It’s Wednesday! Undergoing a mid-week slump? Just remember that you’ve conquered two Wednesdays thus far and that there are only 51 left in the year (not that we’re counting…).
In today’s edition:
Pirate’s booty
New close, who dis?
File of filth
—Billy Hurley, Brianna Monsanto, Patrick Lucas Austin
|
|
CYBERSECURITY
Threat actors, pirate-style, are trying to bury the Treasury.
In a letter to lawmakers on Dec. 30, a US Treasury official said the department believes China-based state-sponsored threat actors remotely accessed workstations and unclassified documents from the institution. The reported way in—a compromised security key of a third-party tool—provides instructive security examples across industry, according to pros who spoke with IT Brew.
“If the US Treasury Department, via one of its third-party vendors, can’t shore up its own defenses, I think that just goes to highlight how challenging it is for organizations through the whole range of sizes, from SMEs through to global multinational corporations,” Ian Birdsey, partner and cyber and data protection disputes specialist at global law firm Clyde & Co, told IT Brew. “I think there is very much a lesson for everyone to take away here, that this is a case of when, not if.”
Third-party time. The December letter shared that a threat actor used a stolen key from identity-management vendor BeyondTrust “to override the service’s security, remotely access certain Treasury [departmental office] user workstations, and access certain unclassified documents maintained by those users.”
Read the rest here.—BH
|
|
|
|
Presented by Remote
Expanding your team shouldn’t take weeks or months. It should be fast, secure, and compliant, allowing you to stay laser-focused on building your business with energy and intensity. That’s where Remote comes in.
Grow faster by streamlining hiring, payroll, and compliance in one platform to accelerate growth and gain a competitive edge in the global market.
|
|
IT OPERATIONS
New reports show that most companies who disclosed a cyber incident to the SEC last year were tight-lipped when it came to specific details.
It has been a little more than a year since the SEC’s controversial cybersecurity incident disclosure rule went into effect. The rule, which requires public companies to disclose a cybersecurity incident to the SEC within four days after it is deemed material, was intended to boost disclosure consistency and transparency among investors. However, while more companies disclosed cyber incidents after the rule was enforced, the details provided in the filings were limited.
Living in a not-so material world. According to a 2024 Paul Hastings report that examined 75 disclosures from 48 public companies between December 2023 and October 2024, there was a 60% uptick in the number of cyber incidents disclosed after the SEC’s cyber disclosure rule was enforced. However, less than 10% of the disclosed incidents had a description of the material impact of the incident. Michelle A. Reed, a lead author of the report and co-chair of Paul Hasting’s data privacy and cybersecurity practice, told IT Brew that the findings reflect companies’ concerns around SEC enforcement related to failing to disclose given the “squishiness” around materiality.
Keep reading here.—BM
|
|
|
|
CYBERSECURITY
Security researchers are exposing corruption, and the abuse of trust is happening at the highest levels of email attachment.
IT pros have seen threat actors cleverly corrupting documents so they sneak past email security gateways. What happens next? The application recovers the document and its malicious contents.
Analysts from malware-analyzing service ANY.RUN shared research in December 2024 demonstrating how attackers are able to deliberately change the structure of archives and Office documents.
“The attackers corrupt files only to a certain point, so that they still can be recovered by their native applications (e.g., WinRAR for .zip and Word for .docx). When a user opens a corrupted file with its native application, such as Microsoft Word, the application’s recovery features repair the file, revealing the hidden malicious content,” Stas Gaivoronskii, ANY.RUN malware analyst, wrote in an email to IT Brew.
ANY.RUN shared attack details (and a demo of how the tactic works with a Word doc).
- Manipulating document components, attackers create corrupted files that are then successfully put back together again, Humpty Dumpty-style, by the application.
- A targeted user opens the attachment and clicks, “Yes” to the built-in recovery option.
- The method works, according to ANY.RUN, for a “simple” reason: Most antimalware tools do not have the recovery functionality found in apps like Word, which prevents some detectors from accurately identifying the type of corrupted file.
- ANY.RUN shared one example of a recovered file featuring a “View Document” phishing link.
Chris Campbell, senior VP, CISO, and head of technology at Bitsight, sees the tactic as an advancement of earlier evasion tactics like detecting virtual machines, attaching payloads that begin idle and execute later, and password-protecting a file.
Read more here.—BH
|
|
|
|
Together With JumpCloud
See all that IT can be. Now’s your chance to register for JumpCloud’s free virtual conference on Jan. 28. You’ll get four hours packed with actionable best practices, industry news, and networking opportunities. Ready to kick off this year by investing in your professional growth? Snag your virtual seat for free. |
|
PATCH NOTES
Today’s top IT reads.
Stat: 44%. That’s how many global public policy professionals feel that AI companies aren’t taking data security and privacy seriously. (CIO Dive)
Quote: "Collectively, we know Americans are afraid." —Anne Neuberger, deputy national security adviser for cyber and emerging technologies, on the need for the newly rolled out US Cyber Trust Mark program, a cybersecurity labeling program intended to help inform consumers on the security of the smart devices they purchase (CNET)
Read: A futuristic magic salty spoon? An app that can save the day when the TV remote goes missing? A compact all-in-one fitness solution for that pesky New Year’s resolution? These are just the tip of the iceberg of tech showcased at CES this year. (the Washington Post)
Get your SaaS in gear: IT leaders shouldn’t underestimate the importance of managing their SaaS apps. Need a crash course? BetterCloud breaks it all down in this discussion.* *A message from our sponsor.
|
|
|
SHARE THE BREW
Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.
We’re saying we’ll give you free stuff and more friends if you share a link. One link.
Your referral count: 2
Click to Share
Or copy & paste your referral link to others: itbrew.com/r/?kid=9ec4d467
|
|
|
ADVERTISE
//
CAREERS
//
SHOP
//
FAQ
Update your email preferences or unsubscribe
.
View our privacy policy
.
Copyright ©
2025
Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011
|
|