4.9 • 696 Ratings
🗓️ 12 July 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, July 12, 2016 edition of the Sansonet Storms and a Stormcast. |
0:07.8 | My name is Johannes Ulrich and the I'm recording from Jacksonville, Florida. |
0:12.1 | You got a great new guest diary by Yasser Munsour. |
0:15.7 | He's talking about the malicious vert macros that he observed install malware. Interestingly here the |
0:22.7 | malware is embedded in the word document and then extracted by the word macro. Very detailed |
0:31.1 | instructions here with lots of step-by-step guidance on how you can do something like |
0:36.5 | this yourself pretty much with open source |
0:40.0 | tools so if you have to reverse engineer malware and you're running into one of these |
0:45.6 | word macros you may want to take a look at this guest diary and by the way we always accept |
0:51.5 | guest diaries if you have an idea just it to us before you go through trouble and writing it |
0:58.8 | all up. |
1:00.1 | And the Pokemon GoFever is continuing not just with kids running around trying to find |
1:06.5 | Pokemon's, but also with security researchers finding vulnerabilities in the application. |
1:12.6 | First of all, if you installed Pokemon Go on an iOS device, you probably gave it access to your Google account, |
1:21.6 | which means that the application has full access to everything Google on your phone or on your Google account, including |
1:31.5 | emails, pictures, and Google trive data. There appears to be no simple way right now to limit |
1:40.5 | the permissions that the Pokemon app has on your phone. Secondly, the web API that the |
1:49.1 | application uses appears to be vulnerable to man the middle attack. It does not actually |
1:54.8 | verify ZSEL certificates. So with that, it's not really such a huge deal for the user, more for the people behind the app, |
2:03.6 | because it does allow you to gain arbitrary goods, for example, in the Pokemon Go Online store. |
2:11.6 | And one problem with simple speaker-independent voice command systems like Siri has always been that someone |
2:20.9 | could play a voice file speaking commands that would then get interpreted by the phone or whatever |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.