meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 5th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 July 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Pseudo Darkleech Uses Simpler Javascript Include;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 5th, 2016 edition, Sandtonet Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and I'm recording from Jackson, Florida.

0:11.9

Pratt this weekend wrote about a change that he's seeing in the Pseudo Dark Leach campaign.

0:17.6

In the past, according to Pratt, the pseudo-darkleash campaign usually left a few

0:24.3

kilobytes of JavaScript, heavily obfuscated JavaScript in websites that it compromised. More

0:32.2

recently, what he's seeing is really just sort of an included JavaScript that then points to a different site.

0:39.9

Likely, in my opinion, this is due to making a little bit more difficult to spot this particular

0:46.2

JavaScript. Typically, the old style JavaScript was very easy to identify as malicious

0:52.6

just because of the heavy obfuscation of that script.

0:57.0

Last Thursday I talked about some vulnerabilities that were discovered in Lenovo's system management mode code

1:04.0

that could lead to an attacker flashing the bias with malicious code. Now back then I just talked about how this could

1:14.8

possibly be happening there is an exploit available now that exploits just this

1:21.3

particular vulnerability has been published to GitHub I have no thing pad, so can't really test if it's working or not.

1:31.3

But according to the comments I've seen, the exploit is working and is genuine.

1:37.8

According to the author of the original blog, the code that's vulnerable here, at least in part, comes from Intel

1:46.0

reference code that Intel published, so it's very possible that other vendors are affected

1:52.6

as well. Lenovo stated that it actually didn't write the code itself, it received it from

1:59.1

an upstream vendor, so it's possible that that

2:02.7

particular vendor sold this code to multiple laptop makers and as a result, they would be

2:10.3

vulnerable as well. So watch out for firmware updates, not just from Lenovo, but make sure that the firmware updates that

2:20.6

you're receiving are authentic.

2:23.3

Another patch here that you may see show up in the next couple days or weeks, effects

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.