Handler on Duty: Mark Baggett
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9428.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics
Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received network data.
https://isc.sans.edu/diary/SRUM-DUMP%20Version%203%3A%20Uncovering%20Malware%20Activity%20in%20Forensics/31896
Novel Universal Bypass For All Major LLMS
Hidden Layer discovered a new prompt injection technique that bypasses security constraints in large language models.
The technique uses an XML formatted prequel for a prompt, which appears to the LLM as a policy file. This “Policy Puppetry” can be used to rewrite some of the security policies configured for LLMs. Unlike other techniques, this technique works across multiple LLMs without changing the policy.
https://hiddenlayer.com/innovation-hub/novel-universal-bypass-for-all-major-llms/
CHOICEJACKING: Compromising Mobile Devices through Malicious Chargers like a Decade ago
The old “Juice Jacking” is back, at least if you do not run the latest version of Android or iOS. This issue may allow a malicious USB device, particularly a USB charger, to take control of a device connected to it.
https://pure.tugraz.at/ws/portalfiles/portal/89650227/Final_Paper_Usenix.pdf
SANS @RSA: https://www.sans.org/mlp/rsac/
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, April 29th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. And in diaries today we got a new Python tool for a change, not from Didier, but from the Python master himself, Mark Baggett. Mark wrote SRUM DUMP, SRUM the systems resource usage monitor. That's the part of Windows that logs how much resources different software used for the last 30 days. And it's of course really interesting in forensics and instant response because you can check, well, which software was running when and did it use the network? How much data did it send? All of this is in the system research usage monitor logs. And well, that's exactly what this tool exports for you, presents it in easy to use formats. So if you are in that line of business, definitely take a look. And Mark is always interested in feedback. There's also a little run through of the tool and how to use it in sort of a simple case, kind of to give you an idea for how you could apply this tool to any kind of investigation that you are performing. And then we got an interesting new technique to perform a prompt injection in large language models. This comes from Hidden Layer and what they say is unique about their particular technique, they call it a policy puppetry, is that it's fairly universal. The same technique, the same style prompt can be used across multiple LLMs. They sort of tested all the big ones as part of their research. There have been similar prompt injections for specific models. But as Hidden Layer points out, well, they can't easily sort of be transferred then to another model and, of course, have in part been patched in the past. What they essentially are doing is that they're not only using the role-playing trick. And that trick is old. That, of course, has been used by itself in the past. Where you, for example, ask the language model, hey, write me a movie script, how to build a bomb or something like this. That's not alone what they're doing. In addition, they're also prefacing this particular prompt with a snippet of XML. The reason they're using XML is that this is usually how the policy files are using that these large language models are using that are actually defining some of the constraints. So, by essentially confusing the model as to what is the prompt or what is the policy, well, they end up being able to overwrite some of the fixed policy or supposedly fixed policy, which then leads the large language model to actually act on the prompt that is following that particular policy insert. It's an interesting trick. They say it's difficult to patch. It's sort of back to the good old bad pattern where you're sort of mixing instructions and data and user data. So, mixing code and user data that usually never goes very well. So, I think they probably have to figure this out in a more fundamental way than sort of just by simple block listing certain strengths. Well, it looks like an older attack. Juice jacking is back again. Juice jacking referred to the ability of malicious USB chargers to essentially act as a keyboard and then send keystrokes to a device. This was an issue that was sort of thought to be mostly mitigated. Now, if you remember, maybe if you're at RSA this week, I'm not sure if the NSA still has its USB charger at its booth, sort of as a little nod to this particular technique. But it looks like it sort of made a little bit a comeback in the form of Joyce jacking. Researchers at the Graz University of Technology in Austria have developed a technique that Android, as well as in a limited form, iOS were vulnerable to. Now, iOS fixed this last month with the update to 18.4. And these research were also credited with notifying Apple of this particular weakness in Android. It was fixed as well. But then again, depends on whether or not you're running the latest version of Android, whether or not you are protected. The trick here is similar to sort of the old juice jacking in that the device changes its nature. Now, the little difference here is that they're also taking advantage of the power delivery protocol. The power delivery protocol is usually used between the charger and the device to figure out what voltages the device is willing to accept. But it can also be used to basically indicate that the device is a charger or a device that actually receives a charger or power from another device. And that's sort of part of this here where the device is first charging. But then basically telling the phone, hey, I'm now actually a device that wants to be charged. So it changes in this host mode. And that's sort of the first step here. On Android, they also developed a technique that involves just filling up the input queue with sort of requests. And then when you're making the switch at the right time, it will essentially then turn the device into the ability to actually send keystrokes to the vulnerable phone or tablet or whatever you have in this system. Now, there's lots of details here. There's also another technique here where it actually involves then using a Bluetooth input device. Bluetooth, of course, similar issue where the charger could also include a Bluetooth interface and then basically emulate a Bluetooth keyboard. A number of different techniques are being demonstrated here. Again, if you are running the latest versions of respective operating systems, you should be good. Personally, I'm always not that terribly worried about chargers in airports and such all of a sudden turning malicious. Apparently, it has happened in the past. My main concern usually is of the electrical safety of some of these chargers. But for the most part, if you want to stay safe, just use your own charger. And this shouldn't really be a problem. Well, that's it for today. I will actually not be at RSA this week. I'll be in San Diego teaching a class next week. If you happen to be at RSA, stop by at the SANS booth. They'll be able to tell you what SANS instructors are speaking at RSA. There will also be the famous Most Dangerous Attack panel again. And well, let them know how much you like the podcast. And that's it for today. And talk to you again tomorrow. Bye. Bye. Bye. Bye. Thank you.