Babuk source code provides criminal inspiration. CISA and FBI release a joint report on PaperCut. There are more bad bots out there than anyone would like. Phishing-as-a-service tools in the C2C market. CISA\u2019s Eric Goldstein advocates the adoption of strong controls, defensible networks and coordination of strategic cyber risks. Our cyberwire producer Liz Irvin speaks with Crystle-Day Villanueva, Learning and Development Specialist for Lumu Technologies. And KillNet\u2019s short-lived venture, with a dash of\xa0regret.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/92\n\nSelected reading.\nBabuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers (Bleeping Computer)\nRansomware actors adopt leaked Babuk code to hit Linux systems (Decipher)\nHypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers (SentinelOne)\nMalicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG (CISA)\nCVE-2023-27350 Detail (NIST)\nProofpoint Emerging Threats Rules (Proofpoint)\n2023 Imperva Bad Bot Report (Imperva)\nNew phishing-as-a-service tool \u201cGreatness\u201d already seen in the wild (Cisco Talos)\nUkraine at D+442: Russians say the Ukrainian counteroffensive has begun. (CyberWire)\nLearn more about your ad choices. Visit megaphone.fm/adchoices