meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 January 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, January 29th,

0:03.9

2025 edition of the Science Internet Storm Center's Stormcast.

0:09.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.6

In diaries today, Xavier is talking about new Python matter that Xavier came across,

0:20.4

this one going after Exodus

0:22.8

wallets. Exodus is a popular cryptocurrency wallet, and in this case, the malware is trying to

0:30.6

infiltrate secret keys in case the wallet is password protected. It also is looking for passwords in common password managers.

0:41.3

All is written in Python, not leaving much of a fingerprint on the file system,

0:46.7

like all the data is kept in memory and then directly exfiltrated.

0:50.9

The keystroke logger is also kind of interesting in that it doesn't just simply

0:56.0

record keystroke, but also has some of special setups. For, for example, if something is

1:01.8

copied to the clipboard, it will automatically then grab data from the clipboard and exfiltrate

1:07.6

this as well. Cryptocurrencies keep coming up more and more, of course, lately with the increased

1:14.6

value of cryptocurrencies, and that's probably just going to continue.

1:19.9

Interesting to see Python sort of jumping in here with some malware, and yeah, Xavier has

1:26.7

lots more details in his diary,

1:29.7

including code snippets from the actual malware.

1:34.6

And the Arctic Wolf is reporting that they are now seeing some compromised simple help server.

1:41.7

No Surprise Horizon 3 AI released about a week ago.

1:45.7

Details about a number of vulnerabilities. There was an unauthenticated path traversal

1:50.3

vulnerability. There was an arbitrary file upload and remote code execution vulnerability,

1:55.1

as well as a privilege escalation vulnerability. So no surprise that these systems are being exploited.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.