meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 30 January 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, January 30th, 2025 edition of the Sands and at Storm Center's Stormcast.

0:09.3

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.2

One of the comments we often get when we're talking about Python matter is that on Windows,

0:19.7

usually there is no sort of full Python environment

0:22.7

like you have it commonly on Linux. Well, today, Xavier has an interesting piece of Python

0:30.0

malware that actually includes the entire Python environment in the form of a fake document.

0:36.6

Document.sip is being downloaded here with the Python

0:40.9

environment. Also interesting and not really that terribly unusual when you start the malware.

0:47.5

A PDF will open. In this case, some sort of generic Garmin related PDF. This is usually done to make the user feel like they opened a document.

0:59.1

Probably the pretense here for delivering of the Malver was that this attachment is

1:04.0

supposed to include this PDF document.

1:07.6

So if the user now clicks on the file, which really starts the matter, the PDF

1:12.4

is opened for them, making them feel safe and sound, while in the background, all of their

1:19.1

crypto coins and other sensitive information is being exfiltrated. Then we have two updates

1:26.5

for 40 net users.

1:28.5

First of all, there is an exploit apparently for sale now, according to Threatmon.

1:34.6

They posted on X that they saw an exploit for sale on a Russian forum.

1:41.1

This exploit apparently takes advantage of the vulnerability I talked about yesterday.

1:45.5

That's the interesting remote access via web socket bypassing authentication vulnerability.

1:55.1

So definitely make sure that your devices are patched.

1:59.0

It affects 40OS version 7 version 700 through 7016. The second item is,

2:06.8

well, a little bit related maybe, but 40Net also notified its users that if you are running a

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.