4.9 • 696 Ratings
🗓️ 24 August 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to a Thursday, August 25th, 2016 edition of the Sandsenet Storms and Stormcast. |
0:07.7 | My name is Johannes Ulrich and today I'm recording from Jackson, Florida. |
0:11.8 | We got a couple updates regarding the NSA exploits leaked by Shadowbroker. |
0:17.2 | Juniper now has a statement about its share of the exploits. |
0:22.6 | Apparently the Exploids League do allow an attacker to install malicious firmware images |
0:28.6 | or add malicious firmware images. |
0:31.6 | Juniper does refer to a document they published in 2008 about some validation issues with |
0:40.2 | firmware that may be exploited in these released exploits. |
0:45.3 | Juniper also states that they have reviewed several thousands as they say of |
0:51.3 | firmware images and haven't found any yet that they think were compromised. |
0:57.5 | Now, regarding the SNMP vulnerabilities that were exploited by the Cisco exploits in this release, |
1:06.3 | turns out they may actually work against newer versions of ASA firewalls as well. |
1:12.6 | Thus require some adaptation, but silent signal stated that they were able to make these exploits |
1:20.6 | work against current version of Cisco firewalls. |
1:24.6 | Cisco has released updates a couple days ago, so certainly something that |
1:29.9 | probably should expedite. And in the cat mouse game between researchers and bad guys that come |
1:37.0 | up with ransomware, another round went to researchers and this time against the wildfire ransom bear. Now |
1:46.3 | wildfire isn't so far special that it targets Dutch and Belgian users. It does so |
1:52.9 | by using emails that are written flawless Dutch and of course with most of |
1:58.3 | these emails being written in English. |
2:08.5 | Dutch emails to a local Dutch speaker are very enticing and less likely to raise suspicion. |
2:15.5 | Well, research has now published 5,800 encryption keys for infected systems. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.