Palo Alto Report Outlines China’s Airstalk Supply-Chain Attack Campaign

Posted in Commentary on November 4, 2025 by itnerd

Palo Alto Networks has identified a new Chinese state-sponsored operation using a malware family called Airstalk to infiltrate business process outsourcing (BPO) providers as a conduit into their enterprise clients. The campaign leveraged PowerShell and .NET variants, abused AirWatch’s MDM API for covert C2, and used stolen signing certificates and timestamp manipulation to evade detection.

You can read Palo Alto’s report here: Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack

VP of Cyber Risk for HITRUST, Tom Kellermann had this to say:

“The Airstalk campaign demonstrates China’s continued pivot toward deep supply-chain infiltration, targeting BPOs as operational beachheads to silently reach their clients’ networks. By abusing AirWatch’s MDM API and pairing PowerShell and .NET implants with stolen certificates and timestamp tampering, Chinese operators are weaponizing trusted enterprise mobility infrastructure as covert C2 channels. This is calculated espionage, not opportunism. BPOs are trust concentrators, and once breached, they provide a direct path into multiple U.S. corporate environments. We must elevate third-party security monitoring, particularly API abuse detection and certificate validation, or these persistent access campaigns will proliferate unchecked across the economy.”

This highlights the threats that a supply chain attack can pose. It also shows the lengths that an organization will go to execute their plans. This attack is multi-layered which makes it harder to defend against. But not impossible if you take a more holistic view to securing your organization.

Active Archive Alliance Releases Report on How Active Archives Unlock the Value of Data for Innovation and Discovery 

Posted in Commentary with tags on November 4, 2025 by itnerd

The Active Archive Alliance today released a special report, “Preparing for Tomorrow’s Expanding Storage Challenge with Active Archive,” which showcases how active archives are solving data growth challenges and transforming data archives from passive repositories into active engines for innovation and discovery. It also highlights the need for new secondary storage tiers to address today’s data-driven applications.

Active archives enable reliable, online and cost-effective access to data throughout its life. They are compatible with flash, disk, tape, optical, cloud and emerging technologies, as well as file, block or object storage systems.

The report highlights applications and industries where active archives are ideal, including compliance and legal discovery, artificial intelligence (AI), machine learning, big data analytics, video surveillance, medical research and high-performance computing (HPC) environments. It also expands on key benefits of utilizing an active archive:

  • Sustainability: The growing demands of AI computing are pushing data centers and energy grids to their limits. By migrating low-activity or inactive data from HDDs to tape with an active archive, organizations can significantly reduce carbon emissions. 
  • Security: An active archive strengthens the protection of archival data by incorporating advanced features such as encryption, data immutability and an air gap, along with access and authentication controls.
  • Capacity and Performance: HDDs are widely used for storing massive datasets for AI training and inference, and they continue to increase capacity through innovations such as HAMR (Heat-Assisted Magnetic Recording), potentially enabling capacities to reach 50 TB per drive. At the same time, the LTO Ultrium roadmap calls for tape capacities to double with each new generation, with LTO-14 delivering up to 1,440 TB (1.44 PB) compressed per cartridge. HDDs and tape most often combine to host an active archive, offering features that boost both capacity and performance. 
  • Data Migration: An active archive for hybrid clouds is a modern data management solution that bridges on-premises and cloud environments, enabling seamless, long-term storage and access to archival data. Frequently accessed data can remain on premises or in high-performance cloud tiers, while less frequently accessed data is automatically moved to low-cost cloud storage.

The special report is a collaborative effort among the members of the Active Archive Alliance, who are bringing innovative technology solutions to the market to help meet the increased demand for effective data management. 

The full report is available here: Preparing for Tomorrow’s Expanding Storage Challenge with Active Archive.

Supporting Resources

University of Pennsylvania hacker claims to have stolen 1.2 million donor records in data breach 

Posted in Commentary with tags on November 3, 2025 by itnerd

Cybercriminals have claimed responsibility for the recent cyberattack on the University of Pennsylvania and the stealing of data on approximately 1.2 million students, alumni, and donors. Here are the details:

Penn has reported last week’s mass cybersecurity breach to the Federal Bureau of Investigation following reports that the hack compromised data for millions of individuals. 

The breach resulted in mass scam emails sent on Oct. 31 from multiple University-affiliated email addresses that were addressed to the Penn community and contained criticisms of the University’s security practices and institutional purpose. A University spokesperson wrote to The Daily Pennsylvanian that the matter has been referred to law enforcement and the FBI as Penn investigates a “breach of data of select information systems.”

In the initial emails, the hacker appeared to threaten to release user data, writing that “all your data will be leaked.”

“We understand and share our community’s concerns and have reported this to the FBI. We are working with law enforcement as well as other third-party technical resources to address this as rapidly as possible,” the spokesperson added. 

And according to Bleeping Computer, this is how the threat actors got in:

However, the threat actor behind the attack contacted BleepingComputer, claiming the intrusion was far broader and that they had gained access to multiple university systems.

The hacker said their group “gained full access” to an employee’s PennKey SSO account, allowing access to Penn’s VPN, Salesforce data, Qlik analytics platform, SAP business intelligence system, and SharePoint files.

I have a lot of commentary on this. Staring with Darren James, a Senior Product Manager at Specops Software:

“This incident highlights the double-edged nature of single sign-on (SSO). It is an effective way to simplify access and strengthen security through centralized monitoring and MFA, but if compromised, it can act like a master key and provide access to multiple connected systems at once.

In this case, the access spanning Salesforce, Qlik, SAP, and SharePoint is unusual and raises questions about how role-based access controls were managed. Even if this level of access was legitimate for the user involved, it reinforces the importance of strict privilege management and continuous identity monitoring.

The attacker’s behavior, including sending offensive mass emails, does not appear to align with professional or highly organized cybercrime groups. However, the volume and sensitivity of the data reportedly accessed makes the breach significant.

PennKey authentication appears to rely on a username and password followed by a DUO push prompt. That raises several important questions: Was the password reused or previously compromised? Was MFA configured properly, including fatigue protections? Was the second factor bypassed through social engineering, or could a stolen session token be responsible?

Modern identity security needs to go beyond MFA alone. Controls like device pinning and posture checks, which ensure credentials can only be used from trusted and compliant devices, would significantly reduce the likelihood of this type of intrusion.”

Ensar Seker, CISO at SOCRadar follows with this:

“The claims that 1.2 million donor, alumni and student records may have been exfiltrated at Penn including access via a compromised SSO account, VPN, SharePoint, Salesforce, SAP and BI systems highlight the highly leveraged value of non‑financial, crowd‑sourced datasets. What’s alarming here is the attack vector: the hacker asserts that rather than immediately demanding ransom, the aim was pure information theft and monetization of donor insights. 

If this breach is genuine as claimed, the impact extends beyond identity theft. Data sets linking net worth, donation history and demographic details (race, religion, sexual orientation) are highly tailored and valuable to adversaries launching social engineering, targeted phishing or credential stuffing campaigns. The fact that the initial indicators emerged as a provocative “we got hacked” mass‑email adds urgency: it wasn’t just a stealthy breach, it was weaponized for reputation and donor confidence.

In terms of dark‑web indicators, our dark web team is monitoring underground forums for early exposure of “appetizer” leak data and dataset advertisements associated with the incident. While we have not yet seen full confirmation of a wide‑scale public dump, the presence of credential sets tied to the institution suggests the attack may already be staging towards commercialization.

For organizations in the education or non‑profit sectors, the message is clear: privileged access to major donor platforms, CRM systems, marketing cloud tools and analytics portals must be treated with the same level of monitoring and segmentation as financial systems. A compromised user session in an SSO environment has proven more than enough to cascade into high‑value data loss.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech adds this: 

“None of the breached data poses a direct threat to victims or their finances. There are no passwords or Social Security numbers, for example. However, the info could be used to craft more convincing phishing messages that are tailored to the recipient. Be on the lookout for phishing messages from scammers posing as UPenn or a related organization. Never click on links or attachments in unsolicited emails.”

Finally, Chris Hauk, Consumer Privacy Champion at Pixel Privacy had this to say:

“Victims of the hack should keep an eye out for phishing emails, texts, and phone calls that may attempt to use the gleaned information to obtain additional data about the users. They should particularly be on the alert for emails appearing to come from the University of Pennsylvania.

Victims should also change any passwords that they have used for accounts that are connected to the university. They should also use a password manager to create unique and secure passwords for not only possibly targeted accounts, but for all of their accounts. Most popular password managers will check login credentials for each account, warning of duplicated passwords. Users should also enable multi-factor authentication on all of their accounts, not just their affected accounts. This will help guard against wide exposure in future data breaches.”

This is one of these hacks that will have downstream effects for years. Which is why the best defense is going to be to do everything possible to make sure that a hack like this never happens.

Minister McGregor and Global Tech Leaders Unite to Advance Talent, AI, and Innovation in Canada’s Future

Posted in Commentary with tags on November 3, 2025 by itnerd

The Honourable Graham McGregor, Ontario’s Minister of Citizenship and Multiculturalism, will join Obsidi®, North America’s largest network and job platform for Black and allied tech professionals, at the 2025 BFUTR Global Tech Summit presented by TD.

