4.9 • 696 Ratings
🗓️ 2 March 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, March 2nd, 2023 edition of the Sandsenet Storm Center's |
0:08.0 | Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. |
0:15.3 | Savier today found a Python script bringing back memories. This Python script steals information from gamers. |
0:24.6 | I remember some of the very early pieces of malware that I've been sort of working on many, |
0:29.9 | many years back, that were often referred to as gold farming, where you had at hackers |
0:36.1 | stealing virtual goods, for example, from World of Warcraft |
0:40.2 | was the big thing back then. Now, World of Warcraft was also one of the pioneers as a result |
0:46.3 | when it came to two-factor of the occasion. This script uses Telegram as a command control channel and then essentially searches your system for credentials and other information regarding several games. |
1:03.5 | Minecraft is targeted here, but also the platform Steam, which of course can be used for various other games and other domains and |
1:13.7 | such are being intercepted in order to steal users' data. The exact monetization here isn't quite |
1:20.1 | clear just from the malware itself, but online gaming credentials are valuable. They are being |
1:27.4 | traded and often then again, just like in the old days with World |
1:31.3 | of Warcraft, you may find, for example, virtual goods being removed from accounts or the accounts |
1:37.2 | themselves being used for the status they have in the game. |
1:42.5 | And first, DNS abuse special interest group came up with an interesting DNS abuse techniques |
1:49.4 | matrix. |
1:50.1 | The document was actually released a while ago. |
1:52.8 | I sort of forgot about it, but was just reminded about it again by a news article. |
1:59.6 | What I find interesting about this document is that it gives you a very |
2:03.5 | thorough list of how DNS may be abused. They list about 21 techniques and its attacks against, |
2:13.0 | for example, your DNS infrastructure against registrar, but also the use of DNS, for example, |
2:20.4 | as a command control channel. And then for each one of these threats, they're then listing |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.