meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, November 29th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 November 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Disappearing Phish; Trickbot HTML Resolution Check; QNAP QVR Patch; CronRAT

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, November 29, 2021 edition of the Sandtonet Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.5

Our handler Jan this weekend took a look at a common trick. Fishing sites used to make investigations more difficult.

0:23.4

The phishing email, as Jan described it, was pretty much unremarkable, but shortly after

0:30.0

Jan reviewed the fishing site, the web server started returning 404 errors instead of the

0:37.0

Outlookalike page that was used to harvest

0:42.1

users' credentials. The author of the fishing site took a precaution in only allowing a limited

0:50.2

number of requests from a particular source IP. Now, there are a couple different reasons why NetHacker may do that.

0:57.0

So once the time or the request limit is exceeded, you get the 404 instead of the actual fishing page.

1:05.0

And if a user, for example, would forward the link or the email to an analyst.

1:11.6

That, of course, then may result in a false negative.

1:15.6

Or, for example, the user thinks that, hey, they should probably report that fishing page.

1:21.6

They try to exit again, but, well, they're now getting a 404, thinking probably that the fishing site

1:28.3

has already been taken down. If you are investigating fishing emails like this, always good

1:35.9

to try an anonymous internet connection, like a VPN or some LTE access or such with ever-changing

1:44.0

IP addresses.

1:45.8

Also, be a little bit careful with these URL parameters that are often being passed along.

1:51.2

These are often unique identifiers.

1:53.6

Sometimes it's just a base 64 or URL encoded email address that is then being used to

1:59.6

pre-fill, for example, a username.

2:04.6

And Dell released an important update to its I-Track 9 products.

2:09.6

The vulnerability is due to the use of ZeroMQ in these products.

2:15.6

ZeroMQ is an open source messaging library,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.