meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, April 9th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 April 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Ransomware Prototype; HTML Lego; Azure Functions Vuln; Cisco SMB Router Patches;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, April 9th, 2021 edition of the Sands and at Storms,

0:06.3

Sonners, Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.8

Wouldn't it be nice to look over an attacker's shoulder as they are developing a matter

0:20.6

to be used against you. Xavier sort of ran into

0:24.4

a case where he found on a virus total. It looked like a proof-of-concept piece of software. It

0:31.1

definitely wasn't quite done yet, but shows some of the interesting tricks that the attacker is planning to play here.

0:40.3

So first of all, this looks overall like Ransomware, however it does really just sip the files in the current version.

0:50.3

It does use a command control channel over Tor and is entirely written in PowerShell.

0:58.0

Of course, the simplicity of the code also means that a detection by anti-malver engine at this point

1:04.7

is really non-existent in some ways.

1:07.9

It reminds me a little bit of sort of that living off the land approach.

1:12.2

Also, the Tor client is not included in the malware.

1:16.5

That would be something that would need to be installed separately.

1:21.5

And the use of 7-zip, while not as fancy and strong as what some other ransomware is doing, it may be intended to sort of fly

1:30.4

under the radar of tools that look for the excessive use of encryption libraries by using

1:36.3

a common tool, again, that living of the land approach. And talking about evading various

1:43.4

signatures, Trustwaves Spider-Lab came across some

1:48.1

interesting phishing email that sort of takes the idea of just delivering a bunch of HTML to the

1:54.8

next level by splitting up that HTML into different blocks and hosting it on YourJavascript.com.

2:03.7

Your JavaScript.com is not a malicious site. It's a site to host JavaScript code for free.

2:10.7

And, well, like any free file hosting service, this service now also has been abused to host fishing pages.

2:21.1

But what's sort of different here is that the fishing page isn't sort of host in its entirety.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.