4.9 • 696 Ratings
🗓️ 21 May 2020
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, May 21st, 2020 edition of the Sansonet Stormsendors Stormcast. |
0:07.8 | My name is Johannes Ulrich. |
0:09.4 | I'm recording from Jacksonville, Florida. |
0:14.2 | Brad today is walking us through an ice ID infection that he observed earlier this week. It arrives as so often as a VERT or Excel |
0:25.7 | document with macros and then installs an executable. Now, a couple things that sort of stick out |
0:33.4 | here. First of all, as so often, we do also see odd top-level domains like XYC.club and dot-top. |
0:43.2 | Don't we see a lot of valid domains among those top-level domains, so something that in many |
0:49.5 | organizations they may just block these top-level domains. Another interesting sort of feature here is that part of the executable is encoded in a PNG file, |
1:01.5 | so in an image, and then used by the initial downloader to assemble the actual malicious executable. |
1:10.0 | This type of malware tends to be fairly easy to defend |
1:13.5 | against, like for example, these top level domains and then simple techniques just to harden |
1:19.7 | windows. Now, what these actors usually count on is that you have a couple systems in |
1:27.2 | network that are out of spec |
1:29.3 | and can be used to then essentially serve as a beachhead for an attack like this. And of course, |
1:34.8 | they're also just often going after home users. And researchers at Tel Aviv University came up |
1:41.6 | with an interesting new denial of service attack that again uses |
1:46.2 | DNS. They're calling it the NXNS attack and well the name comes from the NX domain. The Kent found |
1:55.0 | a reply as well as from NS, NS records that are being used in this attack. |
2:04.9 | This attack requires that recursive name server will first connect and try to resolve the attacker's domain. |
2:10.0 | Now, the attacker is going to reply with a pretty long list of |
2:16.3 | NS records, name servers that are actually not responsible for |
2:20.7 | the particular domain. So what will happen now is that your recursive name server will |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.