Handler on Duty: Didier Stevens
Threat Level: green
Podcast Detail
SANS Stormcast Monday, May 4th, 2026: Malicious Homebrew Ads; Wireshark Update; Digicert False Positive; cPanel Exploited
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9916.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
Malicious Ad for Homebrew Leads to MacSync Stealer
https://isc.sans.edu/diary/Malicious%20Ad%20for%20Homebrew%20Leads%20to%20MacSync%20Stealer/32942
Wireshark Update
https://www.wireshark.org/docs/relnotes/wireshark-4.6.5.html
Digicert Microsoft Defender False Positive
https://www.reddit.com/r/cybersecurity/comments/1t2hfsh/mde_flagging_digi_cert_certificate_as_malicious/
https://bugzilla.mozilla.org/show_bug.cgi?id=2033170
cPanel Exploited
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 27th - Jul 2nd 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 27th - Jul 2nd 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Nov 9th - Nov 14th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Dec 14th - Dec 18th 2026 |
Podcast Transcript
Hello and welcome to the Monday, May 4th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Industrial Control Systems Security. And in diaries today, we got one of the excellent malware analysis diaries from Brad. Brad walks us here through an infection with MacSync Steeler. Now, what makes this particular attack so successful likely is that, well, it takes full advantage of the entire Google ecosystem. It starts out with a paid ad on Google. If you're searching for Homebrew, you may be seeing links for this particular malicious version of Homebrew, which is then also hosted within Google's pages infrastructure. So the only URL you're seeing here is business.google.com, which of course is often not considered malicious. Now, if the user then clicks on this link, they're then being sent to a fake Homebrew page. Now, if you're not familiar with Homebrew, Homebrew is essentially a system that allows you to easily install various open source tools. So it's very commonly used by Mac users. And the page here looks very much like the real thing, only that this one, of course, is hosted within sites.google .com. Now, just like in the real Homebrew, you're then being asked to sort of copy paste shell script in order to execute the installer. Now, the real version is not obfuscated like the one here. Here, you're then basically pasting a base64 encoded string that then leads to execution and will then download additional tools, including the malware in the end. Now, there are a number of different warnings that you are probably getting. So definitely something that's not low friction, really. But then again, it's still fairly easy for a victim to overlook this and go through with the install of this MacSync Steeler. As often, Brad has released all the packet captures and, of course, links to various tools and such that are being downloaded here on VirusTotal. The initial script is not well detected. It may get detected by this sort of new click fix fixed that Apple has implemented. But of course, that depends on how you're using your system. If you're routinely copy pasting into the terminal, then this may not trigger here. Since these tools are particular for users that often use the terminal and such, it is probably not going to get detected here on many systems. And then, of course, many of the malware pieces that are being downloaded here are hosted on, well, legitimate websites that are just compromised. Well, then we have a new version of Wireshark 4.6.5. I usually don't sort of highlight new releases of Wireshark. They often do fix vulnerabilities. What's different about this release? Well, actually, two things are sort of different here. Number one, that this particular version does include fixes for vulnerabilities discovered recently by AI tools the developers used. So we have a total of 43 different vulnerabilities being addressed here. Some of these vulnerabilities may be exploitable for code execution. So definitely something that you want to take care of. Now, I usually don't like it when products release sort of a big security update like this. And then they also make some changes sort of to the UI. In this particular case, I sort of actually understand it. They changed the startup page a little bit and added sort of a more prominent ad for Shark Fest, which is sort of a conference that the Wireshark people are running, and also a donation button. And I have to admit, I've been using Wireshark probably just sort of since it came out, like in the late 90s, definitely when it was still called Etherreal back in the day, and wasn't even aware that they were looking for donations. And it's such a useful tool. So if you're using it regularly, well, give them a little bit money to support the development. And this weekend, there were multiple reports that Microsoft Defender for Endpoint did mark certain sort of authority certificates from DigiCert as malicious and removed them in some cases from systems. So these were pre-installed sort of authority certificates. And this was quickly dismissed sort of as false positive, which it was, but there is a little bit more to the story that I just want to point out. So in this particular case, DigiCert did file a bug report with the sort of authority program. Now, a bug report here is really just meant sort of to communicate any issues with the sort of authority program. It's not necessarily sort of a classic bug. In this case, it was actually a compromise of DigiCert. Some systems within DigiCert got compromised by malware, and the 60 different certificates were issued by the malicious actor and subsequently then revoked. All of these certificates were signed by these sort of authority certificates that are now being here marked as malicious. It's likely more sort of a mistake on Microsoft's and that they marked these sort of authority certificates as malicious, not the individual certificates. Again, the revocation, if it worked, should have taken care of these 60 certificates by now, hopefully anyway, even though the latest update here was just a couple days ago. Actually, a pretty good bug report because an interesting compromise here in that some of the endpoint defenses that DigiCert here had in place had failed. And for anybody running cPanel to manage their servers, be aware there is an already widely exploited vulnerability going around here, compromising cPanel. Patches have been released, so please now refer to the cPanel .net page for any details regarding the patch. cPanel, as far as I know, has an auto update feature that should protect you here, but please double check since, yes, the exploit is widely available. So definitely it's one of those cases where you want to assume compromise if you have cPanel exposed. cPanel is particular sort of problematic because it's often used by virtual hosting companies and such to provide customers access to servers. So a particular cPanel instance may have a large number of different websites behind and they are now all exposed due to this vulnerability. Well, and this is it for today. So thanks for listening. Thanks for liking. Thanks for subscribing. And as always, talk to you again tomorrow. Bye.





