meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 17 July 2025

⏱️ 5 minutes

🧾️ Download transcript

Summary


More Free File Sharing Services Abuse
The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused
https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112
Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor
A group Google identifies as UNC6148 is exploiting the Sonicwall SMA 100 series appliance. The devices are end of life, but even fully patched devices are exploited. Google assumes that these devices are compromised because credentials were leaked during prior attacks. The attacker installs the OVERSTEP backdoor after compromising the device.
https://cloud.google.com/blog/topics/threat-intelligence/sonicwall-secure-mobile-access-exploitation-overstep-backdoor
Weaponizing Trust in File Rendering Pipelines
RenderShock is a comprehensive zero-click attack strategy that targets passive file preview, indexing, and automation behaviours in modern operating systems and enterprise environments. It leverages built-in trust mechanisms and background processing in file systems, email clients, antivirus tools, and graphical user interfaces to deliver payloads without requiring any user interaction.
https://www.cyfirma.com/research/rendershock-weaponizing-trust-in-file-rendering-pipelines/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, July 17, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich, and today I'm recording from Washington, D.C.

0:13.1

And this episode is brought you by the Sands.edu credit certificate program in cybersecurity engineering.

0:22.5

Xavier today wrote up a series of attacks that took advantage of a file sharing box called

0:28.7

Catbox. Catbox.com.com.com. Mo is the domain being used by this file sharing service and

0:34.9

Xavier was able to capture about 600 or so different URLs being abused at this

0:41.7

particular file sharing service. Just like any free file sharing service, it can easily be used

0:47.1

to distribute malware. Now on their webpage, they're stating that they do not allow the hosting

0:54.0

of .exe and similar files, but it looks like they're stating that they do not allow the hosting of dot eXE and similar files,

0:56.6

but it looks like they're really only checking the extension and something like dot dLL or such

1:02.3

is easily used to evade some of the filters being set up by Catbox.

1:09.1

You may want to consider blocking access to this service.

1:12.8

It doesn't look based on a website that it is all that

1:16.1

useful for business purposes.

1:19.5

Also, of course, any use of some of these newer generic top-level domains, like Dot Mo

1:24.9

in this case, is often a good indicator that something suspicious may be happening.

1:32.3

And Google's threat intelligence group has published details regarding a compromise of a fully

1:38.8

patched Sonic Wall SMA 100 devices. These devices are end of life, but the particular device is compromised here, were fully

1:49.5

patched.

1:50.4

Now, this is not a serodei apparently that's being used here.

1:54.4

Instead, what Google believes is happening is that these particular devices were vulnerable

1:59.1

to, in the past, to some of these vulnerabilities

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.