meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, August 7th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 August 2017

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Opengraph Link Obfuscation; Cerber Steals Bitcoins;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, August 7th, 2017 edition of the Sandinand, Storm Center's Stormcast. My name is

0:08.5

Johannes Ulrich, and the day I'm recording from Jacksonville, Florida. Thanks to some of my Facebook

0:14.7

friends, I came across an interesting case of the use of the OpenCraft Protocol in order to better disguise malicious Facebook

0:23.6

links.

0:24.6

In this particular case, a link was posted to Facebook that appeared to be linking to YouTube,

0:31.6

but instead linked probably for the most part to a Facebook fishing page. In my own testing it only redirected me

0:40.3

to a harmless Wikipedia page. The Open Craft Protocol is used in order to indicate what

0:47.5

images and what additional text you would like to have displayed in case a user does post a link to your site on Facebook.

0:57.7

Now, the image, of course, can be anything. Same with the text. You just add additional metadata

1:04.7

tags to your HTML in order to indicate what image and what text to display.

1:11.6

In this particular case, the image displayed was just a YouTube logo.

1:16.6

It was identified as a video with some additional text, kind of indicating that this is apparently

1:22.6

an interesting video to watch.

1:25.6

To make detection even a little bit more difficult, all of this happened via Google.

1:30.3

There was a Google short link and then also the Google storage service was used in order to house the HTML that did include these malicious or at least misleading open craft attacks.

1:46.2

Now in my testing on Friday, the link actually stopped working on Facebook.

1:50.6

Facebook refused to let me post this particular link.

1:55.7

Probably they figured out that it is malicious by now.

1:59.6

Google still is hosting the malicious HTML and the

2:03.4

shortling is still working. I notified them on Friday. And Kerber Malver that has so far been

2:10.9

mostly known as ransomware is adding new tricks to its tool chest. Now in the the past, it just encrypted the systems and then asked for ransom to be paid.

2:23.0

Now, if it recognizes certain Bitcoin or cryptocurrency wallets on the system, it will exfiltrate them,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.