Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, April 25, 2025

SMS Gateway Scans; Commvault Exploit; Patch Window Shrinkage; More inetpub issues

https://isc.sans.edu/podcastdetail/9424

Attacks against Teltonika Networks SMS Gateways

Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords.

https://isc.sans.edu/diary/Attacks+against+Teltonika+Networks+SMS+Gateways/31888

Commvault Vulnerability CVE-2205-34028

Commvault, about a week ago, published an advisory and a fix for a vulnerability in its backup software. watchTowr now released a detailed writeup and exploit for the vulnerability

https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/

Exploitation Trends Q1 2025

Vulncheck published a summary of exploitation trends, pointing out that about a quarter of vulnerabilities are exploited a day after a patch is made available.

https://vulncheck.com/blog/exploitation-trends-q1-2025

inetpub directory issues

The inetpub directory introduced by Microsoft in its April patch may lead to a denial of service against applying patches on Windows if an attacker can create a junction for that location pointing to an existing system binary like Notepad.

https://doublepulsar.com/microsofts-patch-for-cve-2025-21204-symlink-vulnerability-introduces-another-symlink-vulnerability-9ea085537741

SANS Internet Storm Center StormCast Thursday, April 24, 2025

Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco

https://isc.sans.edu/podcastdetail/9422

Honeypot Iptables Maintenance and DShield-SIEM Logging

In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes

https://isc.sans.edu/diary/Honeypot+Iptables+Maintenance+and+DShieldSIEM+Logging/31876

XRPL.js Compromised

An unknown actor was able to push malicious updates of the XRPL.js library to NPM. The library is officially recommended for writing Riple (RPL) cryptocurrency code. The malicious library exfiltrated secret keys to the attacker

https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor

https://github.com/XRPLF/xrpl.js/security/advisories/GHSA-33qr-m49q-rxfx

Cisco Equipment Affected by Erlang/OTP SSH Vulnerability

Cisco published an advisory explaining which of its products are affected by the critical Erlang/OTP SSH library vulnerability

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy

SANS Internet Storm Center StormCast Wednesday, April 23, 2025

More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed

https://isc.sans.edu/podcastdetail/9420

xorsearch.py: Ad Hoc YARA Rules

Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches

https://isc.sans.edu/diary/xorsearchpy+Ad+Hoc+YARA+Rules/31856

Google Spoofed via DKIM Replay Attack

DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google.

https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/

SSL.com E-Mail Validation Bug

SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers.

https://bugzilla.mozilla.org/show_bug.cgi?id=1961406

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive
NewsBites: April 25, 2025 Volume XXVII Issue 32 | SANS Institute