meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday Mar 5th: SMTP Credential Hunt; mac-robber.py update; ADSelfService Plus Account Takeover; Android Patch Day; PayPal Scams; VMWare Escape Fix

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 March 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Wednesday Mar 5th: SMTP Credential Hunt; mac-robber.py update; ADSelfService Plus Account Takeover; Android Patch Day; PayPal Scams; VMWare Escape Fix

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, March 5th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:09.3

My name is Johannes Ulrich, and today I'm recording from Baltimore, Maryland.

0:14.9

Now, in our first scene URLs list, I noticed an interesting pattern where we had a host that is scanning routinely

0:23.1

for the last month or so for lead credential files like your usual.

0:27.2

.env files and such.

0:29.0

They added some new files to their repertoire, SMTP underscore token.jason and a second

0:36.3

file that is SMTP underscore keys.

0:41.8

The problem of these files is that, well, they likely contain SMTP server credentials.

0:48.5

It's not half to ensure what particular application these files are associated with, but

0:53.9

Googling comes up with the Jansen project

0:57.6

that is actually sort of a set-off identity management components,

1:02.2

and part of their SMTP server configuration refers to these files.

1:08.5

Interesting, also a little bit sort of side note that this particular system that is

1:12.4

scanning for these files now is associated with a distillery in Romania. Haven't made contact

1:19.9

with them yet, but I assume it's just another compromise system and it's going after various

1:26.3

credential files for about a month now.

1:30.7

And Jim today posted a second diary. This diary is just a quick notice that Jim updated his tool

1:37.0

macrobber.py. This tool is a re-implementation of the Macrobber tool that comes with Slufkit, just in Python.

1:47.0

And the latest version that was actually released a couple of weeks ago does fix some issues with following Simlings.

1:55.0

I've got a couple of vulnerabilities to talk about, so let's start with Soho's ad self-service

2:03.5

plus this tool is important, well, because the ad here doesn't stand for advertisements,

2:08.8

but for Active Directory, it allows users to manage their identity.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.