CyberWire Daily - Your signal is showing.

Episode Date: April 23, 2026

Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a crim...inal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker pathways. CISA orders urgent fixes for a Microsoft Defender zero-day, and their Director nominee withdraws. Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. A meteorological mystery meets market manipulation. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Introducing the AI Security Brief podcast. Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. They join Dave to introduce their new show on the N2K CyberWire Network. You can find their first episode here and catch new episodes every other Thursday on your favorite podcast app. Selected Reading Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say (TechCrunch) Committees on Energy and Commerce and Financial Services Introduce Pair of Privacy Bills to Establish Comprehensive Data Protections for All Americans (Energy Commerce) International cyber agencies share fresh advice to defend against China-linked covert networks (NCSC) RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace (Security Affairs) New GopherWhisper APT group abuses Outlook, Slack, Discord for comms (Bleeping Computer) Hackers Use Hidden Website Instructions in New Attacks on AI Assistants (Hackread) Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950) (Help Net Security) Bad Apples: Weaponizing native macOS primitives for movement and execution (Talos Intelligence) CISA orders feds to patch BlueHammer flaw exploited as zero-day (Bleeping Computer) Trump’s pick to lead CISA withdraws nomination after months of political impasse (POLITICO) A Hair Dryer May Have Gamed a Paris Weather Sensor for $34,000 on Polymarket (Bitcoin News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. No, it's not your imagination. Risk and regulation really are ramping up, and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're getting ready for a SOC2 or managing an end-toe, enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals
Starting point is 00:00:44 moving. Companies like Ramp and Writers spend 82% less time on audits with Vanta. That means less time chasing paperwork and more time focused on growth. For me, it comes down to this. Over 10,000 companies from startups to large enterprises trust Vanta to help prove their security. Get started at vanta.com slash cyber. Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside
Starting point is 00:01:31 compromised device networks. A ransomware forum leak reveals a criminal marketplace. Gofer Whisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data, MacOS admin tools become attacker pathways. SISA orders urgent fixes for a Microsoft Defender Zero Day and their director nominee withdraws.
Starting point is 00:01:57 Our guest today are Johnny Hand and Justin Child's host of Trend AIs' AI's AI Security Brief podcast. And a meteorological mystery meets market manipulation. It's Thursday, April 23rd, 26. I'm Dave Bittner, and this is your Cyberwire Intel Briefing. Thanks for joining us here today. as always, to have you with us. Security researchers have uncovered two covert surveillance campaigns exploiting telecom signaling weaknesses to track individuals' locations worldwide. Citizen Lab reports the operators posed as legitimate cellular providers
Starting point is 00:03:00 and abused access to global signaling systems to query subscriber location data. The campaigns exploited vulnerabilities in signaling system 7 or SSC, and in diameter, a newer protocol sometimes deployed without full protections. Researchers identified repeated use of infrastructure linked to O-19 Mobile, Tango Networks, UK, and Airtel, Jersey. One campaign also used Sim Jacker-style hidden SMS commands against a high-profile target. Continued signaling layer abuse shows global mobile infrastructure still enables covert tracking its scale, creating persistent exposure for executives, activists, and government officials despite known risks.
Starting point is 00:03:52 House Republicans have introduced two coordinated bills aimed at expanding nationwide privacy protections and strengthening consumer control over financial and personal data. The Secure Data Act would establish a national privacy and data security standard, create rights to access, delete, and limit use of personal data and require consent for processing sensitive information. It would also impose disclosure and minimization requirements on companies and data brokers with enforcement by the Federal Trade Commission and State Attorneys General.
Starting point is 00:04:29 The Guard Financial Data Act would modernize the Graham-Leach-Blylea Act by requiring opt-in consent before sharing sensitive financial data. data and allowing customers, including former customers, to access or delete stored information. The proposals signal a coordinated effort to reshape U.S. privacy governance and increase accountability for organizations handling sensitive consumer and financial data. International cybersecurity agencies warn that China-linked threat actors are increasingly using covert networks of compromised devices to disguise their operations and evade detection. The UK National Cybersecurity Center, part of GCHQ and 15 international partners,
Starting point is 00:05:18 release joint guidance describing how attackers exploit vulnerable edge devices, such as home routers and smart devices, to route malicious traffic, steal data, and maintain persistent access to critical sectors. The advisory also highlights indicator of compromise extinction, where forensic clues disappear quickly, complicating detection and response. Experts say defenders must shift toward intelligence-driven monitoring and stronger baseline protections
Starting point is 00:05:49 as attackers scale infrastructure designed to obscure attribution and persistence across global networks. A leaked database from the Ramp Cybercrime Forum is offering rare insight into how ransomware operations function as structured criminal marketplaces, rather than isolated attacks. According to Comparatex analysis, the leak includes records spanning November 2021 through January 24,
Starting point is 00:06:19 covering over 7,700 users, over 1,700 forum threads, more than 340,000 IP logs, and nearly 1900 private conversations. The forum supported access sales to compromised corporate networks, Ransomware as a service recruitment and deal negotiations in private messages. Listings targeted organizations across more than 20 countries, with the United States appearing in 40% of identified cases. The data illustrates how specialization across access brokers, malware operators, and affiliates enables ransomware campaigns to scale faster
Starting point is 00:07:00 and become harder for defenders to disrupt. researchers have identified a previously undocumented threat actor called Gofer Whisper, using legitimate cloud platforms to conduct espionage against government targets. According to ESET, the group has operated since at least 2023 and deployed a Go-based malware toolkit against a Mongolian government entity, compromising 12 systems and likely dozens more victims globally. The tool set includes multiple backdoors that use Slack, Discord, and the Microsoft Graph API through Microsoft 365 Outlook for command and control, plus a custom ex-filtration utility that uploads stolen data to file.io.
Starting point is 00:07:49 Analysis of command activity patterns and metadata linked to the activity to China. Blending command traffic into trusted enterprise services complicates detection, and enables persistent access across sensitive government environments. Researchers warn that attackers are actively using indirect prompt injection techniques to manipulate large language models through hidden instructions embedded in ordinary websites. ForcePoint X Labs reports threat actors concealed commands in web content using hidden text, metadata, and styling tricks that AI agents can read, but users cannot see.
Starting point is 00:08:32 Telemetry identified 10 live cases in April involving actions such as API key theft, fraudulent payment attempts, denial of service behavior, and data deletion commands. Researchers say the technique exploits LLM's inability to distinguish between data and instructions when processing external content. Organizations deploying AI assistants
Starting point is 00:08:56 or coding agents may face new risks if models execute hidden web instructions as trusted commands during routine browsing or automation tasks. Apple has released security updates for iPhones and iPads to fix a notification logging flaw that allowed deleted app notifications to remain stored on devices. The vulnerability affected notification services and was addressed with improved data redaction in iOS and iPadOS updates. Signal confirmed the flaw enabled authorities to recover message notification content
Starting point is 00:09:33 even after the Signal app was deleted, though Apple said it has no evidence of active exploitation. Residual notification data can expose sensitive communications even after apps are removed, highlighting risks in mobile notification storage. Researchers at Cisco Talos warn that attackers can exploit built-in macOS administrative features to move laterally and execute code across enterprise environments
Starting point is 00:10:02 without traditional malware. The study shows adversaries can repurpose native capabilities such as remote application scripting, AppleScript Spotlight metadata, and common utilities including SSH, Socat, Netcat, and SNMP to deliver payloads, transfer tools, and maintain persistence. Techniques include storing malicious code in finder metadata and using legitimate inter-process communication channels that evade typical endpoint detection telemetry. Researchers say these living off-the-land methods exploit gaps in macOS monitoring compared with Windows environments. Growing enterprise macOS adoption increases exposure to stealthy attacks that blend in to normal system activity and bypass conventional detection controls.
