meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 21st, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 21 December 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Agent Tesla Code Reuse; VMWare Workspace ONE; KNXlock

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, December 21st, 2021 edition of the Santernat Storm Center's Stormcast.

0:08.8

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.5

Jan took a look at a malicious PowerPoint file today, and according to Jan, he has seen a steep increase in PowerPoint being used to distribute matter.

0:26.6

Of course, PowerPoint being a Microsoft Office type document, it is able to hold the same macros as any other office document.

0:38.1

This particular document did bring Agent Tesla,

0:42.3

and it arrived as a PPM file.

0:46.2

PPM stands for PowerPoint add-ins with macros, and, well, the last part here.

0:53.6

Macros is really sort of what's important.

0:56.0

Jan has a good walkthrough of this particular malicious file and how it works, nice diagram

1:03.0

in the different stages, how components are loaded.

1:06.0

He also points out that a good part of this particular malware

1:11.5

is actually just based on open source code.

1:14.4

And while some of it is sort of exploit code,

1:16.8

like a UAC bypass, there's also some more generic code,

1:21.1

like for example, how to deal with SIP files.

1:25.0

That's just borrowed from GitHub.

1:29.1

And if we got updates from VMware, actually two updates on consecutive days for workspace

1:34.5

one, and the critical one with a CVSS score of 9.1 is a server site request forgery

1:43.3

vulnerability that would allow anHacker access to sensitive information

1:48.9

without having to authenticate.

1:52.5

VMware also published a pretty extensive list of products that are vulnerable to log 4J.

1:58.6

Some of them start having some patches available now.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.