meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 24th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 September 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. VBA Creates Excel4 Downloader; WPBT Unpatched Flaw; Patch for Older iOS/macOS; Broken Digital Signatures

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 24, 2021 edition of the Sansonet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.2

Attackers keep mixing up old evasion techniques in order to, well, hopefully find something new that will not get detected by anti-matter.

0:25.6

And Xavier came across an interesting trick here that one particular attacker used,

0:32.6

and that's sort of a mix of Excel4 macros and Visual Basic for applications or VBA. So Excel 4 macros is the older way

0:42.9

how to do macros in Excel. These days you typically would use VBA, but of course, Excel 4

0:50.2

macros are still supported and we talked in the past about how they're also still being used

0:55.6

in malicious code. In this particular case, which starts as your usual DocuSign mal-spam,

1:04.4

visual basic macros actually then used to create an Excel 4 macro that will then download additional malicious

1:13.2

code and that's the actual malware that is then being scheduled to run automatically.

1:20.1

So the downloader has these two components, first VBA and the VBA creates an Excel 4 macro

1:26.1

that then does the actual downloading.

1:29.5

In addition to added complication, not really sure how much that'll do in order to throw

1:35.7

off anti-malware, but then of course they don't necessarily need to throw off all anti-malware

1:42.3

if they can't throw off a couple of products. This may increase

1:46.7

their chances of success sufficiently to make the additional complexity of the attack worthwhile.

1:55.2

Researchers at Eglitzmium found an interesting vulnerability in Windows platform binary tables or WPBT.

2:03.6

This feature allows hardware like motherboards and the like to supply the operating system Windows with drivers in order to interface with the specific hardware.

2:17.8

The feature has had a little bit of controversial history

2:20.6

because essentially it does allow, for example,

2:24.4

OEMs to add additional software into your operating system

2:29.9

that is pretty difficult to remove essentially sort of root kits, sometimes also being used

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.