Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, May 30, 2025

Alternate Data Streams; ConnectWise Breach; Google Calendar C2

https://isc.sans.edu/podcastdetail/9472

Alternate Data Streams: Adversary Defense Evasion and Detection

Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse.

https://isc.sans.edu/diary/Alternate+Data+Streams+Adversary+Defense+Evasion+and+Detection+Guest+Diary/31990

ConnectWise Breach Affects ScreenConnect Customers

ConnectWise’s ScreenConnect solution was compromised, leading to attacks against a small number of customers. This is yet another example of how attackers are taking advantage of remote access solutions.

https://www.connectwise.com/company/trust/advisories

Mark Your Calendar: APT41 Innovative Tactics

Google detected attacks leveraging Google’s calendar solution as a command and control channel.

https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics

Webs of Deception: Using the SANS ICS Kill Chain to Flip the Advantage to the Defender

Defending a small Industrial Control System (ICS) against sophisticated threats can seem futile. The resource disparity between small ICS defenders and sophisticated attackers poses a significant security challenge.

https://www.sans.edu/cyber-research/webs-deception-using-sans-ics-kill-chain-flip-advantage-defender/

SANS Internet Storm Center StormCast Thursday, May 29, 2025

LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability

https://isc.sans.edu/podcastdetail/9470

Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack

Jennifer Wilson took a ‘weird string’ found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about.

https://isc.sans.edu/diary/Guest+Diary+Exploring+a+Use+Case+of+Artificial+Intelligence+Assistance+with+Understanding+an+Attack/31980

Ransomware Deployed via SimpleHelp Vulnerabilities

Ransomware actors are using vulnerabilities in SimpleHelp to gain access to victimÕs networks via MSPs. The exploited vulnerabilities were patched in January.

https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/

OS Command Injection in Everetz Equipment

Broadcast equipment manufactured by Everetz is susceptible to an OS command injection vulnerability. Everetz has not responded to researchers reporting the vulnerability so far and there is no patch available.

https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009

SANS Internet Storm Center StormCast Wednesday, May 28, 2025

Securing authorized_keys; Meteobridge RCE Vulnerability; ADAuditPlus SQL Injection; Dero Miner vs Docker API

https://isc.sans.edu/podcastdetail/9468

SSH authorized_keys File

One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems.

https://isc.sans.edu/diary/Securing+Your+SSH+authorizedkeys+File/31986

Remote Command Execution on Smartbedded Meteobridge(CVE-2025-4008)

Weatherstation software Meteobridge suffers from an easily exploitable unauthenticated remote code execution vulnerability

https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008

https://forum.meteohub.de/viewtopic.php?t=18687

ManageEngine ADAuditPlus SQL Injection

Zoho patched two SQL Injection vulnerabilities in its ManageEngine ADAuditPlus product

https://www.manageengine.com/products/active-directory-audit/cve-2025-41407.html (CVE-2025-41407)

https://www.manageengine.com/products/active-directory-audit/cve-2025-36527.html (CVE-2025-36527)

Dero Miner Infects Containers through Docker API

Kaspersky found yet another botnet infecting docker containers to spread crypto coin miners. The initial access happens via exposed docker APIs.

https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/

SANS Internet Storm Center StormCast Tuesday, May 27, 2025

SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection

https://isc.sans.edu/podcastdetail/9466

SVG Steganography

Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG.

https://isc.sans.edu/diary/SVG+Steganography/31978

Fortinet Vulnerability Details CVE-2025-32756

Horizon3.ai shows how it was able to find the vulnerability in FortinetÕs products, and how to possibly exploit this issue. The vulnerability is already being exploited in the wild and was patched May 13th

https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/

Remote Prompt Injection in GitLab Duo Leads to Source Code Theft

An attacker may leave instructions (prompts) for GitLab Duo embedded in the source code. This could be used to exfiltrate source code and secrets or to inject malicious code into an application.

https://www.legitsecurity.com/blog/remote-prompt-injection-in-gitlab-duo

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive