meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, March 7th 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 March 2019

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. More Resume Malspam; Cloudflare Protects Drupal; Cisco Exploit; Monitorkit

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, March 7th, 2019 edition of the Sansanet Storm Center's Stormcast. My name is Johannes Ulrich.

0:09.0

And I'm recording from San Francisco, California.

0:14.3

Amazing how melspan with resume attachments are still a thing, but my usual rule is if you do see a lot of emails

0:23.1

like it they're probably successful otherwise the bad guys wouldn't waste resources sending them

0:29.5

the latest example that brad looked at used the iced id or borg bot to actually infect the system after the user did open the

0:40.6

vert document and of course enabled macros what I think makes this particular

0:45.9

version so dangerous is Trickbot trickbot is a new payload that's being

0:50.9

downloaded by the malware and it's actually using the Eternal

0:56.2

Plu-Smb-esque exploit.

0:58.6

Now this exploit isn't supposed to work against modern versions of SMB, but we all know

1:04.3

there are still people with SMB version 1 out there and in this case it's going then straight

1:09.3

for the Active directory domain controller once

1:13.1

there of course the bot would have access to all of your infrastructure so in essence all it takes

1:19.4

is one insecure endpoint with a user opening this resume and then of course SMB version one being

1:27.4

enabled to allow Eternal Blue to spread

1:30.7

the malware to your domain controller and I hope in this particular chain of events isn't a

1:37.4

problem for anybody listening to this podcast a type of website that's typically quite dangerous to visit, and most people don't

1:48.6

realize it, are local community websites, like, for example, websites operated by local churches

1:55.4

and the like. The problem here is that they often have been set up years ago using one of the many simple

2:03.8

free content management systems like for example triple of course there will be yet another

2:11.0

exploit for triple and then these websites are sitting ducks because there is really nobody to maintain them.

2:18.7

I have been asked quite frequently by groups like this how to secure their websites better.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.