Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Tuesday, May 20, 2025

AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise

https://isc.sans.edu/podcastdetail/9458

RAT Dropped By Two Layers of AutoIT Code

Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool

https://isc.sans.edu/diary/RAT+Dropped+By+Two+Layers+of+AutoIT+Code/31960

Trojaned Version of Keepass used to install info stealer and Cobalt Strike beacon

A backdoored version of KeePass was used to trick victims into installing Cobalt Strike and other malware. In this case, Keepass itself was not compromised and the malicious version was advertised via search engine optimization tricks

https://labs.withsecure.com/publications/keepass-trojanised-in-advanced-malware-campaign

Procolored UV Printer Software Compromised

The official software offered by the makers of the Procolored UV printer has been compromised, and versions with malware were distributed for about half a year.

https://www.hackster.io/news/the-maker-s-toolbox-procolored-v11-pro-dto-uv-printer-review-680d491e17e3

https://www.gdatasoftware.com/blog/2025/05/38200-printer-infected-software-downloads

SANS Internet Storm Center StormCast Monday, May 19, 2025

xorsearch Python Functions; pwn2own Berlin; Senior Govt Official Impersonation; Dynamic Domain Risk

https://isc.sans.edu/podcastdetail/9456

xorsearch.py: Python Functions

Didier’s xorsearch tool now supports python functions to filter output

https://isc.sans.edu/diary/xorsearchpy+Python+Functions/31858

Pwn2Own Berlin 2025

Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machine escape.

https://www.zerodayinitiative.com/blog/2025/5/17/pwn2own-berlin-2025-day-three-results

Senior US Officials Impersonated in Malicious Messaging Campaign

The FBI warns of senior US officials being impersonated in text and voice messages.

https://www.ic3.gov/PSA/2025/PSA250515

Scattered Spider: TTP Evolution in 2025

Push Security provided an update on how Scattered Spider evolved. One thing they noted was that Scattered Spider takes advantage of legit dynamic domain name systems to make detection more difficult

https://pushsecurity.com/blog/scattered-spider-ttp-evolution-in-2025/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive