Handler on Duty: Jan Kopriva
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, May 19th, 2026: New libssh in Malware; Exchange 0-Day; MSFT Authenticator Update
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9936.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
New Malware Libraries means New Signatures
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20%20New%20Malware%20Libraries%20means%20New%20Signatures/32986
Addressing Exchange Server May 2026 vulnerability CVE-2026-42897
https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498
Microsoft Authenticator Update CVE-2026-41615
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41615
ssh-keysign-pwn (CVE-2026-46333) Patches Released
https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 27th - Jul 2nd 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 27th - Jul 2nd 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Nov 9th - Nov 14th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Dec 14th - Dec 18th 2026 |
Podcast Transcript
Hello and welcome to the Tuesday, May 19th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. This episode is brought to you by the SANS.edu Graduate Certificate Program in Cybersecurity Leadership. Let's start out today with today's diary and that comes again from one of our SANS undergraduate interns, Gokul Prema Thangawell wrote this particular diary about the ever present SSH bots. Bots that are brute forcing usernames and passwords for SSH and then they often install modified authorized keys files which of course then act as a backdoor for the attacker. Now the one thing that Gokul here is looking at is a very well established chain of these SSH bots that always is leaving behind the same authorized keys files. It's sort of one of the indicators of compromise here. But Gokul notes some subtle modification to the binary being used to do the scanning in that it updated to a new lib SSH. Lib SSH is the base library that implements SSH and then we also have these hassh values. Now hassh is written here with two S's basically H A SSH which basically identifies the SSH connection details and with that often identifies the malware. But that now changed with the switch to the new lib SSH. And well, what this really means is don't be too specific on your indicators of compromise. If you're seeing a lot of outbound SSH connection, there is a good chance that you have a system in your network that is attempting to infect others via SSH no matter whether or not this particular hassh is present in the connections or whether it's not present and often goes undetected as pointed out in this diary. And late last week Microsoft disclosed a new unpatched vulnerability in Exchange Server affecting Exchange Server 2016-19 as well as the current subscription edition. Well, this is a cross-site scripting vulnerability but given that it's running in Exchange and then basically exposed via Outlook Web Access, there's quite a bit of damage that the hacker could do by exploiting this cross -site scripting vulnerability. Always an issue with cross -site scripting in webmail clients like Outlook Web Access. And as a result, well, definitely something that you want to address in particular since the reason that Microsoft sort of came forward and made this issue public is that it's already being exploited in the public. Now, Microsoft did publish a workaround and you can apply this workaround if your version of Exchange is reasonably up-to-date. So even for the older versions like 2016, you can apply it. You just must have applied some of the more recent updates to Exchange Server 2016. And this will block exploitation. This is not a patch yet and it apparently does have a couple of issues. And again, refer to Microsoft's write-up on it because that's something they have been adding to over the last couple of days. In particular, apparently with the calendar functionality like running calendars and such may have some problems here after you apply the workaround. But take a look at it. To me, they sound less severe, these issues, than getting exploited with cross -site scripting exploit here. And Microsoft also late last week did release an update for Microsoft Authenticator for iOS as well as for Android. This particular update fixes a vulnerability where an attacker could gain access to the authentication token being submitted by Microsoft Authenticator. In order to exploit this vulnerability, an attacker would have to essentially trick you to a website, then interact with the website. You'll see a pop -up on your authenticator asking you essentially to approve the login. And the attacker would then get access to the token that would allow the attacker to essentially bypass Microsoft Authenticator -based two-factor authentication. Something interesting, vulnerability, like I said, not a lot of details out there yet. And nothing being exploited yet on Android and iOS. The application should automatically update. Well, to all the Linux users that are smirking here about the Microsoft and Windows flaws, there's also a new bridge escalation vulnerability for Linux to worry about. This one in particular allows also access to private shkeys on the server as well as to the etsy shadow file. Now, the server shkeys typically don't allow you to actually log into the server, but they allow you to impersonate the server. So, still something that you want to take care of and make sure that your Linux system is, again, properly patched. And, of course, rebooted as for most kernel patches like this. And that's it for today. Thanks for listening. Thanks for liking. Thanks for recommending this podcast. And talk to you again tomorrow. Bye.





