4.9 • 696 Ratings
🗓️ 17 July 2025
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, July 17, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.7 | My name is Johannes Ulrich, and today I'm recording from Washington, D.C. |
0:13.1 | And this episode is brought you by the Sands.edu credit certificate program in cybersecurity engineering. |
0:22.5 | Xavier today wrote up a series of attacks that took advantage of a file sharing box called |
0:28.7 | Catbox. Catbox.com.com.com. Mo is the domain being used by this file sharing service and |
0:34.9 | Xavier was able to capture about 600 or so different URLs being abused at this |
0:41.7 | particular file sharing service. Just like any free file sharing service, it can easily be used |
0:47.1 | to distribute malware. Now on their webpage, they're stating that they do not allow the hosting |
0:54.0 | of .exe and similar files, but it looks like they're stating that they do not allow the hosting of dot eXE and similar files, |
0:56.6 | but it looks like they're really only checking the extension and something like dot dLL or such |
1:02.3 | is easily used to evade some of the filters being set up by Catbox. |
1:09.1 | You may want to consider blocking access to this service. |
1:12.8 | It doesn't look based on a website that it is all that |
1:16.1 | useful for business purposes. |
1:19.5 | Also, of course, any use of some of these newer generic top-level domains, like Dot Mo |
1:24.9 | in this case, is often a good indicator that something suspicious may be happening. |
1:32.3 | And Google's threat intelligence group has published details regarding a compromise of a fully |
1:38.8 | patched Sonic Wall SMA 100 devices. These devices are end of life, but the particular device is compromised here, were fully |
1:49.5 | patched. |
1:50.4 | Now, this is not a serodei apparently that's being used here. |
1:54.4 | Instead, what Google believes is happening is that these particular devices were vulnerable |
1:59.1 | to, in the past, to some of these vulnerabilities |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.