Newsletters

Written content from the Risky Business Media team

DeepSeek and Musk's Grok Both Toe the Party Line

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The Chinese-made DeepSeek-R1 AI model produces more insecure code when prompts mention subjects considered sensitive to the Chinese Communist Party (CCP), according to recent research from Crowdstrike. 

CrowdStrike's testing compared the security of code produced by DeepSeek with that of other state-of-the-art Large Language Models (LLMs). In the baseline test, the models were given straightforward prompts to produce code to carry out a particular task. 

They were then given the same base prompt with additional information that CrowdStrike described as a "contextual modifier" and/or a "geopolitical trigger".

Risky Bulletin: Sha1-Hulud npm worm returns, with destructive behavior

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Another Salesforce breach: Hackers are pilfering data from Salesforce customers again, this time after they've breached Gainsight, the maker of a Salesforce app. More than 200 customers were affected. The Scattered Lapsus$ Hunters group took credit for the hack, the same group that breached Salesforce earlier this year as well. [Salesforce//TechCrunch]

CrowdStrike fires malicious insider: Security firm CrowdStrike has fired an employee who was feeding information to the Scattered Lapsus$ Hunters hacking group. The company discovered the insider after screenshots of its internal systems were posted on the group's Telegram channel. [BleepingComputer]

SitusAMC hack impacts Wall Street: Hackers have stolen sensitive data from fintech company SitusAMC. Its main customers include banks and real estate loan platforms. [CNN]

AI-Powered Espionage Will Favor China

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Last week, Anthropic revealed a real-world, AI-orchestrated cyber espionage campaign. There's a real speed and scale benefit here for malicious actors that care more about hacking everything than flying under the radar. Western governments, however, will likely stick to the tried and tested method of "slowly, slowly, catchy monkey".

In the report, Anthropic detailed its discovery of the campaign that used AI "not just as an advisor, but to execute the cyberattacks themselves". 

Anthropic believes the threat actor was a Chinese state-sponsored group whose goals align with those of the Chinese Ministry of State Security. The group attempted to infiltrate "roughly thirty" typical victims: large tech companies, financial institutions, chemical manufacturing companies and government agencies. It succeeded in a small number of cases. 

Risky Bulletin: Microsoft will integrate Sysmon into Windows

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Russian surveillance vendor got hacked: An unidentified threat actor has hacked and leaked sensitive data from Protei, a Russian company that makes telecom-grade surveillance gear, including equipment for Russia's SORM system. [TechCrunch]

Cyberattack disrupts Russian port operator: A cyberattack has crippled the operations of Port Alliance, a Russian company that manages cargo terminals at six Russian ports. The incident lasted days and disrupted Russian coal and fertilizer shipments. [The Record]

NHS impacted by Oracle zero-days: The UK National Health Service (NHS) has joined a long list of companies that were hacked using an Oracle EBS zero-day this summer. [SecurityWeek]

Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys infrastructure

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Europol and law enforcement agencies from more than 30 countries have seized servers, domains, and Telegram channels for three malware services—the Rhadamanthys infolstealer, the VenomRAT, and the Elysium botnet.

Authorities say the three malware strains infected hundreds of thousands of users and stole millions of credentials. The stolen credentials were later used to deploy ransomware or steal cryptocurrency.

The takedown was part of Operation Endgame, an Europol-led project that began in 2023 and targets criminal infrastructure that is used to enable ransomware attacks.

Reuters Blows Lid on Meta's Fraud Profit Scandal

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In an eye-popping investigation, Reuters has revealed that Meta had projected its 2024 advertisements for scams and banned goods would bring in about USD$16 billion or 10% of its total revenue. 

The report is based on a cache of documents reviewed by Reuters.

In one of those documents, Meta's safety staff estimated that the company's platforms were "involved" in a third of all successful scams in the US. That's a stunning figure. But we do wonder how much of that involvement is simply WhatApp being used to talk to victims. If advertisements weren't the bait that lured victims, it hardly seems fair to blame Meta for running an end-to-end encrypted messaging app. 

Risky Bulletin: Another Chinese security firm has its data leaked

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

More than 12,000 internal documents were leaked online from Chinese security firm KnownSec.

The files were uploaded last week on GitHub by an unknown individual and later removed before the repo got any widespread circulation.

According to analyses from Mrxn and NetAskari, who got their hands on the leak, the most recent documents are from 2023. This suggests this was likely when the files were stolen/exfiltrated from the company's network, or at least someone intentionally truncated the leak to keep the most recent files for themselves.

Risky Bulletin: Yanluowang ransomware IAB pleads guilty

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

A Russian man has pleaded guilty to hacking US companies and selling access to ransomware groups.

Aleksei Olegovich Volkov went online under the hacker name of chubaka.kor, and worked as an initial access broker (IAB) for the Yanluowang ransomware.

Volkov used various techniques to breach a corporate employee's account, escalate access to the employer's network, and then sold that access to other cyber criminals.

Risky Bulletin: Europol arrests payment service executives for role in credit card fraud ring

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Law enforcement agencies from Europe, Asia, and North America have dismantled a massive credit card fraud network that stole money from users using unwanted online subscriptions.

Eighteen suspects were arrested for defrauding users of more than €300 million since 2016.

According to Europol and Eurojust, the group stole credit card data, created accounts on online websites with the stolen information, and subscribed users to premium services.

The Cyber Regime Change Pipe Dream

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Disruptive US cyber operations against Venezuela during President Trump's first term achieved their operational goals, according to new reporting from CNN. But they failed to meet the president's broader goal of ousting Venezuelan leader Nicolás Maduro

Sources told CNN that during Trump's first term a CIA operation to disable the computer network of Maduro's intelligence service was perfectly successful. A separate Cyber Command operation interrupted the satellite communications of Wagner Group mercenaries who were sent to Venezuela to protect Maduro.   

This adds to previous reporting from Wired late last year that revealed the CIA had temporarily disrupted the Venezuelan military's payroll system in the same campaign.