Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:01):
canada's second largest airline reporteda cybersecurity incident Friday night.
Anubis ransomware adds filewiping function to increase
destruction and pressure discord.
Vanity Link hijack leads to malwaredelivery campaigns, targeting
crypto wallets, and Thursday'sGoogle Cloud outage root cause
tied to API quota misconfiguration.
(00:24):
This is cybersecurity today, andI'm your host, David Shipley.
Canadian airline WestJet is isresponding to a confirmed cybersecurity
incident that disrupted access toits mobile app and internal systems.
The Calgary based company issued a publicstatement on social media late Friday
evening saying it was, quote, aware of acybersecurity incident involving internal
(00:47):
systems and the WestJet app, which hasrestricted access for several users.
End quote.
The airline says that it activated itsinternal response team and is cooperating
with law enforcement and transportCanada to investigate the incident.
In its statement, WestJet emphasizedthat is expediting efforts to maintain
the safety of its operations and workingto safeguard sensitive data and personal
(01:10):
information for both guests and employees.
An update Saturday night clarified thatthe airlines flight operations remain
safe and unaffected by the incident at thetime of this recording, WestJet has not
released technical details regarding theattack vector or potential threat actors.
There is also no public evidencelinking this event to ransomware
(01:31):
or other known campaigns.
Yet, while the impact appears limitedto its digital services, WestJet's
disruption underscores the growing riskthat cyber attacks pose to operational
continuity In the cybersecurity sector,aviation firms are attractive targets
due to reliance on real-time digitalsystems, their regulatory oversight,
(01:52):
and the criticality of public trust.
WestJet's response shows the importance oftimely transparent incident communications
in maintaining public trust.
It will be interesting to see if theyreveal more details on the attack and
whether this turns out to be date of theftand extortion or a ransomware attack.
(02:12):
. WestJet works to restoreits affected systems.
Cybersecurity researchers aretracking an additional rapid evolution
of ransomware threats that haspotentially devastating consequences.
One group they're tracking is theAnubis ransomware as a service.
RAAS first observed in December, 2024.
The Anubis operation has gainedmomentum in 2025 with the launch
(02:35):
of an affiliate program that offerssignificant revenue sharing up to
80% for ransomware operators, 60%for data extortion partners, and
50% for initial access brokers.
Now researchers at Trend Micro havediscovered that Anubis has integrated a
wiper module into its ransomware payload.
This component, which can be triggeredvia the slash wipe mode, command line
(02:58):
parameter irreversibly deletes filecontents, reducing files to zero bytes
while preserving directory and file namestructures according to Trend Micro.
This design choice is intentional.
It amplifies pressures on victimsby sabotaging recovery efforts, even
if the ransom was paid effectively.
(03:18):
Weaponizing data lossas a psychological tool.
The command requires key basedauthentication, suggesting
attackers reserve it for high valuetargets or stalled negotiations.
Technically, Anubis incorporatesseveral layers of functionality.
It uses Elliptic Curve, integratedencryption Schema, ECIS, similar
(03:39):
to that scene in Evil Byte andPrints, ransomware families.
It has process interference.
It kills processes and services that mightinterfere with its encryption efforts.
System safeguards, it inclu.
It excludes key system andprogram directories by default.
To avoid rendering devices completelyinoperable before ransom payment
and volume, shadow copy removalensures that rollback via Windows
(04:03):
recovery features isn't an option.
Encrypted files are marked with adot Anubis extension and ransom.
Notes are dropped in impacteddirectories Attempts to change
desktop wallpapers have been observed,but failed in recent samples.
Anubis infections typically beginwith phishing emails that include
malicious links or attachments, andall two common initial access strategy.
(04:26):
So far, only eight victims havebeen publicly listed on the
group's dark web extortion page,but with these new capabilities,
wider deployment may be imminent.
The combination of extortion anddestruction represents a disturbing
trend in ransomware operations.
As attackers increasingly shift frompure financial motives to applying
punitive pressure, organizationsshould review their disaster recovery
(04:49):
plans and ensure that offline backupsare regularly tested and updated.
Our reminder, our reporting earlier thisyear says that 75% of enterprises still
pay ransoms even though they have backups,because often those backups are destroyed.
Anubis evolution highlights agrowing trend towards irreversible,
(05:10):
punitive ransomware tactics.
This marks a disturbing changein the evolution of ransomware.
Let me explain.
Ransomware 1.0 was allabout encrypting the files.
Ransomware 2.0 was encrypting files orstealing data and holding it hostage.
Ransomware 3.0 holds this nowsword of Damocles of data wiping
(05:32):
on top of the other two tactics.
Discord is in the middleof another problem.
A newly uncovered malware campaign isexploiting a quirk in Discords vanity
invite system to distribute the async ratremote access Trojan, and a specialized
version of the scald information.
