meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, June 6th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 June 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Simple Analysis Evasion; Confluence Exploit; Gitlab Patch; u-boot Vuln; Unisoc Vuln

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, June 6, 2020 edition of the Sandsenet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.5

On Friday, we got a diary by Ksavi illustrating an interesting trick how sometimes sandboxes may be evaded.

0:22.7

Now, a lot of Malware defenses these days do rely on sandboxes.

0:27.2

So once a suspicious file is received, it's being copied to the sandbox and then executed,

0:33.7

and then some automatic mechanism is looking for behavior that indicates that the sample is malicious.

0:41.9

But quite often as the sample is being executed, the name of the file is changed.

0:48.2

This is done also in part to protect the sandbox from odd file names.

0:53.5

But what Xavier found was that the samples that

0:57.4

he looked into sometimes are actually checking if they still retained their original

1:03.1

file name. And if they can't find their original file name, they will refuse to run. This is a little

1:10.3

bit like trying to detect if you're running in a virtual machine or in a debugger,

1:14.3

but of course there are so many different sandbox technologies out there,

1:18.1

instead of implementing detection techniques for every single one.

1:22.3

This is a little bit more generic and apparently works quite well.

1:27.5

Last week, I mentioned new vulnerability in Adelation's Confluence product.

1:34.4

On Friday, Alation did release a patch and, well, not too early.

1:40.9

There is also an exploit available.

1:43.0

Rapid 7 has a pretty good write-up with a lot of

1:46.1

details that help create exploits. Also, there have been multiple sidings already of the

1:53.7

exploit being used against at least honeypots. I just looked as I started recording and seeing a couple hits with an exploit against

2:05.9

our Honeypot network from Saturday. So time is running out to apply the patch. It's probably

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.