meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 June 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Extracting With pngdump.py
Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file.
https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022
16 React Native Packages for GlueStack Backdoored Overnight
16 npm packages with over a million weekly downloads between them were compromised. The compromised packages include a remote admin tool that was seen before in similar attacks.
https://www.aikido.dev/blog/supply-chain-attack-on-react-native-aria-ecosystem
Atomic MacOS Stealer Exploits Clickfix
MacOS users are now also targeted by fake captchas, tricking users into running exploit code.
https://www.cloudsek.com/blog/amos-variant-distributed-via-clickfix-in-spectrum-themed-dynamic-delivery-campaign-by-russian-speaking-hackers
Microsoft INETPUB Script
Microsoft published a simple PowerShell script to restore the inetpub folder in case you removed it by mistake.
https://www.powershellgallery.com/packages/Set-InetpubFolderAcl/1.0

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, June 9th, 2025 edition of the Sands Internet Storm Centers.

0:07.0

Stormcast, my name is Johannes Ulrich, and this episode brought you by the Sands.edu graduate certificate program in Purple Team Operations is recorded in Jacksonville, Florida.

0:20.0

Well, and in Diaries this weekend, we had an update to pngdump.p.i by DDA.

0:25.8

This update was, well, as so often prompted by some malware that Xavier was looking at a few

0:32.4

days ago. In that particular example, we had a PNG file with some additional data appended to the end.

0:40.7

Now, this data followed the I-end marker in the PNG.

0:47.1

And PNG dump will display a list of all the sections in the PNG, including the I-end marker.

0:55.2

So then it's easy to spot, hey, there's some unexpected data here following that I-end

1:00.4

marker, and that's the data that you can then save into a separate file.

1:05.5

So if this is helpful for people and makes Malware analysis a little bit simpler.

1:13.8

Well, and then we do have yet another significant compromise of the NPM ecosystem. This time it particular targeted some React

1:22.4

native packages for CluStack. CluStack delivers interface components, and a number of them were compromised last week.

1:32.5

This attack happened June 6, June 7th, so just Friday, Saturday, I guess.

1:38.4

It's also difficult there for people to pay attention, and the attack did deliver back door to the systems. Now, the write-up

1:47.9

I'm going by here comes from Aikido. They actually detected a similar compromise back in May,

1:54.0

very similar. Malware deployed back then with all the minor changes being deployed here,

1:59.2

but for the last month, they were fairly,

2:02.0

not very active, but now apparently sort of hit the big jackpot with these NPM packages

2:08.3

that have aggregated about a million downloads a week. What interesting thing here is

2:14.8

that you actually don't see the compromised code easily.

2:19.5

They use, well, white spaces to basically push it off the screen,

2:24.5

and that way, again, sort of escape some cursory detection.

...

Transcript will be available on the free plan in 20 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.