4.9 • 696 Ratings
🗓️ 7 July 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, July 8, 2016 edition of the Sansonet Storm Center's Stormcast. |
0:07.7 | My name is Johannes Ulrich, and I am recording from Jacksonville, Florida. |
0:11.9 | Symmetria today came out with interesting report documenting details of a targeted attack that they detected recently. |
0:21.6 | Typically these attacks are called advanced persistent threat attacks. |
0:26.6 | The funny part here is that the attack was actually not really that advanced when you look at the tools used. |
0:33.6 | When it comes to these attacks, really where they distinguish themselves is the reconnaissance |
0:39.0 | being done in order to target the victims. |
0:41.9 | As part of the reconnaissance usually a customized malware document is created, like in this |
0:49.0 | case a PDF that claimed to deal with some of China's influence in the South China Sea. |
0:57.0 | However, the rest of the attack was pretty much copy paste and a lot of open source tools like |
1:05.0 | Metasploid and could probably be done by anybody who has taken some kind of intermediate pen testing class. |
1:13.6 | Now, Symmetria took an interesting approach in detecting this particular attack. |
1:18.6 | They're in the business of deploying decoys. |
1:21.6 | Now, this is not really a honeypot, really more a little bit like a honey token. |
1:26.6 | So what they did in this case is |
1:28.8 | that they left documents on systems that pointed to an rdp server that is available |
1:36.7 | well that rdp server turned out to be the actual honeypot so after the attacker broke into the |
1:42.9 | victim system and then pillaged documents on that |
1:46.7 | system, they discovered this RDP server and then tried to log into it, which led to their |
1:53.5 | discovery. |
1:54.8 | Overall, this took about three days. |
1:57.2 | Three days. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.