meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 October 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Polymorphic Python Malware
Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly.
https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354
SSH ProxyCommand Vulnerability
A user cloning a git repository may be tricked into executing arbitrary code via the SSH proxycommand option.
https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984
Framelink Figma MCP Server CVE-2025-53967
Framelink Figma s MCP server suffers from a remote code execution vulnerability.

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, October 9th, 2025 edition of the Sands Internet Storm Centers.

0:11.2

Stormcast, my name is Johannes Ulrich, recording today from Denver, Colorado.

0:17.4

And this episode is brought you by the Sands.edu master's degree program in information security

0:23.5

engineering. Xavier again went out hunting for a malware on virus total and came across an

0:30.1

interesting Python script. That's actually polymorphic. Polymorphic code modifies itself

0:36.3

as it runs. The intent here is usually to evade signatures that may otherwise detect the malware.

0:44.3

Well, this turned out to be a remote access tool, a rat, and it took advantage of the Python Inspect module.

0:51.3

That module allows you to read the code from various functions and then, of course,

0:57.4

modified, and it's then being executed using the exec function in Python that will execute

1:03.0

the resulting string. It not only modifies code by, for example, exoring it and then decoding

1:09.6

it, but it also injects random junk code,

1:13.7

which will again mostly be used to full detection algorithms to not detect this particular malware.

1:21.4

So far, that seems to be somewhat successful with only two antivirus tools detecting it on virus total. Otherwise, this is your

1:31.1

standard rat. It has the standard functionality like keystroke loggers, reporting, retrieving

1:36.4

files, and the like. So it's certainly possibly dangerous malware. Whether or not this was

1:43.2

actually used in attack or is really sort of

1:45.6

a proof of concept, of course, is open at this point. And in vulnerabilities, we have a little bit

1:51.4

an odd vulnerability to start out with. It's not very severe, but I still decide to include it

1:59.1

because it's interesting how the vulnerability is being exploited

2:02.7

and also it affects SSH, which of course is a very widely used tool for secure remote access.

2:11.6

The problem with this vulnerability is the proxy command directive in SSH.

2:23.3

The intent of the proxy command directive is to, well, execute code before the connection is established.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.