meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Encore: The curious case of the missing IcedID. [Only Malware in the Building]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 4 July 2024

⏱️ 20 minutes

🧾️ Download transcript

Summary

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape. And be sure to check out the latest episode of Only Malware in the Building here. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network powered by N2K.

0:10.0

This week on Only Mal malware in the building.

0:13.0

You know, I'm going to make a note of that and share it with my detection team that they should all put clothes in their USB drive, clothes of garlic.

0:21.0

I mean, it couldn't hurt.

0:22.0

I just upgraded my modem

0:24.4

Dave so I don't want to hear any crap about how snow I am on this particular

0:28.1

episode. We sound impulsively brilliant. Even malware has multiple names for the same type of malware.

0:36.0

It's, yeah, you have to keep them straight.

0:38.0

Do we understand the circumstances of how it just fell off the radar?

0:42.0

Only if you'll share your dips, Dave.

0:44.0

No, I'm sorry. Welcome in the building. You've entered only malware in the building.

1:03.0

Join us each month to sip tea and solve mysteries about today's most interesting threats.

1:09.0

I'm your host, Selina Larson, proof point threat researcher.

1:12.8

Being a security researcher is a bit like being a detective.

1:16.4

We gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle.

1:21.8

Inspired by Mabel Mora and the residents of New York's exclusive Upper West Side residents,

1:27.6

I alongside N2K networks Dave Bitner and Rick Howard

1:31.9

uncover the stories behind notable cyber attacks. The IT world used to be simpler, You only had to secure and manage environments that you controlled.

1:56.0

Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere.

2:03.4

This means poor visibility, security gaps, and added risk.

2:07.5

That's why Cloudflare created the first ever Connectivity Cloud.

2:12.1

Visit Cloud.com to protect your business everywhere you do business. Today we're talking about the curious case of the missing Iced ID.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.