Podcast Detail

SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9490.mp3

Podcast Logo
Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
00:00

Quasar RAT Delivered Through Bat Files
Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT.
https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036

Delayed Windows 11 24H2 Rollout
Microsoft slightly throttled the rollout of windows 11 24H2 due to issues stemming from the patch Tuesday fixes.
https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3570

An In-Depth Analysis of CVE-2025-33073
Patch Tuesday fixed an already exploited SMB client vulnerability. A blog by Synacktiv explains the nature of the issue and how to exploit it.
https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025

Connectwise Rotating Signing Certificates
Connectwise is rotating signing certificates after a recent compromise, and will release a new version of its Screen share software soon to harden its configuration.
https://www.connectwise.com/company/trust/advisories

KDE Telnet URL Vulnerablity
The Konsole delivered as part of KDE may be abused to execute arbitrary code via “telnet” URLs.
https://kde.org/info/security/advisory-20250609-1.txt

Podcast Transcript

 Hello and welcome to the Thursday, June 12, 2025
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich and this episode brought to you by
 the SANS.edu undergraduate certificate program in applied
 cybersecurity is recorded in Jacksonville, Florida. Well in
 diaries today we have Xavier looking like yet another
 image. This time it actually leads to the install of a
 Quasar remote admin tool. Now it all starts pretty innocuous
 with a little bad file. That file will download the actual
 installer, injector. It'll also load a normal Word
 document and that's typically done because the user just
 clicked on something that looked like a Word document.
 So after starting the malicious code the malware
 loads an actual Word document. So the user really thinks
 nothing bad happened. Well the second stage then will
 download this kind of noisy looking image. This is
 actually an encrypted code that will then be injected
 into the running process here by the batch file that was
 downloaded. Also interesting that the second stage being
 downloaded relies on environment variables defined
 by the first stage. That way if someone would just reverse
 analyze the second stage without having access to the
 first stage then of course that wouldn't execute,
 wouldn't actually do anything bad. For example like if you
 would just quickly load that script into sandbox or such by
 itself. Well it wouldn't really show up as malicious.
 VirusTotal doesn't do a good job here. I should say the
 antivirus tools being sort of represented by VirusTotal do a
 pretty lousy job in recognizing any of this as
 malicious. Which probably is also due to this not sort of
 being a very widely spread threat but something that's a
 little bit more boutique. Which is well like Savvy was
 interested in this particular sample. Then we got a couple
 of follow-on items here to patch Tuesday this week. First
 of all if you're running Windows 11 the 24H2 update was
 rolled out gradually as Microsoft posted. Apparently
 they had some issues with certain hardware
 configurations initially that have now been resolved. And
 everybody should now be able to download Windows 11 24H2.
 And one of the highlights of course of this week's patch
 Tuesday was a patch for an already exploited
 vulnerability in the SMB client. Well we have now more
 details about including proof of concept exploit. I liked
 the Synactive write-up about this particular vulnerability.
 It goes in depth into the actual root cause of the
 vulnerability. Microsoft described it as a privileged
 escalation vulnerability. And that's really sort of the
 nature of the vulnerability in allowing basically users
 access as a system. However it's really as synactive also
 described as block more sort of a code execution
 vulnerability then. Because you can then actually execute
 arbitrary commands on the system as system. And
 ConnectWise published an advisory noting that it
 rotated its signing certificate for its software
 in particular Screen Connect. If you remember we had a
 couple weeks ago an incident at ConnectWise that affected
 some Screen Connect customers. Since then they published a
 couple of details about this particular compromise. But
 really not a lot what the actual nature of the breach
 was. So there's some concern that maybe there was more than
 initially stated. However this update appears to be also
 related to a software update going to be released shortly.
 If it hasn't already been released. That will further
 tighten up the Screen Connect configuration. Apparently what
 has been happening is that scammers did send users
 legitimate copies of Screen Connect. With their own
 configuration. And basically tricking the victim to
 connecting to the attacker's server. And that way by sort
 of including these configurations in the signed
 content. They hopefully will make it more obvious if an
 attacker is sending their own configuration. Instead of one
 provided by ConnectWise. Well then we got an interesting
 vulnerability in KDE. Actually really in the console the
 terminal it comes with KDE. The reason I cover this is not
 because I think desktop Linux is sort of such a big deal.
 But I think it's an interesting issue that people
 often forget there is more than HTTP and HTTPS URLs. Well
 there is a number of different protocols. They often then
 start commands. For example telnet colon slash slash will
 typically start telnet. However in this particular
 case. If you are not. If you don't have telnet installed on
 the system. Which a lot of modern Linux systems don't
 have installed anymore. Then the argument which is the URL.
 Is just directly passed to bash. Leading to a very simple
 command execution. Exploitability is a little bit
 tricky. Because typically on the console you would see the
 URL in the clear. So it's a little bit more difficult to
 hide here in this particular context. But certainly
 something that you definitely should patch. And yeah be
 aware that it's not just HTTP and HTTPS. And that's it for
 today. So thanks for listening. And thanks for
 liking and subscribing. And whatever you do to promote
 this podcast. And talk to you again tomorrow. Bye.