meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, June 27th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 June 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Ransomware without C&C; Swagger CodeGen Tool Vuln; More Voter Database Leaks

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, June 27, 2016 edition of the Santonet Storms and Stormcast.

0:07.0

My name is Johannes Ulrich and the day I'm recording from Salt Lake City, Utah.

0:12.0

Fishmi is reporting about a new ransomware strain.

0:17.0

The ransomware which calls itself Bard appears to take some at least optical cues from

0:23.7

Locky.

0:25.0

The ransom page looks somewhere, but in a major change from other ransomware, this one doesn't

0:33.0

use a command control channel to actually register exploited hosts and then also retrieve

0:39.3

encryption keys. Instead, whatever keys being used is derived locally. In addition, it does

0:46.3

not sort of implement its own file encryption like other encryption tools. Instead, it just uses

0:53.7

encrypted zip files to encrypt the data.

0:57.0

The ransomware is delivered by the Rockloader, downloader, and the Malver itself is initially

1:04.0

encrypted using a simple XOR key. So when the Malver is downloaded by Rockloader, it's not immediately obvious

1:13.6

that this is a Windows executable. You first have to XOR it with this key in order to actually

1:20.3

discover it as being executable, which may attempt here to bypass some network detection of Ransware or Mather in general.

1:32.3

Fishmi made available a Python script to decode the Ransver executable,

1:38.3

but at this point I don't see a complete analysis of BART.

1:43.3

It would be nice to learn more about how the

1:45.7

encryption keys being derived because, well, if there's no external influence really for

1:52.2

this particular sample, like no command control channel, then it's very possible that a victim

1:58.6

could derive the same key and then decrypt the files.

2:04.1

Rapid 7 announced critical vulnerability in the code generation tool Swagger. Swagger automatically

2:11.5

creates code in various languages that allows applications to interact with rest services.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.