meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, December 2nd, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 December 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. AWS Honeypot+SIEM; Obfuscated Infostealer; Magento Skimmer; LogoFAIL Exploit;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, December 2nd, 24 edition of the Sands and the Storms on a stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.3

Luckily, there was no major news this long weekend, so hope everybody got some time to relax.

0:22.4

And we'll start here with a couple of diaries that we published over the last couple days.

0:30.8

He has been working on a scene kind of to go as a front end for our DeShield Honeypot and Sensor.

0:39.5

This has been quite popular among our interns, if you're interested in that.

0:44.3

We now have a post by Paul Sacriere, who is writing how to set this all up in AWS.

0:53.5

But it also works on your standalone honeypot

0:56.6

in order to install the full seam, which requires components like, for example, Elasticsearch.

1:01.8

You need a little bit more resources, so better usually to run it on something like a mini-PC

1:07.7

or virtual machine with Ubuntu versus just sort of a bare-bones

1:12.9

raspberry pie honeypot. For example, you will need 8 gigabyte of RAM.

1:21.2

And Xavier took a look at obfuscation techniques used to make it more difficult to detect an info stealer.

1:29.4

Xavier took the trap stealer as an example and then showed how, first of all, it can be hidden

1:35.7

in a JPEC image.

1:37.9

It can be obfuscated by just adding essentially code that does nothing.

1:43.1

Base 64 encoding and a bunch of other techniques.

1:47.2

Interesting also that the sort of raw code, of course,

1:51.5

increased substantially in size with all of these obfuscation techniques.

1:57.2

On the other hand, it certainly helped a virus total score for this very common form of InfoStealer.

2:04.1

The trapstealer was only three out of 63.

2:09.3

And given that this is, of course, a big shopping season.

2:12.9

I do want to mention some of the threats are going around.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.