4.9 • 696 Ratings
🗓️ 19 December 2024
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, December 19th, |
0:03.6 | 2004 edition of the Sansonet Storm Center's Stormcast. |
0:09.1 | My name is Johannes Ulrich, and today I'm recording from Washington, D.C. |
0:15.2 | Another great guest diary today by one of our sands.edu undergraduate interns, this time taking apart an attack |
0:24.4 | that is associated with Team TNT and Spinning Yarn. This particular attack attacked |
0:30.6 | web server, of course, a honeypot that simulated a vulnerability that was then exploited by the attacker to install script. |
0:41.0 | This script was heavily obfuscated in order to bypass malware detection, and then was |
0:47.2 | used to download additional malware. |
0:50.8 | What's sort of interesting in here is that there is sort of multiple stages to install all |
0:55.1 | the components needed to actually execute the malware, and then the malware went ahead and also |
1:01.4 | did disable security measures on the system. In the end, the malware did install Cryptominer |
1:10.3 | and then did harvest ZH keys, clear system logs, and also execute yet another reverse shell in order to provide persistent access to the attacker. |
1:24.9 | Interesting write-up on a fairly common attack and something that you definitely should be |
1:30.2 | ready to detect. |
1:31.8 | Typically, the crypto coin miner itself should trigger some anti-maliburr signatures. |
1:38.9 | The problem there sometimes is that the standard crypto miners are necessarily included |
1:44.1 | in these signatures |
1:44.9 | because they're not themselves necessarily malicious software. |
1:50.2 | One quick check that you may want to run is XM Rick is the number one crypto miner that we |
1:56.4 | do see being used. Make sure it gets detected on your systems. |
2:02.4 | Yesterday we had a couple stories involving Anydesk. |
2:05.3 | Well, today we switch to another favorite remote control methods for attackers, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.