DiscoverCybersecurity TodayFinal Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025
Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025

Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025

Update: 2025-02-18
Share

Digest

This podcast discusses several significant cybersecurity incidents and technological advancements. A critical PostgreSQL vulnerability (CVE-2025-1094), combined with a BeyondTrust zero-day (CVE-2024-12356), allowed a breach of the US Treasury. Russian state-sponsored hackers (Storm-2372) are bypassing password security by exploiting device code authentication via Microsoft's authentication broker. New malware, "Final Draft," uses Outlook email drafts and the Graph API for command and control, evading detection. Finally, the BBC is testing "content credentials," a technology using tamper-evident digital signatures to verify news authenticity and combat fake news. Patches are available for the PostgreSQL vulnerability.

Outlines

00:00:00
Major Cyberattacks and Emerging Technologies

This episode covers four key cybersecurity events: the US Treasury breach exploiting a PostgreSQL vulnerability and a BeyondTrust zero-day; Russian hackers bypassing password security through device code authentication; the emergence of "Final Draft" malware using Outlook for command and control; and the BBC's testing of content credentials to combat misinformation. The episode highlights the evolving tactics of cybercriminals and the development of new technologies to combat them.

Keywords

PostgreSQL Vulnerability (CVE-2025-1094)


A high-severity SQL injection vulnerability in PostgreSQL allowing malicious code execution. Requires patching.

Device Code Authentication Exploitation


Hackers bypass password security by exploiting device code authentication on Microsoft sign-in pages.

Final Draft Malware


Malware using Microsoft Outlook drafts via the Graph API for command and control, evading detection.

Content Credentials


Technology creating tamper-evident digital signatures for media, verifying authenticity and tracking modifications.

Cybersecurity Threats


Overview of current threats including exploitation of vulnerabilities and malware.

Russian State-Sponsored Hackers


Details on the tactics and targets of Storm-2372 hacking group.

US Treasury Breach


Analysis of the breach and the vulnerabilities exploited.

Microsoft Authentication Broker


How the authentication broker was leveraged in the attacks.

Combating Misinformation


Discussion of technologies and strategies to fight fake news.

Q&A

  • What vulnerabilities were exploited in the US Treasury hack?

    A PostgreSQL vulnerability (CVE-2025-1094) and a BeyondTrust zero-day (CVE-2024-12356) were exploited.

  • How are Russian hackers bypassing password security?

    They are exploiting device code authentication on Microsoft sign-in pages.

  • How does the Final Draft malware operate?

    It uses Outlook email drafts and the Graph API for command and control.

  • What is the purpose of content credentials technology?

    It verifies news content authenticity and tracks modifications to combat misinformation.

Show Notes

Critical PostgreSQL Bug Exploited in Treasury Hack & New Threats Unveiled - Cybersecurity Today

In today's episode of Cybersecurity Today, hosted by Jim Love, we delve into major cybersecurity events, including a crucial PostgreSQL vulnerability exploited in the U.S. Treasury hack, Russian hackers bypassing traditional password security with device code authentication, and the discovery of the 'Final Draft' malware hijacking Microsoft Outlook drafts. Additionally, we explore the BBC's new tool to combat digital misinformation with Content Credentials. Tune in for in-depth insights and latest cybersecurity updates.

00:00 Introduction and Headlines
00:24 PostgreSQL Vulnerability and U.S. Treasury Hack
02:21 Russian Hackers Exploit Device Code Authentication
04:09 New Malware Hijacks Outlook Drafts
05:55 BBC Tests Truth Marks to Combat Fake News
07:49 Conclusion and Contact Information

Comments 
In Channel
loading

Table of contents

00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025

Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025

Jim Love