4.9 • 696 Ratings
🗓️ 30 July 2018
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 30th, 2018 edition of the Sans Summit Storm Center's StormCast. My name is Johannes Ulrich. |
0:08.0 | I'm recording from Jacksonville, Florida. As I have mentioned a couple times before, we have seen a number of |
0:16.1 | different extortion emails recently that took advantage of leaked passwords. Rick posted a summary of the |
0:25.3 | activity that he has seen from this scam by monitoring Bitcoin addresses that he collected |
0:32.6 | from these emails. He collected a total of 334 addresses. |
0:39.4 | We have seen some reuse of these addresses, so it's not easy to figure out how many addresses |
0:45.9 | were used in total and sort of what these 334 addresses represent that Rick Monard, but 57 of these addresses have received payments. |
0:58.9 | Now, these 56 addresses have received a total of 123 payments, again pointing to at least some |
1:07.2 | reuse of these addresses. We can not easily derive as a result the actual success rate |
1:15.4 | of these emails, but it does suggest that my best guess would be a few percent success here, |
1:23.4 | maybe up to about 10 percent of the emails actually result in payments and the total amount of |
1:32.4 | Bitcoin deposited in these addresses does amount to about $200,000. |
1:40.0 | At this point, we haven't really seen any money being removed from these addresses, so looks |
1:45.3 | like the hacker is still waiting for a good day to actually reap the profits from their |
1:51.2 | work. |
1:53.8 | And security researcher Ivan Kwiakowski came across a number of websites that distributed |
1:59.3 | well-known software ataced with adware. |
2:02.5 | Now, the software itself was legitimate. For example, key pass was used in this attack, |
2:08.3 | or audacity, the software that I'm actually using to record this podcast. But if you |
2:14.5 | downloaded the software from one of the affected sites, you actually ended up |
2:19.5 | with the software and some adware. |
2:22.8 | Now, why would you go to another site? |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.