meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, December 6th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 December 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. BEC Step by Step; Mital MiCollab PoC; Lorex Camera, HPE Aruba Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, December 6, 2024 edition of the Sansonet Storm Center's Stormcast.

0:09.2

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:15.8

Timing is everything in particular when it comes to defenses, being able to outrun the attacker as

0:23.3

their scheme unfolds. Got an interesting blog post here by one of our interns, Chris Kobe.

0:31.0

Chris is writing about business email compromise and well, unlike other interns, this is not Honeypot data, but data from an actual

0:41.8

business email compromise. Apparently, this all started on the 20th of May the overall scheme,

0:49.4

took about three days to unfold, and in the end end did result in a successful payment that the attacker

0:59.1

was able to trigger. One important rule that actually led to the detection of the attack

1:05.7

is the creation of a new inbox rule. These inbox rules, well, they are somewhat common.

1:13.8

People like to filter inboxes.

1:16.5

Apparently what the attacker did here was just send email with a specific pattern to an RSS feed box.

1:25.3

So didn't forward it to an external email address, which these days is often blocked in a better defended organization, and may likely also lead to more actionable alerts.

1:39.9

But I like how sort of the different phases of the attack are being laid out here.

1:44.2

I think the real detection here comes sort of from detecting the overall behavior,

1:50.1

not from looking for one specific alert.

1:54.0

And again, from a prevention point of view, just setting up these inbox rules could potentially be used.

2:01.5

If you block these inbox rules, well, the attack wouldn't work.

2:05.5

But that again, maybe a little bit too burdensome to your users.

2:11.6

The diary also summarized the lessons learned and some other technical steps that were taken to mitigate a repeat of an attack like this.

2:21.6

Well, whenever I mention Watchtower Labs, you probably know by now that there is probably an interesting

2:28.1

exploit coming. This time it's in MyTEL's My Collab.

2:33.3

MyTel is a company that deals most in voice over IP and similar solutions.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.