SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, March 2nd, 2026: Reversing Fake Fedex; Abusing .ARPA; MSFT Authenticator Update; Apex One Vuln; Special AirSnitch Webcast

12 snips
Mar 2, 2026
A walkthrough of a FedEx-themed phishing attack that delivers a Donut loader and XSwarM payload. A deep dive into attackers abusing .ARPA reverse zones and how to spot suspicious DNS lookups. A heads-up about Microsoft Authenticator blocking rooted and jailbroken devices. A critical Trend Micro Apex One directory traversal fix and an invite to a live AirSnitch webcast.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Fake FedEx Email Hid Donut Loader

  • Johannes Ulrich describes a fake FedEx email that delivered a 7-zip attachment which contained a batch file and encoded PowerShell payload.
  • The analyst ran the PowerShell to dump decrypted code (set breakpoints) revealing a 'donut loader' that ultimately loads and executes Xworm.
INSIGHT

Familiar Shipping Emails Lower Guard

  • Johannes Ulrich notes that repetitive legitimate FedEx emails desensitize recipients, making them more likely to open malicious attachments.
  • The attack leverages contextual familiarity rather than novel domain tricks to bypass user suspicion.
INSIGHT

Phishers Abuse Delegated .ARPA Reverse Zones

  • Infoblox observed phishing using delegated .ARPA reverse DNS zones as normal domains, allowing TLS certs and hosting like any other domain.
  • Attackers register IPv6 reverse zones (via Hurricane Electric), point NS to Cloudflare, and host phishing pages under the .ARPA name.
Get the Snipd Podcast app to discover more snips from this episode
Get the app