meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, May 23rd, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 May 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Zip bomb AV Evasion; Cisco Redis Patch; pwn2own Results; Cobalt Strike via PyPi; Netgear No Patch;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, May 23, 2020 edition of the Sands and at Storms Centers Stormcast.

0:07.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.7

Xavier ran into an interesting piece of malware that bypassed security stack and was luckily reported by the end user.

0:23.9

Now, the big question, of course, was why did the malware make it so far,

0:27.3

given that this particular end user was protected by several layers of different tools

0:33.3

that are commonly used to find malware like this.

0:38.0

And the malware itself was sort of well-known.

0:41.4

At least it was a well-known family of malware

0:45.7

and should have been detected.

0:48.4

But in this particular case,

0:50.8

the hacker played an interesting and very simple trick, actually, by embedding a

0:56.8

sip bomb into the binary. Sip bombs are short files that are construct in such a way that once

1:04.5

they're being decompressed, they become very large. Now, in some cases, they can be terabytes

1:10.6

in size. In this case, it was just 400

1:13.8

megabytes after expanding the file, but this was big enough in order to prevent an analysis

1:20.6

of the file. Overall, the original SIP archive was only 2 megabyte in size, which is certainly within range of what

1:29.7

you typically see for malicious attachments. Xavier's diary does cover how he went about analyzing

1:38.3

this particular sample and how he was able to figure out that it was one of these zip bombs.

1:46.6

So take a look if you want to know more details.

1:51.1

And Cisco patched an issue in its iOS XR software that's well related to the Health Check feature.

1:59.6

The problem here is that health check does implement

2:03.6

a Redis database and this Redis database is exposed to the world by default by opening TCP port

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.