meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 May 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Example of Modular Malware
Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail.
https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928
Sysaid XXE Vulnerabilities
IT Service Management Software Sysaid patched a number of XXE vulnerabilities. Without authentication, an attacker is able to obtain confidential data and completely compromise the system. watchTowr published a detailed analysis of the flaws including exploit code.
https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability
Cisco Patched a vulnerability in its wireless controller software that may be used to not only upload files but also execute code as root without authentication.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC
Unifi Protect Camera Vulnerability
Ubiquity patched a vulnerability in its Protect camera firmware fixing a buffer overflow flaw.
https://community.ui.com/releases/Security-Advisory-Bulletin-047-047/cef86c37-7421-44fd-b251-84e76475a5bc

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, May 8th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich, and today I'm recording from San Diego, California.

0:13.8

Today's diary comes from Xavier, and Xavier takes a look at an interesting piece of matter.

0:19.6

This matter is written in dot net, not Python, for a change,

0:23.9

and it is thinked itself by being very modular. Now, the way the modularity is implemented is

0:31.3

if a particular feature is needed, the particular module a DLL file is loaded from GitHub, and then installed on the system.

0:41.6

Some of these modules, for example, can install a root kit. There is a token grabber module.

0:47.5

There also is a password stealer, and then the one module that Xadri looks at a little bit closer

0:53.7

is implementing some webcam functionality.

0:57.6

The advantage of malware like this is that the initial download, first of all, is smaller and is also less likely going to trigger alerts because it doesn't contain any code that indicates that it may act malicious.

1:11.4

That's only then added again later on demand.

1:15.4

And since this malware is reasonably simple built, it's not obvious gated,

1:19.9

it makes it a great sort of little learning tool in order to better understand how malware works.

1:26.7

Let me have an interesting vulnerability to talk about again from sort of friends of the show

1:32.3

Watchtower. This vulnerability affects CIS aid. CIS aid is an IT service management platform,

1:40.0

so it allows you to let help desk tickets, inventory, and various other sort of IT management tasks.

1:47.2

Of course, software like this is always in the crosshairs of ransomware gangs,

1:53.0

given that they're also often used by outsourced IT management companies

1:57.3

that would give an actor access to multiple entities using one compromised

2:03.6

CIS aid instance.

2:05.6

Now the vulnerabilities here start out with XML external entity vulnerabilities.

2:12.6

It's a little bit weird vulnerability if you're not familiar with XML.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.