meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, January 6th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 January 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Code Reuse; ZLoader Exploiting Signature Bug; VMWare CD-Rom Vuln; Honda Y2K22 Bug

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, January 6, 2022 edition of the Sansonet Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich, and the name is I'm recording from Jacksonville, Florida.

0:13.1

Ever wonder how the bad guys are writing malware?

0:16.2

Well, it's actually not that different from how any other software is written.

0:21.6

And Xavier has a nice document where he shows how recent Excel macros are really just copying code from GitHub projects.

0:32.8

Well, this isn't really a big surprise and, of course, has going on for a long time.

0:37.3

Also, different malware versions

0:39.6

copying code and techniques from each other this of course does present a problem for

0:46.7

malware detection because many of these techniques and also these code snippets are being copied

0:52.8

here are also being used in non-malicious code

0:57.4

and as a result, of course, malicious and non-malicious code

1:01.3

can end up being fairly similar.

1:05.2

And Checkpoint found some interesting malabre exploiting

1:09.2

an older vulnerability in how Windows verifies digital

1:14.6

signatures. The Malvern question is C-loader, and C-loader itself has been around for a while,

1:20.4

but as typical for Malware, it keeps changing, it keeps adding new tricks, and one of the new tricks

1:27.3

it recently added is to actually append itself to legitimate DLLs.

1:34.3

Now, this should be detected by the signature that is being used to verify these DLs, but due to an long-standing bug in Microsoft, if you are appending data to the

1:49.3

signature section itself, then it remains undetected.

1:53.5

Now, Checkpoint points out that this was fixed originally back in 2012, but Microsoft has removed.

2:03.3

Some of that fixed made it optional again because it had some impact on legitimate software as well.

2:10.7

So by default, this patch is not necessarily installed.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.