meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 5th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 July 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. 7-Zip and MotW; Session Manager Backdoor; Chrome 0Day Patch

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 5, 22 edition of the Sansonet Stormsendors Stormcast.

0:07.9

My name is Johannes Ulrich, and I'm recording from Stockholm, Germany.

0:13.3

One thing I mentioned last week is how 7-Sip introduced new option to allow you to apply the mark of

0:20.5

the web to any files extracted

0:23.3

from an archive that was downloaded from a website. This feature has three settings. You either

0:31.7

may not set the flag at all for any file extracted. You may set it for all of the files extracted.

0:40.8

And then there's a third option, it's kind of interesting, and that applies the flag only

0:45.6

to office files with, well, the history of office files being abused, of course, makes some

0:51.6

sense.

0:52.7

So Didi take a closer look at how this feature actually works,

0:58.1

actually disassembled part of the code here of 7-Sip. And what he found was that yes,

1:06.0

somewhat expected. This really is only applied if specific extensions are being used for the file name.

1:13.7

You have your standard subjects suspects here, like Doc XLS, PowerPoint, PPP, and such.

1:22.2

One thing that they found missing was RTF, a lot of, in particular, like, Folina exploits and such that we have seen recently took

1:32.8

advantage of RTF to kind of fly a little bit underneath the radar and be not sort of

1:38.9

fully identified as an office document.

1:43.4

So just apply the mark of the web to all files.

1:46.3

It's probably a safe option here.

1:48.0

Remember, this only works if you're using the NTFS file system.

1:53.8

Then an alternative data stream is added to the file that does contain this flag.

2:00.1

And then prompts the user to acknowledge that the file was downloaded

2:04.6

from a specific website. And Kaspersky has a good write-up of an interesting IIS backdoor that

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.