Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, April 4, 2025

URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update

https://isc.sans.edu/podcastdetail/9394

Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive

Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity.

https://isc.sans.edu/diary/Exploring+Statistical+Measures+to+Predict+URLs+as+Legitimate+or+Intrusive+Guest+Diary/31822

Critical Unexploitable Ivanti Vulnerability Exploited CVE-2025-22457

In February, Ivanti patched CVE-2025-22457. At the time, the vulnerability was not considered to be exploitable. Mandiant now published a blog disclosing that the vulnerability was exploited as soon as mid-March

https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/

WinRAR MotW Vulnerability CVE-2025-31334

WinRAR patched a vulnerability that would not apply the ÒMark of the WebÓ correctly if a compressed file included symlinks. This may make it easier to trick a victim into executing code downloaded from a website.

https://nvd.nist.gov/vuln/detail/CVE-2025-31334

Microsoft Warns of Tax-Related Scam

With the US personal income tax filing deadline only about a week out, Microsoft warns of commonly deployed scams that they are observing related to income tax filings

https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/

Oracle Breach Update

https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen

SANS Internet Storm Center StormCast Thursday, April 3, 2025

Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail

https://isc.sans.edu/podcastdetail/9392

Surge in Scans for Juniper 't128' Default User

Last week, we detected a significant surge in ssh scans for the username Òt128Ó. This user is used by JuniperÕs Session Smart Routing, a product they acquired from Ò128 TechnologiesÓ which is the reason for the somewhat unusual username.

https://isc.sans.edu/diary/Surge+in+Scans+for+Juniper+t128+Default+User/31824

Vulnerable Verizon API Allowed for Access to Call Logs

An API Verizon offered to users of its call filtering application suffered from an authentication bypass vulnerability allowing users to access any Verizon userÕs call history. While using a JWT to authenticate the user, the phone number used to retrieve the call history logs was passed in a not-authenticated header.

https://evanconnelly.github.io/post/hacking-call-records/

Google Offering End-to-End Encryption to Gmail Business Users

Google will add an end-to-end encryption feature to commercial Gmail users. However, for non Gmail users to read the emails they first must click on a link and log in to Google.

https://workspace.google.com/blog/identity-and-security/gmail-easy-end-to-end-encryption-all-businesses

SANS Internet Storm Center StormCast Wednesday, April 2, 2025

Apple Updates Everything; VMWare Workstation Update Check Broken; NIM Postgres Vulnerability

https://isc.sans.edu/podcastdetail/9390

Apple Patches Everything

Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities were patched.

https://isc.sans.edu/diary/Apple+Patches+Everything+March+31st+2025+Edition/31816

VMWare Workstation and Fusion update check broken

VMWare's automatic update check in its Workstation and Fusion products is currently broken due to a redirect added as part of the Broadcom transition.

https://community.broadcom.com/vmware-cloud-foundation/question/certificate-error-is-occured-during-connecting-update-server

NIM Postgres Vulnerability

NIM Developers using prepared statements to send SQL queries to Postgres may expose themselves to a SQL injection vulnerability. NIMÕs Postgres library does not appear to use actual prepared statements; instead, it assembles the code and the user data as a string and passes them on to the database. This may lead to a SQL injection vulnerability.

https://blog.nns.ee/2025/03/28/nim-postgres-vulnerability/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive