SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsMicrosoft has addressed a "zero-click" attack chain in which Microsoft 365 (M365) Copilot's Retrieval-Augmented Generation (RAG) chatbot receives malicious instructions disguised as a typical email, causing it to "automatically exfiltrate sensitive and proprietary information from M365 Copilot context, without the user's awareness, or relying on any specific victim behavior." CVE-2025-32711, CVSS score 9.3, bypasses cross-prompt injection attack (XPIA) classifiers, external link redaction, Content-Security-Policy, and M365 Copilot's reference mentions. Aim Labs, who discovered this vulnerability (dubbed "EchoLeak"), state that while no exploitation in the wild has been observed, the relevant "general design flaws" of RAG-based AI may mean more applications are vulnerable. The researchers contend that "protecting AI applications requires introducing finer levels of granularity into current frameworks;" while the attack might be understood as Indirect Prompt Injection, Aim coins "LLM Scope Violation" to describe instructions that "make the LLM attend to trusted data in the model's context, without the user's explicit consent."
Neely; NB June 13, 2025; Microsoft 365 Copilot Prompt Injection Attack PatchedMicrosoft has patched the flaw, and no user action is required to address the issue. The flaw is leveraging Microsoft Graph to answer a query which is using data from their mailbox, OneDrive, SharePoint, Office Files and MS Teams. It's the Microsoft Graph interface which allows exfiltration of the otherwise organizationally private data.
Frost; NB June 13, 2025; Microsoft 365 Copilot Prompt Injection Attack PatchedThese retrieval bugs are really fascinating, as any GenAI that uses any type of document ingestion or web scraping feature can be prone to having issues between what is designed to be data to be ingested versus new prompt commands. These confusion bugs are common in many traditional web bugs where the system cannot determine the difference between data and code.
Pescatore; NB June 13, 2025; Microsoft 365 Copilot Prompt Injection Attack PatchedThis is another warning that AI applications are complex, immature and, from a security perspective, present serious risks to data security requiring remediation until those 'finer levels of granularity' are routinely built in.
Murray; NB June 13, 2025; Microsoft 365 Copilot Prompt Injection Attack PatchedOne more instance in which features, functions, and 'early-to-market' trump secure by design. We can expect it to get worse as software becomes ever more complex.
Aim Labs
Microsoft
SC Media
The Hacker News
Bleeping Computer
Salesforce has patched five zero-day flaws in OmniStudio before Spring '25/version 254, and has categorized 15 more flaws as risky "misconfigurations" that must be addressed by users, all of which were reported by Aaron Costello, Chief of Saas Security Research at AppOmni. Two zero days "require manual action to be taken by the customer in order to be remediated ... likely due to potential business impact:" CVE-2025-43967 exposes encrypted data in cleartext due to improper preservation of permissions in the DataMapper component; CVE-2025-43698 allows an attacker to bypass field level security controls for Salesforce objects due to improper preservation of permissions in the FlexCards component. The remaining three flaws have been patched via auto-update and are all improper preservation of permissions vulnerabilities affecting the FlexCards component: CVE-2025-43699 allows an attacker to bypass field level security controls for OmniUICard objects; CVE-2025-43700 exposes encrypted data in plaintext; and CVE-2025-43701 exposes Custom Settings data. Costello stresses the seriousness of risk from seemingly minor misconfigurations in Salesforce's low code platform, especially for organizations with compliance obligations such as HIPAA, GDPR, SOX, or PCI-DSS: "In industries where data sensitivity is high, [settings'] usability needs to be rebalanced with security rigor. [...] Apply the same scrutiny to industry cloud components that you would to any production code. Test, audit, and configure defensively."
Frost; NB June 13, 2025; Salesforce Data at Risk from Misconfigurations'Low Code' systems have been the rage for quite a bit of time, especially now with the advent of GenAI systems. These systems, however, do generate quite a bit of code, and as was disclosed in this disclosure, there was plenty of attack surface in these systems. If you're looking to use these, I suspect they have not been thoroughly audited, and you should probably give these a look.
