meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, June 28th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 June 2018

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Magic Unicorn O365 API; Anonymizing Printers; Malware Analysis Opsec; CVE-2018-0296 (Cisco) Exploite

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, June 28th, 2018 edition of the Sandcent Storm Center's Stormcast.

0:07.4

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:12.2

Remember about a week ago, I talked to Mark Lucas, the SDI student who wrote a paper about Office 365 logs.

0:21.6

Now, he explained how there are actually quite detailed logs available, but a lot of this

0:27.1

you have to enable and of course it's too late to enable it after an incident.

0:32.6

Well, it turns out that in addition to these official logs that Microsoft actually always had some

0:40.1

private APIs that could be used to gather some fairly detailed data about Office 365

0:47.6

activity.

0:49.1

This particular API was fairly tightly held up to now.

0:53.6

We have now a couple great blog posts by CrowdStrike

0:57.8

and by Sherry Davidov about how to actually analyze this and Sherry's team actually did

1:04.8

release a tool that makes it rather easy to extract these logs. So we're not talking about the vulnerability

1:11.9

here. These logs, they require authentication, everything, but these are APIs that were

1:18.1

not available or at least not made public before, and only a couple forensics teams actually

1:23.6

knew about the existence of these APIs and sort of treated them as a trade secret.

1:30.3

Now one particular type of case where this comes in really handy is fishing.

1:36.3

And this is something that Office 365 users fall for all the time.

1:42.3

Given that there are still organizations out there that do not enforce

1:45.9

two-factor authentication for these kind of cloud services. So typically, if your account gets

1:53.3

breached, then hacker will then try to launch a business email compromise, which usually

1:58.2

involves them searching for emails that relate to invoices, for example,

2:03.2

and of course they will log in and send email or read email to do this.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.