4.9 • 696 Ratings
🗓️ 5 April 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, April 5th, 2021 edition of the Sandcent Storm Center's Stormcast. |
0:08.0 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.0 | Last week, Xavier wrote about how he came across some malware that took screenshots and Xavier was able to recover many of the screenshots |
0:24.9 | that a malware sent back to a command and control server. But Xavier noticed that some of these |
0:30.9 | images did actually originate from sandboxes, not from actual end user systems. |
0:44.8 | And this was pretty evident, for example, if terminal windows were open that ran software that typically is used by sandboxes. |
0:48.0 | So Xavier wrote a little Python script to determine how many of these screenshots came from sandboxes, and he ended |
0:57.3 | up with about 21%. The main criteria Xavier did look for is the size of the screenshot, and |
1:06.3 | then also the percent of unified color, essentially, how much of the screen is just one color. |
1:14.7 | In a real system, you often have multiple windows open and icons and such, leading to a more |
1:22.1 | colorful desktop. While, of course, in a sandbox, you often don't have many windows open usually |
1:29.3 | fairly plain wallpaper and the like which then was identified as a sandbox now just |
1:37.4 | looking at some of the samples that Xavier posted it looks like the script was pretty good |
1:43.6 | in identifying sandboxes and characterizing |
1:48.5 | those images. And the FBI, as well as the cybersecurity infrastructure agency SISA, are |
1:56.6 | noticing an increase in the attacks against older 40Gate VPN gateways. |
2:04.9 | The vulnerabilities being attacked here are CVE 2020-12, which was patched in July |
2:12.5 | of last year, and then CVE 2018-13379, which also was patched in May of 2019. |
2:23.6 | So patches have been available for a while now, and these vulnerabilities have always been |
2:29.2 | exploited. So this is not really all that new. It does allow an attacker to essentially access credentials for the VPN and then connect |
2:39.5 | to the VPN as an authenticated user. |
2:43.5 | So, of course, short solution here, update 40 OS. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.