meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, April 7th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 April 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. MetaStealer Malware; Cyclops Blink Takedown; Palo Alto TLS Bug; VMWare Bugs

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, April 7, 22 edition of the Sansonet Storm Center's

0:07.1

Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.2

Brad today wrote up a story of Meda Steeler. A Meda Steeler is a malware that has been around for a while, but

0:22.4

well, it keeps morphing as most of this malware. And this particular sample arrived as an Excel

0:29.5

spreadsheet. Of course, the victim had to enable macros. It does use the good old docusine

0:37.3

lure in order to get people to enable macros. It does use the good old docu sign lure in order to get people to enable macros.

0:40.3

And then, well, urgency again here, it does claim that you just transferred some money

0:47.3

and the attached document will tell you more or possibly, of course, block the transfer. Now Now once you enable the macros, then the

0:58.4

macros reach out to GitHub. GitHub of course being usually considered a benign website and has

1:05.0

a lot of good uses, but well like with many file storage sites like that, it's often being abused.

1:12.9

It also uses transfer.

1:14.5

js.h, which we have talked about last week, I believe, we had a story with transfer.

1:21.4

That's, again, a very simple and free file transfer service that's particularly designed to sort of allow

1:30.3

simple scripted transfers.

1:33.0

Well, all the files being downloaded are then being used to create DLL and executable.

1:40.3

That is then being used to, of course, download additional instructions and connect to the

1:47.0

Medastaler command and control servers.

1:50.4

There are a couple of red flags here for the user, like having to enable macros and later

1:55.6

to actually allow a process called notice.exe to make changes to your device. But all of this, of course,

2:04.7

may be considered normal by user who really just wants to block this straight bank transfer.

2:12.4

That's at least sort of what the email claims this is all about. From a detection point of view,

2:17.3

I definitely would keep an eye out for Transfer.jsH.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.