Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict.

Published: Feb. 22, 2023, 9:15 p.m.

b'CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data centers. LockBit claims an attack on a water utility in Portugal. Tim Starks from the Washington Post describes calls to focus on harmonizing cyber regulations. Our guest is Luke Vander Linden, host of the RH-ISAC Podcast. Disrupting Mr. Putin\'s speech, online, and what the hybrid war suggests about the future of cyber auxiliaries.\\n\\nFor links to all of today\'s stories check out our CyberWire daily news briefing:\\nhttps://thecyberwire.com/newsletters/daily-briefing/12/35\\n\\nSelected reading.\\nCISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)\\nHydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia (Symantec)\\nIBM Security X-Force Threat Intelligence Index 2023 (IBM)\\nS1deload Stealer \\u2013 Exploring the Economics of Social Network Account Hijacking (Bitdefender Labs)\\xa0\\nCyber Attacks on Data Center Organizations (Resecurity)\\nHackers Scored Data Center Logins for Some of the World\'s Biggest Companies (Bloomberg)\\nLockBit gang takes credit for attack on water utility in Portugal (The Record from Recorded Future News)\\xa0\\nUkraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever (WIRED)\\xa0\\nUkrainian hackers claim disruption of Russian TV websites during Putin speech (The Record from Recorded Future News)\\xa0\\nUkraine\'s volunteer cyber army could be model for other nations: experts (Newsweek)\\xa0\\nUkraine\'s largest charity wants to raise $1.3 million for \\u2018cyber offensive\\u2019 (The Record from Recorded Future News)'