meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 April 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary


SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics
Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received network data.
https://isc.sans.edu/diary/SRUM-DUMP%20Version%203%3A%20Uncovering%20Malware%20Activity%20in%20Forensics/31896
Novel Universal Bypass For All Major LLMS
Hidden Layer discovered a new prompt injection technique that bypasses security constraints in large language models.
The technique uses an XML formatted prequel for a prompt, which appears to the LLM as a policy file. This Policy Puppetry can be used to rewrite some of the security policies configured for LLMs. Unlike other techniques, this technique works across multiple LLMs without changing the policy.
https://hiddenlayer.com/innovation-hub/novel-universal-bypass-for-all-major-llms/
CHOICEJACKING: Compromising Mobile Devices through Malicious Chargers like a Decade ago
The old Juice Jacking is back, at least if you do not run the latest version of Android or iOS. This issue may allow a malicious USB device, particularly a USB charger, to take control of a device connected to it.
https://pure.tugraz.at/ws/portalfiles/portal/89650227/Final_Paper_Usenix.pdf
SANS @RSA: https://www.sans.org/mlp/rsac/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 29th, 2025 edition of the Sands Inundit Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.1

And in diaries today, we got a new Python tool for a change, not from DDA, but from the Python master himself.

0:23.2

Mark Baggett.

0:24.4

Mark wrote SRUM dump, SRUMD the systems resource usage monitor.

0:31.4

That's the part of Windows that logs.

0:33.9

How much resources different software used for the last 30 days? And that's of course

0:39.0

really interesting in forensics and incident response because you can check, well, which

0:44.9

software was running when and did it use the network? How much data did it send? All of this

0:51.0

is in the system research usage monitor logs.

0:55.7

And well, that's exactly what this tool exports for you presents it in easy-to-use formats.

1:03.7

So if you are in that line of business, definitely take a look.

1:07.6

And the mark is always interesting feedback.

1:10.0

There's also a little run-through of the

1:11.9

tool and how to use it in sort of a simple case, kind of to give you an idea for how you could

1:17.5

apply this tool to any kind of investigation that you are performing. And then we got an interesting

1:24.6

new technique to perform a prompt injection in large language models.

1:30.3

This comes from hidden layer, and what they say is unique about their particular technique.

1:36.4

They call it policy puppetry is that it's fairly universal.

1:40.9

The same technique, the same style prompt can be used across multiple

1:45.2

LMs. They sort of tested all the big ones as part of their research. There have been

1:51.8

similar prompt injections for specific models, but as Hidden Layer points out, well,

...

Transcript will be available on the free plan in 24 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.