A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has emerged. Shuckworm collects intelligence, and may support targeting. The Washington Post\u2019s Tim Starks explains the section 702 debate. Our guest is Rotem Iram from At-Bay with insights on email security. And Russia's Cadet Blizzard.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/115\n\nSelected reading.\nAndroid GravityRAT goes after WhatsApp backups (ESET)\nQuarterly Adversarial Threat Report (Facebook)\nBarracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China (Mandiant)\nGravityRAT - The Two-Year Evolution Of An APT Targeting India (Cisco Talos)\nFake Security Researcher GitHub Repositories Deliver Malicious Implant (VulnCheck)\nDarth Vidar: The Aesir Strike Back (Team Cymru)\nTracking Diicot: an emerging Romanian threat actor (Cado Security)\nShuckworm: Inside Russia\u2019s Relentless Cyber Campaign Against Ukraine (Symantec)\nCadet Blizzard emerges as a novel and distinct Russian threat actor (Microsoft)\nDestructive malware targeting Ukrainian organizations (Microsoft)\nLearn more about your ad choices. Visit megaphone.fm/adchoices