4.9 • 696 Ratings
🗓️ 4 August 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, August 4, 2023 edition of the Sands and the Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.8 | Got an interesting malware walkthrough today from Jan. |
0:18.0 | It was one of those fairly common sort of purchase order emails that included a |
0:23.9 | SIPT link file. The link file itself then executed a PowerShell to download an additional |
0:31.6 | badge file that then would install the actual malware. Pretty straightforward in hindsight, kind of what's happening here. |
0:41.0 | Pretty common also to see compressed link files being used to sort of initiate and compromise. |
0:49.0 | What's somewhat surprising here is even though all of the different techniques being used here, |
0:54.0 | the obfuscation such, |
0:55.2 | none of that is terribly sophisticated, but on a virus total, this particular sample still had |
1:02.7 | zero hits, kind of showing again the gaps in anti-malware, in particular if you're relying on |
1:10.0 | just sort of simple static analysis without |
1:12.8 | actually running the malware. And Microsoft's threat intelligence team published an interesting |
1:20.0 | blog post with details regarding an attack that Microsoft calls Midnight Blizzard. They believe it is |
1:26.2 | associated with the Russian government. |
1:29.3 | This particular attack is heavy on social engineering. It uses Microsoft teams as a vehicle here to reach its victims. |
1:39.3 | It does start out by naming itself something like Microsoft Identity Protection. |
1:46.1 | The account is then labeled as external, but of course they then claim to come from Microsoft |
1:52.5 | and they registered some pretty plausible domains like on Microsoft.com, and then they're |
2:00.0 | using, for example, Teamsprotection.on Microsoft.com, and then they're using, for example, |
2:01.9 | TeamsProtection.onMarkrosoft.com. |
2:04.9 | They use then social engineering in order to trick the victim into, for example, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.