SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, February 3rd, 2026: Scanning for AI; Notepad++ Compromise; OpenClaw Vulnerabilities

14 snips
Feb 3, 2026
Scans found attempts to discover exposed Anthropic models on the open Internet. A popular text editor’s update host was hijacked and linked to a state-level backdoor campaign. An AI assistant platform has insecure loopback websockets, a wave of malicious skills, and thousands of instances exposed publicly.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Public Scans Target Exposed Anthropic Models

  • Exposed Anthropic model endpoints were detected scanning from a Tor exit node over the weekend.
  • Johannes Ulrich warns not to expose locally hosted models or proxies directly to the Internet.
ADVICE

Audit Notepad++ For Supply-Chain Backdoor

  • Check Notepad++ installs for malicious downloads and follow Rapid7 IoCs to identify compromise.
  • Update to the new hosting provider release and verify installer integrity to remediate the supply chain backdoor.
INSIGHT

Convenience Created OpenClaw's Risk Surface

  • OpenClaw (ClawedBot/MoldBot) gained rapid adoption because it automates workflows across web services.
  • That convenience also exposes large attack surface due to the many integrations it requires.
Get the Snipd Podcast app to discover more snips from this episode
Get the app