meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 November 2025

⏱️ 10 minutes

🧾️ Download transcript

Summary


SmartApeSG campaign uses ClickFix page to push NetSupport RAT
A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix
https://isc.sans.edu/diary/32474
Formbook Delivered Through Multiple Scripts
An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks
https://isc.sans.edu/diary/32480
sudo-rs vulnerabilities
Two vulnerabilities were patched in sudo-rs, the version of sudo written in Rust, showing that while Rust does have an advantage when it comes to memory safety, there are plenty of other vulnerabilities to worry about
https://ubuntu.com/security/notices/USN-7867-1
https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw?ref=itsfoss.com
SANS Holiday Hack Challenge
https://sans.org/HolidayHack

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, November 14th,

0:07.8

2025 edition of the Sands Inundit Storm Center's Stormcast.

0:12.8

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.6

And this episode is brought you by the sands.edu graduate certificate program in

0:22.5

Purple Team Operations. And today we do have two diaries I should talk about. First one is from

0:29.5

Brad Duncan and he writes about the latest regarding the SmartApe SG campaign. This is a campaign that usually advertised itself via fake browser updates,

0:41.8

but lately has jumped on the ClickFix bandwagon,

0:45.3

and that has overall been sort of a huge thing,

0:49.1

where we see more and more of these fake catchers

0:51.7

that are tricking victims into installing malicious software on their system.

0:59.0

In this particular case, it starts out with a compromised webpage.

1:04.1

Inside that webpage, the attacker will add some JavaScript to then redirect the user to the clickfix exploit, which is in this case,

1:14.1

as you see sort of a Cloudflare lookalike, capture that then tricks the victim into installing

1:21.6

or basically running a malicious power shell command, and that PowerShe shell command will install additional malicious software.

1:29.7

As usual, Pratt provides plenty of indicators of compromise here with his diary, including

1:36.4

packet captures, to see how the attack really unfolded and hopefully helps you detect

1:43.3

some of these attacks in your own network.

1:47.1

The second diary comes from Xavier, and Xavier gives us an update of the formbook of Malware.

1:54.6

Formbook, another very popular piece of Malware that we haven't really talked much about lately.

2:00.2

This particular example arrived the form of an email attachment as a zip file.

2:05.5

The user was then tricked into extracting the zip file and executing the Visual Basic

2:10.9

script that was included with the zip file.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.