SANS Stormcast Thursday, April 23rd, 2026: Stealing Telegram Sessions; Oracle CPU; Firefox Patches
8 min
•Apr 23, 20265 days agoSummary
This episode covers three critical security threats: attackers stealing Telegram session data from compromised systems, the compromise of Checkmarks' Docker images and VS Code extensions, and Oracle's quarterly patch release addressing 481 vulnerabilities. Mozilla also released Firefox 150 with 271 vulnerability fixes using AI-assisted scanning.
Insights
- Telegram session data (tdata files) are as valuable as usernames and passwords, bypassing two-factor authentication entirely—organizations should monitor for unauthorized access to these files
- Supply chain attacks on security tools themselves (Docker images, VS Code extensions) create cascading risks that can compromise downstream users and their customers
- AI-assisted vulnerability scanning (Mozilla's use of Anthropic's model) is dramatically increasing vulnerability discovery rates, suggesting the industry may be entering a new era of proactive security
- Weak Linux passwords remain a persistent attack vector, with attackers using honeypots to test for crypto miners and then pivoting to steal valuable session credentials
- Organizations using Checkmarks or Oracle products need immediate verification of downloaded artifacts, as the full scope and timeline of compromises remain unclear
Trends
Session hijacking and credential theft targeting messaging platforms as high-value attack objectivesCompromises of security and development tools creating supply chain vulnerabilitiesAI-powered vulnerability discovery accelerating the pace of security patch releasesAttackers targeting weak authentication on Linux systems as entry points for lateral movementIncreased monitoring requirements for endpoint protection to detect suspicious session activityGrowing criminal preference for Telegram due to automation capabilities and global infrastructureOracle's consistently high vulnerability counts across diverse product portfolioBrowser update frequency and patching becoming critical security hygiene practices
Topics
Telegram session data theft and hijackingCheckmarks Docker image compromiseVisual Studio Code extension securitySupply chain attacks on development toolsOracle quarterly security patchesMySQL vulnerability managementFirefox 150 vulnerability fixesAI-assisted vulnerability scanningAnthropic Mythos model for securityLinux weak password exploitationCryptocurrency miner malwareEndpoint protection monitoringTwo-factor authentication bypassBrowser security hygieneDocker Hub security risks
Companies
Telegram
Attackers targeting Telegram session data (tdata files) to hijack accounts and bypass 2FA; platform valued by crimina...
Checkmarks
Docker images and Visual Studio Code extensions compromised; malicious images rolled back from Docker Hub after disco...
Docker
Docker Hub hosted compromised Checkmarks images; platform used for distributing official container images
Oracle
Released quarterly patch update addressing 481 vulnerabilities across dozens of applications; includes MySQL critical...
MySQL
Part of Oracle portfolio; affected by critical vulnerabilities in Oracle's quarterly patch update
Mozilla
Released Firefox 150 addressing 271 vulnerabilities using Anthropic's Mythos AI model for vulnerability scanning
Anthropic
Mythos model used by Mozilla to scan Firefox for vulnerabilities, resulting in 271 fixes in single release
Socket
Research team that discovered and published analysis of Checkmarks compromise on Docker Hub and VS Code extensions
Microsoft
Visual Studio Code extensions published by Checkmarks were compromised alongside Docker images
People
Johannes Ulrich
Host of Stormcast episode, recording from Amsterdam, Netherlands
Al Carty
Author of diary entry about honeypot compromise and Telegram session data theft discovery
Quotes
"the content of the tdata file are essentially session ids that are being used to authenticate the client to telegram's system this session data could then easily be copied to another system and used to authenticate as the user so it's essentially as valuable as the username and password"
Johannes Ulrich•Early in episode
"Telegram remains to be a highly valued platform by criminals in part because of its easy automation and of course of its worldwide infrastructure that is relatively easy to use"
Johannes Ulrich•Mid-episode
"The title of the blog where they're introducing and talking about this is called the zero days are numbered just because they feel that this gives them a significant head start over attackers looking for vulnerabilities"
Johannes Ulrich•Firefox discussion
"this is likely going to then lead to additional compromises down the road"
Johannes Ulrich•Checkmarks compromise discussion
"Restart them once a day in order to make sure that the latest updates are applied at least once a week. Double check whether or not you are actually running the latest version of your favorite browser"
Johannes Ulrich•Closing recommendations
Full Transcript