Hacker And The Fed

Zero-Days, Cookies, and the Death of Dial-Up

14 snips
Aug 14, 2025
A critical zero-day exploit targeting WinRAR users reveals the risks of malicious RAR files in phishing scams. The impact of stolen browser cookies on security measures like MFA is discussed, shedding light on their economic motivations. Nostalgically, one host bids farewell to AOL dial-up, reminiscing about the excitement of early internet days. The complexities of cybersecurity regulations are also examined, especially their implications for collaboration with the Department of Defense. It's a blend of nostalgia, serious threats, and insightful discussions!
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

WinRAR Path-Traversal Enabled Persistent RAT

  • A WinRAR path-traversal zero-day let attackers extract files to arbitrary system paths and plant a DLL in startup folders.
  • That DLL persisted across reboots and created HTTPS C2 channels, bypassing AV by abusing WinRAR's trusted status.
INSIGHT

Old Vulnerabilities Keep Reappearing

  • Many exploited vulnerabilities are old classes like path traversal, indicating regression in secure development.
  • New developer cohorts may reintroduce decade-old bugs because historical lessons weren't retained.
ADVICE

Block Unneeded Services And Use Threat Intel

  • Block unnecessary apps and services (e.g., Telegram) in corporate networks to disrupt attacker C2 channels.
  • Use threat intel feeds to update DNS blocks and prevent known malvertisement domains from delivering payloads.
Get the Snipd Podcast app to discover more snips from this episode
Get the app