Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet StormCast Friday, February 28, 2025

Njrat devtunnels.ms; Apple FindMe Abuse; XSS Exploited; @sans_edu Ben Powell EDR vs. Ransomware

https://isc.sans.edu/podcastdetail/9344

Njrat Campaign Using Microsoft dev Tunnels:

A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel.

https://isc.sans.edu/diary/Njrat+Campaign+Using+Microsoft+Dev+Tunnels/31724

NrootTag Apple FindMy Abuse

Malware could use a weakness in the keys used for Apple FindMy to abuse it to track victims. Updates were released with iOS 18.2, but to solve the issue the vast majority of Apple users must update.

https://nroottag.github.io/

360XSS: Mass Website Exploitation via Virtual Tour Framework

The Krpano VR library which is often used to implement 3D virtual tours on real estate websites, is currently being abused to inject spam messages. The XSS vulnerability could allow attackers to inject even more malicious JavaScript.

https://olegzay.com/360xss/

SANS.edu Research: Proof is in the Pudding: EDR Configuration Versus Ransomware. Benjamin Powell

https://www.sans.edu/cyber-research/proof-pudding-edr-configuration-versus-ransomware/

SANS Internet StormCast Thursday, February 27, 2025

High Exfil Ports; Malicious VS Code Theme; Developer Workstation Safety; NAKIVO PoC; OpenH264 and rsync vuln

https://isc.sans.edu/podcastdetail/9342

Attacker of Ephemeral Ports

Attackers often use ephemeral ports to reach out to download additional resources or exfiltrate data. This can be used, with care, to detect possible compromises.

https://isc.sans.edu/diary/Guest+Diary+Malware+Source+Servers+The+Threat+of+Attackers+Using+Ephemeral+Ports+as+Service+Ports+to+Upload+Data/31710

Compromised Visal Studio Code Extension downloaded by Millions

Amit Assaraf identified a likely compromised Visual Studio Code theme that was installed by millions of potential victims. Amit did not disclose the exact malicious behaviour, but is asking for victims to contact them for details.

https://medium.com/@amitassaraf/a-wolf-in-dark-mode-the-malicious-vs-code-theme-that-fooled-millions-85ed92b4bd26

ByBit Theft Due to Compromised Developer Workstation

ByBit and Safe{Wallet} disclosed that the record breaking Ethereum theft was due to a compromised Safe{Wallet} developer workstation. A replaced JavaScript file targeted ByBit and altered a transaction signed by ByBit.

https://x.com/benbybit/status/1894768736084885929

https://x.com/safe/status/1894768522720350673

PoC for NAKIVO Backup Replication Vulnerability

This vulnerability allows the compromise of NAKIVO backup systems. The vulnerability was patched silently in November, and never disclosed by NAKIVO. Instead, WatchTowr now discloses details including a proof of concept exploit.

https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/

OpenH264 Vulnerability

https://github.com/cisco/openh264/security/advisories/GHSA-m99q-5j7x-7m9x

rsync vulnerability exploited

https://www.cisa.gov/known-exploited-vulnerabilities-catalog

https://cybersecuritynews.com/rsync-vulnerabilities-full-control-servers/

SANS Internet StormCast Wednesday, February 26, 2025

M365 Infostealer Botnet; Mixing OpenID Keys; Malicious Medical Image Apps

https://isc.sans.edu/podcastdetail/9340

Massive Botnet Targets M365 with Password Spraying

A large botnet is targeting service accounts in M365 with credentials stolen by infostealer malware.

https://securityscorecard.com/wp-content/uploads/2025/02/MassiveBotnet-Report_022125_03.pdf

Mixing up Public and Private Keys in OpenID

The complex OpenID specification and the flexibility it supports enables careless administrators to publish private keys instead or in addition to public keys

https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html

Healthcare Malware Hunt Part 1:

Medial images are often encoded in the DICOM format, an image format unique to medical imaging. Patients looking for viewers for DICOM images are tricked into downloading malware.

https://www.forescout.com/blog/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive
Signal May Exit Sweden Over E2EE Backdoor; CVSS 10.0 Flaw in Mitre Caldera; Anne Arundel County Cyberattack