SANS Stormcast Wednesday, April 22nd, 2026: WAV Malware; GitHub OAUTH Phishing; Perforce Settings
7 min
•Apr 22, 20267 days agoSummary
This episode covers three cybersecurity threats targeting developers: WAV malware using steganography to hide executables, GitHub OAuth phishing exploiting notification delays, and insecure Perforce default configurations. All three represent supply chain attack vectors against software developers.
Insights
- Attackers are increasingly targeting developers as a supply chain vector, using multiple platforms (GitHub, Perforce) to gain access to systems and credentials
- Simple obfuscation techniques (base64 encoding + XOR cipher in audio files) can be effective at bypassing initial detection if they appear legitimate to users
- OAuth's cryptographic strength is undermined by usability issues—users struggle to understand what privileges they're granting and to whom, making social engineering more effective
- Time-of-check-time-of-use (TOCTOU) vulnerabilities in notification systems can be exploited to craft more convincing phishing attacks by modifying content after initial trigger
- Default configurations in widely-used developer tools pose significant security risks; organizations must actively review and harden settings rather than relying on vendor defaults
Trends
Supply chain attacks increasingly focus on developer tools and platforms as high-value targetsSteganography and simple obfuscation techniques remain effective for initial payload delivery despite their simplicityOAuth-based attacks are growing as attackers exploit the gap between protocol security and user understandingNotification systems and timing-based vulnerabilities are being weaponized in social engineering campaignsDefault configuration weaknesses in enterprise software remain a persistent and exploitable vulnerability classMulti-stage attacks combining social engineering with legitimate platform features are more effective than traditional phishing
Topics
WAV file steganography and malware obfuscationBase64 encoding and XOR cipher encryptionGitHub OAuth token theft and phishingGitHub notification system vulnerabilitiesTime-of-check-time-of-use (TOCTOU) attacksOAuth usability and privilege assignment issuesPerforce version control security configurationDeveloper-targeted supply chain attacksDefault account and password reset vulnerabilitiesRepository synchronization security controlsMalware analysis and Python-based extraction toolsPE header analysis and executable recoveryFreemium software security models
Companies
GitHub
OAuth phishing attack exploits GitHub notifications and application authentication to steal developer tokens
Perforce
Version control software with insecure default configurations that pose risks to developer environments
SANS
Host organization of the podcast; sponsors the episode through SANS.edu Credit Certificate Program
People
Johannes Ulrich
Host of the Stormcast podcast episode, recording from Amsterdam
dde
Analyzed WAV malware with embedded executable and created Python scripts for extraction and key brute-forcing
Morgan Robertson
Authored blog post revealing insecure default configuration options in Perforce software
Quotes
"OAuth itself, cryptographically, technically a very solid protocol, suffers often from usability issues where it's not really all that clear to the user, even a little bit more sophisticated user like a developer."
Johannes Ulrich
"The attacker will create an issue and mention the victim inside the issue. Now this will trigger a notification for the victim but that of a little twist comes in. There actually a delay in the notification being created and GitHub actually retrieving the necessary data from the actual issue."
Johannes Ulrich
"The attacker here used a piece of malware an executable and base64 encoded it then used a simple xor cipher in order to encrypt it and essentially used the resulting data as the audio data in a dot wave file."
Johannes Ulrich
"It is not phishing in a sense where an attacker has to set up a fake GitHub clone or anything like this. Instead, the link then in that GitHub notification will entice the victim to basically connect to the attacker's application."
Johannes Ulrich
Full Transcript