Two sets of China-linked cyberespionage activities. Mirais new vectors. A Cozy Bear sighting. Anonymous Sudan gets less anonymous.

Published: June 23, 2023, 8:15 p.m.

An update on Barracuda ESG exploitation. Camaro Dragon\u2019s current cyberespionage tools spread through infected USB drives. The Mirai botnet is spreading through new vectors. Midnight Blizzard is out and about . Ukraine is experiencing a "wave" of cyberattacks during its counteroffensive. Karen Worstell from VMware shares her experience with technical debt. Rick Howard speaks with CJ Moses, CISO of Amazon Web Services. And Anonymous Sudan turns out to be no more anonymous or Sudanese than your Uncle Louie.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/120\n\nSelected reading.\nBarracuda ESG exploitation (Proofpoint)\nBeyond the Horizon: Traveling the World on Camaro Dragon\u2019s USB Flash Drives (Check Point Research)\nChinese malware accidentally infects networked storage (Register)\nAkamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware (Akamai).\nMirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices (BleepingComputer)\xa0\nNeuberger: Ukraine experiencing a \u2018surge\u2019 in cyberattacks as it executes counteroffensive (Record)\xa0\nMicrosoft warns of rising NOBELIUM credential attacks on defense sector (HackRead).\nAnonymous Sudan: neither anonymous nor Sudanese (Cybernews)\nLearn more about your ad choices. Visit megaphone.fm/adchoices