meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, March 31st, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 March 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malicious 3CX Desktop App Update; Reverse Engineering Obfuscated Powershell via Debugger

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, March 31st, 2003 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.3

Well, today I'll deviate a little bit from my normal format. I'll not start with today's diary post. Instead, I want to give an update on the 3CX

0:24.3

situation. I mentioned this briefly yesterday, 3CX, a company that distributes voice and video

0:32.1

over IP software. The desktop line that are distributing for Mac and Windows was a compromise,

0:40.6

which meant that beginning this week, if you download a desktop client, you also installed

0:46.3

a back door. With this application being used literally by millions of users, this is a significant

0:53.5

supply chain incident.

0:55.8

And while this is still a somewhat developing situation,

1:00.0

we do have a couple more details by now.

1:03.0

When you're running the malicious application,

1:05.5

it will first reach out to a specific GitHub repository,

1:09.7

download some icon files, and then extract some

1:13.3

base 64 data from those icon files that will give it additional instructions, in particular,

1:20.1

how to download a particular DLL for the Windows version that then implements an InfoSteeler. The InfoSteeler uploads data about the system,

1:32.5

version of software, browser versions, and also the browser history to a collection point,

1:40.1

to a command control server that then the attacker, of course, may have access to.

1:45.7

Now, this entire infrastructure has been dismantled by now, so if you are running it right

1:51.8

now, the software shouldn't cause any damage, but of course, we don't know everything yet

1:59.2

about it, so would still be extremely careful with this.

2:04.7

The root of all of this was the Lib FFMPEC library that was included with this desktop client.

2:12.7

Lip FFMPEC is a standard open source library.

2:16.3

It implements various sort of video audio encoding routines.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.