meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 April 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary


Example of a Payload Delivered Through Steganography
Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary.
https://isc.sans.edu/diary/Example%20of%20a%20Payload%20Delivered%20Through%20Steganography/31892
SAP Netweaver Exploited CVE-2025-31324
An arbitrary file upload vulnerability in SAP s Netweaver product is actively exploited to upload webshells. Reliaquest discovered the issue. Reliaquest reports that they saw it being abused to upload the Brute Ratel C2 framework. Users of Netweaver must turn off the developmentserver alias and disable visual composer, and the application was deprecated for about 10 years. SAP has released an emergency update for the issue.
https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
Any.Run Reports False Positive Uploads
Due to false positives caused by MS Defender XDR flagging Adobe Acrobat Cloud links as malicious, many users of Any.Run s free tier uploaded confidential documents to Any.Run. Anyrun blocked these uploads for now but reminded users to be cautious about what documents are being uploaded.
https://x.com/anyrun_app/status/1915429758516560190

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, April 28th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:12.9

Well, this weekend we had two interesting diaries that sort of played on each other.

0:17.3

First, Xavier talked about a piece of malware that encoded an executable as part of an image.

0:25.4

This technique usually called steganography does essentially adjust the value of individual pixels

0:32.5

in order to encode the particular binary that's supposed to be either exfiltrated or in this case

0:38.6

infiltrated, so it's more here about bypassing network defenses. The initial download

0:45.9

malware is actually encoded using Unicode characters, very common, as Xavier points out,

0:52.4

in order to make reverse analysis a little bit more

0:55.5

difficult. But then the real interesting part is the steganography part, where the attacker

1:02.8

sort of extracts the binary from individual pixel values. Often lately, I've seen steganography being used to refer to where an attacker just appends data to an image.

1:15.6

In my opinion, that isn't really sort of what steganography is all about because the data is still

1:20.3

clearly readable.

1:22.5

Steganography usually just means making these sort of subtle adjustments to existing files

1:27.4

in order to hide

1:28.9

that there is any additional data present.

1:32.3

And then the second diary this week was from DDA.

1:34.8

DDA, of course, famous for his Python scripts that analyze Malabar, and DDA is walking us

1:40.6

through how these tools can be used to analyze a piece of malware like this

1:45.9

that hides data in an image. The first tool that the DA is using is his PNG

1:53.6

dump tool. PNG is a compressed file format. So in order to get the raw pixel data that you

2:00.5

need here to extract the actual pixel data that you need here to extract the actual

...

Transcript will be available on the free plan in 23 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.