meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, October 21st 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 October 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. #NanoCore RAT; #DirtyCow Priv Escalation Flaw;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, October 21st, 2016 edition of the Sandsenet Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich and the M.m recording from Baltimore, Maryland.

0:13.3

Pratt today wrote about nanocor rat.

0:16.6

This is a remote access tool that is actually available for purchase but has been used in the past repeatedly in some more targeted attacks.

0:28.7

For example, in some of these tax documents scamps we have seen going around about half a year or so ago.

0:36.6

Well, more recently Prats sees this particular toolkit being distributed via regular malicious spam.

0:45.3

Actually, according to Brad, so regular in some cases, like it's just being attached as a SIP file.

0:52.3

So it's an executable as a SIP file, that this type of spam is usually blocked

0:58.0

by any kind of, certainly something that changed another commoditization of some of the use in mass exploits.

1:07.0

And then we got a new approach escalation vulnerability in Linux.

1:11.8

That in itself, of course, wouldn't be big news.

1:14.8

But in this case, the vulnerability got branded in a sense.

1:19.0

There is a website available.

1:20.4

There is a logo available and a cute name.

1:23.4

It goes by Dirty Cow, which of course caused this particular vulnerability to be discussed more than probably it should be, given that it's just a privilege escalation vulnerability.

1:36.3

An exploit for this vulnerability has been seen in the wild. However, the exploit in the wild doesn't affect all vulnerable versions of Windows.

1:48.0

The vulnerability was introduced back about 11 years ago, which means that pretty much any version of Linux is vulnerable.

1:58.0

The exploit that has been seen in the wild rights to prok self-memm in order to

2:03.7

exploit this vulnerability, which tends to be not writable on, for example, some of the older

2:08.9

Reddit Enterprise and SendOS versions like Reddit Enterprise Linux 5 and 6 do not expose Procself

2:17.0

Mem as writable to regular users, which means that on these

2:21.0

distributions the exploit currently available doesn't work.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.