Starting point is 00:10:55 SISA has ordered U.S. federal agencies to patch a Microsoft defender privilege escalation vulnerability, exploited in ongoing zero-day attacks within two weeks. The flaw allows low-privileged local attackers to gain system access on unpatched devices. Microsoft released fixes on April 14th and Huntress reported evidence of hands-on keyboard intrusion act. activity linked to the vulnerability. Sissa added the issue to its known exploited vulnerabilities catalog with a May 7th remediation deadline. Additionally, Sean Planky has withdrawn his nomination to lead Sisa after more than a year without Senate confirmation. Planky notified Homeland Security leadership and the White House that the Senate would not advance his nomination, which had been pending
Starting point is 00:11:46 since March 2025, despite clearing committee review. His withdrawal follows reported opposition tied to an unrelated Coast Guard shipbuilding dispute and comes amid broader leadership turnover at Sisa. Coming up after the break, my conversation with Johnny Hand and Dustin Childs, host of Trend AI's new AI Security Brief podcast, and a meteorological mystery meets market manipulation. with us. Quick question. Have you watched Project Hail Mary yet? Humanity is facing an existential threat and racing to solve it with the clock ticking. For security teams, that probably hits close to home with AI use rapidly spreading. Everyone's using AI, marketing, sales, engineering. Chris the
Starting point is 00:12:55 intern without security even knowing about it. That's where Nudge security comes in. Nudge finds shadow AI apps, integrations, and agents on day one, and helps you enforce policy without blocking productivity. Try it free at nudgesecurity.com slash cyberwire. Maybe that's an urgent message from your CEO, or maybe it's a deep fake trying to target your business. Doppel is the AI-native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Dopple uses it to fight back, from automatically dismantling cross-channel attacks
Starting point is 00:13:45 to building team resilience and more. Dopple, outpacing what's next in social engineering. Learn more at doppel.com. That's D-O-P-P-E-L.com. Johnny Hand and Dustin Childs are hosts of Trend A-I's brand-new AI Security Brief podcast right here on the N2K Cyberwire Network. I caught up with Johnny and Dustin for insights and a sneak peek at the show.
Starting point is 00:14:24 Well, Johnny and Dustin, welcome to the show. It's great to have both of you with us here, and I appreciate you taking the time. No problem. Happy to be here. Yeah, thank you. Well, let's start out by learning a little bit about both of you. Dustin, can I start with you? Where did you get your start and what led you to where you are today? Oh, wow.
Starting point is 00:14:43 That's going to take me back. So I actually got my start in Infosec back in 1990. believe it or not, when I was assigned to the Air Force unit designed to catch hackers. So that's where I, you know, learned everything back on ancient systems and everything else when we were happy to catch a port scan. But from there, I did that quite a while, worked for the government, then moved to Microsoft as part of their Microsoft Security Response Center. I did patch Tuesday for about seven or eight years.
Starting point is 00:15:13 And, you know, did a lot of different things to take you back. if you remember conficker, Stuxnet, a lot of those were my cases where I was a program manager for that and getting those updates off the door. And then at the beginning of 2015, I joined the Zero Day Initiative and have been here ever since that it's a lot more fun on this side, receiving bugs and paying for bugs and running Pone to Own
Starting point is 00:15:34 than it is trying to fix everything. So, yeah, that's kind of been my journey in a real quick step. So it's been a lot of really actionable stuff, a lot of learning over the years. So it's been really great. No, that is quite a journey. Johnny, how about you? Very similar to Dustin.
