4.9 • 696 Ratings
🗓️ 14 February 2019
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, February 14th, 2019 edition of the Sandcent, Storm Center's |
0:07.1 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.9 | Brad looked at a recent example of one of these fake update campaigns, and you probably have seen |
0:20.7 | them. I actually personally |
0:22.4 | consider them the most dangerous type of malware that you usually see against |
0:29.5 | Max being used. Now works against Windows 2 and the attack that Brad looked at here |
0:36.4 | was targeting Windows at least when he pulled it up, |
0:40.3 | even though I've seen them sort of adapt their lure based on what operating system and what browser use to actually visit the site. |
0:50.1 | The way they work is that a website gets compromised and is then being used to advertise |
0:56.5 | these fake updates. |
0:58.3 | They can get quite sophisticated in the way they look. |
1:02.5 | They try to emulate the real update notifications as much as possible. |
1:08.5 | Now the example that Brad here has is Chrome. I've seen quite a few |
1:13.9 | fake updates in particular again against a Mac OS users that advertise updates for Flash. |
1:21.7 | So take a look at it and look at some of the traffic patterns that Brad describes. Now he mentions that this particular |
1:29.5 | case that he looked at was a little bit unusual in that it still used HTTP. Many of these campaigns |
1:37.4 | are now using HTTP, which of course makes detection a bit more complex. |
1:47.0 | Well, in talking about fake installers and Mac OS, Carbon Black actually has a write-up about |
1:53.5 | one that they recently ran into. |
1:56.5 | It's a variant of Schlayer. |
1:58.0 | Now, Schlaher has been around since at least a year or so ago, Intego |
2:02.9 | has written about it, but this new variant adds a couple new tricks sort of to its repertoire. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.