meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 14th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 September 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malicious MHT Files; Improved Coldboot Attacks; Hurricanes/Disasters; SAP Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 14th, 2018 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Orich, and I am recording from Jacksonville, Florida.

0:14.2

There appears to be no shortage of file types that an attacker can use to expose a victim with malicious content.

0:23.6

The latest example is MHT files or sometimes also called MHTML files.

0:30.6

These are files that are created typically by Internet Explorer if you are saving a web page. Problem with saving a web page is that it's more

0:40.0

than just the HTML to make the webpage work. You also need images, you may need JavaScript

0:45.9

files and the like, and that's what the MHT format accomplishes. Now it's not just the SIP archive

0:52.7

of all of these files. Instead, it's actually sort of a mime encode,

0:57.2

it's a multi-part mime file. So it's one big file. It's not compressed by itself and it includes

1:04.9

different segments with all the different files that are needed to build the web page.

1:16.5

Now, the reason the DA is looking at this file type is that he found it being used in order to, of course, spread malicious content.

1:19.1

In a simple case, it's really just sort of a little one-liner HTML file that then redirects

1:26.6

the user to a different website.

1:29.3

That then delivers the malicious code.

1:32.5

But Xavier has another example where actually a bunch of JavaScript and B-B-Script code

1:38.0

is being included in these files that in itself is malicious.

1:43.4

Attackers, of course, hope that you're not inspecting these somewhat special file types,

1:51.2

and as a result, the malicious code or the malicious URL will make it to the user past whatever sort of filters you have set up.

2:00.4

We had one user right in who I think puts it best in that he said that he's blocking all

2:07.2

of these MHT files for years with very little bad side effects.

2:12.8

The only example here he had is his Qualis Wall.

2:16.7

Let me see scanner does deliver scan reports using

2:20.3

this format.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.