SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, February 19th, 2026: Malware Image Resuse; Dell RecoveryPoint; Admin Center Vuln; DNS-PERSIST-01

14 snips
Feb 19, 2026
They discuss tracking malware campaigns by spotting reused image assets across samples. They cover active exploitation of a Dell RecoverPoint zero-day and its fallout. A recent Windows Admin Center privilege elevation fix gets attention. The new DNS-PERSIST-01 validation model and its implications for certificate lifetimes and automation are explained.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Wallpaper Image Ties Malware Samples

  • Xavier found malware using an MSI wallpaper image as payload carrier, showing reuse of benign media across samples.
  • Johannes Ulrich notes hundreds of VirusTotal submissions contained the same image, linking multiple campaigns to a single actor.
INSIGHT

Benign Assets As Linkage Signals

  • Reused benign assets like wallpapers can act as weak but useful linkage signals between samples and actors.
  • Such artifacts should not be sole indicators but can prioritize deeper analysis of related submissions.
ADVICE

Check And Patch Dell RecoveryPoint Carefully

  • If you run Dell Recovery Point for Virtual Machines, investigate and patch immediately and check for compromise before moving on.
  • Look for Tomcat web shells, added network interfaces, iptables rules, and lateral-movement artifacts as Google observed.
Get the Snipd Podcast app to discover more snips from this episode
Get the app