meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 May 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


RAT Dropped By Two Layers of AutoIT Code
Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool
https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960
RVTools compromise confirmed
Robware.net, the site behind the popular tool RVTools now confirmed that it was compromised. The site is currently offline.
https://www.robware.net/readMore
Trojaned Version of Keepass used to install info stealer and Cobalt Strike beacon
A backdoored version of KeePass was used to trick victims into installing Cobalt Strike and other malware. In this case, Keepass itself was not compromised and the malicious version was advertised via search engine optimization tricks
https://labs.withsecure.com/publications/keepass-trojanised-in-advanced-malware-campaign
Procolored UV Printer Software Compromised
The official software offered by the makers of the Procolored UV printer has been compromised, and versions with malware were distributed for about half a year.
https://www.hackster.io/news/the-maker-s-toolbox-procolored-v11-pro-dto-uv-printer-review-680d491e17e3
https://www.gdatasoftware.com/blog/2025/05/38200-printer-infected-software-downloads

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, May 20th, 2025 edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich. And this episode brought you by the Sands IDU Graduate Certificate Program in Cybersecurity Leadership was recorded in Jacksonville, Florida.

0:25.9

In today's diary, we got Xavier taking apart a remote access tool.

0:31.6

This remote access tool starts out with scripts written in Auto-It.

0:34.3

This is something that keeps coming up.

0:39.0

It's not a new technique at all, but something I think that's often overlooked. Auto IT is a language designed to, well, rollout configurations, remote-managed machines,

0:45.6

and that's exactly what the bad guys take advantage of here. In particular, since these scripts

0:51.4

can also be compiled into self-contained executables, not requiring the victim

0:57.2

to already have auto-it installed. In the past, of course, we have seen a couple of examples

1:02.5

where the actor would also install auto-it on the system for the victim, but that's not the case here

1:10.5

with what Xavier saw.

1:13.0

It also enables some simple persistence by adding itself as a startup item, and then essentially

1:19.5

connects to a remote control server, some command control server that luckily is no longer

1:26.7

accessible.

1:28.1

From a defensive point of view, you probably don't want to outright block Auto IT

1:32.6

because it is a useful tool unless you're not using it in your environment.

1:38.5

And other than that, well, it comes back to downloading executables, letting users execute random executables.

1:45.7

Never a good idea.

1:47.8

And last week I talked about the unfortunate incident around RV tools, the VMware

1:54.1

Analysis Toolset, well, there was some confusion whether or not it was actually just

2:00.0

malicious version downloaded from some other random site or whether the actual RV Tools website was compromised.

2:08.8

We now got confirmation from rawfair.net, the entity behind RVTools, that yes, their website was compromised and the website is currently shut down.

2:22.7

Now, in different news, we have a similar incident around KeyPass, but in this case, it's not that

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.