meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 25th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 April 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Aukill BYOVD Ransomware; Papercut Exploit; Solarwinds Patch; APC UPS Software Patch; Virustotal Code Insight

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 25th,

0:04.0

2023 edition of the Sands and at Storm Ther's Stormcast. My name is Johannes Ulrich,

0:11.1

and today I'm recording from San Francisco, California.

0:15.5

Today is a bit of a patch Tuesday kind of episode with patches from a number of vendors,

0:23.2

but before we jump to patches, let's catch up on an issue I didn't cover last week. Softos and others are reporting

0:32.5

about the use of Aukil by Ransomware Gangs. Aukil uses the bring your own vulnerable driver technique

0:41.4

to disable endpoint protection agents. The driver in use by Aukil is an older known vulnerable

0:49.9

driver from Process Explorer. Process Explorer, of course, comes from Sys Internal. It's part of Microsoft,

0:57.6

so it's a valid signed, which is part of what makes this driver so interesting. The issue that

1:07.0

this driver is vulnerable to has been known until 2021.

1:11.6

It has been patched since then, but of course this old driver is still signed, it's still

1:18.6

valid, so it can still be loaded in operating systems, and with that it can be used for

1:24.6

privilege escalation.

1:26.6

This particular driver apparently was also used in the open source tool, a backstap.

1:32.0

Aukil is sort of based on backstap, and it uses then the privileges it gets from this driver

1:40.7

to disable endpoint protection agents.

1:45.0

And by the way, patching here is not really going to help you

1:48.0

because the attacker essentially installing this out-of-date driver for you.

1:54.0

So even if you are patched, you're still vulnerable to this privilege escalation attack.

2:00.0

More details about this particular attack

2:03.0

and how it's now being used to disparate ransomware can be found in Sophos' blog. So with that,

2:12.1

let's talk about vulnerabilities and exploits in early March. Two vulnerabilities were patched for paper cut.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.