In his second inauguration, President Donald Trump showcased a new alliance with Silicon Valley’s elite, seating tech titans like Elon Musk and Jeff Bezos more prominently than governors. A golden era dawns, blurring lines between politics, innovation, and global power. All eyes watch closely now!!!
Mr Donald Trump was sworn in on January 20, 2025, as the 47th U.S. President amid talk of sweeping policy shifts. Global markets breathed a sigh of relief at his trade probes in lieu of immediate tariffs, while billionaire oligarchs stood front and center at the scaled-down ceremony.
Stunned creators and small businesses saw TikTok vanish from U.S. app stores, reeling from a Supreme Court’s ban order—until President-elect Donald Trump vowed to 'SAVE TIKTOK.' In a single day, the platform roared back, revealing just how powerful a viral app and a presidential promise can be. Wow.
Australia, backed by allies like the US, UK, and Japan, has accused a Chinese state-sponsored hacking group, APT40, of breaching government and private sector networks.
Welcome to the Weekly Cyber Scan Wrap-Up, your essential source for the latest insights in cybersecurity and global tech affairs! In this edition, Australia, backed by allies like the US, UK, and Japan, has accused a Chinese state-sponsored hacking group, APT40, of breaching government and private sector networks. This move, endorsed by Five Eyes nations, underscores the ongoing threat of Chinese cyber espionage, despite recent diplomatic efforts to rebuild trade ties with China. The report highlights Australia's commitment to safeguarding its cyber infrastructure while balancing complex international relations.
Australia Accuses China-Backed Hackers of Breaching Government Networks
Australia, supported by allies including the US, UK, and Japan, has accused a Chinese state-backed cyber hacking group of breaching the country’s government and private sector networks. The statement, endorsed by security and intelligence agencies from the Five Eyes nations and other allies, cited a “shared understanding” of a Chinese “state-sponsored cyber group and their current threat to Australian networks.”
The group, identified as Advanced Persistent Threat 40 (APT40), has been linked to China’s Ministry of State Security and is known for infiltrating various global entities.
“APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing,” the advisory noted.
This unprecedented move by the Australian Signals Directorate follows recent efforts to rebuild trade ties with China and highlights the persistent risks of Chinese cyber espionage.
The report marks the latest action by Western governments to combat Chinese cyber threats and raise awareness of their risks. In recent months, the US and UK have taken measures against other Chinese hacking groups, and the Five Eyes intelligence alliance has warned about Chinese espionage threats to critical tech sectors.
Australia’s foreign minister, Penny Wong, emphasised that publicising the allegations against APT40 is in the national interest, stating,
“We have always said we engage with China without compromising on what is important for Australia and to Australians.”
This stance underscores Australia’s commitment to safeguarding its cyber infrastructure while navigating complex diplomatic relations with Beijing.
A newly discovered attack called "Blast-RADIUS" affects the widely used Remote Authentication Dial-In User Service (RADIUS) protocol, according to a paper published by a team of researchers, Ars Technica reports. Developed in 1991, RADIUS is supported by almost all switches, routers, access points, and VPNs but still relies on the outdated MD5 hash function. The researchers explain,
"Our attack exploits an MD5 chosen-prefix collision on the ad hoc RADIUS packet authentication construction to produce Access-Accept and Access-Reject packets with identical Response Authenticators, allowing our attacker to transform a reject into an accept without knowledge of the shared secret between RADIUS client and server."
The paper's publication is being coordinated with security bulletins from at least 90 vendors, accompanied by patches implementing short-term fixes while a working group drafts longer-term solutions.
Microsoft Patches Two Zero-Days
Microsoft issued patches for 142 vulnerabilities, including two actively exploited zero-days, Help Net Security reports. One zero-day (CVE-2024-38112) is a spoofing vulnerability in the Windows MSHTML Platform that can be triggered with a malicious HTML file.
Researchers at Check Point found that threat actors have been exploiting the flaw since January 2023, explaining, "Specifically, the attackers used special Windows Internet Shortcut files (.url extension name), which, when clicked, would call the retired Internet Explorer (IE) to visit the attacker-controlled URL. An additional trick on IE is used to hide the malicious .hta extension name." By exploiting this vulnerability, attackers gained significant advantages despite the modern Windows 10/11 operating system.
US Justice Department Disrupts AI-Enhanced Russian Disinformation Operation
The US Justice Department, along with security agencies in Canada and the Netherlands, has disrupted a Russian disinformation operation on X (formerly Twitter), SecurityWeek reports. The agencies seized two domains and identified "968 social media accounts used by Russian actors to create an AI-enhanced social media bot farm that spread disinformation in the United States and abroad."
The Justice Department stated, "The social media bot farm used elements of AI to create fictitious social media profiles — often purporting to belong to individuals in the United States — which the operators then used to promote messages in support of Russian government objectives, according to affidavits unsealed today."
Biden’s sweeping AI export curbs, unveiled just before he leaves office, split the global market into ‘tier-one’ allies with unrestrained access and adversaries facing strict embargoes. Tech giants warn of global disruption, while US officials claim it defends US leadership from China’s AI surge.
In 2024, deepfakes became a major threat, causing market disruptions and privacy concerns. The rapid growth of AI technology has made digital deception easier, stressing the urgent need for enhanced verification systems to protect against misinformation and cyberattacks.
2024 saw hackers unleashing AI-powered phishing and deepfake scams, leaving agencies scrambling. From deepfake fraud to open-source malware, cybercrime surged. But as we head into 2025, there’s hope—smarter defenses and a chance to outsmart evolving threats. Stay cautious and prepared!
As we close the book on 2024, we welcome you to our Holiday Edition, where we unwrap the biggest stories that defined a whirlwind year in AI and cyber affairs—a celebration of relentless innovation, jaw-dropping rivalries, and high-stakes power plays that kept us captivated all year round.