Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, July 18, 2025

Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches

https://isc.sans.edu/podcastdetail/9532

Hiding Payloads in Linux Extended File Attributes

Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data.

https://isc.sans.edu/diary/Hiding+Payloads+in+Linux+Extended+File+Attributes/32116

Cisco Patches Critical Identity Services Engine Flaw CVE-2025-20281, CVE-2025-20337, CVE-2025-20282

An unauthenticated user may execute arbitrary code as root across the network due to improperly validated data in Cisco’s Identity Services Engine.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6

Oracle Critical Patch Update

Oracle patched 309 flaws across 111 products. 9 of these vulnerabilities have a critical CVSS score of 9.0 or higher.

https://www.oracle.com/security-alerts/cpujul2025.html

Broadcom releases VMware Updates

Broadcom fixed a number of vulnerabilities for ESXi, Workstation, Fusion, and Tools.

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877

SANS Internet Storm Center StormCast Thursday, July 17, 2025

catbox.moe abuse; Sonicwall Attacks; Rendering Issues

https://isc.sans.edu/podcastdetail/9530

More Free File Sharing Services Abuse

The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused

https://isc.sans.edu/diary/More+Free+File+Sharing+Services+Abuse/32112

Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor

A group Google identifies as UNC6148 is exploiting the Sonicwall SMA 100 series appliance. The devices are end of life, but even fully patched devices are exploited. Google assumes that these devices are compromised because credentials were leaked during prior attacks. The attacker installs the OVERSTEP backdoor after compromising the device.

https://cloud.google.com/blog/topics/threat-intelligence/sonicwall-secure-mobile-access-exploitation-overstep-backdoor

Weaponizing Trust in File Rendering Pipelines

RenderShock is a comprehensive zero-click attack strategy that targets passive file preview, indexing, and automation behaviours in modern operating systems and enterprise environments. It leverages built-in trust mechanisms and background processing in file systems, email clients, antivirus tools, and graphical user interfaces to deliver payloads without requiring any user interaction.

https://www.cyfirma.com/research/rendershock-weaponizing-trust-in-file-rendering-pipelines/

SANS Internet Storm Center StormCast Wednesday, July 16, 2025

ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions

https://isc.sans.edu/podcastdetail/9528

Keylogger Data Stored in an ADS

Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data

https://isc.sans.edu/diary/Keylogger+Data+Stored+in+an+ADS/32108

Malvertising Homebrew

An attacker has been attempting to trick users into installing a malicious version of Homebrew. The fake software is advertised via paid Google ads and directs users to the attacker’s GitHub repo.

https://medium.com/deriv-tech/brewing-trouble-dissecting-a-macos-malware-campaign-90c2c24de5dc

CVE-2025-5333: Remote Code Execution in Broadcom Altiris IRM

LRQA have discovered a critical unauthenticated remote code execution (RCE) vulnerability in the Broadcom Symantec Altiris Inventory Rule Management (IRM) component of Symantec Endpoint Management.

https://www.lrqa.com/en/cyber-labs/remote-code-execution-in-broadcom-altiris-irm/

Code highlighting with Cursor AI for $500,000

A syntax highlighting extension for Cursor AI was used to compromise a developer’s workstation and steal $500,000 in cryptocurrency.

https://securelist.com/open-source-package-for-cursor-ai-turned-into-a-crypto-heist/116908/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive