SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, February 24th, 2026: Malicious JPEG Analysis; Calibre Vuln; jsPDF object injection; Roundcube Exploited

8 snips
Feb 24, 2026
A breakdown of a malicious JPEG that masked a downloader for Remcos RAT. Analysis of Calibre path traversal flaws that allow arbitrary file write and possible code execution. Examination of a jsPDF addJS object-injection vulnerability. Alert about active exploitation of a Roundcube webmail PHP serialization bug and urgency to patch self-hosted mail systems.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Malicious JPEG Began As Obfuscated Zip Downloader

  • Johannes Ulrich describes a malicious JPEG delivered as a zip containing obfuscated JavaScript downloader.
  • The attacker padded the JS with >1MB of garbage then revealed a small downloader that fetched a JPEG carrying scripts and installed the Remcos RAT.
ADVICE

Enable DMARC DKIM And SPF To Block Faked Senders

  • Use email authentication like DMARC, DKIM, and SPF to block faked sender addresses.
  • Johannes Ulrich warns the attack's from-address was faked and would fail properly configured DMARC/DKIM/SPF checks.
INSIGHT

Calibre Path Traversal Enables Arbitrary File Writes

  • Two critical Calibre vulnerabilities allow path traversal and arbitrary file write leading to potential code execution.
  • Exploits rely on opening a crafted ebook that extracts files into attacker-controlled paths because Calibre fails to sanitize extraction locations.
Get the Snipd Podcast app to discover more snips from this episode
Get the app