

SANS Stormcast Monday March 17th: Mirai Makes Mistakes; Compromised Github Action; ruby-saml vulnerability; Fake GitHub Security Alert Phishing
Mar 17, 2025
The podcast dives into the latest antics of the Mirai botnet, which hilariously misconfigured a router exploit. A compromised GitHub action raises alarms, leaking sensitive credentials. The discussion also highlights a ruby-saml authentication bypass caused by a parsing blunder. Additionally, it warns developers about fake GitHub security alerts designed to trick them into granting malicious apps OAUTH privileges. Cybersecurity never sounded so intriguing!
AI Snips
Chapters
Transcript
Episode notes
Mirai Botnet's Flawed Exploit
- A Mirai botnet variant is exploiting DrayTek Vigor router vulnerabilities.
- However, the exploit URL is malformed, making it ineffective.
Compromised GitHub Action
- The GitHub action "tj-actions/changed-files" is compromised and leaks secrets.
- Remove this action from your workflow and check logs for leaked secrets.
Ruby SAML Vulnerability
- Ruby SAML uses two different XML parsers, REXML and Nokogiri, which parse differently.
- This parser differential can lead to authentication bypasses, so update Ruby SAML.