meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, October 31st 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 October 2016

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Volatility Bot; E911 DoS; Mirai Vuln; iOS/macOS task_t Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, October 31st, 2016 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich,

0:09.7

and the day I'm recording from Jacksonville, Florida. If your day-to-day job involves analyzing malware,

0:16.5

you probably have more malware than you can possibly handle. So automation is really key. And there's a new

0:25.1

tool here to help you analyze Malver automatically. And that's Volatility Bot. Volatility bot runs

0:32.3

Malver for you, then it takes a snapshot off the memory of the virtual machine

0:37.8

that it ran the malware in and then analyzes it,

0:42.2

it extracts strings, it extracts executables,

0:46.4

and also can provide some Yara results.

0:50.0

So pretty nice tool, according to Pascal,

0:53.7

who looked at a tool.

0:55.0

He says the author states that 88% of Malver was analyzable by this tool, which isn't bad.

1:02.0

It's definitely cutting down on some of the dull day-to-day work that you have to do when you're into analyzing Malvern.

1:12.1

And last week's outage of the Phoenix Area 911 system has been traced back to at least

1:18.9

what's claimed to be an accidental denial of service attack.

1:23.0

It kind of shows how fragile these systems are.

1:27.3

The attack was triggered by a malicious link sent via Twitter

1:31.0

that then caused vulnerable phones to repeatedly dial 911. According to the individual that set up

1:39.5

the link, the link was published by mistake, but still the affected offices did receive over 100 hang-up

1:48.8

911 calls, which then essentially tied up all their lines. One big ongoing problem with

1:56.7

911 has been that 911 is typically not able to blacklist repeat hang-up callers.

2:04.7

So these applications or these malicious link just caused the phone to repeatedly dial 911

2:11.7

and because the 911 center isn't able to just block these calls, they will tie up all lines pretty

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.