Risky Business #768 -- CSRB will investigate China's Wiretap Hacks
Oct 30, 2024
auto_awesome
Daniel Ayala, Chief Security and Trust Officer at Dotmatics, shares insights on data security challenges in cloud environments. Rajan Kapoor from Material Security discusses the importance of securing data in platforms like M365 and Google Workspace. The conversation delves into the investigation of Chinese wiretap hacks, the rise of cybercrime, and the impact of recent breaches on corporate accountability. They also highlight the necessity for robust email security measures and data governance strategies to protect sensitive information from misuse.
The investigation into China's wiretap hacks by the Cyber Safety Review Board highlights the urgent need for improved national security measures against sophisticated cyber espionage.
Operation Magnus's success in dismantling Redline botnets signifies a growing international cooperation in combating cybercrime and enforcing cybersecurity laws.
The unusual return of stolen crypto funds emphasizes the complexities and unpredictable nature of cryptocurrency crimes, raising questions about the motivations of cybercriminals.
Deep dives
Correction in Security News
A correction was issued regarding Apple's position in the CA Browser Forum concerning certificate lifespans, clarifying that the proposed duration is actually 45 days, rather than the previously reported 10 days. This change still emphasizes the need for faster certificate issuance in order to enhance security, suggesting that shorter lifetimes could minimize the risk associated with compromised certificates. The discussion highlights the increasing complexity of managing security in today's digital landscape and the need for organizations to remain vigilant and adaptable to evolving challenges. Overall, this correction serves as a reminder of the importance of accurate information in influencing security practices.
Chinese Cyber Intrusion into Telcos
Recent developments revealed that a Chinese APT group, dubbed Salt Typhoon, has infiltrated telecommunications companies in the United States, with consequences that extend beyond mere espionage. Initial reports suggested that the actors aimed to discover details about the FBI's wiretapping activities, but it has now been confirmed that the hackers also intercepted calls of political figures, raising significant concerns about political privacy and national security. The incident has gained traction as a major case for the Cyber Safety Review Board, which aims to investigate the breach thoroughly despite potential challenges posed by classification issues. This situation underscores the critical need for robust counterintelligence measures in the face of increasingly sophisticated cyber threats.
Takedown of Info-Stealers
Operation Magnus led to the arrest of several individuals involved in the Redline and Meta info-stealer botnets, marking a significant victory for international law enforcement. Authorities seized multiple servers and domain names associated with these illegal operations, showcasing a coordinated effort to tackle cybercrime across borders. Indictments in absentia were issued for the ringleader, whose online persona was uncovered through investigation, demonstrating the challenges of anonymity in the cyber world. Such operations not only disrupt criminal activities but also send a clear message that law enforcement agencies are increasingly united in their fight against cyber threats.
Crypto Theft Incident
An unusual situation arose when nearly $20 million was stolen from a US government-controlled crypto wallet, linked to a probe into the Bitfinex hack. Shockingly, the thief returned the funds, leading to speculation about whether they were unaware of the funds' origins or the legal ramifications of their plunder. This incident illustrates the chaotic and often unpredictable nature of cryptocurrency crimes, as well as the challenges law enforcement faces in tracing and recovering stolen digital assets. The thief's actions raise questions about the motivations behind such crimes and whether individuals fully comprehend the implications of their actions in the crypto space.
Data Security in M365 and Workspace
A discussion about the vulnerabilities associated with Microsoft 365 and collaborative workspaces highlights the challenges organizations face in managing access controls effectively. As sensitive information becomes more accessible due to advancements in discovery tools, organizations are realizing they must address long-standing security concerns around both email and file sharing. Conversations with security professionals reveal that while awareness of risks associated with file sharing is growing, email remains a significant blind spot for many businesses. This underscores the necessity for organizations to implement comprehensive security solutions that encompass all areas of digital communication and collaboration to safeguard against breaches.
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
CSRB to investigate China’s telco-wiretapping hacks
Euro law enforcement takes down the Redline infostealer
Someone steals Fed crypto… and then tries to quietly sneak it back in
Russia sentences REvil guys to … jail? Really?
Apple private cloud compute gets a proper bug bounty program
And much, much more.
This week’s episode is sponsored by Material Security, who help navigate the mess of cloud productivity data security. Daniel Ayala - Chief Security and Trust Officer at Dotmatics - is a Material customer, and joins Pat and Material Security’s Rajan Kapoor to talk about how to wrangle securing data that ends up in corporate cloud email and file stores.