meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 June 2025

⏱️ 5 minutes

🧾️ Download transcript

Summary


Phishing e-mail that hides malicious links from Outlook users
Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of
https://isc.sans.edu/diary/Phishing%20e-mail%20that%20hides%20malicious%20link%20from%20Outlook%20users/32010
Amazon changing default logging from blocking to non-blocking
Amazon will change the default logging mode from blocking to non-blocking. Non-blocking logging will not stop the application if logging fails, but may result in a loss of logs.
https://aws.amazon.com/blogs/containers/preventing-log-loss-with-non-blocking-mode-in-the-awslogs-container-log-driver/
Cisco Removes Backdoor
Cisco fixed a Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7
Infoblox Vulnerability Details disclosed
Details regarding several vulnerabilities recently patched in Infoblox s NetMRI have been made public. In particular an unauthenticated remote code execution issue should be considered critical.
https://rhinosecuritylabs.com/research/infoblox-multiple-cves/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, June 5th, 2025 edition of the Sands in the Net Storm Centers, Stormcast.

0:08.1

My name is Johannes Ulrich, and this episode brought you by the Sands.edu graduate certificate program in cyber defense operations is recorded in Jacksonville, Florida.

0:21.2

Today we have a diary from Jan about an interesting fishing trick that Jan ran across.

0:28.1

This fishing trick basically hides the malicious link from Outlook users.

0:33.6

So at first, the email looks like, well, any other fishingishing email, it tries to impersonate a bank, but when Jan hovered over the link in Outlook, well, the link actually was a normal link for this particular bank.

0:51.3

So what's the point here?

0:53.2

Well, essentially what the attacker is likely trying to do here is

0:56.3

not trigger the fishing attack for Outlook users. Because Outlook users are often corporate users.

1:05.7

Most home users may be more susceptible to fishing, use webmail browser systems.

1:13.6

And corporate users, of course, have more security around their browsing experience,

1:19.6

which of course could trigger an alert and then could lead to the fishing site being discovered.

1:26.6

So what they're actually doing here is use this little trick here with HTML comments.

1:34.3

This is a specific feature in Outlook that if MSO,

1:39.3

and you often see some sort of product-specific features implemented like this,

1:43.6

where essentially you can

1:45.0

display different content to Outlook users versus other users. And that's really what's happening

1:52.4

here. And that's how the non-Outlook user is seeing the malicious link, while Outlook users

1:59.8

are seeing the benign link.

2:02.7

Interesting little trick, and like I said, it's not necessarily meant to protect Outlook users.

2:07.0

It's more to hide the malicious link from users that are more likely part of a more managed IT environment.

2:15.3

Then we got an update from Amazon regarding the default mode for AWS logging via CloudWatch

2:23.6

logs and others.

...

Transcript will be available on the free plan in 16 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.