4.9 • 696 Ratings
🗓️ 1 May 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, May 1st, 2023 edition of the Sandsenet Storm Center's Stormcast. |
0:08.1 | My name is Johannes Ulrich and today I am recording from Jacksonville, Florida. |
0:14.3 | Let's start with Diaries from this weekend. |
0:17.1 | We got one on Friday from Xavier about doing a quick indicator of compromise scan |
0:23.1 | using Docker. The tool that Xavier actually uses here is Locky. It's a free version of |
0:30.3 | the Tor scanner. While Locker is usually just installed on a Windows system, it's a Python script, |
0:37.2 | so you don't really need |
0:38.6 | Windows for it. And Xavier walks you through the process of setting up the Docker container |
0:45.1 | with Lockhe and then doing a scan with it. |
0:50.3 | In the second diary over the weekend, we had the D.D.Edy write about how to de-obuscate scripts? |
0:56.8 | In this particular case, JavaScript that was using UTF-16 encoding. |
1:03.9 | In this case, the trick was really just to remove the sort of non-asky, the non-translatable characters, |
1:13.6 | and D.D.A. walks you through how to do this, |
1:16.1 | and how he then figured out what kind of malware it is, |
1:20.0 | and also what it used for its particular command and control server. |
1:25.2 | And if you are using an email address that is provided to you by AT&T or one of its other |
1:33.2 | companies like SPC Global.net and such are other domains that may be affected by this, well, |
1:40.3 | your email account may have been compromised due to a bug in AT&T's email system. |
1:48.0 | The root cause here was that attackers were able to set up special authentication keys for any user without properly authenticating. |
1:59.6 | You may have run through a procedure like this yourself, |
2:02.4 | where you do have an email account that requires two-factor authentication, |
2:07.5 | and in order to allow a legacy email client to connect to this email account, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.