meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, October 22nd, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 October 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Stolen Images Malware; FiveSys Signed Rootkit; Oracle CPU; WinRAR Vuln; Bad NPM Packages

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, October 22nd, 2021 edition of the Sandsenet Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and today I'm recording from Riyadh, Saudi Arabia.

0:14.0

In today's diary, Brad is updating us on the Stolen Image Evidence Campaign.

0:20.5

One interesting update here, the message that you'll receive is typically not sort of just

0:26.1

a simple spam email, but instead was likely submitted via some kind of web-based contact form.

0:34.7

The message then claims that there is some evidence of wrongdoing, some copyright violation,

0:41.1

or the like which will link to a SIP file. The SIP file, once uncompressed, will reveal a JavaScript

0:48.7

file, and then the JavaScript file does download and run a DLL.

0:55.2

That turns out to be malware based on sliver.

0:58.3

Sliver is often referred to as an adversary emulation tool.

1:03.1

Essentially a tool pen testers are using in order to create malicious files for their tests.

1:09.9

But of course, the same tools are also quite useful

1:13.2

for the bad guys. And as usual, Brad will provide you with all the P-caps and details in order

1:19.8

to train your teams in recognizing and analyzing any similar activity.

1:30.2

And Bit Defender ran across yet another RootKit that takes advantage of digital certificates

1:33.3

that are validated by Microsoft.

1:37.4

Netfilter was a similar case a couple of months ago,

1:41.3

and the problem here is that a lot of the protection that Windows

1:45.8

uses against rootkits, against drivers and such being installed are being bypassed as soon as

1:54.3

the Malware is able to present a valid certificate. These are not stolen certificates, but instead the malware author was apparently

2:04.3

successful into tricking Microsoft into signing one of their certificates. Aside from the fact that

2:12.1

this, of course, can be very damaging to a system exposed to this malware.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.