meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 26th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 July 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. More Python Malware Reversing

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 26, 2016 edition of the Sansa and Storm Center's StormCast.

0:07.4

My name is Johannes Ulrich, and I'm recording from Jackson, Florida.

0:11.8

DDA today continues his fantastic series on how to deal with Python Malver.

0:18.4

Again, this is a Python code that uses Pi installer in order to create an executable.

0:25.6

Today, Did he did add another layer of obfuscation here where he actually had embedded Python bytecode

0:33.8

that then was run inside the Python script now in order to actually decompile all

0:41.7

of this you need to add the special Python bytecode header so it's going to be

0:48.5

recognized by Python decompilers and once you prepend the right 8 bytes here, Python decompilers should

0:58.4

have no problem decompiling the code.

1:02.0

And yesterday I mentioned PowerBer, the fairly basic crypto ransomware that does try to extort

1:10.0

money from victims by claiming to be lucky.

1:13.4

Well, I also mentioned that there's a decryption tool but didn't actually link to it.

1:18.7

I'll do that today in the show notes.

1:22.2

So if you run into Powerware, Palo Alto's Unit 42 did release a decryption tool written in Python and

1:30.8

it's published on GitHub and you will find the link to it in my show notes.

1:37.9

And if you're looking for decryptors for any other ransomware, it has always been difficult to track down individual decryptors.

1:47.0

A new website, no more ransom.org, does have links to all of the different decryptors

1:55.0

that have been published for various versions of ransomware. So take a look at the site if you are getting infected and hopefully

2:04.1

you'll find the cryptor for whatever hit you there. It also includes a feature they call

2:11.0

Crypto Sheriff, which essentially you just upload an encrypted file to and then it attempts to figure out what kind of ransomware

2:20.3

you got infected by and whether or not there is a decryption solution available.

2:26.3

And Team Panku, a Chinese team that deals with iOS jail breaks, has released an app that will jailbreak all current versions of iOS,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.