meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Sunday, September 2nd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. OSX/MacOS Custom URL Schemes; Philips e-Alert Vulnerablity

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, September 3rd, 2018 edition of the Sandstone at Storm Center's Stormcast. My name is Johannes Ulrich. And I'm recording from Amsterdam, Netherlands. When I recorded on Friday, I totally forgot that it's Labor Day today on Monday in the United States. Typically, I don't have a podcast, but since I announced that there will be one on Monday,

0:23.8

I'll do at least a brief one today.

0:28.5

Max security expert Patrick Waddle off Objective C published another blog post showing how custom

0:37.0

URL schemes can be abused on OS10 and

0:41.3

Mac OS systems.

0:43.3

What this is all about is the beginning of a URL.

0:47.3

If the URL starts with HTTP or HTTP then of course Safari is launched by default. Well, a different software can register

0:57.0

its own custom URL schemes. So for example, if a URL starts with Skype colon, Skype

1:05.6

can automatically register itself to actually then launch whenever a user clicks on such a URL.

1:14.3

The problem here is that the registration actually doesn't require that the user launches

1:21.8

any software.

1:23.5

All the user has to do is download a SIP archive and if Safari automatically unsips it,

1:31.3

the SIP archive now contains an info.p.P.L.L.S. file, then any actions defined in this file

1:38.6

will automatically be registered. And apparently this has been used in some advanced attacks.

1:46.2

The attacker will trick the victim to visit a malicious website.

1:51.4

That typically happens via a spearfishing attack.

1:55.0

Once the user visits the website, then the download is triggered off the SIP archive and then a custom action is

2:03.6

registered to launch code once the user then clicks on a second URL that does take

2:10.3

advantage of this custom scheme so the problem here is that exploitation is very

2:16.2

simple the best thing you can do right now is to not

2:21.3

automatically open safe file types in OS10 and macOS. This is not disabled by default in these

2:31.2

operating systems, so you have to disable this in Safari.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.