meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 December 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


AutoIT3 Compiled Scripts Dropping Shellcodes
Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution.
https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542
React2Shell Update
The race is on to patch vulnerable systems. Various groups are aggressively scanning the internet with different exploit variants. Some attempt to bypass WAFs.
https://blog.cloudflare.com/5-december-2025-outage/
https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/
Apache Tika XXE Flaw
Apache s Tika library patched a XXE flaw.
https://lists.apache.org/thread/s5x3k93nhbkqzztp1olxotoyjpdlps9k

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, December 8th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:12.3

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.6

And this episode is brought you by the Sands.edu undercredit certificate program in cyber security fundamentals.

0:25.6

Xavier lately found a wave of different malicious files that all took a similar route in order to obfuscate some of the code in Auto IT3.

0:37.7

Auto IT3 is an automation system.

0:41.1

It's quite old going back to the early 2000s,

0:44.6

but it's still being maintained,

0:45.8

it's still being updated,

0:47.2

and it's still frequently being used to manage Windows systems

0:51.2

and essentially create small scripts

0:53.2

to automate some tasks on Windows systems.

0:57.5

Now, Auto IT3 has an interesting function called File Install. File install sounds a little bit like an

1:04.6

include function. If the script is parsed, then it's just read from the file system.

1:11.5

Now, what gets interesting is once you're running a compiled Auto IT script,

1:16.8

and that's kind of one of the advantages of Auto IT.

1:19.7

It's very easy to create binary executables,

1:22.8

so you don't, as a malware author, have to first install all of auto IT on the system,

1:28.8

but you just run the executable or have the victim run the executable.

1:34.8

So when it's compiled, then the file is included in the binary at compiled time.

1:41.1

But what Xavier also saw is that then a temporary file is being created

1:45.2

at runtime of this script, which of course then makes it easy to extract that file and

1:52.6

analyze it, and Xavier is going a little bit over the different obfuscation techniques being

...

Transcript will be available on the free plan in 23 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.