Handler on Duty: Didier Stevens
Threat Level: green
Podcast Detail
SANS Stormcast Monday, September 15th, 2025: More Archives; Salesforce Attacks; White Cobra; BSides Augusta
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9612.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Web Searches For Archives
Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages
https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282
FBI Flash Alert: Salesforce Attacks
The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. There are no new vulnerabilities disclosed, but the initial access usually takes advantage of social engineering or leaked data from the Salesdrift compromise.
https://www.ic3.gov/CSA/2025/250912.pdf
VSCode Cursor Extensions Malware
Koe Security unmasked details about a recent malicious cursor extension campaign they call White Cobra.
https://www.koi.security/blog/whitecobra-vscode-cursor-extensions-malware
BSides Augusta
https://bsidesaugusta.org/
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Dallas | Dec 1st - Dec 6th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
Podcast Transcript
Hello and welcome to the Monday, September 15th, 2025 edition of the SANS and Internet Storm Centers Stormcast. My name is Johannes Ulrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Undergraduate Certificate Program in Applied Cybersecurity. Anyway, Didier this weekend published a brief post just confirming some of the scans that I've observed for archives and also filling in a couple of other archive types that are being searched for. Just a quick recap. This is all about our web honeypods. What we are seeing is over the last few months at least an increase in scans for .zip and similar archive files, often pointing that the attackers are looking, for example, to retrieve backups or such of configuration files that the system administrators may have left in the document route. Well, in addition to zip files, Didier also saw .rar, .7z, .gz and .tar files being looked for. And the file names being, well, backup mostly. But we have also seen a couple of other file names. So backup .back, backup.sh, various files that basically point to the attacker, hoping that careless administrators left these backup files behind. And of course, they often contain credentials and other goodies. So that's probably what they're ultimately after. And on Friday, the FBI released another one of its flash alerts focusing on particular threat actors. There are actually two distinct threat actors that this latest flash alert does focus on, both Salesforce related. The first one is just sort of your classic Salesforce social engineering and phishing attack, where then the attacker also often attempts to get the victim to approve various applications via OAuth and then essentially steals the OAuth tokens. So that's the first threat actor. The second one is one that we already covered here. And that's in relationship to the sales drift compromise, where OAuth tokens were stolen. And then they were, again, being used against Salesforce and other applications. Either way, these are actively ongoing attacks. The first one, I think, is probably the broader and more real threat in particular, not just against Salesforce, but any kind of enterprise application like this. One thing I want to note, and it has been pointed out by a couple people on X and other social media as well, is that this advisory includes lists of IP addresses and such. Never, ever just blindly, for example, block access to these IP addresses. There are Cloudflare, Microsoft, ZScaler IP addresses and such in that advisory that are definitely used by the threat actor here. But of course, also have lots of non-evil uses. So for detection, yes, that can be useful, but certainly not sort of from a blocking or enforcement point of view. As I always put it, also when it comes to data that we publish in Internet Storm Center, use it to color your logs, to better understand what a particular log entry is about. But using something like this as a block list can be dangerous. And security company Koi Security did reveal some interesting insight into how some of the fake browser extension and editor extension campaigns are working. They call this particular campaign, they unraveled here, White Cobra. And they're basically going over the playbook of that particular threat actor. Well, a couple of interesting things here. First of all, that they're manufacturing credibility by artificially increasing the number of downloads for malicious extensions they're uploading. For example, for Visual Studio Code extensions or such, they usually suggest about 50,000 fake downloads before they then start advertising a particular extension on social media to trick developers into installing that extension. That also leads to another caveat here. We often measure the impact of these sort of, you know, fake Visual Studio Code extensions and such based on the number of downloads and have to realize that this number is likely inflated because of the fake downloads that the attacker added before they started advertising their particular extension. In this particular case with White Cobra, we do know that they got at least one high value victim. There was one particular crypto influencer who stated that they lost something like $500,000 because, well, they installed one of these malicious extensions into their IDE and as a result, well, were compromised. Well, of course, attacks against developers is sort of one of my favorite topics. I've spoken about this multiple times on this podcast. Also have spoken about it before at conferences. I will be speaking again about attacks against developers at B-Sides in Augusta. I know there are a couple of Augusta listeners on the podcast, so hope to see some of them there. And that'll happen at the end of October. I'll add a link to the show notes. Well, that's it for today. So thanks again for listening and talk to you again tomorrow. Bye.