Pescatore; NB June 13, 2025; Salesforce Data at Risk from MisconfigurationsData safety, like physical safety, requires built-in 'interlocks' to prevent users/admins from selecting unsafe combinations of settings and parameters. Essentially, a form of setting 'fuzz testing' is needed before release for apps that will handle sensitive data.
Neely; NB June 13, 2025; Salesforce Data at Risk from MisconfigurationsWith cloud-based services we're reminded that security of the configuration is paramount. It's easy to be lulled into thinking the provider handles everything; they generally don't. Make sure that you know the consequence of loss and protection requirements for the data you're processing in that environment to ensure you implement the appropriate security controls. Then, make sure that you review the baseline regularly to ensure all previous and new protections are implemented. If you're a SalesForce shop, review your field level and components' permissions, verify you're applying regular updates, and make sure you are using private, not public, caching mechanisms to protect user data.
AppOmni
The Register
The Hacker News
SecurityWeek
SC Media
On Tuesday, June 10, Microsoft released updates to address nearly 70 vulnerabilities in multiple products. One of the flaws (CVE-2025-33053), an important-severity remote code execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV), is being actively exploited. A second flaw (CVE-2025-33073), a Windows SMB client privilege elevation vulnerability, was previously disclosed. Also on June 10, Adobe released updates to address more than 250 vulnerabilities, 225 of which affect Adobe Experience Manager (AEM). There are also updates for Adobe Acrobat Reader, Adobe Commerce, Adobe InDesign, Adobe InCopy, Adobe Substance 3D Sampler, and Adobe Substance 3D Painter.
Neely; NB June 13, 2025; Patch Tuesday: Microsoft and AdobeMake sure you're not forgetting to update your Adobe suite; CC users are likely being prompted, but you probably have standalone installs of reader you need to verify. Check for older Adobe products, like Reader 2020, to see if they can either be removed or upgraded to the current versions. Note that the AEM Cloud service is automatically updated; you're going to have to update your on-premises version yourself, for now. There are no reported exploits, but don't bank on that remaining unchanged.
MUrray; NB June 13, 2025; Patch Tuesday: Microsoft and AdobeWe cannot patch our way to security. Patching is not timely or efficient. We need secure development tools and procedures that result in essential quality early.
Frost; NB June 13, 2025; Patch Tuesday: Microsoft and AdobeWebDAV, a Critical SMB Vulnerability, and a Word RCE. What decade is this again?
ISC SANS
Krebs on Security
The Hacker News
The Hacker News
Adobe
Google and Mozilla have both published security advisories disclosing high-severity memory bugs in their browsers, two each, now patched in Chrome 137.0.7151.103/.104 for Windows and macOS, Chrome 137.0.7151.103 for Linux, and Firefox 139.0.4. CVE-2025-5958 allows a remote attacker to use a crafted HTML page to exploit heap corruption due to a use-after-free flaw in Media in Google Chrome; a researcher from the Ant Group Light-Year Security Lab reportedly received an $8,000 bounty for notifying Google of this flaw. CVE-2025-5959 allows a remote attacker to use a crafted HTML page to execute arbitrary code inside a sandbox due to a type confusion flaw in V8 in Google Chrome. CVE-2025-49709 could lead to memory corruption via certain canvas graphics rendering operations in Firefox. CVE-2025-49710 is an integer overflow in 'OrderedHashTable" used by Firefox's JavaScript engine. NVD CVSS scores have not been assigned, but all four flaws are judged by their respective companies to be high severity.
Murray; NB June 13, 2025; Chrome and Firefox Patch High-Severity FlawsThese vulnerabilities put all users and uses at risk. The use of browsers should be restricted to browsing. Prefer purpose built clients for sensitive applications.
Dukes; NB June 13, 2025; Chrome and Firefox Patch High-Severity FlawsFirst, kudos to Google for investing in a bug bounty program. It's proven itself repeatedly these past few years. Second, both Google and Mozilla make it easy to update to the latest version of their browser. Just close and restart your browser. In fact, get into the habit of restarting your browser daily, it's an excellent security best practice.
Chrome Releases
Mozilla
SecurityWeek
ConnectWise is rotating the code signing certificates for ScreenConnect, ConnectWise Automate, and ConnectWise RMM "due to concerns raised by a third-party researcher about how ScreenConnect handled certain configuration data in earlier versions." The company is also releasing an update "to improve how this configuration data is managed in ScreenConnect." The on-premises builds for both Automate and ScreenConnect are available; on-premises customers are advised to ensure that they've updated to the latest build by Friday, June 13, 2025, at 8:00 p.m. ET (June 14, 12:00 a.m. UTC) "to avoid disruptions or degraded experience." ConnectWise is in the process of updating certificates and agents for cloud instances. The certificate rotation is unrelated to the nation-state cyberattack ConnectWise experienced in May of this year.
Bleeping Computer
DarkReading
The Hacker News
ConnectWise
During the first four months of 2025, INTERPOL coordinated Operation Secure, which took down more than 20,000 malicious IP addresses and domains related to information stealers. Law enforcement agencies from 26 countries in Asia and Oceania worked to locate servers, map physical networks and execute targeted takedowns." Private sector firms Group-IB, Kaspersky, and Trend Micro also contributed by helping compile Cyber Activity Reports. In all, authorities seized 41 servers and 100 GB of data, making 32 arrests. They also notified more than 216,000 people that their data were compromised, urging them to change passwords, freeze accounts, and remove unauthorized access to accounts.
Neely; NB June 13, 2025; Interpol Coordinated Operation to Take Down Infostealer Malware InfrastructureOperation Secure discovered 69 infostealer variants including Lumma, Risepro, and Meta Stealer. The identified infrastructure included 117 C2 servers spread across 89 internet service providers. The information stolen included credentials, cookies, credit card details and cryptocurrency account data. Make sure you know how to update those credentials, that you've enabled MFA where available, and that you know who (and what) has access to your online accounts, particularly financial/banking services.
Frost; NB June 13, 2025; Interpol Coordinated Operation to Take Down Infostealer Malware InfrastructureI think our industry downplays InfoStealers, as quite honestly these things are probably just as bad if not worse than other types of malware. With 100GB of InfoStealer logs being reported, that is a lot of data.
Dukes; NB June 13, 2025; Interpol Coordinated Operation to Take Down Infostealer Malware InfrastructureSome eye-popping figures posted as part of Operation Secure, and it only took four months. Kudos to team Law Enforcement. That said, cyber-crime still pays handsomely, so expect the infrastructure to be rebuilt and operational soon. Until then, hopefully everyone can enjoy the slowdown in phishing, smishing, and vishing attacks delivered daily to their inbox.
MUrray; NB June 13, 2025; Interpol Coordinated Operation to Take Down Infostealer Malware InfrastructureWe may never get the cost of attack greater than the value of success but this is a big step in the right direction.
Interpol
The Record
Cyberscoop
SecurityWeek
Help Net Security
The Register
The Texas Department of Transportation (TxDOT) has published a press release and sample notification letter disclosing a data breach of the state's Crash Records Information System (CRIS) that took place on May 12, 2025. TxDOT disabled access to the compromised system account employed in the attack, but discovered that an unauthorized user had downloaded nearly 300,000 crash reports, containing personal information including "first and last name, mailing and/or physical address, driver's license number, license plate number, vehicle make and model, car insurance policy number," as well as information about injuries sustained and narratives of crashes. TxDOT says they are implementing preventative security measures to protect against future attacks. The notice does not specify the nature or scope of the attack, and notes that TxDOT is sending letters to notify affected individuals despite not being required by law to do so. The letters urge wariness with communications mentioning crash information or requesting personal information, recommending that those affected monitor and/or freeze credit and request a credit report fraud alert.
Dukes; NB June 13, 2025; Texas DOT Crash Records StolenThe annus horribilis for Texas continues. Seems like a serious review is in order by the TX CIO and CISO on how systems are secured within the state. Sure, credentials get can be compromised. That's why we have multi-factor authentication (MFA). Another interesting tidbit is that a user (TX employee) can download all records (300K). Seems like a bit more granularity in protecting citizens data would be in order as well.
Neely; NB June 13, 2025; Texas DOT Crash Records StolenTxDOT's notice to affected users advises them to be careful of emails, texts or calls related to past crashes, and they have established a dedicated call line for victims with questions. Not a bad time to remind users to verify contact from law enforcement as many phishing scams rely on people accepting that contact as genuine.
TxDOT
The Record
Bleeping Computer
The Register
South Korea's Yes24, a platform that sells books as well as tickets to concerts, plays, and other events, has been experiencing an outage due to a ransomware attack since Monday, June 9. There are reports of events being postponed or cancelled. The company hopes to have service restored by Sunday, June 15. The incident is being investigated by the Personal Information Protection Commission, South Korea's data privacy watchdog. Yes24 was not immediately forthcoming with information in the wake of the attack. While they notified the Korea Internet & Security Agency on Monday afternoon, they initially publicly described the platform's outage as being due to system maintenance; the disclosure that it was because of a ransomware attack was made on Tuesday, June 10. On Thursday, June 12, Yes24 said it would notify people if their personal data were compromised in the attack.
Dukes; NB June 13, 2025; South Korean Ticketing Bookselling Platform Suffers Outage Due to Ransomware AttackCompanies find interesting and sometimes unique ways to hide the fact of a security incident. Most likely they're guided by their legal team. In this case the use of the term 'system maintenance.' Yes, they are likely performing system maintenance but is that maintenance routine or the result of a security incident? We now know it's the latter.
After major operational disruptions and a data breach from a cyberattack in late April 2025, suspected but not confirmed to have been ransomware, UK retailer Marks & Spencer (M&S) has announced that customers in England, Scotland and Wales may now place online delivery orders for certain "best selling" items, with service to Northern Ireland still forthcoming. Only standard shipping is available, and shipping times have increased from before the attack. "Click & Collect" service remains unavailable. In May 2025, M&S estimated in a statement to the London Stock Exchange that profit losses as a result of the attack could amount to £300M (US$400M).
Neely; NB June 13, 2025; Marks & Spencer Resumes Domestic Online OrderingM&S is closing in on full-service restoration. If you're a M&S online user, be aware of the limits in both selection and delivery for online shopping: it's clothing and footwear right now, beauty and homeware targeted next week. Even so, many items are still reporting out of stock, so be patient.
Denmark's Minister of Digitization has announced that the Ministry will move from Windows to Linux, switching their systems from Microsoft Office 365 to LibreOffice. Half the Ministry's employees will make the shift this summer; if all goes well, the remaining half will follow by this autumn. The shift is driven by the country's "digital sovereignty" digitization strategy, which calls for taking control of their own digital infrastructure, in part through a reduction in dependence on foreign tech providers. Two Danish cities -- Copenhagen, the country's capital, and Aarhus, the country's second-largest municipality -- recently announced their intentions to move away from Microsoft software and cloud services.
Frost; NB June 13, 2025; Denmark Intends to Move from Office 365 to LibreOfficeBy now LibreOffice is probably good enough for standard office documents. If someone in the ministry is an Excel power user, you may find LibreOffice lacking. We have seen a few governments attempt this, specifically in Germany, it's not been generally successful. To be frank it has less to do with Linux itself and more to do with the Desktop Environments provided. Another one to watch for sure.
Dukes; NB June 13, 2025; Denmark Intends to Move from Office 365 to LibreOfficeProtection of a country's data (aka, digital sovereignty) is an important mandate in Europe and will continue to be. That said, there are some serious technical and fiscal challenges in getting off a private sector cloud and use of commercial IT applications. When it comes to cloud infrastructure, there arenÕt a lot of options without a lot of fiscal investment. Even open-source software comes at a cost that tends to grow over time. And what's next, the building of chip fab's and manufacturing of endpoint devices? Perhaps it's time to move away from the political soundbite and entertain other strategies to enforce the EU mandate.
