meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday Mar 11th: Shellcode as UUIDs; Moxe Switch Vuln Updates; Opentext Vuln; Livewire Volt Vuln;

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 March 2025

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Tuesday Mar 11th: Shellcode as UUIDs; Moxe Switch Vuln Updates; Opentext Vuln; Livewire Volt Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, March 11th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:09.3

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.4

Well, Xavier went out and went Malware hunting again, and one of his malvers safaris he came across another odd

0:22.7

API calls that's just one of the tricks that excati often uses looking for odd API calls

0:28.6

the odd API call here was a Windows API call UID from string A so what it does is it takes a UUID, a universal unique identifier.

0:41.1

These are these long 128-bit identifiers.

0:46.4

And then it takes that string and converts in its binary format.

0:50.3

In this case, it was actually used to encode Malver.

0:55.4

So the Malver was encoded in UUID strings, 16 bytes or 128 bits at a time.

1:02.9

It was transmitted to the victim in this format and then decoded into its original binary form using this Windows API call, but the actual

1:14.3

script was written in Python. Turned out to be a Cobalt Strike beacon, but overall, still

1:22.1

important to know that yes, attackers can use these creative API calls to encode malware in various formats.

1:31.4

And apparently, according to Xavier, the Lazarus group, the North Korean group,

1:36.3

often going after crypto coin, well, has been known to use this particular trick in the past.

1:43.9

Let me have a little bit an interesting, tricky vulnerability.

1:46.2

I mainly want to cover it because it's a little bit confusing here.

1:50.8

It's a vulnerability in Moxa switches.

1:54.3

Moxa makes switches for factory environments,

1:58.2

so a lot of them are used in ICS and OT networks.

2:02.9

The problem here is that this particular vulnerability, which they call a front-end authorization

2:10.0

logic disclosure vulnerability that can be used to bypass authentication and gain admin

2:16.8

access to the switch.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.