meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, June 20th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 June 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Avoiding Javascript Malware; LogMeIn Joins Other Sites in Proactive Password Rese

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, June 20th, 2016 edition of the Santernet Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich.

0:09.0

And today I'm recording from Jacksonville, Florida.

0:12.0

We still see a lot of malvert that arrives as a sipped JavaScript file.

0:18.2

The problem here is that if you open such a JavaScript file on your system,

0:23.6

it doesn't run in the browser. Instead, it actually runs with the shell and JavaScript in this

0:30.6

context has far-reaching abilities to download additional software, execute commands, change files and the like. So it is really

0:39.3

not limited by any kind of browser sandbox in this case. But there is a real simple and

0:46.6

effective way to prevent execution and it's just associating a different program with JavaScript

0:53.5

files in particular, Notepad.

0:56.1

This way if a user does double click on a JavaScript file, it just opens in Notepad

1:03.1

and doesn't actually execute.

1:06.3

This should have minimum effects on the users.

1:10.1

Users aren't really supposed to run JavaScript files like that,

1:14.6

but it does protect the user from accidentally executing these files.

1:20.6

And as one of our readers comment, you should of course apply the same trick to various other scripting languages

1:29.8

that your users don't really need and just by associating them with Notepad, you essentially

1:35.9

make these exploits less likely to succeed.

1:39.9

And if you received the last couple of days an email from Log Me In that your password was

1:47.0

reset, well, the reason behind this is the same as we have seen for other large sites.

1:53.0

Team Viewer, sort of a Log Me in competitor had issues with accounts getting compromised

1:59.0

just due to password reuse,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.