
SANS Stormcast Wednesday Mar 5th: SMTP Credential Hunt; mac-robber.py update; ADSelfService Plus Account Takeover; Android Patch Day; PayPal Scams; VMWare Escape Fix
Loading summary
A
Hello and welcome to the Wednesday, March 5, 2025 edition of the sans Internet stormcenters stormcast. My name is Johannes Ulrich and today I'm recording from Baltimore, Maryland. Now in our first seen URL's list I noticed an interesting pattern where we had a host that is scanning routinely for the last month or so for leak credential files like your usual env files and such. They added some new files to their repertoire smtpToken, JSON and a second file that is smtpkeys. The problem with these files is that while they likely contain SMTP server credentials, it's not 100% sure what particular application these files are associated with, but Googling comes up with with the Janssen project that is actually sort of a set of identity management components and part of their SMTP server configuration refers to these files. Interesting. Also a little bit sort of side note that this particular system that is scanning for these files now is associated with a distillery in Romania. Haven't made contact with them yet, but I assume it's just another compromised system and it's going after various credential files for about a month now. And Jim today posted a second diary. This diary is just a quick notice that Jim updated his tool Macrobber py. This tool is sort of a reimplementation of the Macrobber tool that comes with Sleuthkit just in Python and the latest version that was actually released a couple weeks ago does fix some issues with following symlinks and I've got a couple of vulnerabilities to talk about. So let's start with Soho's Ad Self service. Plus, this tool is important well because the ad here doesn't stand for advertisements, but for Active Directory it allows users to manage their identity and apparently they didn't get their sessions quite right. So that allows Nethacker to gain information about enrolled users without authentication. This vulnerability is mitigated if you have two factor authentication implemented, which kind of sounds like a good idea anyway for a tool like this. And of course there is now a patch available fixing this session handling vulnerability and Google yesterday had its Android patch day for March. It's significant so far as two of the vulnerabilities being patch tier approach escalation vulnerabilities, one of them in Framework, one of them in the kernel, have already been exploited in some limited targeted attacks. As these updates become available for your particular phone, you probably do want to apply them rather quickly. There are also a number of not yet exploited critical vulnerabilities, but I'm sure that people are pretty much already working on trying to find exploits for them right now. And malwarebytes is warning off an interesting new phishing and scam technique to impersonate PayPal. PayPal offers to merchants the no code checkout option. What this really means is that PayPal basically will create a checkout page for you that you're able to heavily customize, but the page itself is hosted within the paypal.com domain. So what attackers are doing here is that they are signing up for these no code checkout pages. They're creating now a page that doesn't really look like a checkout page, but instead offers, for example, PayPal support, phone numbers and such. Because you pretty much can add whatever content you would like to this page, which of course is branded by PayPal. You can. It's using the paypal.com domain and then they are advertising these pages via Google Ads. This makes it really difficult for a victim to figure out that this is not a legitimate PayPal page because, well, everything is really hosted on PayPal's website. It's just that the attacker added their own text to that particular page. Interesting scam. And I wouldn't be surprised if other similar services aren't vulnerable to this attack as well. And Broadcom released updates for VMware VCenter, fixing three different vulnerabilities with CBSS scores up to 9.3. The worst outcome here is VMware Escape. So if an attacker is able to take over one of your virtual machines, they own your infrastructure. And these vulnerabilities, according to Broadcom, are already being exploited. So you definitely must patch now. But then again, you probably shouldn't expose vcenter to the world. Well, your virtual machine, on the other hand, you probably can't help but to expose some content of them. And then one virtual machine that's vulnerable would then be used in order to again take over your infrastructure. So this is a super critical vulnerability. Well, that's it for today. So thanks again for listening and thanks again for any feedback received for all the good reviews. And if you haven't gotten around to it yet, please check the five stars, check the like or whatever in your particular podcast platform and talk to you again tomorrow. Bye.
Host: Johannes B. Ullrich
Location: Baltimore, Maryland
This episode delivers a concise rundown of the day's most pressing cybersecurity events, ranging from novel credential hunting tactics and tool updates, to several important vulnerabilities and emergent scam techniques. The focus is on actionable intelligence for security professionals, with timely advice on patching and vigilance against evolving threats.
Timestamp: 00:13 – 01:30
.env files) across the internet.
smtpToken.json and smtpkeys.“Interesting pattern... a host that is scanning routinely... for leak credential files... they added some new files to their repertoire: smtpToken.json and smtpkeys.”
— Johannes B. Ullrich [00:13]
“I assume it’s just another compromised system and it’s going after various credential files for about a month now.” — Johannes B. Ullrich [01:13]
Timestamp: 01:30 – 02:00
mac-robber.py, a reimplementation of the Sleuthkit utility.
Timestamp: 02:01 – 02:50
“This vulnerability is mitigated if you have two-factor authentication implemented, which kind of sounds like a good idea anyway for a tool like this.”
— Johannes B. Ullrich [02:30]
Timestamp: 02:51 – 03:40
“As these updates become available for your particular phone, you probably do want to apply them rather quickly.” — Johannes B. Ullrich [03:22]
Timestamp: 03:41 – 04:40
“It’s using the paypal.com domain and then they are advertising these pages via Google Ads. This makes it really difficult for a victim to figure out that this is not a legitimate PayPal page... Everything is really hosted on PayPal’s website; it’s just that the attacker added their own text to that particular page.” — Johannes B. Ullrich [04:23]
Timestamp: 04:41 – 05:25
“The worst outcome here is VMware Escape. So if an attacker is able to take over one of your virtual machines, they own your infrastructure.” — Johannes B. Ullrich [05:00]
On the expanding file scan threat:
“Googling comes up with the Janssen project that is actually sort of a set of identity management components and part of their SMTP server configuration refers to these files.”
— Johannes B. Ullrich [00:43]
On phishing innovation:
“I wouldn’t be surprised if other similar services aren’t vulnerable to this attack as well.”
— Johannes B. Ullrich [04:37]
On urgency of VMware patching:
“You definitely must patch now. But then again, you probably shouldn’t expose vcenter to the world.”
— Johannes B. Ullrich [05:15]
smtpToken.json and smtpkeysmac-robber.py tool for improved forensic artifact collection