Handler on Duty: Jan Kopriva
Threat Level: green
Podcast Detail
SANS Stormcast Thursday Mar 27th: Classifying Malware with ML; Malicious NPM Packages; Google Chrome 0-day
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9382.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest
This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors, we will focus on capturing high-entropy segments within files, regions most likely to harbor malicious functionality, and feeding these distinct byte patterns into our model.
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Leveraging%20CNNs%20and%20Entropy-Based%20Feature%20Selection%20to%20Identify%20Potential%20Malware%20Artifacts%20of%20Interest/31790
Malware found on npm infecting local package with reverse shell
Researchers at Reversinglabs found two malicious NPM packages, ethers-provider2, and ethers-providerz that patch the well known (and not malicious) ethers package to add a reverse shell and downloader.
https://www.reversinglabs.com/blog/malicious-npm-patch-delivers-reverse-shell
Google Patched Google Chrome 0-day
Google patched a vulnerability in Chrome that was already exploited in attacks against media and educational organizations in Russia
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Podcast Transcript
Hello and welcome to the Thursday, March 27th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. It's always great when students are able to apply what they're learning in their classes and we have a great example here from one of our undergraduate interns, Wee Ki Joon, and Wee did write about how to classify malware using machine learning. And it's, I think, a pretty interesting novel way. Also, the diary itself that Wee wrote is in lots of details. So really also enables you to apply some of these techniques to samples and such that you may have in your environment. The goal of this particular work was to classify malware. So not to figure out is it malicious or not so much as to what type of malware it is. And that's, of course, with these undergraduate interns. As part of the internship, they're looking at honeypot data. You end up with a ton of malware there. And the difficult part is sometimes how to sort of triage it and deal just with the sheer volume of data. So this particular model was then able to distinguish between, like, you know, simple troppers, downloaders, backdoors, ransomware, trojans, viruses, and worms. Also, information stealers was another category that Wee looked at. And, well, it worked actually really well with detection sort of in the 90% correct range. Of course, there's always a piece of malware that may be somewhat in between. And, well, again, lots of details here in the diary if you're interested in these type of techniques. I think a really educational piece and very thorough the work being done here. And imagine that we still have malicious packages, NPM packages in particular. And there is a good new blog post by Lucija Valentich with Reversing Labs. She looked into the Ethers provider 2 packages, which was recently published and turned out to be malicious. What's a little bit different here about this is, so, again, you know, we have attacks against crypto coin developers. Ethers refers to Ethereum. And that's sort of what the package is supposed to help with. The actual Ethers package was not compromised here. But the tricky part was that these additional Ethers provider 2 packages, they were then actually patching the already installed Ethers package with malicious payload to then lead to an execution in the code. So, yes, you know, they realize that you probably already have Ethers installed. That's the package. They really wanted to compromise, but not being able to compromise it directly, they sort of went this detour to first trick you into installing that second package that was supposedly related. And then have it update the main target that they were after. What they ended up with then was a downloader, which basically would allow additional malware to be installed. Most of the time, as Loggia here points out in the blog post, this type of malware is an info stealer. They're trying to steal your crypto coins. Here in this case, well, again, the attacker went a slightly different route via the downloader first. And something else that's not going away is Saturday vulnerabilities in Google Chrome. Google just released a new update for Google Chrome, apparently only affecting Windows. This particular vulnerability was found by Kaspersky after it had been used to compromise various Russian media and educational institutions, according to Kaspersky. Well, and that's it for today. If I missed the story, let me know. Let me know if there is any story I should have covered. There were a couple other vulnerabilities that crush FTP, for example, that I don't really think is noteworthy enough. But let me know if it is, and I'll definitely include vulnerabilities like that. And as always, I like it if you like this podcast. And any feedback is welcome. And if you like it even more, then leave a good comment or let someone that sends know that you like this podcast. Thanks, and talk to you again tomorrow. Bye.