SANS Internet Storm Center StormCast Friday, June 13, 2025
Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln
https://isc.sans.edu/podcastdetail/9492
Automated Tools to Assist with DShield Honeypot Investigations
EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak
Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot users. Copilot mishandled instructions an attacker included in documents inspected by Copilot and executed them.
https://www.aim.security/lp/aim-labs-echoleak-blogpost
Thunderbolt Vulnerability
Thunderbolt users may be tricked into downloading arbitrary files if an email includes a mailbox:/// URL.
https://www.mozilla.org/en-US/security/advisories/mfsa2025-49/
SANS Internet Storm Center StormCast Thursday, June 12, 2025
Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; ConnectWise Signing Keys; KDE Telnet code exec
https://isc.sans.edu/podcastdetail/9490
Quasar RAT Delivered Through Bat Files
Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT.
https://isc.sans.edu/diary/Quasar+RAT+Delivered+Through+Bat+Files/32036
Delayed Windows 11 24H2 Rollout
Microsoft slightly throttled the rollout of windows 11 24H2 due to issues stemming from the patch Tuesday fixes.
https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3570
An In-Depth Analysis of CVE-2025-33073
Patch Tuesday fixed an already exploited SMB client vulnerability. A blog by Synacktiv explains the nature of the issue and how to exploit it.
ConnectWise Rotating Signing Certificates
ConnectWise is rotating signing certificates after a recent compromise, and will release a new version of its Screen share software soon to harden its configuration.
https://www.connectwise.com/company/trust/advisories
KDE Telnet URL Vulnerability
The Konsole delivered as part of KDE may be abused to execute arbitrary code via ÒtelnetÓ URLs.
https://kde.org/info/security/advisory-20250609-1.txt
SANS Internet Storm Center StormCast Wednesday, June 11, 2025
Microsoft Patch Tuesday; Acrobat Patches
https://isc.sans.edu/podcastdetail/9488
Microsoft Patch Tuesday
Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today.
https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+June+2025/32032
Adobe Vulnerabilities
Adobe released patches for 7 different applications. Two significant ones are Adobe Commerce and Adobe Acrobat Reader. All vulnerabilities patched for Adobe Commerce can only be exploited by an authenticated user. The Adobe Acrobat Reader vulnerabilities are exploited by a user opening a crafted PDF, and the exploit may execute arbitrary code.
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveShort description of the section to provide users context and value of the content being featured in this carousel.
Power. Water. Energy. Critical sectors are under siege. Join experts from E-ISAC, WaterISAC, and leading utility providers to learn how they're securing OT/ICS systems, building cyber resilience, and navigating evolving regulations. New forum. Big stakes. Real-world answers.
<p>SANS 2025 ICS Survey | Calling all ICS and OT cybersecurity professionals: the SANS 2025 ICS Survey needs your perspective. Help us uncover the latest trends, challenges, and priorities in securing critical infrastructure. Your input makes the difference. We are collecting real feedback from real practitioners and you could win one of four Amazon gift cards for participating. <a href="https://www.sans.org/info/232795" target="_self">https://www.sans.org/info/232795</a></p>
<p>Webcast | Multicloud Survey Results + Panel Insights | Friday, August 22 at 1:00 PM ET How do your cloud defenses stack up? Get the exclusive first look at the 2025 Multicloud Security Survey results. Our experts break down what's working, where orgs are falling short, and what it takes to secure complex, multi-cloud environments. Real data. Real analysis. Real strategy. Save your seat: <a href="https://www.sans.org/info/232785" target="_self">https://www.sans.org/info/232785</a></p>
<p>Webcast | Adopting an Offensive Security Posture | Wednesday, August 20 at 1:00 PM ET Stop waiting for threats start hunting them. Learn how to shift your mindset and strategy toward proactive defense with best practices in threat emulation, attack surface management, and red teaming. Turn your SOC from reactive to ready. Register now: <a href="https://www.sans.org/info/232790" target="_self">https://www.sans.org/info/232790</a></p>