Security Weekly Podcast Network (Audio)

North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More - SWN #560

Mar 3, 2026
Coverage of North Korea's USB air-gap tactics and an MSHTML exploit used to escape browser context. A deep dive into developer supply chain attacks and exposed API keys. Discussion of OpenClaw agent flaws and a major third-party data exposure. Debate over Anthropic's risk designation and new EU ICT supply chain guidance.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Air Gap Crossing By Treating USB As A Network

  • North Korean APT37 treats removable media as a network layer to move data across air gaps.
  • Zed Skiller observed LNK-based decoys, batch files, PowerShell, and shellcode enabling bi-directional persistence and Cloud C2 for exfiltration.
INSIGHT

Legacy MSHTML Lets Browser Content Escape To Shell

  • APT28 exploited MSHTML hyperlink navigation logic in ieframe.dll to escape browser security boundaries.
  • The flaw allowed attacker content to get Windows Shell to act outside expected browser context, leveraging legacy IE components still embedded in Windows.
INSIGHT

Steganography In NPM Packages Targets Developer Secrets

  • Attackers used 26 malicious NPM packages and steganography to target developers for credential and secret harvesting.
  • Socket found character-level stego in Pastebin dead-drops and 31 virtual deployments masking staging infrastructure.
Get the Snipd Podcast app to discover more snips from this episode
Get the app