Themed “The New World of Work,” this year’s summit highlights Ontario’s leadership in fostering inclusive innovation and advancing AI talent development as key drivers of economic growth. Hosted at the International Centre, BFUTR convenes more than 20,000 Black professionals, executives, and allies from across North America to connect, collaborate, and shape the future of technology.

Minister McGregor will deliver remarks from the Main Stage on November 6, emphasizing Ontario’s commitment to building a strong, diverse innovation economy where every community can thrive.

As part of the Summit, Obsidi® and the Ministry of Citizenship and Multiculturalism will host a CIO Roundtable Discussion with senior technology leaders to explore how public–private partnerships can accelerate AI workforce growth and expand access to high-demand careers. The session will feature insights from Obsidi® Academy, a workforce initiative equipping Canadians with the technical and professional skills needed to succeed in AI, data, and software development roles.

Early results point to strong employer engagement and promising participant outcomes, underscoring how partnerships between government and industry can create sustainable pathways into Ontario’s innovation economy. The model aligns with the province’s Black Youth Action Plan, which supports equitable access to technology careers and long-term workforce representation.

The BFUTR 2025 Summit will also feature the release of Reprogramming the Enterprise: AI’s Reinvention of Technology, Talent, and Leadership, a national white paper developed by Obsidi® and senior Canadian executives outlining strategies for scaling AI adoption and inclusive workforce design across industries.

Headliners at BFUTR 2025

  • Bozoma Saint John – Former CMO of Netflix and trailblazing brand executive redefining
    bold, authentic leadership across tech and culture.
  • Dan Schulman – CEO Verizon and globally recognized voice in digital transformation and
    purpose-driven business.

These global thought leaders will join Minister McGregor and top CIOs and CTOs to explore how innovation, equity, and talent are reshaping the future of work and economic opportunity in Canada.

The Threat Actors Behind The Questrade And Wealthsimple Phishing Campaign Are Now Going After TD Customers

Posted in Commentary with tags on November 3, 2025 by itnerd

I have been tracking a threat actor who has used first Questrade and then Wealthsimple as part of a large scale phishing campaign that is being carried out via email. Well, my honeypot, which is a computer that I have set up to capture emails and be a target for hackers so that I can gather intel on what the bad guys are up to, have caught a new twist in this campaign. This time the threat actors are using TD bank to perpetrate their scam. This popped up in my honeypot a few minutes ago:

Now I won’t go down the rabbit hole on how the campaign works as I have done this in the first part my research. But I will note that these threat actors are getting sloppy. The quality of this email is not as good as the other ones which makes me wonder how effective this will be. Having said that, the fact that these threat actors are still trying and are shifting tactics implies that they must be having some level of success. Your task is to make sure that you’re not part of whatever success they are having. Thus this is another email that you should instantly delete if you get it.

Invi Grid Completes Google’s ISV Startup Springboard Program

Posted in Commentary with tags on November 3, 2025 by itnerd

Invi Grid announces that its Invi Grid Intelligent Cloud platform is now available on Google Cloud Marketplace. This move follows Invi Grid’s completion of the Google Cloud ISV Startup Springboard program, deepening its collaboration with Google Cloud.

Built from the ground up for secure-by-design cloud, Invi Grid automates day-zero cloud and AI infrastructure provisioning, enabling developers and operations teams to innovate freely while governance, compliance, cost control, and security are handled automatically. The platform helps ensure that both cloud and AI workloads are deployed securely, efficiently, and in full compliance from the very start.

With Invi Grid now available on Google Cloud Marketplace, organizations can gain streamlined access to enterprise-grade cloud and AI infrastructure that keeps pace with digital transformation, mitigates risk and boosts agility.

With this development, businesses and teams can:

  • Accelerate Secure Cloud Provisioning: Quickly deploy secure, well-architected cloud environments, allowing teams to focus on innovation.
  • Automate Security and Compliance Policies: Enforce security and compliance automatically from day zero, reducing risks and manual effort.
  • Unify Cloud Management with a No-Code Platform: Manage cloud operations across teams in a single, streamlined platform.

Customers reported that Invi Grid accelerated their cloud development with day-zero security and saved months of a skilled DevOps engineer’s work. They valued Invi Grid as a partner, a differentiator that supports their innovation and growth while helping to ensure oversight and governance that is critical to building trust with customers.

