meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, June 2nd, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 June 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Better HTML Phishing; Follina Update; Windows Search Vuln; WhatsApp Takeover; Weak RSA Keys

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, June 2nd, 22 edition of the Sandsenet Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.7

Jan today took a look at a recent HTML fishing attempt.

0:18.4

HTML fishing usually refers to where you have the entire

0:21.2

fishing page included in the email. That of course does make the fishing attempt a little bit

0:28.8

easier in terms of not having to direct the user to an actual malicious web page. However,

0:36.2

the data still has to get to the attacker, and typically,

0:40.2

it was pretty easy to figure out where the data went. You just looked at the HTML, you looked

0:45.2

at the form, maybe there was some JavaScript that picked up the keystrokes, and then

0:50.1

send them to a specific URL. But while even these fairly simple sort of low-end fishing campaigns are using obfuscation now,

0:59.6

and Jan did take a look at a recent attempt here,

1:04.1

and the obfuscation being used in that email that makes it a little bit more difficult

1:09.9

to figure out where the data ends up.

1:12.6

But of course, a JavaScript debucker and the right breakpoints will very easily tell you

1:19.1

where the data is going.

1:21.0

And by the way, Jan will also be speaking at Sansfire.

1:25.2

Mid-July will have the conference and a link to it will be in the show notes.

1:31.6

And then just a quick update on the Folina Vulnerability MS-MSD-T or CVEE 22-30190.

1:42.3

Still no patch from Microsoft, but there is now an unofficial patch from a Zero Patch.

1:50.4

Serra Patch, a company that specializes in creating these micro patches, as they call it,

1:55.8

and they released a free patch for this vulnerability. Not sure if it's worth the risk really, given that there is a

2:03.7

workaround and probably applying. The workaround is about as hard as rolling out this

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.