Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025
Digest
This podcast discusses several significant cybersecurity incidents and technological advancements. A critical PostgreSQL vulnerability (CVE-2025-1094), combined with a BeyondTrust zero-day (CVE-2024-12356), allowed a breach of the US Treasury. Russian state-sponsored hackers (Storm-2372) are bypassing password security by exploiting device code authentication via Microsoft's authentication broker. New malware, "Final Draft," uses Outlook email drafts and the Graph API for command and control, evading detection. Finally, the BBC is testing "content credentials," a technology using tamper-evident digital signatures to verify news authenticity and combat fake news. Patches are available for the PostgreSQL vulnerability.
Outlines

Major Cyberattacks and Emerging Technologies
This episode covers four key cybersecurity events: the US Treasury breach exploiting a PostgreSQL vulnerability and a BeyondTrust zero-day; Russian hackers bypassing password security through device code authentication; the emergence of "Final Draft" malware using Outlook for command and control; and the BBC's testing of content credentials to combat misinformation. The episode highlights the evolving tactics of cybercriminals and the development of new technologies to combat them.
Keywords
PostgreSQL Vulnerability (CVE-2025-1094)
A high-severity SQL injection vulnerability in PostgreSQL allowing malicious code execution. Requires patching.
Device Code Authentication Exploitation
Hackers bypass password security by exploiting device code authentication on Microsoft sign-in pages.
Final Draft Malware
Malware using Microsoft Outlook drafts via the Graph API for command and control, evading detection.
Content Credentials
Technology creating tamper-evident digital signatures for media, verifying authenticity and tracking modifications.
Cybersecurity Threats
Overview of current threats including exploitation of vulnerabilities and malware.
Russian State-Sponsored Hackers
Details on the tactics and targets of Storm-2372 hacking group.
US Treasury Breach
Analysis of the breach and the vulnerabilities exploited.
Microsoft Authentication Broker
How the authentication broker was leveraged in the attacks.
Combating Misinformation
Discussion of technologies and strategies to fight fake news.
Q&A
What vulnerabilities were exploited in the US Treasury hack?
A PostgreSQL vulnerability (CVE-2025-1094) and a BeyondTrust zero-day (CVE-2024-12356) were exploited.
How are Russian hackers bypassing password security?
They are exploiting device code authentication on Microsoft sign-in pages.
How does the Final Draft malware operate?
It uses Outlook email drafts and the Graph API for command and control.
What is the purpose of content credentials technology?
It verifies news content authenticity and tracks modifications to combat misinformation.
Show Notes
Critical PostgreSQL Bug Exploited in Treasury Hack & New Threats Unveiled - Cybersecurity Today
In today's episode of Cybersecurity Today, hosted by Jim Love, we delve into major cybersecurity events, including a crucial PostgreSQL vulnerability exploited in the U.S. Treasury hack, Russian hackers bypassing traditional password security with device code authentication, and the discovery of the 'Final Draft' malware hijacking Microsoft Outlook drafts. Additionally, we explore the BBC's new tool to combat digital misinformation with Content Credentials. Tune in for in-depth insights and latest cybersecurity updates.
00:00 Introduction and Headlines
00:24 PostgreSQL Vulnerability and U.S. Treasury Hack
02:21 Russian Hackers Exploit Device Code Authentication
04:09 New Malware Hijacks Outlook Drafts
05:55 BBC Tests Truth Marks to Combat Fake News
07:49 Conclusion and Contact Information
























