meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 28th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 December 2021

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Cobaltstrike via MSBuild; Bypassing MacOS Gatekeeper; Spider-Miner

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, December 28, 2021 edition of the Sansonet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich.

0:09.7

And today I'm recording from Jacksonville, Florida.

0:13.6

Living off the land attacks is still a big deal, and Renato came across an interesting trick that he documented in a post today where MS build is being used, the Microsoft build engine, which for the Unix folks out here roughly sort of compares to like the make utility in Unix.

0:34.2

MS build is used to build software, but as part of this, it's able to execute scripts.

0:39.8

And that's exactly what the attacker did here.

0:42.6

They used MSBuild to run a script that then essentially turned out to be the good old

0:47.6

Cobalt Strike Beacon.

0:49.5

As Bernato points out, this is of a typical trust, a developer tool that's being used

0:53.4

here. Not uncommon.

0:55.5

The NetHacker takes advantage of those tools.

0:58.5

Microsoft does recommend to pluck these tools with the Windows Defender application control.

1:06.1

May not always work because, of course, there are legitimate uses for these tools and people are

1:12.2

some a little bit hesitant to just turn off tools like this but if you're interested

1:17.2

in how MS build was used here and Renato goes to quite a bit of depth like you know

1:22.9

how to decrypt the connection and that Cobalt strike establishes via a proxy.

1:28.2

Lots of interesting things in this post.

1:30.8

So take a look and see what Renato has to teach you here.

1:37.0

And we have yet another interesting way to bypass Apple's gatekeeper and code signing requirements.

1:46.0

Patrick Wardle has details in his blog post regarding a bug that was recently fixed in

1:51.8

macOS, Big Sur.

1:54.7

Gatekeeper, notarization, and these technologies are used by Apple in order to warn the user if unsigned software is

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.