Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet StormCast Friday, March 7, 2025

Chrome vs Extensions; Kibana Update; PrePw0n3d Android TV Sticks; Identifying APTs (@sans_edu, Eric LeBlanc)

https://isc.sans.edu/podcastdetail/9354

Latest Google Chrome Update Encourages UBlock Origin Removal

The latest update to Google Chrome not only disabled the UBlock Origin ad blocker, but also guides users to uninstall the extension instead of re-enabling it.

https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html

https://www.reddit.com/r/youtube/comments/1j2ec76/ublock_origin_is_gone/

Critical Kibana Update

Elastic published a critical Kibana update patching a prototype pollution vulnerability that would allow arbitrary code execution for users with the "Viewer" role.

https://discuss.elastic.co/t/kibana-8-17-3-security-update-esa-2025-06/375441

Certified PrePw0n3d Android TV Sticks

Wired is reporting of over a million Android TV sticks that were found to be pre-infected with adware

https://www.wired.com/story/android-tv-streaming-boxes-china-backdoor/

SANS.edu Research Paper

Advanced Persistent Threats (APTs) are among the most challenging to detect in enterprise environments, often mimicking authorized privileged access prior to their actions on objectives.

https://www.sans.edu/cyber-research/identifying-advanced-persistent-threat-activity-through-threat-informed-detection-engineering-enhancing-alert-visibility-enterprises/

SANS Internet StormCast Thursday, March 6, 2025

DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware

https://isc.sans.edu/podcastdetail/9352

DShield Traffic Analysis using ELK

The "DShield SIEM" includes an ELK dashboard as part of the Honeypot. Learn how to find traffic of interest with this tool.

https://isc.sans.edu/diary/DShield+Traffic+Analysis+using+ELK/31742

Zen and the Art of Microcode Hacking

Google released details, including a proof of concept exploit, showing how to take advantage of the recently patched AMD microcode vulnerability

https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking CVE-2024-56161

VIM Vulnerability

An attacker may execute arbitrary code by tricking a user to open a crafted tar file in VIM

https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3

Snail Mail Fake Ransom Note

A copy cat group is impersonating ransomware actors. The group sends snail mail to company executives claiming to have stolen company data and threatening to leak it unless a payment is made.

https://www.guidepointsecurity.com/blog/snail-mail-fail-fake-ransom-note-campaign-preys-on-fear/

SANS Internet StormCast Wednesday, March 5, 2025

SMTP Credential Hunt; mac-robber.py update; ADSelfService Plus Account Takeover; Android Patch Day; PayPal Scams; VMWare Escape Fix

https://isc.sans.edu/podcastdetail/9350

Romanian Distillery Scanning for SMTP Credentials

A particular attacker expanded the scope of their leaked credential file scans. In addition to the usual ".env" style files, it is not looking for specific SMTP related credential files.

https://isc.sans.edu/diary/Romanian+Distillery+Scanning+for+SMTP+Credentials/31736

Tool Updates: mac-robber.py

This update of mac-robber.py fixes issues with symlinks.

https://isc.sans.edu/diary/Tool+update+macrobberpy/31738

CVE-2025-1723 - Account takeover vulnerability in ADSelfService Plus

CVE-2025-1723 describes a vulnerability caused by session mishandling in ADSelfService Plus that could allow unauthorized access to user enrollment data when MFA was not enabled for ADSelfService Plus login.

https://www.manageengine.com/products/self-service-password/advisory/CVE-2025-1723.html

Android March Update

Google released an update for Android addressing two already exploited vulnerabilities and several critical issues.

https://source.android.com/docs/security/bulletin/2025-03-01

PayPal's no-code-checkout Abuse

Attackers are using PayPal's no-code-checkout feature is being abused by scammers to host PayPal tech support scam pages right within the PayPal.com domain.

https://www.malwarebytes.com/blog/scams/2025/02/paypals-no-code-checkout-abused-by-scammers

Broadcom Fixes three VMWare VCenter Vulnerabilities

https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive