meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, November 1st 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 November 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Encrypted Word Maldocs; iOS/macOS ICMP Error RCE; iOS lock bypass;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, November 1st, 2018 edition of the Sancton Storm Center's Stormcast. My name is Johannes Ulrich and I am recording from Jacksonville, Florida.

0:14.5

Brad took a look at what's new with encrypted word documents that are spreading malware. Encrypted documents, of course,

0:23.6

have been used for quite a while in order to usually bypass some simple antivirus filters.

0:31.2

Now, in this case, the password is one, two, three, four. It's mentioned within the body of the email. And the emails

0:40.8

themselves are typically either resumes or invoices, or at least that's what they claim to be.

0:48.2

Brad is in particular discussing the various payloads that he has seen with these type of malicious

0:54.1

documents over the last few years

0:56.0

looks like more recently these emails are mostly distributing the Nymai Malware.

1:03.0

Overall, some basic security awareness should probably take care of these type of emails.

1:09.0

They have been around for so long that I think

1:12.2

your users have probably seen them before. And then we have details regarding an interesting

1:20.1

vulnerability in iOS and MacOS that was patched with the release of iOS 12 and MagOS Mojave. So this is not something that

1:32.7

was patched yesterday when Apple released a number of updates, but this vulnerability was patched

1:40.3

a couple months ago and the researcher discovering it now is releasing some details about

1:48.0

the problem.

1:49.0

And it's a good thing that Kevin Backhouse, who is this researcher, did hold back the details

1:55.0

to give people time to patch because this is actually quite severe and easy to exploit, at least potentially

2:03.6

easy to exploit vulnerability.

2:06.4

The problem here is in how these operating systems deal with ICMP errors.

2:13.1

If an operating system sends an ICMP error back, it will copy the headers of the packet that caused

2:20.7

the errors as part of the ICMP payload. So once a packet is received, for example, a UDP

2:28.7

packet to a closed port, the operating system will create an error message and will copy the headers from this

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.