DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from investment in privacy. What's the hacktivist's postwar future? Joe Carrigan tracks a romance scam targeting seniors. Our guest is Pete Lund of OPSWAT to discuss the security of removable media devices. And a retired G-Man is indicted on multiple charges.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/15\n\nSelected reading.\nDragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation (SentinelOne)\nTechnical Advisory: Proxy*Hell Exploit Chains in the Wild \xa0(Bitdefender)\nRealtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats (Unit 42)\nCISA Adds One Known Exploited Vulnerability to Catalog (CISA)\xa0\n\xa02023 Data Privacy Benchmark Study (Cicso)\nHacktivism Is a Risky Career Path (WIRED)\nRetired FBI Executive Charged With Concealing $225,000 In Cash Received From An Outside Source (Department of Justice, U.S. Attorney\u2019s Office, District of Columbia)\xa0\nFormer Special Agent In Charge Of The New York FBI Counterintelligence Division Charged With Violating U.S. Sanctions On Russia (Department of Justice, U.S. Attorney\u2019s Office, Southern District of New York)\nFormer Senior F.B.I. Official in New York Charged With Aiding Oligarch (New York Times)\nLearn more about your ad choices. Visit megaphone.fm/adchoices