
SANS Stormcast Monday, March 2nd, 2026: Reversing Fake Fedex; Abusing .ARPA; MSFT Authenticator Update; Apex One Vuln; Special AirSnitch Webcast
Loading summary
A
Hello and welcome to the Monday, March 2, 20206 edition of the sans Internet storm centers Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida and this episode is brought to you by the SANS EDU Undergraduate Certificate Program in Applied Cybersecurity. In diaries this weekend we had one by Xavier about, Well, a fake FedEx email. The problem with these FedEx FedEx emails are to many of us they're kind of old news and it's easy to recognize. But think about it from perspective. And that's sort of how I've seen these emails work of someone that receives a lot of or reasonable number of these FedEx emails. They're dealing a lot with shipping. They're sort of a little bit desensitized to that and then maybe tricked like in this case to opening an attachment that is actually a 7 zip file. Xavier walks you through the analysis of this particular malicious email. Starts out with a simple batch file and also usual sort of persistent mechanisms, then encoded PowerShell script. In the end, it's actually an as encrypted script. Of course, the credentials here, keys and IVs are in the binary, so in that zip file. So definitely something that you can then extract in order to decrypt it. And that's sort of what Xavier walks you through here. The decryption part is probably sort of more interesting and dangerous part in some ways too, because in this case, like the easiest way to do it is just run the PowerShell script, but then put the right breakpoints in place so it really just decrypts it and doesn't actually execute it. And the next stage, which in this case, well, turns out to be a script called donutloader, it's of a basic malware loader that in this particular case does then load and execute xWarm. Just one note here, with all of these emails, the virus total rates are usually not that great because the exact hashes and such are not necessarily already recognized. But there are often some simpler things to look for, like here, for example, outbound connections in the 7,000 range. It's a port number of 7,030 here. I think that's probably a better signature, if you want to call it that way, than looking for specific hashes and the like that would identify this malware. Now, talking about phishing campaigns, Infoblox has the blog post outlining an interesting twist to how domains are being used for phishing campaigns. Of course, that's sort of one of the tricky things you have to come up with the lookalike domain name or something like that in order to then basically direct victims to your particular website. Now in this case they're not actually using lookalike domains. Instead they're using domains within the ARPA top level domains. And you probably have seen ARPA like IP6RPA, that's what they're using here. That is being used to reverse resolve IPv6 addresses. But what they're doing here is they're first going to Hurricane Electric. Hurricane Electric, not sure if you're familiar with it. They have a very nice and well performing service where you can get IPv6 address space for free and the necessary tunnels in order to use that address space. And they also allow you to basically then register your own reverse resolution using the respective IP6ARPA domain. Now that domain really behaves like any other domain. So what you can do now is you can then once you are basically now once this domain is delegated to you and you are able to set up a name server for it, you just point it to the cloudflare name server. Since you own that particular subdomain, you're able then to get TLS certificates for it and well use it just like any other domain name. What they often do in this case is like have a random letter prefix. Personally I would actually use that for example to impersonate another site, but that's not really what they're after in this case. And then they sort of have a basic simple free infrastructure in order to bootstrap their phishing site. This of course is also intended to sort of fly below the radar because a lot of these ARPA DNS lookups are kind of overlooked, not really analyzed very closely because they're often used for reverse lookups. In this case you should see an a record lookup for, or an A6 or a quad A record lookup for these domains. So that may be a little bit more an indicator here that something is wrong. It's not a pointer lookup for that particular ARPA domain, but either way, yes, it works and yes it's being used. So double check your DNS logs. And again, this comes from Infoblox. And a quick note, in case you didn't have that sort of on your radar. But if you're relying on the Microsoft Authenticator application, it will no longer work on rooted Android devices. On jailbroken iOS devices, it'll stop working in April. They originally thought about basically also breaking them in March, but they push that back for some reason. So you'll have a little bit more time if you're using iOS, but Android already shouldn't be working if the device is rooted. The reasoning behind this is that if you have a rooted or jailbroken device, then of course there's always a chance that someone is messing with the application because some of the security guardrails around sort of applications are weakened and then attacker could for example steal secrets or the like. So that's why they enforce that you can only run it on non jailbreaking, non rooted devices. And Trend Micro released a critical Update for its Apex1 application that affects the Windows and the Mac version. These are directory traversal vulnerabilities that can lead to remote code execution, so definitely keep them updated given that this is the type of application that you intend to be exposed to malicious software. So definitely get it updated. And then we also have a special webcast today on Monday. That webcast is about the Air Snitch vulnerability that I covered on Friday. It's being led by two of our greatest instructors here, Larry Pesky and James Lloyd Vidal, one of them doing a lot of our Wi Fi stuff, the other one a lot of the pen testing parts. So definitely some great content here. And it's running at 4:00pm Eastern, so that's about 10:10pm in Europe or 1:00pm in California. Well, that's it for today. Thanks for listening, thanks for liking. Thanks for subscribing to this podcast. The links to the special webcast also in the show notes and talk to you again tomorrow. Bye.
Host: Johannes B. Ullrich
Main Theme: Rapid-fire coverage of late-breaking cybersecurity news, focusing on new phishing techniques, vulnerabilities, and updates critical for practitioners to know as the week begins.
This episode delivers concise analyses of current security events worth watching, including:
Timestamps: 00:19–02:20
SANS Diary Analysis by Xavier:
Notable Quote:
“In this case, like the easiest way to do it is just run the PowerShell script, but then put the right breakpoints in place so it really just decrypts it and doesn’t actually execute it.” — Johannes B. Ullrich (01:17)
Timestamps: 02:21–04:07
Infoblox Report:
Notable Quote:
“So double check your DNS logs. And again, this comes from Infoblox.” — Johannes B. Ullrich (03:58)
Timestamps: 04:08–04:57
Key Change:
Reason:
Notable Quote:
“If you have a rooted or jailbroken device, then of course there’s always a chance that someone is messing with the application because some of the security guardrails around sort of applications are weakened…” — Johannes B. Ullrich (04:29)
Timestamps: 04:58–05:30
Timestamps: 05:31–06:13
“VirusTotal rates are usually not that great because the exact hashes...are not necessarily already recognized.” — Johannes B. Ullrich (02:05)
“A lot of these ARPA DNS lookups are kind of overlooked, not really analyzed very closely because they’re often used for reverse lookups.” — Johannes B. Ullrich (03:39)
Direct, technical, and focused, with a practical tone appropriate for security professionals who need actionable intelligence.