meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 July 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


Experimental Suspicious Domain Feed
Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes.
https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102
Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812
Huntress saw active exploitation of Wing FTP Server remote code execution (CVE-2025-47812) on a customer on July 1, 2025. Organizations running Wing FTP Server should update to the fixed version, version 7.4.4, as soon as possible.
https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
FortiWeb Pre-Auth RCE (CVE-2025-25257)
An exploit for the FortiWeb RCE Vulnerability is now available and is being used in the wild.
https://pwner.gg/blog/2025-07-10-fortiweb-fabric-rce
NVIDIA Vulnerable to Rowhammer
NVIDIA has received new research related to the industry-wide DRAM issue known as Rowhammer . The research demonstrates a potential Rowhammer attack against an NVIDIA A6000 GPU with GDDR6 Memory. The purpose of this notice is to reinforce already known mitigations to Rowhammer attacks.
https://nvidia.custhelp.com/app/answers/detail/a_id/5671/~/security-notice%3A-rowhammer---july-2025

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, July 14th, 2025 edition of the Sands Inundit Storm Centers. Stormcast. My name is Johannes Orich, and today's episode is brought to you by the sands.edu credit certificate program in Industrial Control System Security, and it is recorded here at Sandspire in Washington, D.C.

0:23.2

Well, this weekend, I worked on a new data feed, suspicious domains.

0:28.2

This is something we used to have in the past.

0:30.6

Like years ago, we had a suspicious domain feed, and what we did in the past was that we

0:36.0

basically aggregated various other public domain

0:39.2

feats in order to then rank them and also look for domains that are sort of more significant

0:44.4

by showing up in multiple feats. The problem with this approach was that, well, these feats kind of

0:51.5

changed. Some of them got this continued.

0:59.2

Others changed their licensing, that we could no longer use them and redistribute them.

1:02.4

So we now take a little bit a different approach. We already had data of newly registered domains.

1:06.6

We offer that as part of our API data.

1:10.7

The recent domains feature in our API basically gives you

1:15.0

recently registered domains. So what we did now is took an approach that is not new, but

1:22.3

where we basically look for odd patterns in these domains. So things like, for example, well-known brand names are often impersonated.

1:31.4

We're looking for international characters that are a little bit odd,

1:34.6

in particular if multiple different scripts are being used in one domain name.

1:39.9

Also, things like lots of numbers, high entropy, like these random domain names.

1:44.9

What we have right now is probably a little bit more sensitive to fishing domains.

1:51.3

The malware domains are probably caught with a lot of these sort of high entropy,

1:56.2

these very random domain names.

1:58.9

But those are actually a little bit more difficult to find, actually

2:03.0

identify and prioritize, because it looks like there are also some legitimate, not really sure

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.