The CyberWire Daily Podcast 9.5.23
Ep 1899 | 9.5.23

In today’s symposium, we talk about a new strand of Chae$ malware, some developments in social engineering, privateers in a hybrid war, cyber ops as combat support, and some default passwords.

Show Notes

A New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator's site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.

Selected reading.

Threat Profile: Chae$ 4 Malware (Morphisec)

"Smishing Triad" Targeted USPS and US Citizens for Data Theft (Resecurity) 

'Smishing Triad' Targeted USPS and US Citizens for Data Theft (Security Affairs) 

New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services (Security Joes)

Hackers exploit MinIO storage system to breach corporate networks (BleepingComputer) 

Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges (The Hacker News) 

More Okta customers trapped in Scattered Spider's web (Register) 

Cross-Tenant Impersonation: Prevention and Detection (Okta Security)

Breaking: UK MoD attacked by LockBit (Computing)

German financial agency site disrupted by DDoS attack since Friday (BleepingComputer) 

LogicMonitor customers hacked in reported ransomware attacks (BleepingComputer)

LogicMonitor customers hit by hackers, because of default passwords (TechCrunch)