Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, September 5, 2025

Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption

https://isc.sans.edu/podcastdetail/9600

Unauthorized Issuance of Certificate for 1.1.1.1

Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina.

https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/

AI Model Namespace Reuse

Deleted accounts on Huggingface can be taken over by other entities unrelated to the original owner.

https://unit42.paloaltonetworks.com/model-namespace-reuse/

macOS vulnerability allowed Keychain and iOS app decryption without a password

Excessive entitlements for the gcore binary facilitated access to key material that was sufficient to access secrets stored in Apple’s keychain.

https://www.helpnetsecurity.com/2025/09/04/macos-gcore-vulnerability-cve-2025-24204/

SANS Internet Storm Center StormCast Thursday, September 4, 2025

Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued

https://isc.sans.edu/podcastdetail/9598

Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086

Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months.

https://isc.sans.edu/diary/Exploit+Attempts+for+Dassault+DELMIA+Apriso+CVE20255086/32256

Android Bulletin

Google released its September update, fixing two already-exploited privilege escalation flaws and some remote code execution issues.

https://source.android.com/docs/security/bulletin/2025-09-01

Mis-issued Certificates for SAN iPAddress:1.1.1.1 by Fina RDC 2020

Certificate authority Fina RDC issues a certificate for Cloudflare’s IP address 1.1.1.1

https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/SgwC1QsEpvc

SANS Internet Storm Center StormCast Wednesday, September 3, 2025

Sextortion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches

https://isc.sans.edu/podcastdetail/9596

A Quick Look at Sextortion at Scale

Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns.

https://isc.sans.edu/diary/A+quick+look+at+sextortion+at+scale+1900+messages+and+205+Bitcoin+addresses+spanning+four+years/32252

Azure AD Client Secret Leak

Attackers are stealing Azure AD client secrets from websites that are leaving them exposed.

https://www.resecurity.com/blog/article/azure-ad-client-secret-leak-the-keys-to-cloud

Covert Channel via ICMP and DNS

A new bot combines ICMP and DNS in new ways for covert communication. The DNS requests use domains with a fixed prefix followed by a base64 encoded command, and the ICMP echo request packets include commands as a payload.

https://thehackernews.com/2025/09/researchers-warn-of-mystrodx-backdoor.html

Official Release of Critical FreePBX Patch

Sangoma has announced that the experimental patch released for the exploited FreePBX vulnerability is now considered stable, and users should update to apply it.

https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203

SANS Internet Storm Center StormCast Tuesday, September 2, 2025

pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password

https://isc.sans.edu/podcastdetail/9594

pdf-parser: All Streams

Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams.

https://isc.sans.edu/diary/pdfparser+All+Streams/32248

Salesloft Drift Putting OAuth Tokens at Risk

OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Workspace, and others have been compromised and heavily abused for additional compromise and large-scale data exfiltration from exposed services.

https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift

Velociraptor incident response tool abused for remote access

Attackers are using the open source incident response tool Velociraptor to access remote systems in breached networks. Tools like Velociraptor are ideal for attackers to perform lateral movement.

https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/

Default Password in NeuVector (Rancher Desktop)

SuSE fixed a default password vulnerability in NeuVector, a security tool included in Rancher Desktop.

https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive