Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet StormCast Tuesday, March 4, 2025

Mark of the Web Details; Sharepoint and Click-Fix Phishing; Paragon Partition Manager BYOVD Exploit

https://isc.sans.edu/podcastdetail/9348

Mark of the Web: Some Technical Details

Windows implements the "Mark of the Web" (MotW) as an alternate data stream that contains not just the "zoneid" of where the file came from, but may include other data like the exact URL and referrer.

https://isc.sans.edu/diary/Mark+of+the+Web+Some+Technical+Details/31732

Havoc Sharepoint with Microsoft Graph API

A recent phishing attack observed by Fortinet uses a simple HTML email to trick a user into copy pasting powershell into their system to execute additional code. Most of the malware interaction uses a Sharepoint site via Microsoft's Graph API further hiding the malicious traffic

https://www.fortinet.com/blog/threat-research/havoc-sharepoint-with-microsoft-graph-api-turns-into-fud-c2

Paragon Partition Manager Exploit

A vulnerable Paragon Partition Manager has been user recently to escalate privileges for ransomware deployment. Even if you do not have Paragon installed: An attacker may just "bring the vulnerable driver" to your system.

https://kb.cert.org/vuls/id/726882

SANS Internet StormCast Monday, March 3, 2025

AI Training Data Leaks; Copilot Exposes Github Repositories; MITRE Caldera Vuln; modsecurity bypass

https://isc.sans.edu/podcastdetail/9346

Common Crawl includes Common Leaks

The "Common Crawl" dataset, a large dataset created by spidering website, contains as expected many API keys and other secrets. This data is often used to train large language models

https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data

Github Repositories Exposed by Copilot

As it is well known, Github's Copilot is using data from public GitHub repositories to train its model. However, it appears that repositories who were briefly left open and later made private have been included as well, allowing Copilot users to retrieve files from these repositories.

https://www.lasso.security/blog/lasso-major-vulnerability-in-microsoft-copilot

MITRE Caldera Framework Allows Unauthenticated Code Execution

The MITRE Caldera adversary emulation framework allows for unauthenticated code execution by allowing attackers to specify compiler options

https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e

modsecurity Rule Bypass

Attackers may bypass the modsecurity web application firewall by prepending encoded characters with 0.

https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-42w7-rmv5-4x2j

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive