meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, January 6th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 January 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware AutoIT Script; CircleCI Breach; Twitter Leak; Slack Breach; Control Web Panel Bug; Turla USB Hack

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, January 6, 2020,

0:04.2

edition of the Sands and the Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.0

Brad Duncan is added again, and this time with some malware that arrived,

0:19.0

or the lead to the malware, arrived in an email written in

0:23.8

Portuguese and targeting Brazil.

0:27.8

What was a little bit unusual was the use of auto IT.

0:32.1

Auto IT is a simple, basic, like scripting language that allows you to automate Windows tasks,

0:38.7

including interacting with the GUI.

0:42.0

It works all the way back to Windows XP and creates these standalone executables,

0:48.3

which of course are very attractive to attackers in order to automate tasks like

0:53.6

downloading additional malware and executing it.

0:58.4

The trick with Auto IT is that of course it's a legitimate tool, so it's usually not detected by

1:05.2

anti-malver, but it's use in Malver like the one Brad observed, sometimes leads to it annoyingly being detected by Ante Malver.

1:16.6

What's the real problem here is not Auto-Itt, it's the scripts written with it, but of course, anti-malver doesn't always make that distinction.

1:26.6

Needless to say, with difficulties detecting it

1:30.5

and the underlying tool being not malicious, this is a rather attractive way for attackers

1:38.5

to create simple little malware executables. For more details, including packet captures, samples, and all the

1:47.7

indicators of compromise that you would ever want, well, check out Brad's diary. Well, usually I don't

1:55.4

talk much about breaches, but today we have actually a couple that are sort of actionable so that's why I want to mention

2:02.6

them the first one and probably the more severe one here is that the breach at Circle

2:10.3

CI now Circle CI the CI stands for continuous integration a company that helps

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.