meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, July 2nd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 July 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. MacOS Malware; LTE Attacks; Rowhammer Exploit For Android (and counter measure)

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, July 2nd, 2018 edition of the Santa

0:05.0

Storm Center's Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:12.3

Ramco came across an interesting bit of Malware last week that he wrote up on Friday.

0:19.2

The Malver targets Mac OS users, which of course is interesting

0:24.0

in itself in particular, since in this case it doesn't appear to be one of the typical fake

0:30.4

flash players that we see so often for OS10 and Mac OS.

0:35.9

The Malver itself appears to be spreading on Slack and Discord channels that do deal with

0:42.6

crypto and essentially people are trying to impersonate popular users in these channels

0:49.2

or administrators in order to advertise their malware.

0:53.4

What's also a little bit odd about this malware is that

0:57.0

first of all it's very large. It's 34 megabyte that needs to be downloaded. Also,

1:03.0

virus total has no hits, at least at the time when Remko looked at this particular piece of malware.

1:10.0

Now there is a reason why this malware

1:12.8

is so large. It's actually written in JavaScript and then it uses a tool called package that

1:19.1

will take Node.js and the JavaScript and will combine that to an executable. So you have to carry around all that Node.js overhead.

1:31.2

Sadly, we don't necessarily know what they were trying to accomplish here. The Mather is then

1:36.9

trying to connect to a server to download additional instructions. But as far as Remco

1:43.0

could tell, that server is no longer active.

1:47.1

And since it connected it directly by IP address, it's not looking up a host name.

1:53.1

So unlikely that this will just come back again.

1:57.0

But overall, the interesting way to write Mal and distribute it, so if you run anything

2:02.1

like this, then please forward us a sample.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.