

Zero-Days, Cookies, and the Death of Dial-Up
14 snips Aug 14, 2025
A critical zero-day exploit targeting WinRAR users reveals the risks of malicious RAR files in phishing scams. The impact of stolen browser cookies on security measures like MFA is discussed, shedding light on their economic motivations. Nostalgically, one host bids farewell to AOL dial-up, reminiscing about the excitement of early internet days. The complexities of cybersecurity regulations are also examined, especially their implications for collaboration with the Department of Defense. It's a blend of nostalgia, serious threats, and insightful discussions!
AI Snips
Chapters
Transcript
Episode notes
WinRAR Path-Traversal Enabled Persistent RAT
- A WinRAR path-traversal zero-day let attackers extract files to arbitrary system paths and plant a DLL in startup folders.
- That DLL persisted across reboots and created HTTPS C2 channels, bypassing AV by abusing WinRAR's trusted status.
Old Vulnerabilities Keep Reappearing
- Many exploited vulnerabilities are old classes like path traversal, indicating regression in secure development.
- New developer cohorts may reintroduce decade-old bugs because historical lessons weren't retained.
Block Unneeded Services And Use Threat Intel
- Block unnecessary apps and services (e.g., Telegram) in corporate networks to disrupt attacker C2 channels.
- Use threat intel feeds to update DNS blocks and prevent known malvertisement domains from delivering payloads.