4.9 • 696 Ratings
🗓️ 10 April 2023
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, April 10th, 2020, |
0:04.5 | 3 edition of the Sandin at Storm Center's Stormcast. |
0:08.6 | My name is Johannes Ulrich, and the time recording from Jacksonville, Florida. |
0:13.8 | Quite a few interesting diaries over the weekend, so let's start with Friday. |
0:18.6 | Friday Xavier wrote about how detect suspicious API usage with Yara rules. |
0:25.3 | Yara rules, well, the open source language to detect malware. |
0:29.1 | That's how I always describe it. |
0:30.6 | But essentially it allows you to create patterns and efficiently search binaries for those patterns. |
0:37.7 | Now, what Xavier is looking at here is particular behavior that's often associated with malware, |
0:44.8 | in particular the virtual alloc function with the page execute read-write attribute set, |
0:51.1 | which basically means that, well, anything can be done with this just |
0:56.5 | assigned memory. And he presents a quick Yara rule to look for just this particular behavior. |
1:05.7 | Give it a try and let Xavi know if this is something that works for you. |
1:12.2 | Let me got a little surprise from Apple on Friday. |
1:15.3 | Apple released an update for iPad OS, iOS, and Mac OS on Friday. |
1:20.5 | An update was sort of expected. |
1:22.6 | That's very typical a couple weeks after there's sort of a larger update that we had recently for these operating systems. |
1:29.3 | There's often a smaller update fixing some outstanding bugs. But in this case, the update also fixed to already exploited vulnerabilities. |
1:40.3 | The vulnerabilities were reported by Amnesty International, so likely exploited in a more targeted sense in that particular context. |
1:51.5 | What's sort of interesting is the two vulnerabilities together. The first vulnerability is a web kit vulnerability. We had hundreds of web kit vulnerabilities. They, |
2:03.7 | like in this case, allow arbitrary remote code execution as you visit a malicious webpage, |
2:09.8 | but that code would typically run inside the Safari sandbox. However, the second vulnerability does allow then approach escalation to run code using |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.