4.9 • 696 Ratings
🗓️ 28 April 2020
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, April 28, 2020 edition of the Sandinand Storm Center's Stormcast. |
0:07.5 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.4 | Leave it up to the bad guys to abuse yet another security feature in order to hide malware. |
0:20.6 | Xavier looked at some malware that used the PowerShell |
0:24.4 | PS credential class in order to store malicious code. Now, usually a PS credential is used |
0:32.6 | in order to store usernames, passwords, and any other credentials being used for authentication. |
0:38.9 | So this way you have a nice central repository of this information that you can then use in |
0:44.3 | your scripts. |
0:45.0 | But in this case, the bad guy pretty much had some simply obfuscated script stored as a password |
0:53.0 | essentially that could then be extracted and de-ovescated and executed. |
0:59.0 | Anti-malware detection rates for this kind of malware, of course, is not exactly great for this particular sample. |
1:07.0 | Virus total showed a score of six out of 59 anti-malware products, recognizing |
1:14.2 | the file as malicious. Now, Xavier's advice here at the management automation PS credential |
1:21.3 | and convert to secure string to the list of suspicious strings that you look for when you're looking |
1:28.9 | for malicious PowerShell scripts. |
1:33.0 | And today, Zoom finally released its famous version 5 that it promised last week, so a day |
1:39.6 | late or so, but still it was released. |
1:42.4 | But Zoom isn't the only sort of collaboration and video |
1:45.7 | platform that attackers have their eyes on. Turns out there was an interesting, even though not |
1:52.0 | all that terribly critical, vulnerability in Microsoft Teams. The problem here was that when Microsoft |
1:59.3 | teams would access images, it would send an authentication |
2:03.9 | token along with that request that would have all the information that you need to take |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.