Cyberespionage in East and Southeast Asia, for both intelligence collection and domestic security, Spyware tools tracked. Shifting cyber targets in Russias hybrid war. Securing the Super Bowl.

Published: Sept. 25, 2023, 8:15 p.m.

The Gelsemium APT is active against a Southeast Asian government. A multi-year campaign against Tibetan, Uighur, and Taiwanese targets. Stealth Falcon's new backdoor. Predator spyware is deployed against Apple zero-days. An update on Pegasus spyware found in Meduza devices. There\u2019s a shift in Russian cyberespionage targeting. A rumor of cyberwar in\xa0occupied Crimea. In our Industry Voices segment, Amit Sinha, CEO of Digicert, describes digital trust for the software supply chain. Our guest is Arctic Wolf\u2019s Ian McShane with insights on the MGM and Caesars ransomware incident. And if you\u2019re looking for a Super Bowl pick, go with an egg-laying animal\u2026and, oh, the NFL and CISA are noodling cyber defense for the big game.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/183\n\nSelected reading.\nRare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (Unit 42)\nRare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (IBM X-Force Exchange)\nEvasive Gelsemium hackers spotted in attack against Asian govt (BleepingComputer)\nUnit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government (Unit 42)\nEvilBamboo Targets Mobile Devices in Multi-year Campaign (Volexity)\xa0\nFrom Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese (The Hacker News)\nStealth Falcon preying over Middle Eastern skies with Deadglyph (We Live Security) t\nDeadglyph: Covertly preying over Middle Eastern skies (LABScon)\xa0\nNew stealthy and modular Deadglyph malware used in govt attacks (BleepingComputer)\xa0\nDeadglyph: New Advanced Backdoor with Distinctive Malware Tactics (The Hacker News)\xa0\n0-days exploited by commercial surveillance vendor in Egypt (Google).\nPREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions (The Citizen Lab)\xa0\nNew Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware (The Hacker News)\xa0\nEgyptian presidential hopeful targeted by Predator spyware (Washington Post)\nRussian news outlet in Latvia believes European state behind phone hack (the Guardian)\xa0\nExclusive: Russian hackers seek war crimes evidence, Ukraine cyber chief says (Reuters).\nRussian hackers trying to steal evidence of Moscow\u2019s war crimes in Ukraine - cyber chief (Ukrinform).\nLarge-scale cyberattack reported in occupied Crimea (The Kyiv Independent)\xa0\nNFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII (Dark Reading)\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices