logo
episode-header-image
Jun 2022
30m 15s

Malibot info stealer is no coin miner. "...

N2K Networks
About this episode

Malibot is an info stealer masquerading as a coin miner. "Hermit" spyware is being used by nation-state security services. Fabricated evidence is planted in Indian computers. The US takes down a criminal botnet. The British Home Secretary signs the Assange extradition order. We wind up our series of RSA Conference interviews with David London from the Chertoff group and Hugh Njemanze from Anomali. And putting the Service into service learning.


For links to all of today's stories check out our CyberWire daily news briefing:

https://thecyberwire.com/newsletters/daily-briefing/11/117


Selected reading.

'MaliBot' Android Malware Steals Financial, Personal Information (SecurityWeek)

F5 Labs Investigates MaliBot (F5 Labs)

Sophisticated Android Spyware 'Hermit' Used by Governments (SecurityWeek)

Lookout Uncovers Android Spyware Deployed in Kazakhstan (Lookout)

Police Linked to Hacking Campaign to Frame Indian Activists (Wired)

U.S., partners dismantle Russian hacking 'botnet,' Justice Dept says (Reuters)

Russian Botnet Disrupted in International Cyber Operation (US Attorney's Office, Southern District of California)

Julian Assange: Priti Patel signs US extradition order (The Telegraph)

AIVD disrupts activities of Russian intelligence officer targeting the International Criminal Court (AIVD)

Alleged Russian spy studied at Johns Hopkins, won ICC internship (Washington Post)

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
Listening In on the listeners.
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider s ... Show More
29m 15s
Aug 27
Whistle-blown and wide open.
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy networ ... Show More
25m 57s
Aug 26
Rolling the dice on cybersecurity.
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting e ... Show More
26m 30s
Recommended Episodes
Jul 2023
Asaf Lubin on Cyber Espionage and International Law
On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-0558. ... Show More
48m 46s
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
59m 4s
Sep 2023
TWiG 732: Unidentified Flying Skellington - New Android Branding, Twitter Spy
Britain Admits Defeat in Controversial Online Safety Bill When Tech Says "No" Apple Backs Down on Its Controversial Photo-Scanning Plans The FBI secretly launched an encrypted messaging system for criminals Former Twitter Employees Charged With Spying for Saudi Arabia Jeff Jarvis ... Show More
2h 14m
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, poten
0:50 Jason intros Tim Junio 1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform 5:20 Tim explains the Dyn cyber attack 13:20 How many Fortune 500 companies have been blackmailed via cyber attack? 19:32 "White-ha ... Show More
1h 37m