meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, October 25th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 October 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Quiz; Odd ZIP Files; Decrypting Cobalt Strike

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, October 25th, 2021 edition of the Sansonet Storm Center's

0:07.1

Stormcast. My name is Johannes Ulrich, and I'm recording from Al-Kobar, Saudi Arabia.

0:14.3

Brad decided to release another challenge for October. This is a packet capture that if you solve the case correctly,

0:24.6

you'll be able to qualify for a raspberry pie drawing. You do have about a week until Sunday,

0:33.5

October 31st, to submit your entry. Please read Brad's diary first. It has further instructions

0:40.6

as to how to exactly submit the entry and how to qualify for the Raspberry Pi drawing.

0:48.4

And as long as you're submitting your entry by deadline, what will matter in order to participate

0:54.0

in the drawing is the accuracy

0:55.9

of your results.

0:59.2

And the DE came across an interesting SIP file that contained file names with character returns.

1:05.8

Now, character turns, of course, are not legal in file names, and apparently it depends on the particular utility that

1:13.3

you use to investigate the SIP file, whether or not the file is even displayed or whether it's

1:20.0

extractable. DDA isn't sure what the intention is of this odd file name, but one suggestion is that this may throw off

1:31.4

some automatic utilities that are decompressing files for further analysis, and as a result,

1:38.8

well, it may slip past some anti-malar checks as you commonly have them set up, for example, for mail servers.

1:48.5

And then we have another DDE news item. This one comes via his day job and Vissau, Belgium

1:55.0

consulting company. And one thing that DDA has looked at in the past, and he has also written about on the Internet Storm Center, is Cobalt Strike.

2:07.3

Now, Cobalt Strike uses an encrypted scheme for its communication.

2:13.2

It's AES encrypted, and then there is an RSA public-private key scheme in order to transmit the AES

2:21.3

symmetric key. By searching virus total, Dedi found a total of six private keys that are used

2:30.5

for this encrypted channel for Cobalt Strike.

2:35.1

And the D.D. now looked into, well, how commonly are these keys used?

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.