meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 26th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 April 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. PDF leads to PPT; VirusTotal Vuln; Apple Private Relay; Emotet fixes broken installer

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, April 26, 2000, 22 edition of the Sands and at Stormsendors Stormcast.

0:08.6

My name is Johannes Ulrich, and I am recording from Jacksonville, Florida.

0:14.3

Another nice quick malavre analysis example, this time from Xavier, who is talking about a PDF that then linked to a malicious

0:24.2

document.

0:26.0

Often we do have a malicious document being delivered as an ad hatchment or a simple link in an

0:31.8

email that the user clicks on, of course, that's often easily parsed by automated systems.

0:39.3

In order to prevent this, another trick that we certainly have seen a lot of in the last

0:45.7

couple of years is that the document being attached to the email itself is not malicious,

0:51.8

but instead just contains the link that then directs the user to the

0:57.2

malicious content.

0:58.7

And the example here starts out with a PDF.

1:01.9

Again, that's PDF is in itself not really malicious, meaning there is no real exploit here,

1:07.6

other than a link that links to a malicious PowerPoint file. PowerPoint is often

1:15.1

a little bit ignored when it comes to office documents, but of course, everything malicious

1:20.0

that you can do in Word or Excel, you typically are also able to do in PowerPoint. That

1:25.4

exactly what happens here. So Xavier walks you through the analysis of this document.

1:32.3

Well, in one way how you may quickly analyze some malware is of course a virus total and uploading to virus total is done fairly commonly.

1:42.3

If you think about it, virus total is trying to do something pretty difficult and dangerous.

1:48.2

They're willingly accepting malicious files, and then they have virus scanners,

1:54.2

so software on the host, on the server, scan that file that you uploaded. And well, researchers at SciSaurus

2:04.2

actually managed to exploit that process and gain remote code execution access on VirusTotals

2:12.2

servers. While in itself, of course, yes, no, this affects Google doesn't really affect you personally

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.