4.9 • 696 Ratings
🗓️ 14 November 2025
⏱️ 10 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Friday, November 14th, |
| 0:07.8 | 2025 edition of the Sands Inundit Storm Center's Stormcast. |
| 0:12.8 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.6 | And this episode is brought you by the sands.edu graduate certificate program in |
| 0:22.5 | Purple Team Operations. And today we do have two diaries I should talk about. First one is from |
| 0:29.5 | Brad Duncan and he writes about the latest regarding the SmartApe SG campaign. This is a campaign that usually advertised itself via fake browser updates, |
| 0:41.8 | but lately has jumped on the ClickFix bandwagon, |
| 0:45.3 | and that has overall been sort of a huge thing, |
| 0:49.1 | where we see more and more of these fake catchers |
| 0:51.7 | that are tricking victims into installing malicious software on their system. |
| 0:59.0 | In this particular case, it starts out with a compromised webpage. |
| 1:04.1 | Inside that webpage, the attacker will add some JavaScript to then redirect the user to the clickfix exploit, which is in this case, |
| 1:14.1 | as you see sort of a Cloudflare lookalike, capture that then tricks the victim into installing |
| 1:21.6 | or basically running a malicious power shell command, and that PowerShe shell command will install additional malicious software. |
| 1:29.7 | As usual, Pratt provides plenty of indicators of compromise here with his diary, including |
| 1:36.4 | packet captures, to see how the attack really unfolded and hopefully helps you detect |
| 1:43.3 | some of these attacks in your own network. |
| 1:47.1 | The second diary comes from Xavier, and Xavier gives us an update of the formbook of Malware. |
| 1:54.6 | Formbook, another very popular piece of Malware that we haven't really talked much about lately. |
| 2:00.2 | This particular example arrived the form of an email attachment as a zip file. |
| 2:05.5 | The user was then tricked into extracting the zip file and executing the Visual Basic |
| 2:10.9 | script that was included with the zip file. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.