meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 May 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack
Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about.
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20Understanding%20an%20Attack/31980
Ransomware Deployed via SimpleHelp Vulnerabilities
Ransomware actors are using vulnerabilities in SimpleHelp to gain access to victim s networks via MSPs. The exploited vulnerabilities were patched in January.
https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/
OS Command Injection in Everetz Equipment
Broadcast equipment manufactured by Everetz is susceptible to an OS command injection vulnerability. Everetz has not responded to researchers reporting the vulnerability so far and there is no patch available.
https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, May 29th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich, and this episode brought you by the Sands.edu graduate certificate program in cloud security is recorded as usual in Jacksonville, Florida.

0:22.0

Well, in Diaries today, we got another one from one of our undergraduate students.

0:26.7

Jennifer Wilson did a little experiment demonstrating how you can use large language models

0:33.2

like chat GPT in order to assist you in better understanding various artifacts that you may

0:40.4

recover from a honeypot.

0:42.9

Now, in this particular case, well, it was a little bit an oddly named file that sort of

0:49.8

triggered the investigation here.

0:52.7

It had this sort of hex name, but there was a lowercase S at the

0:59.1

end as well, which made it kind of, well, appear that it's not just sort of a simple random hex-encoded

1:07.3

string. And after going forth and back here a little bit with ChatGPT,

1:12.8

Jennifer was able to figure out that this particular file name is associated with Telegram

1:19.9

desktop and, well, where you basically sort of have various encryption keys and such stored.

1:26.4

So certainly an interesting finding something that wasn't quite as easy and straightforward

1:33.2

to find with a simple search.

1:36.8

The help from the chat GPDA system here certainly helped, but also demonstrates how

1:42.6

a lot of this is about asking the right questions,

1:45.6

not accepting the first answer you're getting necessarily as true, and sort of that dialogue,

1:52.4

really, where you have a skilled analyst, use chat sheet, P10 in order to figure out what this

1:59.4

particular string here was really all about.

2:02.8

And Softos published a blog post about attacks that they have observed from Ransomber

2:09.1

that took advantage of unpatched instances of Simple Help.

...

Transcript will be available on the free plan in 9 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.