The CyberWire Daily Podcast 7.6.23
Ep 1857 | 7.6.23

The Port of Nagoya continues its recovery from ransomware. Charming Kitten ups its game. Spyware in the Play store. Risks to electrical infrastructure. And a quick update on hacktivist auxiliaries.

Show Notes

LockBit 3.0 claims responsibility for Nagoya ransomware attack. Charming Kitten sighting. Spyware infested apps found in Google Play. Threats and risks to electric vehicle charging stations. Solar panels and cyberattacks. Dave Bittner speaks with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, to talk about CISA’s effort for companies to build safety into tech products.Rick Howard sits down with Clarke Rodgers of AWS to discuss the mechanics of CISO roundtables. And Hacktivist auxiliaries remain active in Russia's hybrid war.

Selected reading.

Pro-Russian hackers target Port of Nagoya, disrupting loading of Toyota parts (The Japan Times) 

Port of Nagoya resumes operations later than planned after Russian hack (The Japan Times) 

Ransomware Halts Operations at Japan's Port of Nagoya (Dark Reading) 

Nagoya Port Faces Disruption After Ransomware Attack (Infosecurity Magazine) 

Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware | Proofpoint US (Proofpoint)

Two spyware tied with China found hiding on the Google Play Store (Pradeo)

EV Charger Hacking Poses a ‘Catastrophic’ Risk (WIRED) 

Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks (SecurityWeek)

The Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe (OODA Loop).  

Russian railway site allegedly taken down by Ukrainian hackers (Record)