Handler on Duty: Brad Duncan
Threat Level: green
Podcast Detail
SANS Stormcast Friday, March 27th, 2026: TeamPCP Update; DarkSword vs Patches; LangFlow Exploited
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9868.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
TeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
https://isc.sans.edu/diary/TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20001%20-%20Checkmarx%20Scope%20Wider%20Than%20Reported%2C%20CISA%20KEV%20Entry%2C%20and%20Detection%20Tools%20Available/32834
DarkSword and This Weeks iOS Updates
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
LangFlow Exploited
https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Friday, March 27th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Industrial Control System Security. Well, you can't get quite let go of Team PCP and the supply chain compromise. Kenneth Hartman, SANS instructor who also did the webcast I mentioned yesterday, published a quick update as Diary. One of the important points here is that the checkmarks compromise affected all 91 tags. That was not sort of noted initially. I mentioned yesterday what you're seeing now is just the tip of the iceberg. So always suspect under reporting. You must rotate credentials even if you just suspect that you had an issue. You may have some time as apparently Team PCP is a little bit behind in actually using all of the credentials. But you really also for future reference, you must get good at rotating credentials. If you can't do it sort of weakly just for the fun of it, without breaking anything, then you're not good at it. So try to get to that point. liteLLM. Well, because it was compromised, PyPy actually froze that particular repo and it now has been released again. liteLLM announced that for now they're not going to release any new releases. The latest good one is still out there, so you can use it if you want to. But before they're doing any new releases, they first want to go over their CI/CD pipeline, their release procedures to make sure that something like this doesn't happen again, which sounds like a very good idea. Then, of course, earlier this week we did have the Apple updates and there were some questions, some confusion about another sort of Apple related event that has gotten a lot of press lately and that's a Darksword. So first of all, what's Darksword? Darksword is basically a set of exploits being used on websites that if a user with a vulnerable Apple device visits one of those websites, they're getting infected and the exploits being used in Dark Sword, they actually came originally out of a little more sort of these government sponsored spyware scenarios. Koruna was like the name for that particular campaign back in July last year. This is really sort of one example where these exploits are trickling down from more sophisticated to more widely used malware. But what's causing confusion is sort of the overlap of these events of Apple releasing updates and Darksword sort of being discussed in the press. This week's updates did not fix any of the vulnerabilities that were used in Darksword. At least that's not sort of what's in the update here. Early February, Apple released iOS 26.3 and then early March. Remember they released these updates for like the older operating systems 18.4, 18.6. Those were the updates that fixed some of these vulnerabilities used by Dark Sword and Koruna. So as long as you use 26.3, which is the February version of iOS, you're good as far as Dark Sword is concerned. This week's update, you don't need to apply it to be safe from these currently used exploits. On the other hand, of course, always a good idea to keep your stuff up to date. And who knows that I may be the next Darksword around the corner that uses new vulnerabilities that were patched this week. So definitely update, but it's not like a super emergency where anything that was patched this week is sort of already being exploited. And in the show notes, I'll add a link to a blog post by Google that has a real good timeline how these different exploits were patched and how they were used by various attackers. And yes, let's go back to AI. We do have a vulnerability that was recently being discovered in Langflow. Now, Langflow is one of those visual systems allows you to create AI pipelines and racks. And yes, it had a number of vulnerabilities. That's not the first time that there was a vulnerability here. But according to a blog by Sysdig, this vulnerability was exploited within 20 hours of the patch being released. Not a huge surprise given, you know, how frequently Langflow is being used. And also, you know, with some of these open source tools, of course, the diff is much quicker than a bin diff in some kind of a commercial tool. That's also probably not all that popular. Get it patched. And if you haven't patched yet, assume compromise. And didn't I mention rotating keys and all that good stuff? So yes, you definitely get to do that. Well, and that's it for today. Thanks for listening. Thanks for liking. Thanks for subscribing. Next week, of course, I'll be in Orlando at our spring conference. So if you run into me, I always have some Internet Storm Center stickers with me. And well, talk to you again on Monday. Bye. Bye. Bye. Bye. Bye! Bye! Thank you.





