4.9 • 696 Ratings
🗓️ 16 July 2018
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 16th, 2018 edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Washington, D.C. |
0:12.4 | Just a quick follow-up on the extortion emails. Looks like some of the victims actually paid. We got a hold of about a dozen or so samples right now, |
0:22.6 | and I think we found four Bitcoin addresses that have received funds. Now, a couple of these |
0:29.1 | addresses have received more than one payment, kind of suggesting that the addresses |
0:34.0 | were reused for different victims. |
0:43.2 | As a little site project that came out of polling the Bitcoin addresses via blockchain. |
0:48.9 | Dotinfo, Did he wrote a quick tutorial about how to use command line tools like JQ to parse JSON formatted data,, how to extract blocked Bitcoin addresses from email. |
0:57.6 | That's probably a good indicator to look for some malicious emails like these extortion emails. |
1:05.3 | Xavier ran into yet another cryptojacking exploit. |
1:08.7 | In this case, existing JavaScript on a compromised WordPress |
1:14.4 | site was modified to include the cryptojacking JavaScript. Usually we just have additional |
1:20.3 | script tags being added, but here they actually just sort of appended it to existing JavaScript. |
1:26.5 | Also, Xavier found that the JavaScript was not well recognized now by Virus Total or by the |
1:34.8 | scanners that are represented by Virus Total back when the script hit on Friday. |
1:40.8 | I hope that by now things look a little bit better but the sample of course |
1:45.4 | was heavily obfuscated when we're talking about search engines for the |
1:52.3 | internet of things we usually refer to Shodan the probably best known |
1:58.4 | search engine that catalogs various systems exposed on the internet. |
2:04.1 | However, Shodan isn't the only one. |
2:06.6 | Zoom-Eye, a similar system to scan the internet for open ports, |
2:10.4 | appears to have pushed the ethical boundaries of such scans even further. |
2:17.3 | Researchers from security firm New Sky found out that Sumai enumerated passwords for devices |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.