Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Monday, March 16th, 2026: SmartApeSG and Remcos RAT; React Based Phishing; Google Chrome Patches; AdGaurd Vuln
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9850.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
SmartApeSG campaign uses ClickFix page to push Remcos RAT
https://isc.sans.edu/diary/SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT/32796
A React-based phishing page with credential exfiltration via EmailJS
https://isc.sans.edu/diary/32794
Google Chrome announced two zero-day fixes, then removed one.
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html
AdGuard Vulnerability
https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.73
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Monday, March 16, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu graduate certificate program in Purple Team Operations. And today we got a couple of interesting diaries to talk about. The first one is by Brad about a click fix campaign that is then pushing Remco's RAT. Now this is all associated with SmartApeSG, a threat actor that Brad has talked about before. In the past they have deployed other RATs like for example NetSupport Manager. Overall the attack is well what we have seen so many times where a victim is presented with a fake captcha that tricks them into copy pasting a command into their Windows system that will then download the malware. As usual Brad is sharing also all the evidence including packet captures and the like. So this is a great diary kind of to follow along Brad's analysis and learn also a little bit more about how to analyze these kind of compromises. And the second diary from this weekend comes from Jan and Jan is looking at an interesting phishing trick being played here. It all starts fairly straightforward. The victim receives a PDF. The PDF itself is harmless other than it contains a link to a Cloudflare worker. And that Cloudflare worker is used in order to display the phishing page with a lot of JavaScript. Now the one trick here that the attacker is displaying the attacker is collecting of course credentials and in the example that Jan shows they're impersonating Dropbox. But they have to get the credentials somehow to the attacker. In the past we have seen stuff used like Telegram for example is very popular. A bunch of different APIs. What they're using in this particular case is email.js. Email.js allows you to send email with JavaScript. Of course JavaScript itself doesn't allow you to like speak SMTP or such. So instead they're connecting to the email.js web service that allows you to then send HTTP requests to the web service. That will then result in the email being sent to the attacker. So an interesting twist on this. Of course I think it makes it a little bit easier than to actually find the attacker given that you can check what email.js account or so they're using. And that may be a little bit of a vulnerability here in this particular scheme. But then again as long as it lasts a day or two. That's probably all attackers need in order to call this particular phishing campaign successful. Well then we got a little bit of patch drama with Google Chrome. On Thursday Google released a new version of Chrome. Stating that they patched the two critical vulnerabilities in Google Chrome that were already exploited in the wild. On Friday they corrected the notice stating that this update actually only fixes one of these vulnerabilities. And the second is going to be updated in the next version of Google Chrome. So there is still an outstanding already exploited vulnerability that will hopefully be patched soon. Just now make sure that you keep Google Chrome patched. As I always say at least once a day restart Google Chrome. And once a week double check that you're running the latest version. Microsoft published a blog post with details regarding a campaign they are currently observing that tricks users into downloading malicious VPN clients. It all starts with good old search engine optimization. So that's still a thing sadly. If the user searches for VPN client they are then being directed to a fake website that imitates the particular manufacturer. And then the download will actually capture the credentials as the user types them in. There are a number of different VPN clients being impersonated here by this particular malware. Like Pulse Secure is like one but also Fortinet and a couple of other. Cisco I think also there is not a vulnerability really in any of these VPN systems. But just malicious software that the user is tricked into installing. It's digitally signed using a Chinese certificate. Unclear where that came from but likely stolen from the rightful owner. And with all of the search engine optimization tricks and in many cases also paid malicious advertisements. Of course one defense is to run some kind of ad blocker. Well if you're running AdGuard Home there's an update for you. It does fix an authentication issue that would allow an attacker to gain full access to AdGuard Home without valid credentials. I'm not sure how severe this vulnerability or exploitable it is given that it does require a transition from HP to clear text. And to basically encrypted or HP to over TLS. And browsers typically don't support HP to clear text. So maybe difficult to exploit but please keep your systems updated. And this time it's AdGuard's time. Well and this is it for today. So thanks again for listening. Thanks for liking. Thanks for subscribing to this podcast. And talk to you again tomorrow. Bye.





