Podcast Detail

SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9446.mp3

Podcast Logo
Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
00:00

Steganography Challenge
Didier revealed the solution to last weekend’s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed.
https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/


FBI Warns of End-of-life routers
The FBI is tracking larger botnets taking advantage of unpatched routers. Many of these routers are end-of-life, and no patches are available for the exploited vulnerabilities. The attackers are turning the devices into proxies, which are resold for various criminal activities.
https://www.ic3.gov/PSA/2025/PSA250507

ASUS Driverhub Vulnerability
ASUS Driverhub software does not properly check the origin of HTTP requests, allowing a CSRF attack from any website leading to arbitrary code execution.
https://mrbruh.com/asusdriverhub/

RV-Tools SEO Poisoning
Varonis Threat Labs observed SEO poisoning being used to trick system administrators into installing a malicious version of RV Tools. The malicious version includes a remote access tool leading to the theft of credentials
https://www.varonis.com/blog/seo-poisoning#initial-access-and-persistence

Podcast Transcript

 Hello and welcome to the Monday May 12, 2025 edition of
 the Sands and Storm Sonners Stormcast. My name is Johannes
 Ulrich and today I'm recording from Jacksonville, Florida.
 This weekend Diddier posted the solution for last week's
 Steganography Challenge. This example used a similar
 encoding as Diddier presented in his past Steganography Diary
 but with an interesting twist. Instead of encoding the pixels
 in their normal order, meaning one line at a time of the
 image after another, well, this one went actually
 vertical. So it did encode the data in the rows first and
 well then went over to the next row. So in order to
 decode the data you had to transpose it and well imagine
 that Diddier has a tool to transpose the data for you and
 decode the image. For details as usual see Diddier's diary.
 And last week the FBI published a press release that
 it is observing criminals using compromised routers as
 proxies to build infrastructure for criminal
 networks. Now this is nothing fundamentally new but in
 particular they point out that the compromise of end-of-life
 devices is contributing to this and of course those
 devices you can update. One botnet identified in this
 attack is the Moon botnet. A botnet we have first written
 about in February of 2014. These router botnets have been
 very persistent and as I've pointed out multiple times
 before, well, they keep mutating and they keep adding
 new vulnerabilities to their arsenal. Remember to track the
 end-of-life date of your network parameter devices and
 add monthly firmware update. Check to your calendar for
 home device in particular. But may not even be a bad idea for
 some business, particular small business devices to have
 some setup where you're being reminded, hey, let me double
 check that particular router if I need to update it. Also
 like writing the end-of-life date if you know it is quite
 helpful. Write that on the device also makes it easier to
 then figure out what must be replaced. Now not all
 manufacturers make it easy to figure out that a particular
 device is end-of-life but you can usually find out on their
 website at least after the fact. And then again as part
 of your firmware update routine you probably should do
 it. According to the FBI the botnet they are tracking is
 turning this device into proxy servers and then these proxies
 are being resolved, rented to other criminal groups. which
 of course like them to hide their trace and there have
 even been some cases aside from this most recent report
 where some of these proxy servers were then used by more
 advanced adversaries. And ASUS patched two vulnerabilities in
 its driver hub software that could be used to execute
 arbitrary code. So the vulnerability is something
 that has happened in the past with software like this. A lot
 of software like this is setting up a little HTTP API
 listening on loopback. Well and the idea is that then the
 manufacturer's website is able to interact with that API to
 install updated drivers. Well the problem with this is that
 in this particular case ASUS did a pretty lousy job in
 verifying the origin of these requests. They just looked for
 the string ASUS.com in the host name for the origin. So
 an attacker just has to register ASUS.com.evilexample
 .com and well with that they can launch the have their
 JavaScript interact with your ASUS driver hub. Next they
 then also don't check where the software is being
 downloaded from. Again the string ASUS.com has to show up
 anywhere in the URL. So it could even be just a random
 URL parameter that the attacker is adding to it. But
 of course if they already have that ASUS.com.evilexample.com
 host name set up then well they may as well use that. Now
 the person that found it Paul from this vulnerability was
 identified by Paul from mrbruh.com and responsibly
 reported to ASUS. ASUS fixed it about a month after
 receiving the report so that's all good. But sadly no kind of
 recognition bug bounty for Paul and apparently his ASUS
 motherboard that he purchased that sort of led to Discovery.
 Well it still has no working driver for its Wi-Fi interface
 which apparently is a common issue with this particular
 ASUS motherboard. And the Varonis threat lab is
 observing search engine optimizing attacks being used
 to trick administrator into installing backdoors version
 of RV tools. Usually we see search engine optimization
 being used against sort of more commonly used software.
 But I guess websites search engines have gotten a little
 bit better in rejecting some of these tricks against things
 like Google Chrome for example used to be very heavily hit by
 this. So now attackers are going after more these niche
 products which of course have potentially a much larger
 impact. RV tools is being used to manage a VMware and once
 you're infected with the backdoor version it sets up an
 SSH channel to the attacker and allows them for additional
 arbitrary remote code execution. But it also does
 its usual secret exfiltration. Well and this is it for today.
 Remember tomorrow Microsoft patch Tuesday. Thanks for
 listening. Thanks for liking and subscribing to this
 podcast. Of course as always thanks for spreading the word
 about this podcast. That's it for today. Thanks and talk to
 you again tomorrow. Bye.