meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 April 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


It's 2025, so why are malicious advertising URLs still going strong?
Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL.
https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%20advertising%20URLs%20still%20going%20strong%3F/31880
ChatGPT Fingerprinting Documents via Unicode
ChatGPT apparently started leaving fingerprints in texts, which it creates by adding invisible Unicode characters like non-breaking spaces.
https://www.rumidocs.com/newsroom/new-chatgpt-models-seem-to-leave-watermarks-on-text
Asus AI Cloud Security Advisory
Asus warns of a remote code execution vulnerability in its routers. The vulnerability is related to the AI Cloud feature. If your router is EoL, disabling the feature will mitigate the vulnerability
https://www.asus.com/content/asus-product-security-advisory/
PyTorch Vulnerability
PyTorch fixed a remote code execution vulnerability exploitable if a malicious model was loaded. This issue was exploitable even with the weight_only=True" setting selected
https://github.com/pytorch/pytorch/security/advisories/GHSA-53q9-r3pm-6pq6

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 22nd, 2025 edition of the Sands Island Storm Center's Stormcast.

0:09.9

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.6

And no, I won't mention it every single episode going forward, but remember, Sands Fire, July 14th through July 19th and to register just

0:25.3

sansfire.us. Well, in today's diaries, Jan is writing about his favorite topic fishing and

0:32.6

in part, well, why is it still so easy? In the particular case that Jan is presenting here,

0:39.9

it's a very straightforward fishing attack.

0:43.4

It implements one of those webmail forms

0:47.0

that we see very often being used to fish email credentials,

0:51.3

and then, well, it's advertised.

0:53.9

We are sort of a simple email failure notice. Again,

0:57.5

a very common scheme being used to lure users in clicking on fishing links. However, it's then

1:04.7

being directed to a dynamic IP address. Essentially, it uses one of those dynamic IP forwarding systems to

1:13.4

host this particular website. It is forwarded to this dynamic IP by Google's own

1:21.0

double-click.net system. And that's sort of really where Jan has an issue with Google, making it just too easy

1:29.8

for attackers. This particular site has been flagged for about a week now by VirusTotal, which also

1:37.3

is run by Google. So the data is certainly there to prove that this is not a good site to direct users to.

1:46.1

Well, I guess you can also do the same thing yourself, block doubleclick.net.

1:52.2

I've been actually doing this for a while, sort of a very simple ad blocker as well, and it seems to be working well.

1:59.8

Of course, it will break some real ads that you may be

2:03.2

interested in, but you can always go to the company's website directly. And then if everybody

2:09.0

taking currently a writing class in college could just skip for a minute, the next story is about

2:16.0

chat GPT and rummyami docs.com. They discovered that chat

...

Transcript will be available on the free plan in 17 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.