4.9 • 696 Ratings
🗓️ 2 February 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, February 2nd, 2003 edition of the Sansanet Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. |
0:14.9 | Well, One-Note files that is currently sort of one-vector, how an attacker can smuggle malicious code into your network, |
0:23.6 | even if you have things configured reasonably tight. |
0:27.8 | And if you can't really just outright block one node files, then of course you need some way to detect these malicious files. |
0:36.3 | DDA has a great diary today with some rules to detect a one-note file. |
0:43.3 | First of all, some rules contributed by Florian. |
0:47.6 | Florian wrote some Yara rules that not just detect one-note files, but also one-note files, |
0:53.4 | for example, with embedded PE bad files, |
0:57.3 | visual basic files, also link files, which is something that's a particular has been seen here. |
1:03.9 | Secondly, Did he also published some Suricata rules. So this way you can detect some of these files on the network. |
1:14.4 | Did he also explain some of the artifacts that these rules are looking for? |
1:19.5 | So you may be able to modify these rules or even adapt them to whatever detection |
1:26.2 | language you're using in-house if neither Yara nor |
1:31.2 | Suricata will do it for you. I would say must-read for anybody who is looking for some meaningful |
1:37.1 | detection rules for this relatively new threat. Talking about defending Microsoft is doubling down on its support for non-Windows operating |
1:49.1 | systems in its Microsoft Defender line of products. |
1:54.1 | Microsoft Defender for Endpoint is now able to support isolation for Linux devices. |
2:01.0 | The nice thing with isolation is that it essentially allows you to remotely limit network |
2:06.9 | connections that a certain device is able to establish if you are suspecting that a device is |
2:13.0 | compromised. |
2:13.6 | This gives you sort of the level of isolation that hopefully will prevent any data |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.