19:58 And I will say CISA, the FBI, and several other entities are trying very hard at getting that dialogue going and keeping that going through several different initiatives. I'm very excited what some agencies are doing to try to bridge that cap. I would obviously like to see that expand because truly the way that I think you get everyone involved is if you get all stakeholders in a room. I know Sisa for a while, last year, the year before that, they had a committee for RMM security standards and we were able to push out some security standards for companies that were. selling RMM. And RMM can be a very, very powerful tool, which is why we chose to start there. And there were really legs on continuing that legislation and rolling that into what that looked like with the SDLC process, CIDC pipeline, and how we could meaningfully look at technology and businesses that were making products, what that public-private partnership
Starting point is 00:21:20 look like so that we could have some directions to continue to make things in a safer way for the ultimate in-consumer, right? And I think that's a great place to start. And then I think from that, you get some wonderful ideas around things that then grow legs, because in these meetings. You have not only people from the top sectors within business, but you have representatives that are a part of the legislative team. So you won't necessarily have legislatures there, but you'll have part of the legislative team. You'll have people from, you know, cyber warfare from all aspects. You'll have people from people from from all agencies that you can think about.
Starting point is 00:22:15 And they're all sharing ideas and trying to come up with that, you know, $40 trillion answer, if you will, and how we slowly get there. And I think that's where you kind of have to start, right? Because some of the best intended legislation, especially when it starts out, if you don't involve the end technical user, while it may be well-intentioned can lead to adverse consequences. And that's where we don't want to be. Do you suppose that we have what it takes to make these things happen?
Starting point is 00:22:53 Is there political will there? Is there good faith partnerships in the making? Yeah. So I will say my time during the FBI, we spend a lot of time building those relationships within Fortune 50 and 100. companies and even some smaller. And so I would say that there are things, even from back then, you know, a decade ago, that are still bearing fruit and there's still some really good traction to be had there. With some of the other initiatives, I'll be honest, I'm not sure what the newer initiatives
Starting point is 00:23:32 are. I am part of that I will take personal blame for because I am. set to go to D.C. and meet with some folks. But unfortunately, I think it was just a time of transition last year. So unfortunately, that didn't happen. So I'll be going to D.C. I'll be seeing if those things potentially even exist, and I'm just unaware. But I know, as I said before, several of the initiatives with Sisa and DHS have kind of gone away. And those were some of the ones that I was most engaged with. So while they are reconstructing what that looks like, we're engaging more with, you know,
Starting point is 00:24:22 other government entities and trying to be of service and trying to make sure that we are a voice for MSPs and small and mid-sized businesses. to whom we protect and sell services to. That's Jason Minar from Kasea. With Amex Platinum, access to exclusive Amex pre-sale tickets can score you a spot trackside, so being a fan for life turns into the trip of a lifetime.
Starting point is 00:25:02 That's the powerful back-end. of Amex. Pre-sale tickets for future events subject to availability and varied by race. Terms and conditions apply. Learn more at at MX.ca.ca slash Y-Amex. This episode is brought to you by Peloton. A new era of fitness is here. Introducing the new Peloton
Starting point is 00:25:17 Cross Training Tread Plus, powered by Peloton IQ. Built for breakthroughs with personalized workout plans, real-time insights, and endless ways to move. Lift with confidence while Peloton IQ counts reps, corrects form, and tracks your progress. Let yourself run,
Starting point is 00:25:34 lift, flow, and go. Explore the new Peloton cross-training tread plus at OnePeloton.C.A. And finally, in a twist-worthy of a digital sitcom, pro-Russian hackers spent September loudly celebrating the takeover of a Dutch water facility, only to discover they'd been splashing around in a honeypot. The group, calling itself Toonet, had in fact broken into a decoy network built by researchers at Forscout, who quietly watched as the hackers defaced a login page, disabled alarms, and generally made mischief, all in a sandbox. Their victory announcement, complete with the charming signature hacked by Barlotti, F,
Starting point is 00:26:27 although the F was another word, was met by the cybersecurity equivalent of polite applause. Forescout says the incident illustrates how novice hacktivists are increasingly poking at industrial systems they barely understand, mistaking honeypots for heroics. Toonet, like many of its peers, quickly folded, proving that hacktivist groups often have the lifespan of a mayfly, just louder. Still, researchers warn these bumbling forays mark a worrying shift toward real-world infrastructure as the next big cyber playground.
Starting point is 00:27:05 So it turns out the hack of the year was really just a splash in a very well-monitored puddle. And that's the Cyberwire for links to all of today's stories check out our daily briefing at thecyberwire.com. A quick program note, we will not be publishing this coming Monday in observance of the federal holiday. We'll see you back here on Tuesday. Be sure to check out this weekend's research
Starting point is 00:27:46 Saturday in my conversation with John Focker, head of threat intelligence at Trellix. We're discussing their research gang wars, breaking trust among cybercriminals. That's Research Saturday. Check it out. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Heltzman. Our executive producer is Jennifer
Starting point is 00:28:29 I've been Peter Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here next week. Cyber Innovation Day is the premier event for cyber startups, researchers, and top VC firms building trust into tomorrow's digital world. Kick off the day with unfiltered insights and panels on securing tomorrow's technology. In the afternoon, the eighth annual Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration, and funding. The Innovation Expo runs all day, connecting founders. investors and researchers around breakthroughs in cyber security.
Starting point is 00:29:33 It all happens November 4th in Washington, D.C. Discover the startups building the future of cyber. Learn more at cid.d. datatribe.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.