meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, February 25th 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 February 2019

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. B0r0nt0k Ransomware; DLink NAS Ransomware; Linkedin Job Offer Ruse

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, February 25th, 2019 edition of the Sands and the Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Augusta, Georgia.

0:13.7

When we talk about ransomware, we often talk about Windows systems getting infected by your standard mal-spam or users visiting suspect

0:24.1

websites but ransomware also affects servers and we have two stories about this today the first one

0:33.2

is about what's referred to as the Prontock Ransomware so far.

0:37.8

It appears to only affect Linux servers so far.

0:41.9

However, very little is known about this ransomware, so not necessarily sure whether it's

0:47.3

targeting the Linux servers, how it's targeting them.

0:51.4

In the past, Linux ransomware has often just been uploaded using either

0:56.6

standard vulnerabilities like triple of course we had a recent one or weak passwords what's a little bit

1:04.2

different about this ransomware is that it also encrypts the file names. But of course, encrypted file names may include binary.

1:14.6

Characters are not printable or allowable as a file name.

1:19.6

So what they're doing actually, they're then URL encoding these file names to allow for these odd byte values.

1:26.6

Also, the files themselves appear to be encrypted and then base 64 encoded.

1:33.3

Not really sure why they do this, but maybe again they're trying to make this a little bit

1:40.3

easier on the encoding side or just the crypto library that they used produces basics

1:46.7

the four encoded output.

1:50.3

The second ransomware targeting Linux devices goes according to the pleading computer forum

1:56.2

by the name of Cryptor and targets ancient D-Link devices, in particular DNS 320 devices using a vulnerability

2:06.7

that was originally discovered in 2012.

2:10.9

However, these DNS 320 devices are no longer supported and I don't think that an updated firmware was ever released

2:20.7

for these devices. So if you still have one, then you are very vulnerable. On the other hand,

2:26.5

not to be clear if any unexploited vulnerable devices are still around. The exploit is trivial.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.