Invi Grid was selected to participate in the Google Cloud ISV Startup Springboard program to help accelerate growth and innovation for Google Cloud customers. To highlight the collaboration, Google Cloud released a video showcasing how Invi Grid accelerates secure cloud and AI deployment on Google Cloud, making it easier for companies to go to market and win customer confidence.

For more information on how to use Invi Grid to help ensure you are compliant on day zero of your cloud journey and beyond, explore Invi Grid’s offering on Google Cloud Marketplace.

Bulwark: A Dark Web Tool that Bypasses Modern Antivirus and EDR Solutions

Posted in Commentary with tags on November 3, 2025 by itnerd

Bulwark is a new tool being marketed on the dark web as being capable of bypassing modern antivirus and EDR solutions, which constitute one of the main lines of defense for most organizations.

In a new in-depth whitepaper, SOCRadar researchers have dived into this tool, including how it came to be, what its capabilities are — such as advanced obfuscation, real-time evasion — and more. 

Bulwark began appearing in Telegram channels in July, showcasing its capabilities and promising an effective bypass for any EDR or antivirus solution. During continuous hunting activities, SOCRadar’s research team detected an announcement referencing a platform called Database.forum, where this tool was listed. At the time, that database was not indexed by mainstream search engines and formed part of the Deep Web, and has recently been added to the Dark Web as well; over the following days, its popularity grew, and it later became discoverable via traditional search engines.

To understand how Bulwark came to be, it is necessary to go through Database.forum which is a portal run by affiliates and developers where various tools of different kinds are advertised and indexed. Many of these tools are related to threat actors or capabilities that can be used by them.

For full details, the whitepaper can be downloaded at this landing page, or viewed in full at this link: https://socradar.io/wp-content/uploads/2025/10/Bulwark-Whitepaper.pdf

October was a record month for ransomware group Qilin – 200 attacks recorded 

Posted in Commentary with tags on November 3, 2025 by itnerd

According to Ransomlooker, a tool developed by Cybernews that tracks ransomware attacks, October was a record month for notorious ransomware gang Qilin – 200 attacks were recorded during the month. Attacks by Qilin have been steadily growing throughout all of 2025, but October’s spike is unprecedented. 

Key insights:

  • Qilin claimed 200 ransomware attacks in October, 2025, by far the most ever carried out by the group in one month.
  • Attacks more than doubled compared to September, when 84 attacks were recorded.
  • Qilin is already responsible for 723 attacks in 2025 (as of November 3rd, 2025).
  • Qilin’s October victims include Israel’s 4th largest hospital, Shamir Medical Center, a large pharmacy benefit manager MedImpact, and Texas electric cooperatives.
  • In 2024, Qilin claimed 181 attacks. In 2023, there were 45, and in 2022, the gang claimed just 5 attacks.

Notorious for targeting hospitals and the manufacturing sector, the Qilin gang – once known as Agenda – first appeared on the ransomware circuit in 2022. However, its dark leak site claims it began operating in 2021.

Qilin has moved into the number one position as the most active ransomware gang in the past 12 months, aggressively outperforming ransomware rivals Cl0p Play, INC Ransom, and Akira.

Known for using a ransomware-as-a-service (RaaS) business model, the cybercriminal outfit often uses double extortion tactics on its victims, demanding a ransom for decryption and then a second payout to guarantee it will not leak the stolen files on the dark web after the fact.

Here’s a screenshot from the Ransomlooker tool, showing just how active Qilin has become in October compared to previous months:

Obsidi to Launch Groundbreaking AI Leadership White Paper at BFUTR 2025 Executive Mainstage

Posted in Commentary with tags on November 3, 2025 by itnerd

Obsidi® will unveil its new executive white paper, Reprogramming the Enterprise: AI’s Reinvention of Technology, Talent and Leadership, at the BFUTR Executive Mainstage on November 6, 2025, in Toronto.

Built on private, closed-door interviews with more than 50 C-suite leaders from across North America, the white paper reveals the real strategies, challenges, and leadership moves shaping market winners in the AI-first decade.

Key findings include:

● The Six-Month Skills Cliff – the deadline leaders are quietly setting for employees to integrate AI into their work or risk role elimination.

● The Barbell Workforce – why the “average performer” tier is disappearing, replaced by senior architects and AI-augmented juniors.

● Two-Speed Organizations – the operational model allowing innovation and mission-critical systems to run in parallel.

● Owning the AI Moat – why proprietary data, prompts, and workflows are more defensible than AI models themselves.

● 72% of executives believe their AI transformation plans are at risk before they begin — with talent and culture gaps cited as the top barrier.

Event Details:

What: BFUTR 2025 – Executive Mainstage & White Paper Launch

When: November 6, 2025

Where: The International center

Website: https://bfutr.com

Black-led startups secure record $400,000 at DMZ’s largest Black Innovation Summit to date

Posted in Commentary with tags on October 31, 2025 by itnerd

Toronto Metropolitan University’s DMZ held its fifth annual Black Innovation Summit, where 10 Black-led tech startups from across Canada pitched their businesses for the chance to secure over $300,000 CAD in funding to accelerate their growth — a total that ultimately surpassed expectations, reaching $400,000 CAD awarded by the end of the event.

DMZ’s largest Black Innovation Summit to date, the event gathered over 400 guests from the Black entrepreneurial community. Designed to bring together the Black tech ecosystem and celebrate Black excellence, this year’s theme, ‘Black Means Business,’ underscored a powerful message: investing in Black founders is not only the right thing to do, it is a strategic imperative that fuels economic growth and the startup economy. According to a recent report by the BDC, Black entrepreneurs remain underrepresented in Canada’s business landscape yet demonstrate strong export potential and optimism for growth, clear indicators of untapped economic opportunity. The Summit put capital behind this conviction, awarding the most in its history.

The Summit featured a powerful lineup of speakers, including successful Black entrepreneurs such as Frank Baylis, Canadian businessman and Executive Chairman of Baylis Medical Technologies, and award-winning artist, entrepreneur and DMZ Advisory Council member Keshia Chanté and The Honourable Graham McGregor, Minister of Citizenship and Multiculturalism for the Government of Ontario. The day brought together entrepreneurs, investors, corporate leaders and government to celebrate Black-led innovation, culminating in a startup pitch competition exclusively for Black founders.

DMZ Ventures, Tribe Network, and Capital M Ventures led this year’s investments and grants were made possible by DMZ and the Black Founders Network. The investment funds are now proceeding to finalize investment terms. 

  • OutreachGenius, a solution that provides AI-powered agents to answer sales calls and revive cold prospects for home-service businesses, received 200,000 CAD in investment commitments. 
  • Happly.AI, a platform that helps startups find and secure funding, received 75,000 CAD in investment commitments and a $50,000 CAD grant. 
  • Kiwi Charge, a solution that provides autonomous charging units for electric vehicles in buildings that lack a charging infrastructure through a charging-as-a-service model, received a $30,000 CAD grant. 
  • Cellect Laboratories, nanotech-powered products for women to screen for HPV and cervical cancer, received a $20,000 CAD grant. 

The Black Innovation Summit also recognized exceptional Black-identifying young entrepreneurs through its Youth Entrepreneurship Award. The Honourable Graham McGregor, Minister of Citizenship and Multiculturalism from the Government of Ontario, joined the Summit to present the awards. Five outstanding young entrepreneurs shared a $25,000 pool in youth grants:

  • Daniel Martinovic, Nodalli 
  • Samira Mohamed, Stardoe Studio
  • Merveille Mukoko, Yekola
  • Chevon Riley, NORM 
  • Alexis Stackhouse, Global Elevation Network 

The Ontario Government, a longstanding partner of DMZ’s Black Innovation Programs, invested $16.5 million in over 65 Black-focused programs earlier this year, including renewed support for DMZ’s programs.

DMZ is proud to have brought the Summit to life in collaboration with presenting partners Scotiabank and the Government of Ontario; contributing partners Black Founders Network, CapitalM Ventures, DCCM Foundation, DMZ Ventures, Humi by Employment Hero, Torys LLP and Tribe; and community partners Black Entrepreneurship Alliance, Black Women Talk Tech, Brampton Innovation District, Founders Connect, Futurpreneur, LBIH, Nobellum, Rep Matters and Startup Ecosystem Canada.

The annual Black Innovation Summit serves as the marquee event for DMZ’s Black Innovation Programs (BIP), which were launched in 2019. A first-of-its-kind initiative in Canada, DMZ’s Black Innovation Programs were created to increase the number of Black-led startups in the tech ecosystem and break the cycle of inequity. To date, DMZ has supported over 2,500  Black-identifying founders and has distributed over $3 million in grants and services.

Black founders in DMZ’s Black Innovation Programs receive additional opportunities and specialized support, such as free legal services, subsidized hiring grants, professional development opportunities, mentorship, a peer network, exclusive events, and connections to investors dedicated to supporting Black-led innovation—on top of the standard programming all DMZ founders receive.

Black founders seeking hands-on, tailored support to take their businesses to the next level can learn more about DMZ’s Black Innovation Programs at dmz.to/bip.