meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, June 9th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 June 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. CryptXXX Update; Flash Keyboard: Keyboard or Malware? #Firefox #IoT #randsomware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, June 9th, 2016 edition of the Sansonet Storm Center's Stormcast.

0:07.2

My name is Johannes Ulrich.

0:08.7

I'm recording from Baltimore, Maryland.

0:11.9

Brad published a diary yesterday, updating us on what's happening with the Neutrino Exploid Kit and Crypt Triple X.

0:20.1

Crypt Triple X has become one of the predominant pieces of

0:24.5

ransomware that's going around these days. In the past, it usually used the Angler Exploid Kit

0:31.3

in order to install itself. But as Brad points out, we have seen this before that Malver switches exploit kits.

0:38.5

In this case, CryptTriplex switched to the neutrino exploit kit.

0:43.8

In my opinion, that's typically due to one exploit kit sort of running its course.

0:49.5

They're seeing diminishing returns from a particular exploit kit.

0:53.7

So they're switching exploit kits in order

0:56.4

to get users that are more susceptible to the other type of exploit kit.

1:02.4

A British security company Pentest Limited took a closer look at a popular Android keyboard,

1:09.3

the flash keyboard. Now what you found is that not only

1:13.6

does this particular application require excessive permissions, pretty much anything there is.

1:20.6

It does require access to the camera, to your GPS location, to SMS messages, and also it does ask for permission to, for example,

1:31.8

replace your screensaver and the like. It sort of asks for every permission there is.

1:38.5

Now, Android is quite proud of its fine-grained permission system, and it's certainly a good

1:44.0

thing to offer

1:45.0

it to users, but this particular application was downloaded millions of times and users apparently

1:53.0

don't really care about these excessive permissions. In addition, this particular application

1:58.0

also exfilterates quite a bit of data. It collects about the user to the producer of the application in China.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.