Handler on Duty: Xavier Mertens
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday April 15th: xorsearch Update; Short Lived Certificates; New USB Malware
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9408.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
xorsearch Update
Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions.
https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854
Shorter Lived Certificates
The CA/Brower Forum passed an update to reduce the maximum livetime of
certificates. The reduction will be implemented over the next four years. EFF also released an update to certbot introducing profiles that can be used to request shorter lived certificates.
https://www.eff.org/deeplinks/2025/04/certbot-40-long-live-short-lived-certs
https://groups.google.com/a/groups.cabforum.org/g/servercert-wg/c/bvWh5RN6tYI
New Malware Harvesting Data from USB drives and infecting them.
Kaspersky is reporting that they identified new malware that not only harvests data from USB drives, but also spread via USB drives by replacing existing documents with malicious files.
https://securelist.com/goffee-apt-new-attacks/116139/
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, April 15th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Orlando, Florida. Well, I think it was only a week ago that Diddy promised to expand his tool xorsearch with the ability to actually search for regular expressions. This promise has now been fulfilled. Actually, there's more to it. The original xorsearch was a compiled executable. The new one is now a Python script, typical for Diddy, of course. And with that comes the ability to not just specify regular expressions, but actually Yara rules that you can use to search the result file for various strings. And Yara supports regular expressions. So with that also comes regular expression support. Pretty neat update to the tool. Let Didier know if you like it. And of course, there are plenty of examples how to use the tool, what the different output formats are for the strings that you are finding in Didier's diary today. And we have more news for users of TLS certificates. The Certificate Authority Browser Forum finally finalized their decision on shortening certificate lifetimes. First of all, it'll start with reducing the certificate lifetime to 200 days. That'll start on March 15th next year. Next, we'll have again March 15th, 2027. It'll go down 200 days. And finally, March 15th, 2029. It'll go down all the way to 47 days. In order to support that, of course, you will need better automation. Certbot or the Electronic Frontier Foundation actually also just released Certbot 4.0, which also is supporting shorter certificate lifetimes. What they introduce now is profiles. And the way this works is currently you do have the option to use the standard profile, which is basically the way it already works with 90-day certificate lifetimes via Let's Encrypt. And then you also have more short-timed certificates that are going down to six days. So the way you select this is after you install Certbot 4.0 is that you basically specify which profile you would like to use. And then you get either the longer 90-day certificates or the shorter six-day certificates. The default will remain 90 days for Certbot. And of course, most users will continue to use whatever Certbot version that comes with your operating system, with your Unix distribution. And that is usually an older one. I just checked the recent Ubuntu version actually uses Certbot 2.7. And Kaspersky has a write-up about some new malware that they discovered they attribute to a threat actor that they're calling GOFFEE. Given Kaspersky's line of business, this particular malware was found to target organizations in Russia. What's sort of interesting here is not the initial infection vector. That's pretty straightforward and kind of old stuff. It's a malicious PDF document or Word document that then activates a downloader. And after it's finished doing so, it will actually unload a benign document in order to fool the user into believing that they opened the document they believed to want to have opened. What's interesting about it is how it's targeting removable devices. It not only copies files from removable devices inserted into an infected system, but it will then also attempt to copy itself to the removable device. And the way it sort of tricks a victim into executing the malware is by essentially replacing an existing document on the removable device with the malware. And then just basically renaming the original document. Once the malware is started, the device then is restored and the original document flipped back and opened. So again, the user doesn't necessarily see anything wrong here. They thought they opened the document that they had on the device before. And well, that document appears to open. What they don't notice is that the malware is also being executed. Interesting trick here. And definitely there seems to be a little bit of a resurgence in USB devices spreading malware. There have also been some other sort of nation state style attacks that I've seen reports about lately. Where basically just USB sticks were dropped outside of government buildings. Well, and this is it for today. So if you like this podcast, please, of course, subscribe and recommend it to others. And well, if you're here in Orlando, say hi. And like I said, I do have some stickers still left with me. Bye.