meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, July 7th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 July 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. CryptXXX Update

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, July 7th, 2016 edition of the Sandcented Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and the day I'm recording from Jacksonville, Florida.

0:12.1

We got an update on Crypt-Triplex today from Pratt.

0:16.2

He wrote up the latest version that he has seen in the wild and that he hasn't really seen described yet.

0:23.6

So with his diary as usual you get plenty of indicators of compromise that you can use in order to look for infections on your systems.

0:33.6

He calls it a new version of cryptraplex because the ransom note looks differently

0:40.5

than it has before. Also, some of the details of the behavior changed, which is why it's

0:47.4

important to look for these new indicators of compromise. Now, he saw it being installed by the

0:53.4

Neutrino Exploid Kit, which in turn the user was exposed to via the pseudo dark leech exploits that are used to infect websites that then are used to host this exploit kit and in turn crypt triplex.

1:11.4

And apparently we'll have to wait a while to get patches from Symantec for the latest

1:18.6

bugs that were discovered by Travis Ormandy of Google.

1:23.8

According to his Twitter feed, there's more testing underway and well, I understood it that

1:30.1

he actually even found more vulnerabilities there that may get addressed hopefully soon by

1:36.6

Symantec. So keep watching out for additional updates from Symantec for their antivirus engines.

1:45.0

And Checkpoint has another update on what they're calling the Hummingbat malware

1:51.0

that is commonly found on Android phones.

1:55.0

They, I believe, first talked about this back in February,

1:59.0

and essentially in this latest update they

2:02.0

provide more insight into the business behind this particular piece of malware or

2:08.6

adware turns out that it's actually sort of being installed as part of an

2:13.4

advertisement kit that the applications that run on Android often include in order to monetize

2:21.0

their software. But this particular software goes then well beyond just displaying ads. It will

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.