4.9 • 696 Ratings
🗓️ 2 August 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 2nd, 2018 edition of the Sands and its Storm Center's |
0:06.5 | Stormcast. My name is Johannes Orich, and I'm recording from Jacksonville, Florida. |
0:13.2 | Today we got a smishing attack to start out with smithing is derived from fishing and SMS, essentially a phishing message sent via SMS. |
0:24.4 | In this particular case, the message announced that the victim's Facebook message was deleted |
0:30.1 | for being inappropriate, and of course the message then offers a link to Facebook. |
0:36.8 | So the idea here is that the user will click on the link and then of course they will receive |
0:42.8 | a login page that looks just like Facebook's and that's where they lose their credentials. |
0:49.5 | If they enter credentials, whether correct or not, they will be redirected to the authentic Facebook page, |
0:56.9 | which of course will let them in then once they authenticate with their Facebook credentials. |
1:03.4 | There are a couple things that make this particular message a little bit special. |
1:08.0 | First of all, did hacker manage to register a host name starting with Facebook? |
1:13.6 | This host name was registered under a university domain in Bulgaria. Secondly, they actually do a |
1:21.6 | little bit input validation on the fake login form. If you are entering credentials that are syntactically wrong, meaning your |
1:29.8 | user ID or email address is not valid based on the format, then you get a login failed message. |
1:37.9 | Sometimes I hear the advice to enter just some random data. If you're unsure if it's a fishing site, |
1:45.0 | and if it's accepted, then you know it's a fishing site. |
1:48.0 | If it's not accepted, it may be the valid side. |
1:50.0 | Well, that advice is certainly not good advice, |
1:53.0 | and it is another example why you shouldn't rely on this simple test. |
2:00.0 | And then we have a spike in activity on an odd port 52,869. |
2:08.8 | Turns out the port 52,869 is used to send universal block and blame messages encapsulated in soap. |
2:19.4 | One particular popular implementation of this comes from real tech, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.