SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, February 5th, 2026: Malicious Scripts; Synectix Vuln; Google Chrome; Google Looker;

16 snips
Feb 5, 2026
A malware-laden Chrome script that pulls a hidden second-stage payload and why attackers favor multi-stage installs. An unauthenticated web admin interface in a small LAN appliance and the dangers of exposing tiny serial-to-Ethernet devices. Remote code execution and path-traversal flaws in Looker affecting cloud and on-prem deployments. Recent Chrome and Django security patches and a PostGIS-related SQL injection alert.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Script Hid Secondary Malware In Image

  • Xavier dove deeper into an injected script and found it downloaded an image with extra code appended to install more malware.
  • The initial loader looked like an info stealer for Chrome but then fetched a secondary payload that installed XWorm.
INSIGHT

Layered Payloads Evade Single Detection

  • Attackers layer payloads so a secondary component may survive detection that caught the first stage.
  • Expanding capabilities by appending lines to an existing script is an easy way for attackers to monetize compromised systems.
INSIGHT

Tiny Devices Often Lack Basic Security

  • The Synectix LAN-232 TRIO web admin required no authentication, giving full device control to anyone who can reach it.
  • Minimal embedded devices often expose simple services without encryption or proper access controls.
Get the Snipd Podcast app to discover more snips from this episode
Get the app