Podcast Detail

SANS Stormcast Wednesday, November 5th, 2025: Apple Patches; Exploits against Trucking and Logistic; Google Android Patches

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9686.mp3

Podcast Logo
Apple Patches; Exploits against Trucking and Logistic; Google Android Patches
00:00

My Next Class

Application Security: Securing Web Apps, APIs, and MicroservicesDallasDec 1st - Dec 6th 2025
Network Monitoring and Threat Detection In-DepthOnline | Central European TimeDec 15th - Dec 20th 2025

… more classes


Apple Patches Everything, Again
Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities.
https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448

Remote Access Tools Used to Compromise Trucking and Logistics
Attackers infect trucking and logistics companies with regular remote management tools to inject malware into other companies or learn about high-value loads in order to steal them.
https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics

Google Android Patch Day
Google released its usual monthly Android updates this week
https://source.android.com/docs/security/bulletin/2025-11-01

Application Security: Securing Web Apps, APIs, and MicroservicesDallasDec 1st - Dec 6th 2025
Network Monitoring and Threat Detection In-DepthOnline | Central European TimeDec 15th - Dec 20th 2025
Application Security: Securing Web Apps, APIs, and MicroservicesOrlandoMar 29th - Apr 3rd 2026
Network Monitoring and Threat Detection In-DepthAmsterdamApr 20th - Apr 25th 2026
Application Security: Securing Web Apps, APIs, and MicroservicesSan DiegoMay 11th - May 16th 2026
Network Monitoring and Threat Detection In-DepthOnline | Arabian Standard TimeJun 20th - Jun 25th 2026
Network Monitoring and Threat Detection In-DepthRiyadhJun 20th - Jun 25th 2026

Podcast Transcript

 Hello and welcome to the Wednesday, November 5th, 2025
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich, recording today from
 Jacksonville, Florida. And this episode is brought to you
 by the SANS.edu graduate certificate program in cloud
 security. And we got patches from Apple. Now the patches
 were actually released on Monday. I didn't get them into
 the Monday or Tuesday podcast. So covering them now, we got a
 total of 110 vulnerabilities addressed in these patches.
 And as typical for Apple, we got updates for pretty much
 every single product of theirs with a lot of overlap between
 those products, just because the underlying operating
 system has a lot of overlap as well. There are a couple of
 vulnerabilities here that I sort of point out, and that's
 memory corruption vulnerabilities in ImageIO,
 also in font parser. These type of vulnerabilities have
 in the past been exploited for remote code execution. Apple's
 nodes to their patches are always very sparse. So really
 hard to tell how exploitable these memory corruptions are
 and whether they actually will lead to code execution. Also,
 we got at least one memory corruption in WebKit that of
 course affects Safari and anything sort of exposed via a
 website that a user may visit. There's also, as usual for
 Apple, a separate Safari update. The reason you have
 this is because some of the older operating systems, well,
 they may now need a newer version of Safari to address
 the WebKit issues that Apple patched because they
 originally came with an older version of Safari. But for the
 current operating systems, you shouldn't really see a
 separate Safari update. Xcode also was updated, and that's
 also whenever they update the operating system. Of course,
 Xcode, which is Apple's development environment, well,
 has to be updated as well. So overall, nothing terribly
 exciting, nothing that's already being exploited, but
 certainly patches that you probably want to apply
 sometime this week if possible. Well, I've got an
 interesting blog post by Proofpoint showing how cyber
 criminals are targeting trucking and logistic. So
 what's happening here is that these criminals, their end
 goal is to steal trucks or to load being transported by
 those trucks. But in order to do so, they need to know which
 trucks actually has load worth stealing. A lot of times, it
 sort of happens randomly, where basically just parked
 trailers and such are being stolen with whatever load they
 have. But for cyber criminals, of course, much better to then
 being able to figure out which truck actually has a high
 value load. The way this particular scheme works is
 that they initially compromise one company, one trucking or
 logistics company, just via standard fake emails and
 phishing. And once they take control of one company,
 they're using legitimate remote managing and monitoring
 tools like your standard log me in and things like that, in
 order to then basically see what they're working on. But
 they're also using that initial access to then infect
 other trucking companies by, for example, posting fake
 loads and fake offers for work on various systems that these
 trucking companies use. And those fake offers are then
 often being used to trick a victim into clicking on
 malicious links and downloading, installing
 malicious malware just by, for example, posting PDFs and the
 likes. So basically, standard phishing tricks. But by being
 inside these systems, it's, of course, a lot more convincing
 than to get a user to execute or open an attachment. The end
 goal, as I said, is just to figure out which truck has a
 particular value below it and then steal it. And apparently
 the losses for these particular schemes are ranging
 in the billions at this point. From a defensive point of
 view, well, you always need to control these remote
 management tools. That's probably, I think, the biggest
 lesson here from this particular compromise. They're
 often used as ransomware attacks and other attacks
 where an attacker, in order to gain persistent access to a
 system, just installs a legitimate remote management
 tool instead of an obvious malicious one, which, of
 course, is much easier to detect by anti-malware
 endpoint protection systems. And we don't just have patches
 from Apple. Google also released its usual scheduled
 monthly update. This is the November 2025 update that they
 published for Android. The vulnerability is actually kind
 of so similar in scope to what I just talked about when it
 came to Apple. So we have a couple of vulnerabilities here
 that sort of could lead to these single click or no click
 exploits, where just viewing an image or something like
 this will lead to a system compromise. For example, we
 have here one vulnerability in what Google refers to as
 system. So basically, the basic operating system that
 does allow remote code execution and is assigned a
 severity of critical affecting Android back to version 13. A
 little bit more detail here from Google than we do get
 from Apple with this severity and also the type actually
 indicating that remote code execution is possible here
 with this particular vulnerability. As usual, apply
 these Android patches as as they become available for your
 particular device. Of course, there may be a delay depending
 on your carrier and what device you are using. Well,
 and that's it for today. So thanks for listening and
 special thanks to anybody who is recommending this podcast
 on Apple's podcast site and also leaving a comment there.
 And that's it for today and talk to you again tomorrow.
 Bye.