meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, September 27th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Emotet Update; Fedora Crypto Policies; Android Banking Trojan

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, September 27th, 2018 edition of the Sansonet Storm Center's

0:07.3

Stormcast. My name is Johannes Ulrich, and the time recording from Las Vegas, Nevada.

0:14.3

Brad today has an update for us on Emotet. Emotad used to be a banking trojan but has morphed, as Brad explained, to

0:24.3

a malware delivery service. Now, the latest round that he has been observing used word macros

0:31.4

in order to then download additional malicious files. The word files either arrived directly as an attachment to an email

0:40.5

or just as a link that if clicked on would then download the malicious document. In some cases,

0:48.5

Brad has also observed PDFs with, again, links that will then download the Word document. So the PDF itself isn't really

0:57.9

malicious other than delivering the malicious link. In the case that Brad is describing here,

1:05.3

Emot had actually then installed three different pieces of malware. As usual Pratt does show how all of this

1:14.5

happened. He also links to indicators of compromise, IP addresses,

1:19.7

hashes as well as traffic captures from the infection in his lab. And if you are

1:27.3

running Fedora Linux you may have run into a problem with SSH after the latest

1:34.5

round of updates.

1:37.0

Fedora updated its crypto policies, which essentially changes the order in which different

1:43.2

crypto algorithms are being used for

1:46.4

S-S-H connections. The problem here is that as a result, if your server does support multiple

1:54.0

cryptographic protocols, you may actually get a different key from the server than the one

2:00.7

that you have saved in your known

2:02.7

hosts file. This will result in a warning that essentially the key has changed. Now, in an

2:08.8

interactive session, this may not be a big deal, but if you are relying on S.H in Grand

2:15.5

Jobs and the like, so for unattended SESH sessions, these sessions may

2:19.7

now fail because of this warning. This affected Fedora 29, and an update has already been

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.