meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 July 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771
A quick walk-through showing how to decode the payload of recent SharePoint exploits
https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138
Compromised JavaScript NPM is Package
The popular npm package is was compromised by malware. Luckily, the malicious code was found quickly, and it was reversed after about five hours.
https://socket.dev/blog/npm-is-package-hijacked-in-expanding-supply-chain-attack
Microsoft Quick Machine Recovery
Microsoft added a new quick machine recovery feature to Windows 11. If the system is stuck in a reboot loop, it will boot to a rescue partition and attempt to find fixes from Microsoft.
https://learn.microsoft.com/en-gb/windows/configuration/quick-machine-recovery/?tabs=intune

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, July 24, 2025 edition of the Sands and then at Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:12.5

And this episode is brought you by the Sands.edu undergraduate certificate program in Applied Cybersecurity.

0:19.5

Security. Well, today I still spend some time with the

0:22.7

SharePoint tool shell exploits that we have been collecting and others have been collecting

0:28.8

to do a little bit reverse analysis on them. So I figured that I'll summarize some of the things

0:35.6

that I learned here in a quick blog post. Also, I did

0:38.3

a video showing you a little bit how some of this works. And, well, it's actually not terribly

0:45.4

difficult for many of these exploits to figure out exactly what the attacker does. To get

0:52.8

started, first of all, of course, there is the refer.

0:55.8

That's one of the key features here that's being exploited by this vulnerability

1:00.9

or by this exploit.

1:03.1

And then it's really just a lot of decoding base 64.

1:08.8

So there's base 64 and base 64.

1:12.1

That's sort of what it all ends up.

1:22.0

Now it starts out here with this compressed data table feature, which is Bay 64 and compressed and moves on from there. Don't want to go over everything here in the podcast because many of you may not

1:28.2

really be that interested, but here is sort of the final page that was uploaded by some of the

1:33.8

early exploits that stole the machine key from the system. Other than that, no real sort of big

1:40.2

fundamental new use here. Lots of research and I know, scanning for machines that may have this particular backdoor

1:48.5

installed on the system.

1:50.0

This releases the machine keys.

1:52.0

And that's, again, the key lesson I think here that can't be emphasized enough that

...

Transcript will be available on the free plan in 2 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.