4.9 • 696 Ratings
🗓️ 6 April 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, April 6, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, |
0:10.2 | and I'm recording from Jacksonville, Florida. Using job offers to gain individuals' trust is nothing |
0:18.3 | really new, but the latest campaign is using LinkedIn in order to come up |
0:24.2 | with more convincing, but still fairly mass-produced emails. In these emails, it essentially |
0:32.6 | just takes your job title from LinkedIn, adds offer to the subject, and then includes a zip file |
0:40.7 | that it hopes the mark will open, and this particular zip file will then install the |
0:47.3 | MooreX malware Trojan that can then be used to infiltrate a network. |
0:55.1 | Morex is fairly non-specific malware. |
0:58.4 | It's not really associated with a particular threat actor. |
1:01.8 | It is actually offered sort of as malware as a service. |
1:06.1 | So whoever would like to preach a certain type of organization can essentially hire the people behind |
1:14.1 | Morax in order to launch the attack. This is, of course, a very spammy email and probably not going |
1:22.1 | to trick a lot of people that are listening to this podcast. I just want to point out that this sort of a recurring theme |
1:29.0 | where job offers, even sometimes job offers made in person or over the phone, are being used |
1:35.9 | to sort of steal information. This is a very difficult balance sometimes to find. I also talk to |
1:43.8 | people that essentially aren't able to |
1:46.3 | look for a job anymore because they consider any offer that comes in a potential trick to |
1:53.1 | solicit information from them. In general, stay with trusted recruiters and of course that's where social networking sometimes helps, is to build |
2:03.7 | up a network that is able to assist you if you're looking for a job. |
2:10.5 | And if you've got an interesting exploit for an older vulnerability CVE 2019, 8761. The vulnerability itself was patched in October of 2019, but I haven't |
2:25.2 | really seen an exploit for it and it's kind of interesting. As opening a simple text file in Apple's |
2:33.3 | text edit could lead to the exfiltration of arbitrary files. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.