meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, August 3rd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 August 2018

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware in Animated GIF files; MicroTik Miner Botnet; MSFT Edge Vulnerability

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, August 3rd, 2018 edition of the Sandsenet Storm Center's

0:06.3

Stormcast. My name is Johannes Ulrich, and the day I'm recording from Jacksonville, Florida.

0:13.3

Today, Brad wrote of a new variation of the good old D.HL. Malspam as typical for this type of attack, the email

0:24.4

tricks the user into running a loader that then installs additional malware.

0:31.2

This is where it starts to become a bit unusual with this particular sample.

0:37.2

The loader did retrieve an animated gif file.

0:42.1

As it turns out, this file actually was a normal functional file, even displayed the little

0:48.3

animation, but it had executable attached to it. So after the file finished, there was a second file with the executable.

0:58.8

Now, this executable then included the Agent Tesla spyware.

1:05.3

Now, I read up a little bit on this, and Agent Tesla has used sort of tricks in the past,

1:10.6

where it was delivered with, for

1:13.2

example, a corrupt header in order again to fake out anti-malware and trick it into not scanning

1:21.5

the particular file. That's probably the intention here as well that anti-mailware thinks this is just an image.

1:29.0

I don't have to scan it.

1:30.6

And that's sort of how this particular file then gets delivered to the victim.

1:35.4

The loaded in strips off the gift file and just runs the executable.

1:42.0

As usual, Brad provides a number of indicators of compromise that you can use to look for

1:47.1

this particular threat in your environment.

1:51.6

About a year ago, you may probably not have heard of Microtig routers.

1:57.1

They are a bit more of a niche router overall and not as popular as routers from the big brands like lynxys or Netgear.

2:06.6

But they keep popping up in this podcast and in security news for of course all the wrong reasons.

2:14.6

Yet again, Microtick is in the news for a botnet that was built using these

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.