Starting point is 00:15:49 I started out in the U.S. Navy as a technologist and have pretty much been tasked with deploying and securing technology pretty much across every type of environment. Of course, obviously naval ships, but I started working back in 2006 more focused on information security as an information assurance manager for the command that I was at and then just fell in love with cyber operations. in general, moved around a little bit in the Navy and had experience to go as a technologist and as a leading technologist with the Naval Special Warfare Development Group, so working with SEAL teams and special operations, and then transition from there into the Navy Cyber Defense Operations Command, really focusing on defensive cyber operations at scale for the DOD. And then once I got out of the military, I moved into the higher education space, had the opportunity to build a security program and start leading technology initiatives in the university
Starting point is 00:16:50 landscape, which is definitely more interesting in many ways, especially from the viewpoint of having a large international student population. So it's always an interesting environment to secure and then just really fell in love with the operations there and building out programs. And now have made the switch from being a customer of Trend AI into focusing on adoption and really innovation around AI. Well, the podcast is AI security brief. Let's start with some high-level stuff here. What prompted the creation of the show?
Starting point is 00:17:26 I think as trend AI, micro-transitioned into trend AI, we wanted to kind of highlight some of the work we're doing and we wanted to see what work others were doing, not only just for our knowledge and notification, but to give our listeners some actionable stuff. There's so much hype around AI, and there's so little actionable takeaways
Starting point is 00:17:46 that people really understand. So we're looking to bridge that and give an opportunity for real practitioners in the AI space to give CSOs and other security leaders things that they can really do and understand about how to defend their environment from potential AI threats
Starting point is 00:18:03 and then how to use AI to defend their environment as well. So I think from my perspective, Johnny, I hope you chime in here as well. But that's really, I think, the goal of the podcast. Yeah, it's a great focus, too, because I think that the ground has shifted for many of the security practitioners. And it's honestly really hard to keep up with the pace of innovation, but also the pace that the threat actors and
Starting point is 00:18:26 adversaries are using AI against us as well. So we really wanted to take an approach where we looked at the innovation and really celebrated the innovation, but also looked at the opportunities to give, like Dustin said, those really foundational opportunities to secure your environment against the innovation that's happening at scale. You know, one of the things that I really enjoy about your show is in a world where there is so much noise around everything AI, you're having real conversations with real leaders in the space. Can you dig into that a little bit for me, Johnny? Who are the folks that you're talking to? When we started looking at the podcast as an opportunity to connect not only the challenges of
Starting point is 00:19:10 today, but like where we're leading. You know, we often talk about this is being for those security leaders that are looking, you know, out into the future, getting six months ahead of, of what's coming next. And so in order to do that, we're not just focused on, you know, the C-suite leaders, you know, like many people talk to. I think we've looked across and we want to talk to practitioners. We want to talk to those that are in the trenches every day, but also those that are at the board level that are being pressured in many ways to adopt AI and innovate. And ultimately, the conversations are centered around building confidence so that they can be excited and feel competent to innovate.
Starting point is 00:19:49 So we're looking at and having those conversations with threat researchers and law enforcement and the security leaders, those CSOs, but also just looking across the the landscape at everyone that has a touch point involved with AI security. Dustin, from your point of view, what's the value proposition here? What are you hoping people come away from the show with? Well, I think the number one thing is we want listeners to finish an episode thinking, I just learn something I want to share with my team, or I just learn something I want to go have a further conversation with about the people
Starting point is 00:20:24 who I work with and how it impacts us. So whether it's where the AI threat landscape is heading or actually, advice that they can take and use immediately or clarity on just what is the latest thing that marketing is pitching to us that we need to really understand, but how to connect the AI security risk to business in a way that gets the board to listen. And that's really what I'm hoping that the listeners will take away. Well, let's give our listeners a little preview here. I know you have a few episodes ready to roll here as the show launches. Can you give us a little sneak peek at what we can expect to hear?
