meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 7th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 December 2021

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. OOB Networks for Incident Handling; Unitrends Backup Updates; Deanonymizing Tor;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, December 7, 2021 edition of the Sansonet Stormers Stormcast. My name is Johannes Ulrich.

0:09.5

And I'm recording from Jacksonville, Florida. Good reminder from Xavier today based on a recent tweet

0:17.1

to be careful in your instant handling procedure to use out-of-band communication.

0:23.5

The particular incident that Xavier is referring to is a tweet by an unknown person that showed

0:31.6

a screenshot of an organization's Slack channel as they were analyzing a Ragnar Locker infestation.

0:41.4

It appears the attacker was able to access a workstation used as part of the incident response

0:46.7

team via RDP. And as a result, of course, they were able to stay ahead, step of the instant response team as they were able

0:56.7

to monitor their communication. Setting up a communication to be used during an instant like this

1:03.3

is not trivial and something of course that requires some advanced planning. You should consider

1:09.0

all systems that are connected to the corporate network

1:12.6

or have been connected to the corporate network recently compromised. So often what you're left

1:18.8

with is essentially, well, good old phone calls to each other, maybe actually get into the same

1:25.3

room and talk to each other in person or maybe set up some

1:30.3

kind of conference call bridge that's not part of the usual infrastructure used by the organization

1:37.2

because a lot of these conference call systems have some kind of web-based interface or whatever

1:43.7

that may have been accessed using a

1:46.3

compromise system so attackers may have access to things like access pins. If you do set up

1:53.8

conference calls, also make sure that individuals who join the call are identifying themselves.

2:00.9

And talking about ransomware, one of the last lines of defense, typically when you're dealing

2:05.1

with Ransomber, is backups.

2:07.7

So it's somewhat timely that Kasea released a critical update to its Unit Rends,

2:13.6

a backup blinds, before version 1055.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.