4.9 • 696 Ratings
🗓️ 4 January 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, January 4, 22 edition of the Sansonet Storm Center's |
0:06.3 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.2 | Xavier ran into a good old fake anti-malware scam, and in this case, Meg Affie was impersonated |
0:20.5 | by the phishing email, essentially enticing |
0:24.2 | you to renew a McAfee subscription. Of course, the attacker here may count somewhat on you actually |
0:31.6 | using the product and maybe you're not really sure if it expired or when it is about to expire. |
0:38.0 | Now, if you click on the link, then you get the good old fake scan that will tell you |
0:43.6 | that you are infected with five viruses, actually relatively small number compared to what |
0:49.4 | some of these tools are advertising. |
0:52.8 | Often what follows next is very basically in the simplest case, just take your money, |
0:58.5 | so you'll pay them $30 or whatever it is, and you think you renewed your McAfee license, |
1:04.3 | but you actually send the money to some scammer. |
1:07.0 | In the worst cases, of course, you may end up downloading some actual malware from the website that claims to be associated with the antivirus maker. |
1:19.0 | I've also recently seen a lot of emails that sort of contain fake invoices that claim to be for some anti-malware product. |
1:29.2 | Usually the numbers are very large to scare the victim. And the intent then is to either call an 800 number that of course |
1:36.2 | will then run off the fake tech support scam on you or basically verify that you want to cancel |
1:44.0 | the order by providing your credit card number, |
1:47.0 | which then of course will be charged for whatever amount the attacker feels like. |
1:52.0 | Well, fake antivirus is one problem, but we also see occasional vulnerabilities in real antivirus software. |
2:00.0 | Latest example, Trent Micro, the Apex 1 product, as well as the very free |
2:06.7 | business security product, is susceptible to exploitation. |
2:12.1 | Now, the most severe one here is a privilege escalation vulnerability, so the attacker would already need to run code |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.