4.9 • 696 Ratings
🗓️ 29 November 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Thursday, November 29th, 2018 edition of the Sansanet Storm Center's |
| 0:05.9 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
| 0:12.6 | One of the most common attack that I see against Max is fake Flash Player updates or Flash Player downloads. Some of them are actually pretty good |
| 0:23.0 | in the way they sort of emulate the operating system dialogues that usually see if you're |
| 0:27.9 | installing or updating Flash. Today, we do have one example by Xavier here, and he's sort of |
| 0:35.5 | continuing his theme from yesterday about obfuscating badge |
| 0:39.7 | script because that's used to here actually install the malware. |
| 0:44.9 | Now the virus total score that Xavier got when he submitted this particular sample to |
| 0:50.5 | virus total was actually quite low only one anivirus engine recognized it what i often found |
| 0:56.5 | with these dmg files that the dmg file itself isn't recognized but once you mount it and once the |
| 1:04.2 | antivirus engine then looks at the components inside the dmg file it often recognizes one of them as malicious. |
| 1:12.5 | So the effectiveness of antivirus may be a little bit better than virus total suggests |
| 1:19.1 | in these examples. |
| 1:21.0 | But in the end, the vulnerability that's being attacked here is the user. |
| 1:25.1 | There is no real weakness necessarily in the operating system being exploited |
| 1:28.8 | here other than tricking the user into installing the malicious file for the attacker. |
| 1:36.0 | And talking about users willingly installing bad software, it's sometimes not malware. That's the |
| 1:42.3 | problem. Latest case, Senheiser's head setup software. |
| 1:46.9 | This software is used to allow headsets by Senheiser to connect to various soft phones. |
| 1:54.2 | Now in order to accomplish this, Senheiser provides some software that sets up a secure web socket. |
| 2:01.6 | That secure web socket is secured with a certificate that's signed by a |
| 2:06.6 | Senheiser certificate authority. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.