4.9 • 696 Ratings
🗓️ 15 October 2025
⏱️ 9 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, October 16th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:13.0 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:18.1 | And this episode is brought you by the sands.edu undergraduate certificate program |
| 0:23.0 | in Applied Cybersecurity. Xavier today explains an infestiler written in Python and how it deals |
| 0:31.2 | with clipboard content. One of the standard features of infestilers is stealing data from the clipboard, often focusing on things like passwords that maybe copy-pasted or maybe Cryptocoin addresses that are also often copy-pasted because who wants to type in a long random string like this. |
| 0:53.2 | Some Infoen Steelers actually automatically recognize some of these string patterns as they're |
| 0:58.0 | being copy-pasted to be more selective when it comes to actually ex-filtrating the data. |
| 1:04.0 | But not everything on the clipboard is text. |
| 1:06.9 | You can also copy-paste images. |
| 1:08.9 | And that's what Xavier's Malabar is focusing on here. |
| 1:14.0 | In this example, the Python script actually looks also for images |
| 1:18.7 | that may be transferred via the clipboard, |
| 1:21.6 | and then exfiltrates them via Telegram, |
| 1:24.6 | another very common command control channel for Info Steelers like this. |
| 1:30.3 | And then we got some bad news for people using products made by F5. F5 today disclosed |
| 1:36.6 | that they were breached. They claim an unspecified nation-state actor for the breach, |
| 1:43.3 | and the breach apparently did last quite some |
| 1:46.4 | extended time, like at least months. As part of the breach, source code was stolen from F5, |
| 1:54.1 | and probably most importantly, also information about unpatched vulnerabilities was stolen. And that, of course, is something |
| 2:03.5 | that affects users of their products. Remember, their products include products like, for |
| 2:09.6 | example, their big IP series, but also EngineX is being maintained by F5. So if you're using |
| 2:16.7 | any F5 products like this, definitely pay attention. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.