meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, November 30th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 30 November 2018

⏱️ 14 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Ancient Ransomware Family Still Active; Scamclub; Blocking Shodan @sans_edu

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, November 30th, 2018 edition of the Sandsenet Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.3

Not all malicious spam comes in English. Brad is looking at the recent example of mal-spam in Russian. Now the technique used here

0:24.6

is something that you're probably familiar with. It included an attached zip file and that

0:30.7

zip file if decompressed then reveals JavaScript which will then launched, download malware and in this case,

0:40.0

ransomware. The ransomware is actually quite old. Brad noted that the first time he covered

0:46.4

this particular ransomware was in 2014, so it's almost eight-year-old ransomware. But remember,

0:53.1

it's not the same ransomware as eight years

0:56.3

ago.

0:57.3

This ransomware kept evolving and as a result probably is still able to bypass some current

1:03.3

controls.

1:04.3

And of course for the attacker, it's pretty cheap and easy to just reuse old software like

1:09.6

this even if the success rate is probably not all that

1:14.0

large. Now if an attacker can get you to click on an email link and other popular way to reach

1:21.5

victims is malvertising. Malvertising refers to bad actors buying advertisements on otherwise benign websites and then redirecting users that visit a website to their content.

1:35.3

About two weeks ago, security company Confiant did detect a large malvertising campaign that did exceed prior campaigns by orders of Magnet.

1:47.1

A group that Confiant refers to as Spam Club managed to redirect 300 million browser sessions,

1:53.8

at least that's their estimate over the space of 48 hours.

1:58.6

The reason they were so effective was that they actually managed to get access to one of the

2:04.3

top five ad networks. Usually these melvertising campaigns use smaller ad networks. They of course

2:11.3

are a little bit easier to convince to then include these malicious advertisements. But on the other hand, these small ad networks

2:20.3

are usually used by smaller, less reputable sites.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.