SANS Stormcast Friday April 24rd, 2026: Apple Update; Bitwarden Compromise; ASP.NET Core Patch
7 min
•Apr 24, 20265 days agoSummary
This episode covers three critical security vulnerabilities: an Apple iOS/iPadOS patch fixing a notification deletion flaw exploited by law enforcement, a supply chain compromise of Bitwarden's CLI tools via GitHub credential theft linked to the Checkmarks exploit, and an emergency Microsoft ASP.NET Core cryptographic signature verification vulnerability requiring application re-release.
Insights
- Operating system messaging components often fail to meet the encryption standards of end-to-end encrypted applications, creating persistent artifacts that can be recovered by law enforcement or attackers
- Supply chain attacks are cascading: the Checkmarks compromise led directly to Bitwarden compromise through stolen GitHub credentials, demonstrating how one breach enables secondary attacks
- Single-vulnerability Apple patches typically indicate active exploitation in the wild, even when not explicitly documented by Apple
- Cryptographic signature verification flaws enable padding oracle attacks that allow attackers to impersonate users, requiring full credential rotation and application re-release
- Developers must monitor dependencies and delay updates during active compromise investigations to avoid deploying malicious code
Trends
Supply chain attacks targeting developer credentials and build infrastructure are becoming multi-stage campaignsLaw enforcement capabilities in recovering encrypted messaging artifacts are driving security fixes in mainstream OS platformsOperating system components designed without threat modeling for end-to-end encryption create persistent security gapsGitHub credentials are high-value targets for attackers seeking to compromise open-source and commercial software projectsEmergency patches for cryptographic vulnerabilities require coordinated re-release cycles across dependent applicationsPassword managers and developer tools are increasingly targeted in supply chain attacks due to their access to sensitive credentials
Topics
iOS/iPadOS notification center vulnerability and deletion artifactsSignal encrypted messaging and notification handlingBitwarden password manager CLI compromiseCheckmarks tool supply chain attackGitHub credential theft and developer account compromiseMicrosoft ASP.NET Core data protection library vulnerabilityPadding oracle cryptographic attacksSupply chain security and malware deploymentEnd-to-end encryption and operating system integrationCredential rotation and incident responseBrowser plugin security in password managersLaw enforcement message recovery from notificationsMalware infrastructure and attack attributionNuGet package updates and .NET application patchingDeveloper tool security and build pipeline compromise
Companies
Apple
Released emergency patch for iOS/iPadOS notification deletion vulnerability exploited by FBI to recover Signal messages
Bitwarden
Password manager CLI tools compromised via GitHub credential theft in supply chain attack linked to Checkmarks exploit
Microsoft
Released emergency ASP.NET Core data protection library patch for cryptographic signature verification vulnerability
Signal
End-to-end encrypted messenger affected by iOS notification artifact retention; messages recovered by law enforcement
GitHub
Developer credentials stolen from GitHub workers used to compromise Bitwarden and Checkmarks build infrastructure
Checkmarks
Developer tool compromised in supply chain attack; malware stole GitHub API keys and other credentials from developers
Socket.dev
Security research firm that uncovered both Checkmarks and Bitwarden supply chain compromises and published analysis
FBI
Law enforcement agency recovered partial Signal messages from undeleted iOS notification artifacts in criminal invest...
NuGet
Package repository where Microsoft ASP.NET Core data protection library update is available for download
People
Johannes Ulrich
Host recording from Amsterdam, Netherlands discussing three major security vulnerabilities and supply chain attacks
Quotes
"a common problem with secure messengers that if they are using sort of these built operating system messaging components that these components may well at least not encrypt the messages to the same standard as the originating application"
Johannes Ulrich•Early in episode
"if you are affected by either of these compromises, expect all of your GitHub keys and other credentials to be stolen"
Johannes Ulrich•Mid-episode
"probably be rather better safe than sorry and double check when you last updated them what some of the versions are and probably refrain from updating these components for the next couple days"
Johannes Ulrich•Bitwarden discussion
"any keys and such that you used in your application may have been compromised"
Johannes Ulrich•ASP.NET Core patch discussion
Full Transcript