Taking down the storm.

Published: Dec. 14, 2023, 9:10 p.m.

Microsoft takes down the Storm-1152 cybercrime operation. \u201cGambleForce\u201d is a newly discovered threat actor.\xa0 The SVR exploits a JetBrains TeamCity vulnerability. US Postal Service impersonation. Malicious ads associated with Zoom. An update on the cyberattack against Kyivstar. Apache issues a Struts 2 security advisory. The FCC adopts new data breach rules.\xa0 In our latest Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. And the State Department's Global Engagement Center is under fire.\nRemember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nOn the Threat Vector segment with Palo Alto Networks Unit 42\u2019s David Moulton, hear about decoding cyber adversaries. David discusses unveiling intent and behavior in the world of threat hunting with Madeline Sedgwick.\n\nSelected Reading\nMicrosoft disrupts cybercrime operation selling fraudulent accounts to notorious hacking gang (TechCrunch+)\nNew hacker group GambleForce targets government and gambling sites in Asia Pacific using SQL injections (Group-IB)\nRussian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally (Joint Advisory)\nMalvertisers zoom in on cryptocurrencies and initial access (MalwareBytes)\nRussian hacker group claims responsibility for Kyivstar cyberattack (The Kyiv Independent)\xa0\nNew Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now (The Hacker News)\nFCC Adopts Updates to Data Breach Rules, Sets Up Privacy Battle (Bloomberg Law)\nState Dept.\u2019s Fight Against Disinformation Comes Under Attack (The New York Times)\n\nThreat Vector.\nIn this Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. Madeline, a Senior Cyber Research Engineer and Threat Analyst for the Cortex Xpanse team at Palo Alto Networks, shares insights into how analyzing adversary behavior helps in anticipating threats and avoiding guesswork. They discuss the value of understanding both system dynamics and human behavior in cybersecurity, emphasizing that cyber adversaries are limited by the same laws of internet physics.\nPlease share your thoughts with us for future Threat Vector segments by taking our brief survey.\nTo learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin.\xa0\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 2023 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices