- John Hammond
- Posts
- Cybersecurity Shenanigans #017: A teenaged security flaw (no, really) and gearing up for Chicago š¤©
Cybersecurity Shenanigans #017: A teenaged security flaw (no, really) and gearing up for Chicago š¤©
This month's cybersecurity scoop.
š Hey friend,
Itās been a bit of a spicy time in Cybersecurity Land. (Just in time for Cybersecurity Awareness Month, amirite?)
On the news side, weāve got a teenaged (literally) security flaw finally patched, SonicWall SSLVPNs under attack thanks to stolen credentials, and Cl0p-style attacks targeting Oracleās E-Business Suite.
Then, on the more personal side, Iām gearing up to head to the Windy City for BSidesChicago. 𤩠Iāll spend 8ish hours on Friday getting nerdy teaching my script-based malware analysis class, hangin' with the community Saturday, then giving the Closing Keynote. Hope to see you there!
ā JH
Itās Cybersecurity Awareness Month!
But you already knew that because every vendor you know told you, amirite? š
Every October for the last several years, I've been kinda like... meh! Everyone releases Cybersecurity Awareness Month content, but it never really lands with our community ā weāre all about demos and practical stuff.
So this year, Iām shaking things up a bit. š
Join me and my Huntress teammate, Truman Kain, this Friday, October 24 at 1:00 PM ET for "Cybersecurity Awareness for Hackers - Practical Education by Huntress and Just Hacking Training.ā
We'll go beyond simple awareness and give the hacker's perspective with sweet demos of a free, cool Huntress thing called Simulators! After each simulator demo by Truman, I'll share related recommendations on Just Hacking Training for you, the hands-on hacker, and where to find more technical training for actual practitioners.
News & Commentary
Redis Lua flaw opens door to RCE šŖ
Let me start off by saying oof. š
Redis (an open-source, in-memory data store) just disclosed a critical vulnerability with a CVSS score of 10. Yes, you read that right. The vulnerability, tracked as CVE-2025-49844 (RediShell), allows remote code execution (RCE) through malicious Lua scripts.
Once an attacker gains authenticated access, they can ābreak outā of the Lua sandbox and run code directly on the host machine. And while attackers do have to achieve valid access before running any code, there are so many internet-exposed Redis instances that make a red alert appropriate for this.
And, uh, this bug has kiiiind of been hanging out in all Redis versions for checks calendar over 13 years. š š š
Thankfully, there is a patch availableāand given the possible outcomes with this vulnerability, Iād highly recommend patching ASAP if you use Redis.
Credential stuffing at work: SonicWall SSLVPN breach š
Been a bit busy at my day job with this one. š
The Huntress team recently identified a widespread compromise of SonicWall SSLVPN devices. Attackers appear to be quickly logging into multiple accounts using apparently valid credentials, which suggests stolen credentials are being used rather than brute-force attempts.
Since October 4, weāve seen 100+ accounts across 16 of our customersā environments affected, with login activity traced to a specific IP address based in Asia. And while some attackers didnāt stick around, others moved laterally inside networks, scanning and targeting Windows accounts.
All of this is coming right after SonicWall released a security advisory, which acknowledged that theyād seen unauthorized access to firewall configuration backups stored via their cloud service.
We talk a lot about how hackers all too often donāt break in; they walk in. This is the perfect example of that: They stole valid credentials that spared them from having to brute-force their way in. Plus, exposed VPNs are always juicy targets.
If youāre running SonicWall SSLVPNs, I recommend reviewing your access logs ASAP (I know, I know), rotating all your credentials, and locking down remote access. Looking through logs isnāt fun, but neither is holding the door open for threat actors, so choose your own adventure. š«
Hackers are abusing a recent Oracle 0-day in Cl0p-esque extortion campaigns š
Back in August, a security flaw in Oracleās E-Business Suite (EBS) software made way for a 0-day to surface. And now, itās believed that ādozens of organizationsā are impacted.
The security flaw is tracked as CVE-2025-61882 with a CVSS score of 9.8. Hackers are pairing it with other vulnerabilities to breach organizations, exfiltrating sensitive data before sending extortion emails from compromised third-party accountsāall signature moves we typically see from ransomware group Cl0p.

One of the extortion emails sent in this ransomware campaign that reeks of Cl0p. Source: The Hacker News
The ultimate result? Hackers gain RCE on EBS servers. The payloads include GOLDVEIN, a Java-based downloader, and SAGELEAF/SAGEWAVE, custom malware used for persistence and further exploitation.
This blend of custom malware, targeted exploitation, and social engineering screams advanced ransomware playbookānot to mention planning ahead. This was clearly a sophisticated attack that serves as a good reminder that your public-facing apps arenāt just infrastructure. Theyāre targets.
Sponsor

Securing AI Agents 101
AI agents are changing how work gets done and are rapidly emerging across enterprise environments: powering automation, chaining tools, and acting across systems.
Securing AI Agents 101 is a one-page resource to help teams build a clear understanding of what AI agents are, how they operate, and where key security considerations show up.
Inside, youāll find:
What makes an AI agent different from traditional tools
Top risks to watch, from shadow AI to excessive permissions
Four key questions to assess agent usage and exposure
Download the security flashcard and get up to speed quickly.

