4.9 • 696 Ratings
🗓️ 24 July 2017
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 24th, 2017 edition of the Sandtonet Storm Center's Stormcast. My name is |
0:08.4 | Johannes Ulrich, and today I'm recording from Washington, D.C. I'm here at Sands Fire, of course, this week. |
0:16.0 | Now, if you are attending, we do have our handler panel in the evening on Monday 7.30. It starts. You |
0:24.4 | need to have a conference badge in order to attend. We do have about a dozen different |
0:30.7 | handlers present to talk about what we sort of saw of interest last year. Also, Mark Sachs will be attending with his collection of |
0:40.5 | crypto machines. I think it's probably now one of the largest private collections of |
0:46.3 | crypto machines that he'll bring along, including his enigma and a number of other rather unique |
0:52.8 | machines. |
0:59.0 | But in other news, we do have an interesting diary by DDA. |
1:06.7 | DDA is writing about how ISO attachments are being used to infect users with malware. |
1:13.3 | Typically, ISO files are, of course, images of CD of CD ROMs or DVDs. |
1:21.6 | And now in this particular case, these ISO files will be mounted automatically by recent versions of Windows, |
1:30.3 | which will then expose malicious executables that are contained within the ISO file. DDS talking a little bit about how to analyze these attachments, how to extract the executable from them. So if you received any |
1:39.4 | attachments like that, of course, you may find it helpful to get you started in figuring out what the attachment |
1:47.4 | exactly contained. And NDDA also was lucky enough to receive another office document that was |
1:56.8 | spreading link files. Now, in a prior diary that he wrote, |
2:01.8 | that looked at one of those link files, |
2:03.6 | there wasn't really much metadata in it. |
2:06.5 | In this latest example, |
2:08.6 | he has a little bit more data telling us |
2:11.8 | more about the particular author of this sample. |
2:16.8 | The machine name was Frank, and we also have a volume |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.