meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, November 16th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 November 2018

⏱️ 15 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Emotet Spreads IcedID; Miners Go Docker; GPS Watches; Firefox Breach Notification; Auditd @sans_edu

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, November 16th, 2018 edition of the Sands and its Storm Center's

0:07.0

Stormcast.

0:08.0

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.0

Pratt today wrote up his latest findings regarding the Emotad Malware.

0:20.0

Now, Imotad has a number of different ways how it usually arrives, but often it does arrive

0:24.9

with the good old Word document with macros.

0:28.9

It can also first trick you to download the Word document by clicking on a link or by embedding

0:35.6

the link in a PDF.

0:39.8

But ultimately, you will end up with a Word document, you have to enable macros, and then Emotet starts and does its thing. Now,

0:46.1

over the years Pratt has documented a number of different payloads that have been spread by

0:52.4

Emotet. The latest one he's looking at is a banking trojan.

0:57.2

Now Imotet started out with its own banking trojan. Then I think it was last month. Brad

1:03.9

actually wrote about how Imodet was used to spread Suspanda, which is another popular banking trojan.

1:11.7

The latest one that Brad saw pop up on Wednesday was Iced ID.

1:19.3

Yet another banking trojan, and again, Emotet is just used as the delivery vehicle.

1:25.3

Apparently the way this works is that the crew behind Emotet does rent out its services

1:31.5

and then does install these banking trojans for other groups.

1:37.4

Sad part, of course, is yes, it still works.

1:40.5

We still have people that will happily enable macros.

1:46.7

And exposed container services are of course a nice target for an attacker that tries to deploy

1:54.5

their own workload.

1:56.8

Latest example here is a blog by Juniper that looks at how Docker servers are being used in order

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.