meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 May 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


xorsearch.py: Python Functions
Didier s xorsearch tool now supports python functions to filter output
https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858
Pwn2Own Berlin 2025
Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machine escape.
https://www.zerodayinitiative.com/blog/2025/5/17/pwn2own-berlin-2025-day-three-results
Senior US Officials Impersonated in Malicious Messaging Campaign
The FBI warns of senior US officials being impersonated in text and voice messages.
https://www.ic3.gov/PSA/2025/PSA250515
Scattered Spider: TTP Evolution in 2025
Pushscurity provided an update on how Scattered Spider evolved. One thing they noted was that Scattered Spider takes advantage of legit dynamic domain name systems to make detection more difficult
https://pushsecurity.com/blog/scattered-spider-ttp-evolution-in-2025/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, May 19th,

0:03.4

2000, 25 edition of the Sands and its Storm Center's Stormcast.

0:08.3

My name is Johannes Ulrich,

0:09.9

and this episode brought you by the Sands EDU Graduate Certificate Program

0:14.3

in Industrial Control System Security is recorded today in Jacksonville, Florida.

0:21.7

Well, and as the last few weekends, D.D.A. has a new version of XOR search for us.

0:27.7

I guess that's how D.D.A. is spending his weekends, making XOR search better.

0:33.9

Fundamentally, XR. Search is meant to extract strings from files.

0:40.3

That's sort of where the search part comes from.

0:42.3

Of course, we have no regular expressions and all kinds of good things that were added these last few weeks.

0:48.9

But what we got now is to manipulate the output further, you may now define a Python function as, for example,

0:57.5

just simply is printable. You're using a dash capital P for that, that will then filter

1:03.1

out all printable characters, making output potentially more readable.

1:08.2

And last week, the Serity initiative by Trent Micro did conduct another

1:13.8

Pondone context. They're always attached to larger security conferences and are promising

1:20.9

substantial money for new vulnerabilities and that are actually being demonstrated as

1:27.0

exploitable as part of the context.

1:30.2

The big theme here in my opinion was Perlidge Escalation and Virtual Machine Escape.

1:35.1

There were a number of different vulnerabilities in, for example, Redhead, Windows 11 being

1:40.8

demonstrated also on the Virtual Machine escape front, virtual box and VMware

1:48.2

were exploited. Interesting contest, they are reporting all these vulnerabilities to respective

1:56.9

manufacturers. And I think I actually heard some browser vulnerabilities, like in Firefox,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.