meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, August 14th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Python Anti-Debugging; Zoom Zero Touch Vuln; DNS Spoofing

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, August 14, 2023 edition of the Sansonet Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.1

Well, let's start with some diaries that came in over the weekend.

0:16.5

Xavier wrote about some Python malver that he found, and this Malver is using an interesting anti-debugging

0:24.6

trick. It uses two Windows API calls Enum Windows and Get Windows text in order to figure out

0:32.4

which windows are currently open on the system, and then what well, what the text associated with these windows is,

0:39.1

telling the attacker what other software you may have running, like, for example, debuggers,

0:45.4

and that's exactly when they will then stop execution.

0:51.3

Moritz-Aprill with Penetration Company, Siss, that published an interesting blog that's also presented at Black Hat last week, that details some weaknesses in Zoom's serotouch provisioning feature.

1:07.4

What Serotouch provisioning really does is that if you are buying Zoom hardware,

1:12.9

so not using your computer for Zoom calls, but a specific dedicated Zoom telephone or

1:20.1

video conferencing system, in that case, you can configure the hardware to automatically

1:27.2

reach out to Zoom and then download

1:30.0

respective configurations. Now, the way this works is that anybody with a license to deploy

1:38.9

these devices is able to register those devices with Zoom, and then you basically just need to provide the Mac address of the device.

1:50.3

When the device then connects to Zoom,

1:53.0

it will just look up the address for its Mac address

1:56.0

and then follow the instructions for provisioning,

1:59.6

which of course may include running commands,

2:03.0

installing firmware, and other things that an attacker could abuse.

2:07.9

So the attacker would just sign up with Zoom, purchase licenses, then deploy a malicious

2:14.5

configuration for devices with Mac addresses that the attacker would like to attack,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.