meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, August 14th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 August 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. New Sextortion Wave; Intel Puma; btlejack

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, August 14th, 2018 edition of the Sandson and Stormsendos Stormcast.

0:07.9

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.3

The extortion scams that we have seen evolving over the last few weeks have come up with yet another twist. The latest version of

0:23.7

this scam does try to make the scam more believable by offering the last four digit of

0:32.0

one of your phone numbers. I guess the bad guys have figured out that a lot of people watch porn on mobile

0:39.8

devices. So they claim that these are the last four digits of the mobile phone that they

0:46.3

compromised. Just like before by offering up a little bit of information like this, they're trying

0:53.1

to get people to actually believe them

0:55.5

and pay the ransom. Now, the question here is, why do they only give you the last four digits?

1:02.8

Did he had a pretty plausible idea in that this data actually does not come from a breach like

1:10.1

the password data we have seen before. Instead,

1:13.3

a lot of websites when you, for example, try to reset your password, they will give you the

1:19.3

last four digits of the phone number. They're going to send a password reset code to or

1:26.0

a token for a two-factor SMS message. The wording also keeps

1:31.0

changing a little bit. There are probably multiple actors in play here, so this may just be a

1:37.5

later group that just doesn't have access to any breach information, which may include your complete phone number.

1:47.2

And Intel released a bulletin with details regarding a denial of service vulnerability in its

1:53.7

troubled Puma cable modem chipset.

1:57.4

This chipset family came originally from Texas Instrument, but is now developed and sold

2:04.7

by Intel for the last couple versions and has had a history with users complaining about

2:11.7

lower-than-advertised performance and modem crashes. Apparently, one of the causes of these crashes was the bug

2:21.3

that is now being fixed here. Now, typically, this would be a patch that will be applied

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.