Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, March 3rd, 2026: Finding URLs in ZIPs in RTFs; Merkle Tree Certificates; Taming Agentic Browsers
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9832.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Quick Howto: ZIP Files Inside RTF
https://isc.sans.edu/diary/Quick+Howto+ZIP+Files+Inside+RTF/32696/#comments
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
https://blog.cloudflare.com/bootstrap-mtc/
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Tuesday, March 3rd, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Purple Team operations. When attackers are attempting to obfuscate what they're doing, they often take advantage of compound document formats. Where they're trying to sort of, you know, wrap one document into another document type and then of course it becomes more difficult to figure out the actual malicious part. Didier has a quick diary up on how to use his tools in order to analyze one particular type of these documents and that's a zip file inside an RTF. Yes, that's legal, that's perfectly fine and of course a particular type of zip file would be a Word document because these docx formats, well they're really just compressed zip files. So Didier is walking you here through a particular example and showing how to not only extract this sort of mess of convoluted documents but also then extract URLs for example which of course could lead you to then additional exploit attempts or malicious documents. One commenter pointed out that the document that Didier here happened to use in the blog post was actually also covered by Akamai a week or so ago because it was one of the documents attempting to exploit Microsoft vulnerability that was patched in February. So a relatively recent vulnerability was being exploited using this particular document. And well the voyage to finally end up with a quantum safe internet is continuing and the next challenge here is certificates. There are two interesting blog posts that are sort of related to each other one by Cloudflare, one by Google about how to solve this particular challenge. I'll link to the Cloudflare one. I like that a little bit better in its explanation but there's nothing really different so there's nothing wrong with the Google one if you have seen that one. It's a little bit arbitrary here to just pick Cloudflare. But either way, so what's the problem here? The problem is that if we are using quantum safe certificates, we also have to include well the certificate and then of course any signatures that were created using quantum safe algorithms. The problem here is that the certificates and signatures are about 20 times as big as normal certificates. So well what are we going to do about this? And what this would end up with is really like these client hello measures, certificate measures would basically span multiple packets that often kind of creates and issues with middle boxes and such. So have to somehow compress what's going on here. And the solution that they came up with here is Merkle tree certificates. Instead of actually sending the entire certificate as part of sort of the TLS handshake, we're just sending essentially proofs that these certificates exist and that's these Merkle tree certificates. Interesting solution, a little bit too complex to explain here as part of the podcast. That's why I'm going to link to these blog posts that have this in more detail how this all exactly works. Now the reason you have this from Cloudflare and from Google is that Google of course is going to implement that in Google Chrome. And Cloudflare is going to implement that in their proxy architecture. They're actually saying that already 50% of the connection that their proxy here are are taking advantage of some quantum safe encryption algorithms. But that's really just the traffic encryption that's not affecting the certificates. They're going to start implementing this about a year from now. So no rush here. Nothing that you have to do at this point. Similarly, like in the future versions of Google Chrome, Google Chrome will be able to support it as with any other sort of TLS change. They try to remain backwards compatible. So you still have the old fashioned certificates and such to go by. So really at this point nothing you have to do. But of course, as always, that's why they're going to roll it out slowly. There's always a chance that there is something breaking. Like for example, when they initially offered quantum safe algorithms in Google Chrome, they had some issues sort of with these multiple packets in the handshake and such of a TLS 1 .3. They had some issues like this as well. And that's what they're looking for. And that's why they're sort of going to roll it out slowly to not break anything big right from the get-go. So the reason why quantum encryption and quantum signatures are so important for the certificates is also that, well, based on the current algorithms, if you have the public key in the certificate, you could derive the secret key. Now, one reason why you kind of want to start quantum cryptography early is this sort of, you know, store and decrypt threat where an attacker would store data. And then later, once quantum computing becomes available, decrypt the traffic. For the certificates, that threat is less of a problem because, well, the certificates are relatively short-lived on sort of that time scale we're talking about here. So, you know, these days, the longest certificate is about 13 months. So, with that, it's probably not going to happen that we have a quantum cryptography or quantum computing break certificates within the next year. That's why this is less of a problem. And we have more time implementing this than some of the other use cases of quantum safe cryptography. And Palo Alto did publish a blog with some details regarding a vulnerability that was recently patched in Chrome. And the problem here is, well, the new trend of agentic browsing and the Gemini panel that Google added to Chrome. So, the Gemini panel gives you access basically to Google's Gemini AI. And the problem here is that if a browser extension has access to that Gemini panel, which they usually have because it's really just a URL they're accessing here, well, they buy extension and also get access to anything that Gemini can do, which includes in this case accessing camera and a microphone. So, typically, when you're installing an extension in Google Chrome that wants to access the camera or the microphone, you get a warning. You wouldn't get this in this particular case because the extension itself never accesses the microphone or camera. It just does so via Gemini. And that was the vulnerability back then. Relatively easy to exploit. And I hope, well, as always, that you keep your browser up to date. But the reason I really mention this is because I think that's a little bit sort of a more generic issue with some of these AI tools that basically extend the capability of the browser and how these extended capabilities are then exposed to things like extensions. Well, and that's it for today. So, thanks for listening. Thanks for liking. Thanks for leaving comments about this podcast. And talk to you again tomorrow. Bye.





