meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, February 26th 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 February 2019

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. WinRAR ACE Exploited; QR Code Sextortion; Android FIDO2 Compliant; ICANN Pushing DNSSEC

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, February 26, 2019 edition of the Sansonet Storm Center's Stormcast.

0:08.4

My name is Johannes Ulrich.

0:09.9

And I'm recording from Augusta, Georgia.

0:14.5

Last week, Checkpoint disclosed a 15-year-old warner in the compression tool WinRRR.

0:21.6

While not installed by default on Windows systems, MinRRR is still quite popular and has sort of a significant following.

0:30.6

Now typically of course it's used for the RR compression format which tends to be more efficient and more space-saving than SIP.

0:41.7

But the vulnerability that the checkpoint uncovered is actually not related to the RAR format.

0:49.6

Instead, it's related to another format supported by WRRR and it's called the Ace Format.

0:57.0

It's other compression method and yes, it's also supported by this tool as well as other tools.

1:04.0

To make things more complicated, the WinRRR developers actually,, it's an old tool. They no longer have

1:11.6

the source code for the affected DLL. So what they instead did is they essentially just

1:18.2

removed ACE support from WinRAR and with that mitigated the vulnerability. So this

1:24.6

happened last week, but today I saw a report by 360 threat intelligence,

1:30.8

actually a tweet, where they say that there are now some mal-spammed exploits that are using

1:37.7

attachments that exploit this particular ace vulnerability in Winrarr. A sample of the exploit code was submitted to a virus total.

1:50.0

AV detection, well, it's sort of mixed at this point, and I would highly recommend that you expedite patching WinRRR.

2:00.0

If you still need ACE support, well, there are a number of alternative tools that will support this format for you.

2:07.6

In talking about malicious spam, DDA posted the latest greatest version of Sextortion.

2:16.6

This particular campaign

2:18.8

actually uses a QR code

2:21.2

to encode the Bitcoin address.

2:24.1

My guess here is

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.