meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, March 3rd, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 March 2023

⏱️ 14 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malicious OneNote and YARA; DroneID Security; OAuth Flaw; Marco Gfeller Malware Analysis Pipeline #sans_edu

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, March 3, 2023 edition of the Sands and its Storms, Stormcast.

0:09.3

My name is Johannes Ulrich, and that I'm recording from Jacksonville, Florida.

0:15.3

The DA today continued his task to come up with ways to detect malicious OneNote files. And well, of course, the reason

0:22.9

we keep talking about OneNote files is because attackers continue to use them to deliver

0:28.1

malware after Microsoft did limit what can be done with other office formats. In order to deliver

0:36.6

their malicious content using OneNote files,

0:39.4

an attacker has to embed a file into the OneNote file. Now, a popular, harmless embedded file type

0:47.8

that you may find in OneNote files are images. If you are trying to find malicious one-note files,

0:55.9

a good idea is to look for one-out files

0:58.6

that have embedded files that are not images.

1:03.1

But of course, in addition to that,

1:04.6

they may contain some harmless images as well.

1:08.0

And that's what the here accomplished with Yara rules, Yara, the open source detection

1:15.2

language. And essentially, all he did here was he counted the number of embedded files. Then he

1:21.7

subtracted, of course, the number of images in the one-o document. If something is left over, well, that's not an image,

1:30.7

and that's sort of what the rule does.

1:33.3

Also important, of course, to know what the right strings are that you have to look for

1:37.5

that identify these different embedded file types.

1:42.4

And in recent years, small quadcopter drones have become really popular.

1:47.9

And of course, with that, there have also been problems with these drones interfering, for example,

1:54.4

with commercial air traffic.

1:56.7

The market leader in this particular segment, DJI, did implement an interesting proprietary

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.