meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 2nd 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 April 2019

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. OpenOffice PDFs; Android Updates; Android Malware Redirects Phonecalls; Google Extends WebAuthn Support

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, April 2nd, 2019 edition of the Sansonet Storm Center's Stormcast.

0:08.8

My name is Johannes Orich, and I'm recording from Jacksonville, Florida.

0:15.2

We've got a quick diary today by DDA with a common false positive that people run into analyzing PDFs created with

0:24.7

open office or Libra office. These PDFs commonly do include an open action. Now this open

0:34.8

action is often found in malicious PDFs because it is then used to execute

0:40.7

JavaScript that's embedded in the PDF.

0:44.9

In the case of Open Office, this is however not the case, the open action is used to just

0:51.9

display the first page at the right zoom level. This is in line with

0:57.4

the PDF standard and the DA has next served from the particular PDF documentation. And Google

1:08.0

released an update for Android.

1:10.9

This update does fix two critical vulnerabilities in the media framework, a high one in

1:17.9

framework, and then another eight high severity vulnerabilities in system.

1:24.8

The high severity vulnerabilities typically allow for approach escalation while the

1:30.3

two critical vulnerabilities in media framework do allow for remote code execution. And of course

1:37.6

you may have to wait for your carrier to offer these patches for you. They do affect Android 7.0 through 9.

1:48.2

Talking about Android, some pretty ingenious Android Malver apparently is making the rounds in Asia.

1:57.3

In this particular case, the Android application is interfering with calls to specific phone

2:05.8

numbers. The way this application apparently has been used is that after a user installed

2:11.8

it on their phone, typically assuming that it is actually a valid application from their bank. If the victim now is

2:20.7

making a voice call to the bank's official phone number, this call is actually rerouted to the attacker.

2:29.2

This of course now gives the attacker the chance to be very plausible and believable because the victim

2:35.4

thinks that they did what they were supposed to.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.