SANS Internet Storm Center - SANS.edu - Go Sentinels!

isc.sans.edu - Global Network Security Information Sharing Community - honeypots, firewall logs, malware. SANS Technology Institute college research project

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-13

ISC Diary: ClickFix Attacks Still Using the Finger isc.sans.edu/diary/32566

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-12

Apple Patches Everything: December 2025 Edition isc.sans.edu/diary/32564

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-12

Abusing DLLs EntryPoint for the Fun isc.sans.edu/diary/32562

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-12

SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
isc.sans.edu/podcastdetail/9736

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-11

Using AI Gemma 3 Locally with a Single CPU isc.sans.edu/diary/32556

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-11

SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
isc.sans.edu/podcastdetail/9734

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-10

Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) isc.sans.edu/diary/32554

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-10

SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
isc.sans.edu/podcastdetail/9732

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-09

Microsoft Patch Tuesday December 2025 isc.sans.edu/diary/32550

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-09

SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory
isc.sans.edu/podcastdetail/9730

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-08

SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
isc.sans.edu/podcastdetail/9728

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-05

No surprise: We do see active hits of the React Vulnerability (CVE-2025-55182) against our honeypots.

The initial exploit attempts we are seeing originate from the following two IP addresses: 193.142.147.209 and 95.214.52.170. The payloads are either "ping -c 1 45.157.233.80" or "console.log('CVE-2025-55182-VULN')"

If you find an unpatched React app in your environment, you should assume that it has been compromised at this point. Also be careful with apps that may have pinned older versions fo React/Next.js

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-05

AutoIT3 Compiled Scripts Dropping Shellcodes isc.sans.edu/diary/32542

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-05

SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
isc.sans.edu/podcastdetail/9726

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-04

SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
isc.sans.edu/podcastdetail/9724

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-04

Nation-State Attack or Compromised Government? [Guest Diary] isc.sans.edu/diary/32536

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-03

Attempts to Bypass CDNs isc.sans.edu/diary/32532

SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-03

SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
isc.sans.edu/podcastdetail/9722

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-02

SANS Stormcast Tuesday, December 2nd, 2025: Analyzing ToolShell from Packets; Android Update; Long Game Malicious Browser Ext.
isc.sans.edu/podcastdetail/9720

image of sans internet stormcenter logo with stormcast flair
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2025-12-01

[Guest Diary] Hunting for SharePoint In-Memory ToolShell Payloads isc.sans.edu/diary/32524

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst