meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, May 22nd 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 May 2020

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Triage; Verizon DBIR; Apple Updates; Sophos XG Firewall

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, May 22nd, 2020 edition of the Sansonet Storms and Stormers Stormcast.

0:07.9

My name is Johannes Ulrich.

0:09.5

And I'm recording from Jacksonville, Florida.

0:13.6

One thing I've sometimes seen or heard security people do is sort of try to impress others by stating how many samples of malware

0:23.0

they're analyzing each day. And of course, in a reasonably large network, you quickly end up

0:29.9

with a large number of samples. But the real question is always which one of these samples

0:36.7

actually matter.

0:38.3

So if you are analyzing hundreds, thousands of samples, why do you do this if most of them

0:45.1

are really pretty similar to each other and not really all that different in their function

0:50.8

and what they're trying to accomplish?

0:53.2

So triaging Malver samples is a big task.

0:58.2

And today, Xavier introduced us to a nice tool called Fame, which stands for Fame

1:04.9

automates Malvert evaluation, that has a plug-in architecture that you can use to quickly analyze Malver and at least come up with a quick

1:16.0

conclusion. Is this something old or something new or is it interesting? In particular, he's pointing

1:22.5

out the Floss module. Now, Floss was written by Fire Eye and it does stand for Fire Eye Labs

1:32.3

obfuscated string solver. And what it does is it finds obfuscated strings inside these

1:40.2

mal-resembles without actually having to execute them. And And then of course, if you see, for example, some standard library names, API calls,

1:52.0

or maybe host names or email addresses and such, that can be useful to gauge whether or not

2:00.0

this particular malware sample is worth further analysis.

2:05.1

And Xavier is going through a couple of examples here, like for example, how to find out whether

2:09.9

or not a particular sample, maybe taking advantage of process hollowing, which of course, one

2:15.7

of the little bit more interesting techniques.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.