← Back to Tech & Science

SANS Internet Storm Center Details Active Cyber Threats in Weekly Security Report

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

AMSTERDAM — The SANS Internet Storm Center released a weekly security report on Sunday detailing a surge in active cyber threats, including new malware variants and unpatched vulnerabilities affecting Windows systems.

The report, issued from the organization's headquarters in the Netherlands, highlighted the Lumma Stealer malware and the Sectop Remote Access Trojan (RAT) as primary concerns for security professionals. Researchers at the center noted that these tools are being actively deployed in targeted campaigns against enterprise networks.

Xavier Mertens, a handler at the SANS Internet Storm Center, and Johannes Ullrich, the center's director, outlined the technical specifics of the threats. They emphasized the exploitation of zero-day vulnerabilities in Windows operating systems, which remain unpatched as of the report's publication. The vulnerabilities allow attackers to execute arbitrary code on compromised systems without user interaction.

In addition to malware and zero-day exploits, the report detailed a proof-of-concept exploit targeting FortiSandbox, a security product developed by FortiNet. The exploit demonstrates a potential pathway for attackers to bypass sandboxing mechanisms designed to isolate and analyze suspicious files. Huntress Labs and Nightmare Eclipse were also cited in the report regarding their observations of related threat actor activities.

The SANS Internet Storm Center stated the release aims to inform the public and security professionals about active cyber threats, vulnerabilities, and recent updates from the National Institute of Standards and Technology (NIST) regarding Common Vulnerabilities and Exposures (CVE) record management. The NIST updates involve changes to how vulnerability records are maintained and reported, impacting how organizations track and remediate security flaws.

Security experts warn that the combination of active malware campaigns and unpatched zero-day vulnerabilities creates a heightened risk environment for organizations relying on Windows infrastructure. The FortiSandbox exploit adds another layer of complexity, as it targets a defense mechanism intended to protect against such threats.

The report does not specify the number of organizations currently affected by these threats, nor does it provide a timeline for patches from Microsoft or FortiNet. Questions remain regarding the origin of the threat actors behind the Lumma Stealer and Sectop RAT campaigns, as well as the extent of the exploitation of the Windows zero-day vulnerabilities in the wild.

Security professionals are advised to monitor their networks for signs of the identified malware and to apply any available mitigations for the unpatched vulnerabilities. The SANS Internet Storm Center will continue to update its weekly reports as new information becomes available.