Email being clipped?
Hereās some actually helpful advice: You can view the email in your browser: https://johnhammond.beehiiv.com/p/cybersecurity-shenanigans-017.
(And as always, thanks for nothing, Clippy. š)
Latest Content
YouTube Videos
// I walk through how to use regular expressions (regex) in Python to search for and redact sensitive information like emails, phone numbers, IPs, and more from text files. (Itās like ctrl+f, but way better!) |
// Letās explore the dArK wEb. š We navigate real onion sites, examine dark web search engines, and investigate shady services like hacker-for-hire pages. š |
// This one investigates a fake Europol notice offering a $50,000 reward for the admins of the Killin ransomware group. |
Just Hacking Training š¤
October Announcements
šŗ Livestream Previews of In-Person Training šŗ
To see what you might miss, I did three livestreams last week to give an insiderās preview of each of the live classes JHT is presenting at BSidesChicago this Halloween, October 31. Before catching my Closing Keynote on November 1, Iād be soooo thankful if you joined me, Mishaal, or Trevor for 8+ hours of unforgettable hacking fun. Donāt forget, early registration pricing of $450 (10% off) includes food AND the online version of the course.
š» John Hammond - Script-Based Malware Analysis (Livestream Preview!)
Most security professionals are comfortable with scripting methods to analyze incidents. Extending this more familiar process, John focuses on malicious software that can more easily be turned into human readable code, rather than needing to try and make sense of a debugger or disassembler like IDA, GHIDRA, or others. Students will have an array of lessons as a guide through this much more approachable first step into the world of malware analysis.
š» Mishaal Khan - Level Up OSINT (Livestream Preview!)
Itās no hyperbole to say that Mishaal consistently produces āmind blownā syndrome during his popular online courses and talks, but thereās no substitute for having direct 1-on-1 access for an entire day! Learn actionable techniques to use on the job immediately in his intermediate-level course. See why even John Hammond was left speechless in a recent livestream. Now itās your turn to interact with him in a live setting that only happens a few times a year⦠and never at this price!
š» Trevor Stevado - Hardware Hacking 101 w/ Take-Home Kit! (Livestream Preview!)
This intense 1-day hands-on course introduces participants to fundamental hardware hacking techniques used in embedded systems security research and pentesting. Each lab starts with a basic objective and adds additional layers to challenge yourself. Learn by doing with your own dedicated hardware hacking kit custom-made for this course. Continue your journey in the comfort of your home, because the kit is yours to keep!
šø 10% Early Discount = $450
š„ Get online access to the course after the event
š½ļø Lunch included!
Want Just Hacking Training at your event? Email sales[at]justhacking[.]com.
New Courses
API Hacking by Katie Paxton-Fear "My videos on YouTube don't quite reach the mark. This course is everything you need, start to finish in 1 place with labs." Only $80 until Oct 31 with 20% Launch Discount. No code needed! |
Want a cybersecurity career? START HERE! Build your own Elastic SOC in our cloud-hosted cyber range, then play with some hands-on case studies in this $25-$50 NameYourPrice course that's truly accessible to all! |
Join Dahvid Schloss as he begins the second Windows Malware Dev Trilogy. Continue where he left off from the WMD Intro Path Bundle of Courses 1 ā 3. |
Additional Releases
Our third-week of the month content for October:
Free Upskill Challenge ā Detection via Deception by Adrian Sanabria
Blog ā Mental Fortitude for Hackers by Aqeel Haseen
Just Hacking Training is a platform providing "Focused Technical Training for All Levels" with 70+ affordable, hands-on options in 4 categories: Courses, Free Upskill Challenges, Hack-Alongs, and CTFs. With new content released twice a month throughout 2025, bi-monthly livestreams with John Hammond & our All-Star contributors, and even some āName Your Priceā options, JHT will advance your career regardless of experience level or budget.
So special thanks to @M_haggis for taking it on, and giving the idea for a "ClickFix Wiki" a better home! It has been incorporated into his ClickGrab project. I wouldn't be able to maintain the site or resource, so I really appreciate him picking it up!
mhaggis.github.io/ClickGrab/ā John Hammond (@_JohnHammond)
1:52 PM ⢠Oct 7, 2025
Thank you for having me, that was quite a treat š
ā John Hammond (@_JohnHammond)
3:58 PM ⢠Oct 11, 2025
Hello.
The Huntress CTF is back for its third year. October 1st through October 31st with new challenges each and every day, all month long. Free to play, register at any time (even while the game is running!) and play whenever you want at your leisure.
ctf.huntress.com
ā John Hammond (@_JohnHammond)
12:44 PM ⢠Sep 29, 2025
A few months ago I flew to New York to film in the Good Morning America studio, for a segment on the "grandparent scams" where bad actors use AI to impersonate family members and steal money. Last night it aired on @Nightline! š„³ Incredible opportunity, thank you for having me!š
ā John Hammond (@_JohnHammond)
4:55 PM ⢠Sep 25, 2025
Got feedback?
Feels like weāre in a groove with this thing! I invite you to help me shake it up.
Please reply to this email and let me know what youāre loving ā and what youād love to see in the next edition.
Thank you!



Social