4.9 • 696 Ratings
🗓️ 26 April 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, April 26, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich. |
0:09.4 | And today I'm recording from Jacksonville, Florida. |
0:13.5 | In Diaries, we got a couple of quick ones over the weekend. Xavier talked about a malicious PowerPoint file that distinguishes itself with a very compact |
0:24.6 | and simple visual basic macro. |
0:28.4 | Instead of one of those classic Living of the Land attacks, it uses the built-in Microsoft |
0:34.2 | tool MShTA.exe to download and then execute the actual malware. |
0:43.0 | And Ghee took a quick look at what passwords people sent via basic authentication to honeypots. |
0:50.5 | And well, no big surprises here. |
0:52.3 | Now, if you're looking at the list, there's one that ranks |
0:55.0 | really high, that's sort of part of his top five that does look like a random UUID. Well, while the |
1:02.3 | string is sort of random, it's not random in the sense that a fairly popular set of video |
1:09.7 | recorders apparently uses this as a hard-coded password. |
1:14.5 | So at least they didn't use admin and instead used a random password, but the same |
1:19.2 | random password for millions of devices. |
1:24.1 | And on Friday, Glick Studios, the company behind password manager, password state, |
1:29.4 | announced that they apparently were breached and customers were provided with a compromised |
1:36.3 | update. |
1:37.4 | Now, there's not a lot of solid information here. |
1:39.8 | The CSIS group has a write-up about this with some details, but they weren't able to retrieve all |
1:47.5 | stages of the malware. Looks like it was shut down relatively quickly, but it's fair to assume that |
1:54.4 | the malware did attempt to infiltrate passwords. And of course, that's sort of the worst case scenario when it comes |
2:02.2 | to password managers, that the password manager itself gets compromised. Password state itself |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.