Starting point is 00:21:01 Sure. Our first one is how does AI change the economics of cybercrime? And that features Bob McArdle. He's the director of cybercrime research at Trend AI. And he has been working with law enforcement on cyber crime for over 20 years. He gave a talk at RSA about how AI is affecting the cost of cyber crime. And spoiler alert, it's lowering the cost. So the criminal service economy is being rebuilt around AI. And it's perfectly structured for it. So we have this great conversation. about where the cybercrime folks are using AI and some actual items that people can do knowing that this is coming. Johnny, you want to pick up with us what else we have to look forward to? Yeah, we also had great conversations with Ashish Rajan, who is a CISO author and a host of Cloud Security Podcast. He's also a co-host of the AI Security podcast. So really great conversation and a practical conversation because we talked about the viability of the fact that really, anyone can code now using AI and how that's going to impact the SaaS applications and the different secure applications that we have. And he did a really great job of diving into that subject and really talking about the impact that vibe coding and those components are going to
Starting point is 00:22:18 have on the SaaS industry. Yeah, I saw another one of your upcoming episodes that has to do with AI and who's responsible when AI can make mistakes. Dustin, what can we look forward to there? Yeah, our next episode is entitled, Who's Responsible When AI Starts Making Mistakes? And it features Sush and Jane, who's the president and CEO of Vinta Security. And it really looks at how do you talk to your board about the technical risk in a way that can translate into budgets for you to actually manage that risk? Johnny, who do you suppose your target audience is here? Who are you trying to reach? Our focus is really on those security leaders that are really struggling.
Starting point is 00:23:00 with adoption, trying to understand how to secure the AI that's in their environment. So we're focused on security leaders at the CSO level, those CIOs, those CTOs, that are really trying to get their hands on what's happening, what's innovation at scale, and how can they secure that. All right. Well, the show is AI Security Brief. That is from Trend AI, and the hosts are Dustin Childs and Johnny Hand. Gentlemen, best of luck with the new show.
Starting point is 00:23:27 And thanks so much for taking the time for us. You're very welcome and thank you for having us. Yep, thank you. We've got a link to the first episode of the AI Security Brief podcast in our show notes. You can catch new episodes every other Thursday on your favorite podcast app. Local news is in decline across Canada, and this is bad news for all of us. With less local news, noise, rumors, and misinformation fill the void, and it gets harder to separate truth from fiction. That's why CBCC.
Starting point is 00:24:08 ABC News is putting more journalists in more places across Canada, reporting on the ground from where you live, telling the stories that matter to all of us, because local news is big news. Choose news, not noise. CBC News. The Madamy Holmes bike for brain health supporting Baycrest returns on May 31st for its fifth anniversary
Starting point is 00:24:29 with a new start and finish at the Aga Khan Museum. Join thousands of cyclists as we take over the DVP and Gardner Expressway in support of dementia research and brain health. riders of all abilities are welcome, and both regular bikes and e-bikes can participate. Bring your friends, family, or corporate team, and make an impact. Register today at fightforbrainhealth.ca. And finally, French authorities are investigating unusual temperature spikes at a Paris airport weather sensor, after anomalies aligned with roughly $34,000 in prediction market payouts.
Starting point is 00:25:16 Mateo France filed a complaint following two. brief readings above 22 degrees Celsius at Charles de Gaulle Airport on April 6th and April 15th, each resolving Polymarket wagers in better's favor. Meteorologist Paul Marquis said nearby stations showed no matching changes and concluded physical intervention with a heating device was the most plausible explanation. Polymarket later switched its Paris temperature data source to Le Bourget Airport, Markets that rely on a single physical sensor create incentives to influence that center, turning routine weather instrumentation into an unexpectedly lucrative target for creative forecasting. And that's the Cyberwire.
Starting point is 00:26:18 For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights to keep you a step ahead in the rapidly changing world. of Cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at n2K.com. N2K's lead producer is Liz Stokes. We're mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazas. Our executive producer is Jennifer Iben. Peter Kilpe is our publisher, and I'm Dave Bittner.
Starting point is 00:26:59 Thanks for listening. We'll see you back here. tomorrow. Sorry. Investing, trading, that isn't a personality. You don't need the voice. You don't need the jargon. You don't need the podcast. You already know how to trade. You've done it your whole life. And TD Easy Trade taps into that instinct so you can build something real. No minimums, no monthly fees, 24-hour support, no investor personality required. Because you are made to trade. And TD Easy Trade is made to Help. Download it now.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.