Stealer.
The tactic involves registering,expired or deleted discord, invite
(05:55):
codes, and redirecting users.
Often those revisitingtrusted forums or links.
Two malicious servers.
Once on the rogue server, victims areinstructed to verify their accounts
by copying a parish PowerShellcommand presented via a verify button.
This command triggers amulti-stage payload download
that executes in the background.
(06:16):
So the steps are a PowerShell scripthosted on Payin downloads a first
stage loader that loader retrievesthe async rat and skull Steeler from
Bitbucket and GitHub, and the finalpayloads are executed on victim systems.
Async Rat provides the attackers withfull remote access while skull Steeler
written in Golan target sensitivedata including browser credentials,
(06:38):
discord tokens, and especiallycryptocurrency wallet seed phrases.
Researchers noted the use of additionalevasion techniques, including the use
of Click fix social engineering that isconvincing users to run clipboard loaded,
PowerShell commands manually, sandboxevasion, time-based execution, delays and
environment checks to get around thosepesky M-D-R-E-D-R endpoint security tools.
(07:03):
Chrome Cat's variant.
A modified open source tool used tobypass Chrome's encryption protections.
Stolen data is exfiltrated viadiscord webhooks, allowing attackers
to blend malicious activityinto normal platform traffic.
Discord has since disabled amalicious bot enabled NIST campaign.
Checkpoint, which published thedetailed report on this issue,
(07:25):
also found a secondary campaignby the same threat actor.
This version disguised its loader asa cheat tool for unlocking pirate of
games and has been downloaded over350 times at the time of disclosure.
Target regions for these campaignsinclude the United States, Vietnam,
France, Germany, Austria, theNetherlands, and the United Kingdom.
(07:46):
This incident highlights how trustin platform features such as discord
invites can be turned against userswhen security design gaps are exploited.
I. Organizations and end users alike needto be cautious about revisiting previously
trusted links, particularly when they'reused to access high value digital assets.
Discords exploitation demonstratesthat attackers don't need zero
(08:09):
days when they can rely onforgotten features and user trust.
It's also a great thing for us toconsider whether the evolution of
the use of discord from a video gameplatform into a common platform now
used by software developers and othersin some of the largest enterprises
around the world was a good choice.
I.
(08:30):
Now, not a cybersecurity incident, butstill one that had massive implications.
On Thursday, Google Cloud experienceda multi-hour global service disruption
caused by a misconfigured quota updatein its API management infrastructure.
The outage began at approximately 10:49AM Eastern time, and lasted until 3 49
Eastern time, affecting Google's ownservices, as well as third party platforms
(08:54):
that rely on its cloud infrastructure.
Impacted services included Gmail, GoogleCalendar, Google Docs, Google Meet, Google
Drive, Google Chat, Google Cloud search.
Others.
The outage also cascaded to majorexternal services like Spotify,
discord, Snapchat, Firebase, andselect CloudFlare applications.
In its incident summary, Google explainedthat an invalid automated quota update
(09:18):
propagated globally and caused a p.I request to return 5 0 3 errors.
Whoops.
The system's failure to flag andisolate the error in time was attributed
to inadequate testing and lack ofeffective error handling protocols.
This brings back memories of CrowdStrike.
Thank God it was resolved quickly.
(09:38):
Recovery involved bypassing the offendingquota check while most regions recovered
within two hours, the US Central oneregion experienced extended delays
due to overloaded policy databases.
Residual issues persisted for anhour after initial mitigation.
In some services, CloudFlare confirmedthe outage impacted its workers' KV key
value store, which underpins criticalfunctions including authentication
(10:02):
and configuration delivery.
Although no data was lost, theservice interruption was significant.
CloudFare stated it would migrate the KVstore to its own R two object storage to
reduce reliance on third party providers.
This incident is a starkreminder of the fragility of
interconnected digital services.
A single misconfiguration at thecloud infrastructure layer can
(10:24):
ripple across dozens of independentplatforms disrupting both consumer
and business operations worldwide.
And Google's cloud outage revealshow fragile the backbone of the
internet can be when automationand oversight don't align.
It also highlights why major cloudproviders need to be regulated like we
do for other critical infrastructurelike banks, telecommunications, and more.
(10:50):
That's it for today.
Stay patched, stay skeptical.
And yesterday was a good time to checkyour disaster recovery plan, whether it's
to protect you from destructive ransomwareor major cloud provider outages.
A good plan that's welltested, is your best friend.
We're always interested in youropinion, and you can contact us at
editorial@technewsday.ca or leavea comment under the YouTube video.
(11:15):
I've been your host, DavidChipley, sitting in for Jim Love,
who will be back on Wednesday.
Thanks for listening.
I.