meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, January 7th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 January 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Targeting Chinese; Google Docs Comment Abuse; Google Voice Auth Scam

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, January 7, 2020 edition of the Sansonet Storms, anders Stormcast.

0:08.3

My name is Johannes Ulrich.

0:09.9

And I'm recording from Jacksonville, Florida.

0:13.7

Xavier is on a role this weekend.

0:15.4

Well, he found yet another interesting malware sample.

0:18.7

This time, a Python script that is pretty much still under development,

0:23.4

so it's not quite finished yet, but likely the author actually uploaded it to VirusTotal.

0:31.0

What's sort of special about it is that this Python script specifically targets system with a simplified Chinese user interface language.

0:42.2

So basically mainland China is being targeted here. That's however, is also where you sort of see

0:49.1

a little bit the beta version here of the script. There is an API call that's being used here,

0:55.7

get system default UI language.

0:57.5

If it's not equals to 2052,

1:00.7

which would be simplified Chinese,

1:03.2

it's exiting,

1:04.5

but actually the exit here is commoned out.

1:07.5

So maybe the developer was actually using a system that's in, not in Chinese and is trying to sort of

1:15.3

still experiment with the script. The script will then download additional malware from the

1:22.6

Alibaba cloud. So again, consistent with targeting Chinese, that it is using a Chinese cloud provider

1:30.4

to deliver additional parts of the malware. Given that the overall malware hasn't been finished

1:36.6

yet, it's not really clear what the purpose is. It's also listening on some odd high ports,

1:41.9

but also only on loopback. And yes, we usually hear more about systems that

1:48.4

sort of target Western countries and, for example, avoid, for example, Russia by detecting keyboard

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.