meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, February 21st, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 21 February 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. OneNote Suricata Rules; New IIS Backdoor; Outlook Spam; Godaddy Breach

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, February 21st, 2020,

0:04.5

edition of the Sandin and Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm

0:10.6

recording from Jacksonville, Florida. The day today published a follow-up to an earlier diary

0:18.1

that he published regarding Suricata rules for OneNote files.

0:23.5

Now, OneNote files still a big deal, still actively being abused in order to bypass

0:29.8

some of the macro restrictions that Microsoft has put in place.

0:35.6

So having good rules to detect these kind of attacks

0:39.0

remains very valuable.

0:42.0

The one thing that DDA really adds in this new diary entry

0:46.4

is detailed explanations as to what these rules are looking for.

0:52.0

And this is of course very helpful as attacks evolve, as different

0:56.6

file types may be used, or as these OneNote files are used differently to understand what

1:03.0

these rules are able to detect and what they're not able to detect, but also how to possibly

1:08.2

adjust them if you ever need to modify these rules to make them work with new variations of these attacks.

1:17.4

And talking about new attacks, Symantec has an interesting write-up about a new Microsoft IIS backdoor that's being used in order to gain persistent access to a compromised

1:30.5

IIS server. So the backdoor itself is not really the weakness here. It's the result of

1:37.1

another vulnerability, maybe in your application, maybe in your configuration that's then being

1:42.0

used to install this backdoor. What makes this backdoor

1:46.6

unique is that it injects itself into an existing legitimate DLL. Samantha calls this backdoor,

1:56.3

and I hope I'm pronouncing it right here, FREP and IIS. The first part FRIB that comes from the Failed Request Event Buffering.

2:06.8

That's the actual feature kind of being abused here.

2:10.8

Failed request event buffering is implemented by DLL, ISFRIB.DL, and it's used in order to trace failed request to help you debug what's

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.