meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, March 1st 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 March 2019

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Emotet Backend Analysis; Kaspersky vs. Chromecast; Wireshark 3.0; MageCart Update

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the March 1st, 2019 edition of the Sandinut Storm Center's Stormcast. My name is Johannes Ulrich,

0:08.3

and today I'm recording from Augusta, Georgia. If you have written about the Emotet malware multiple times

0:17.0

in the past, in particular, of course, Brad has written about quite a number of variants.

0:23.0

If you don't remember it, while Emmethead is typically arriving as an attachment claiming to be an

0:28.2

invoice. This invoice then usually triggers a number of word macros that are used to download

0:35.3

additional code. Security researcher Max Kirsten wrote an interesting blog post about the latest version of

0:42.5

this malware.

0:43.8

And what's different about the blog post is that he doesn't just analyze the Emotet sample

0:49.4

itself that he found, but he was also able to get access to the web server that's actually delivering

0:56.8

the malware and to the PHP code used to accomplish this.

1:02.1

The PHP code actually turned out to be quite involved, and like the malware itself,

1:07.6

the PHP code goes through quite a few steps and obfuscation in order to make it

1:13.4

more difficult to identify this PHP code. Probably the authors that are deploying this

1:20.2

PHP code, typically on compromised websites, are somewhat afraid that anti-malware on the web server

1:27.2

may actually identify this code.

1:31.0

So, for example, the code itself is obfuscated and encoded, then written to a file on the file

1:38.5

system on the web server, not necessarily in the document route, and then read back and the Eval command in PHP is used to actually execute that code.

1:50.6

Also, a rather large list of regular expressions is being used to identify the operating system of the victim based on the user agent and then a specific response is

2:04.8

crafted based on whatever operating system was identified. The only thing that's really not clear

2:11.0

from the blog post is how that particular code ended up on this web server, but of course,

2:15.9

that could be any number of particular web application

2:19.8

vulnerabilities and users of Kaspersky aniris are having issues for about a month now if they're

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.