meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday Mar 19th 2025: Python DLL Side Loading; Tomcast RCE Correction; SAML Roulette; Windows Shortcut 0-Day

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 March 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Wednesday Mar 19th 2025: Python DLL Side Loading; Tomcast RCE Correction; SAML Roulette; Windows Shortcut 0-Day

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, March 19th, 2020,

0:04.3

edition of the Sands and it's Storm Center's Stormcast.

0:08.3

My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida.

0:13.5

Alixabier came across an interesting piece of Malware that he's sharing in today's diary.

0:20.2

The Malware itself arrives as a SIP archive.

0:23.5

Nothing really that special about it.

0:25.2

It's called Hootsweet.com.

0:27.4

Hootsweet, I'm not sure if they're still around.

0:29.5

What sort of a frontend for Twitter X.

0:33.1

They had some issues when their API pricing changed.

0:37.2

But either way, it's probably well enough known company

0:41.0

where some people may open that zip file.

0:44.5

Also, the zip file itself, at least at first,

0:46.9

doesn't appear to include anything malicious.

0:49.5

There is a legitimate PDF reader.

0:52.3

There is a PDF.

0:53.0

Now, Redcast's interesting is once you are starting

0:57.9

the PDF reader. The reason the attacker is sending you that PDF reader is because this PDF reader

1:03.6

is vulnerable to DLL side loading. If it loads a DLL file, a library, it will prefer the file in the local directory

1:14.3

over the one in the system directory.

1:18.0

And with that, it's easy to replace a system library with a malicious one.

1:23.6

That's exactly what's happening here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.