logo
episode-header-image
Jul 2023
26m 55s

A malign AI tool: FraudGPT. Stealer logs...

N2K Networks
About this episode

FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.


For links to all of today's stories check out our CyberWire daily news briefing:

https://thecyberwire.com/newsletters/daily-briefing/12/141


Selected reading.

FraudGPT: The Villain Avatar of ChatGPT (Netenrich) 

Stealer Logs & Corporate Access (Flare)

Over 400,000 corporate credentials stolen by info-stealing malware (BleepingComputer)

The Alarming Rise of Infostealers: How to Detect this Silent Threat (The Hacker News)

Conti and Akira: Chained Together (Arctic Wolf)

Ukraine-Russia war: Ukraine vows further drone strikes on Moscow and Crimea (The Telegraph) 

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
Cyber defenders pulled into deportation duty.
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its ... Show More
29m 49s
Oct 8
Chinese hackers serve up espionage.
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an allege ... Show More
32m 4s
Oct 7
Critical GoAnywhere bug fuels ransomware wave.
Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based visi ... Show More
32m 23s
Recommended Episodes
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
59m 4s
Dec 2022
Babbage: The surprising ineffectiveness of Russia’s cyber-war
When Russia invaded Ukraine, for the first time ever, two mature cyber-powers began to fight over computer networks in wartime. But while Russia’s cyber-war may have been intense, its impact has been modest. Has the country’s cyber prowess been overrated? The Economist’s Benjamin ... Show More
36m 46s
Dec 2020
Fri. 12/18 – Chinese Drone Maker DJI Blacklisted By The US
Drone maker DJI is blacklisted by the commerce department. Group video comes to Echo devices. Twitter launches Spaces. Sony offers refunds for Cyberpunk 2077. Coinbase files to go public. And, of course, the weekend longreads suggestions.Sponsors:Masterworks.io, promocode RIDE to ... Show More
20m 34s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, poten
0:50 Jason intros Tim Junio 1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform 5:20 Tim explains the Dyn cyber attack 13:20 How many Fortune 500 companies have been blackmailed via cyber attack? 19:32 "White-ha ... Show More
1h 37m
Jun 2021
Cyberguerre: des conflits invisibles aux conséquences bien réelles
Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. De ... Show More
26m 17s